Merge #281828: staging-next 2024-01-18

+2222 -1581
+3 -3
doc/languages-frameworks/emscripten.section.md
··· 86 87 postPatch = pkgs.lib.optionalString pkgs.stdenv.isDarwin '' 88 substituteInPlace configure \ 89 - --replace '/usr/bin/libtool' 'ar' \ 90 - --replace 'AR="libtool"' 'AR="ar"' \ 91 - --replace 'ARFLAGS="-o"' 'ARFLAGS="-r"' 92 ''; 93 }) 94 ```
··· 86 87 postPatch = pkgs.lib.optionalString pkgs.stdenv.isDarwin '' 88 substituteInPlace configure \ 89 + --replace-fail '/usr/bin/libtool' 'ar' \ 90 + --replace-fail 'AR="libtool"' 'AR="ar"' \ 91 + --replace-fail 'ARFLAGS="-o"' 'ARFLAGS="-r"' 92 ''; 93 }) 94 ```
+1 -1
doc/languages-frameworks/rust.section.md
··· 701 hello = attrs: lib.optionalAttrs (lib.versionAtLeast attrs.version "1.0") { 702 postPatch = '' 703 substituteInPlace lib/zoneinfo.rs \ 704 - --replace "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo" 705 ''; 706 }; 707 };
··· 701 hello = attrs: lib.optionalAttrs (lib.versionAtLeast attrs.version "1.0") { 702 postPatch = '' 703 substituteInPlace lib/zoneinfo.rs \ 704 + --replace-fail "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo" 705 ''; 706 }; 707 };
+1 -1
doc/stdenv/platform-notes.chapter.md
··· 54 # ... 55 prePatch = '' 56 substituteInPlace Makefile \ 57 - --replace '/usr/bin/xcrun clang' clang 58 ''; 59 } 60 ```
··· 54 # ... 55 prePatch = '' 56 substituteInPlace Makefile \ 57 + --replace-fail '/usr/bin/xcrun clang' clang 58 ''; 59 } 60 ```
+17 -6
doc/stdenv/stdenv.chapter.md
··· 230 231 postInstall = '' 232 substituteInPlace $out/bin/solo5-virtio-mkimage \ 233 - --replace "/usr/lib/syslinux" "${syslinux}/share/syslinux" \ 234 - --replace "/usr/share/syslinux" "${syslinux}/share/syslinux" \ 235 - --replace "cp " "cp --no-preserve=mode " 236 237 wrapProgram $out/bin/solo5-virtio-mkimage \ 238 --prefix PATH : ${lib.makeBinPath [ dosfstools mtools parted syslinux ]} ··· 1253 1254 Performs string substitution on the contents of \<infile\>, writing the result to \<outfile\>. The substitutions in \<subs\> are of the following form: 1255 1256 - #### `--replace` \<s1\> \<s2\> {#fun-substitute-replace} 1257 1258 Replace every occurrence of the string \<s1\> by \<s2\>. 1259 1260 #### `--subst-var` \<varName\> {#fun-substitute-subst-var} 1261 ··· 1269 1270 ```shell 1271 substitute ./foo.in ./foo.out \ 1272 - --replace /usr/bin/bar $bar/bin/bar \ 1273 - --replace "a string containing spaces" "some other text" \ 1274 --subst-var someVar 1275 ``` 1276
··· 230 231 postInstall = '' 232 substituteInPlace $out/bin/solo5-virtio-mkimage \ 233 + --replace-fail "/usr/lib/syslinux" "${syslinux}/share/syslinux" \ 234 + --replace-fail "/usr/share/syslinux" "${syslinux}/share/syslinux" \ 235 + --replace-fail "cp " "cp --no-preserve=mode " 236 237 wrapProgram $out/bin/solo5-virtio-mkimage \ 238 --prefix PATH : ${lib.makeBinPath [ dosfstools mtools parted syslinux ]} ··· 1253 1254 Performs string substitution on the contents of \<infile\>, writing the result to \<outfile\>. The substitutions in \<subs\> are of the following form: 1255 1256 + #### `--replace-fail` \<s1\> \<s2\> {#fun-substitute-replace-fail} 1257 + 1258 + Replace every occurrence of the string \<s1\> by \<s2\>. 1259 + Will error if no change is made. 1260 + 1261 + #### `--replace-warn` \<s1\> \<s2\> {#fun-substitute-replace-warn} 1262 + 1263 + Replace every occurrence of the string \<s1\> by \<s2\>. 1264 + Will print a warning if no change is made. 1265 + 1266 + #### `--replace-quiet` \<s1\> \<s2\> {#fun-substitute-replace-quiet} 1267 1268 Replace every occurrence of the string \<s1\> by \<s2\>. 1269 + Will do nothing if no change can be made. 1270 1271 #### `--subst-var` \<varName\> {#fun-substitute-subst-var} 1272 ··· 1280 1281 ```shell 1282 substitute ./foo.in ./foo.out \ 1283 + --replace-fail /usr/bin/bar $bar/bin/bar \ 1284 + --replace-fail "a string containing spaces" "some other text" \ 1285 --subst-var someVar 1286 ``` 1287
+18
nixos/doc/manual/configuration/linux-kernel.chapter.md
··· 92 boot.kernelPackages = pkgs.linuxPackagesFor yourCustomKernel; 93 ``` 94 95 ## Developing kernel modules {#sec-linux-config-developing-modules} 96 97 This section was moved to the [Nixpkgs manual](https://nixos.org/nixpkgs/manual#sec-linux-kernel-developing-modules).
··· 92 boot.kernelPackages = pkgs.linuxPackagesFor yourCustomKernel; 93 ``` 94 95 + ## Rust {#sec-linux-rust} 96 + 97 + The Linux kernel does not have Rust language support enabled by 98 + default. For kernel versions 6.7 or newer, experimental Rust support 99 + can be enabled. In a NixOS configuration, set: 100 + 101 + ```nix 102 + boot.kernelPatches = [ 103 + { 104 + name = "Rust Support"; 105 + patch = null; 106 + features = { 107 + rust = true; 108 + }; 109 + } 110 + ]; 111 + ``` 112 + 113 ## Developing kernel modules {#sec-linux-config-developing-modules} 114 115 This section was moved to the [Nixpkgs manual](https://nixos.org/nixpkgs/manual#sec-linux-kernel-developing-modules).
+4
nixos/doc/manual/release-notes/rl-2405.section.md
··· 133 134 - `services.resolved.fallbackDns` can now be used to disable the upstream fallback servers entirely by setting it to an empty list. To get the previous behaviour of the upstream defaults set it to null, the new default, instead. 135 136 - `services.avahi.nssmdns` got split into `services.avahi.nssmdns4` and `services.avahi.nssmdns6` which enable the mDNS NSS switch for IPv4 and IPv6 respectively. 137 Since most mDNS responders only register IPv4 addresses, most users want to keep the IPv6 support disabled to avoid long timeouts. 138 ··· 230 231 - The option [`services.nextcloud.config.dbport`] of the Nextcloud module was removed to match upstream. 232 The port can be specified in [`services.nextcloud.config.dbhost`](#opt-services.nextcloud.config.dbhost). 233 234 - The Yama LSM is now enabled by default in the kernel, which prevents ptracing 235 non-child processes. This means you will not be able to attach gdb to an
··· 133 134 - `services.resolved.fallbackDns` can now be used to disable the upstream fallback servers entirely by setting it to an empty list. To get the previous behaviour of the upstream defaults set it to null, the new default, instead. 135 136 + - `xxd` has been moved from `vim` default output to its own output to reduce closure size. The canonical way to reference it across all platforms is `unixtools.xxd`. 137 + 138 - `services.avahi.nssmdns` got split into `services.avahi.nssmdns4` and `services.avahi.nssmdns6` which enable the mDNS NSS switch for IPv4 and IPv6 respectively. 139 Since most mDNS responders only register IPv4 addresses, most users want to keep the IPv6 support disabled to avoid long timeouts. 140 ··· 232 233 - The option [`services.nextcloud.config.dbport`] of the Nextcloud module was removed to match upstream. 234 The port can be specified in [`services.nextcloud.config.dbhost`](#opt-services.nextcloud.config.dbhost). 235 + 236 + - `stdenv`: The `--replace` flag in `substitute`, `substituteInPlace`, `substituteAll`, `substituteAllStream`, and `substituteStream` is now deprecated if favor of the new `--replace-fail`, `--replace-warn` and `--replace-quiet`. The deprecated `--replace` equates to `--replace-warn`. 237 238 - The Yama LSM is now enabled by default in the kernel, which prevents ptracing 239 non-child processes. This means you will not be able to attach gdb to an
+2 -2
nixos/modules/system/boot/luksroot.nix
··· 1076 boot.initrd.systemd = { 1077 contents."/etc/crypttab".source = stage1Crypttab; 1078 1079 - extraBin.systemd-cryptsetup = "${config.boot.initrd.systemd.package}/lib/systemd/systemd-cryptsetup"; 1080 1081 additionalUpstreamUnits = [ 1082 "cryptsetup-pre.target" ··· 1084 "remote-cryptsetup.target" 1085 ]; 1086 storePaths = [ 1087 - "${config.boot.initrd.systemd.package}/lib/systemd/systemd-cryptsetup" 1088 "${config.boot.initrd.systemd.package}/lib/systemd/system-generators/systemd-cryptsetup-generator" 1089 ]; 1090
··· 1076 boot.initrd.systemd = { 1077 contents."/etc/crypttab".source = stage1Crypttab; 1078 1079 + extraBin.systemd-cryptsetup = "${config.boot.initrd.systemd.package}/bin/systemd-cryptsetup"; 1080 1081 additionalUpstreamUnits = [ 1082 "cryptsetup-pre.target" ··· 1084 "remote-cryptsetup.target" 1085 ]; 1086 storePaths = [ 1087 + "${config.boot.initrd.systemd.package}/bin/systemd-cryptsetup" 1088 "${config.boot.initrd.systemd.package}/lib/systemd/system-generators/systemd-cryptsetup-generator" 1089 ]; 1090
+3
nixos/modules/system/boot/systemd/initrd.nix
··· 70 "systemd-tmpfiles-setup.service" 71 "timers.target" 72 "umount.target" 73 ] ++ cfg.additionalUpstreamUnits; 74 75 upstreamWants = [ ··· 424 425 storePaths = [ 426 # systemd tooling 427 "${cfg.package}/lib/systemd/systemd-fsck" 428 "${cfg.package}/lib/systemd/systemd-hibernate-resume" 429 "${cfg.package}/lib/systemd/systemd-journald" ··· 433 "${cfg.package}/lib/systemd/systemd-shutdown" 434 "${cfg.package}/lib/systemd/systemd-sulogin-shell" 435 "${cfg.package}/lib/systemd/systemd-sysctl" 436 437 # generators 438 "${cfg.package}/lib/systemd/system-generators/systemd-debug-generator"
··· 70 "systemd-tmpfiles-setup.service" 71 "timers.target" 72 "umount.target" 73 + "systemd-bsod.service" 74 ] ++ cfg.additionalUpstreamUnits; 75 76 upstreamWants = [ ··· 425 426 storePaths = [ 427 # systemd tooling 428 + "${cfg.package}/lib/systemd/systemd-executor" 429 "${cfg.package}/lib/systemd/systemd-fsck" 430 "${cfg.package}/lib/systemd/systemd-hibernate-resume" 431 "${cfg.package}/lib/systemd/systemd-journald" ··· 435 "${cfg.package}/lib/systemd/systemd-shutdown" 436 "${cfg.package}/lib/systemd/systemd-sulogin-shell" 437 "${cfg.package}/lib/systemd/systemd-sysctl" 438 + "${cfg.package}/lib/systemd/systemd-bsod" 439 440 # generators 441 "${cfg.package}/lib/systemd/system-generators/systemd-debug-generator"
+1
nixos/tests/all-tests.nix
··· 451 kerberos = handleTest ./kerberos/default.nix {}; 452 kernel-generic = handleTest ./kernel-generic.nix {}; 453 kernel-latest-ath-user-regd = handleTest ./kernel-latest-ath-user-regd.nix {}; 454 keter = handleTest ./keter.nix {}; 455 kexec = handleTest ./kexec.nix {}; 456 keycloak = discoverTests (import ./keycloak.nix);
··· 451 kerberos = handleTest ./kerberos/default.nix {}; 452 kernel-generic = handleTest ./kernel-generic.nix {}; 453 kernel-latest-ath-user-regd = handleTest ./kernel-latest-ath-user-regd.nix {}; 454 + kernel-rust = runTestOn ["x86_64-linux"] ./kernel-rust.nix; 455 keter = handleTest ./keter.nix {}; 456 kexec = handleTest ./kexec.nix {}; 457 keycloak = discoverTests (import ./keycloak.nix);
+30
nixos/tests/kernel-rust.nix
···
··· 1 + { pkgs, ... }: { 2 + name = "kernel-rust"; 3 + meta = with pkgs.lib.maintainers; { 4 + maintainers = [ blitz ]; 5 + }; 6 + 7 + nodes.machine = { config, pkgs, ... }: 8 + { 9 + boot.kernelPackages = pkgs.linuxPackages_testing; 10 + 11 + boot.extraModulePackages = [ 12 + config.boot.kernelPackages.rust-out-of-tree-module 13 + ]; 14 + 15 + boot.kernelPatches = [ 16 + { 17 + name = "Rust Support"; 18 + patch = null; 19 + features = { 20 + rust = true; 21 + }; 22 + } 23 + ]; 24 + }; 25 + 26 + testScript = '' 27 + machine.wait_for_unit("default.target") 28 + machine.succeed("modprobe rust_out_of_tree") 29 + ''; 30 + }
+2 -2
pkgs/applications/audio/mpg123/default.nix
··· 21 22 stdenv.mkDerivation rec { 23 pname = "${lib.optionalString libOnly "lib"}mpg123"; 24 - version = "1.32.3"; 25 26 src = fetchurl { 27 url = "mirror://sourceforge/mpg123/mpg123-${version}.tar.bz2"; 28 - hash = "sha256-LZkTpX1O6PSXoYLG6CWCYCQJeCpPtIHpif7r9ENYZ7Q="; 29 }; 30 31 outputs = [ "out" "dev" "man" ] ++ lib.optional withConplay "conplay";
··· 21 22 stdenv.mkDerivation rec { 23 pname = "${lib.optionalString libOnly "lib"}mpg123"; 24 + version = "1.32.4"; 25 26 src = fetchurl { 27 url = "mirror://sourceforge/mpg123/mpg123-${version}.tar.bz2"; 28 + hash = "sha256-WplmQzj7L3UbZi9A7iWATQydtrV13LXOdBxtxkIkoIo="; 29 }; 30 31 outputs = [ "out" "dev" "man" ] ++ lib.optional withConplay "conplay";
+18 -15
pkgs/applications/editors/neovim/default.nix
··· 12 13 # now defaults to false because some tests can be flaky (clipboard etc), see 14 # also: https://github.com/neovim/neovim/issues/16233 15 - , doCheck ? false 16 , nodejs ? null, fish ? null, python3 ? null 17 }: 18 - 19 - let 20 nvim-lpeg-dylib = luapkgs: if stdenv.isDarwin 21 then (luapkgs.lpeg.overrideAttrs (oa: { 22 preConfigure = '' ··· 42 (nvim-lpeg-dylib ps) 43 luabitop 44 mpack 45 - ] ++ lib.optionals doCheck [ 46 luv 47 coxpcall 48 busted ··· 64 in deterministicLuajit.withPackages(ps: [ ps.mpack (nvim-lpeg-dylib ps) ]) 65 else lua.luaOnBuild; 66 67 - pyEnv = python3.withPackages(ps: with ps; [ pynvim msgpack ]); 68 69 - in 70 - stdenv.mkDerivation rec { 71 pname = "neovim-unwrapped"; 72 version = "0.9.5"; 73 74 src = fetchFromGitHub { 75 owner = "neovim"; 76 repo = "neovim"; 77 - rev = "v${version}"; 78 hash = "sha256-CcaBqA0yFCffNPmXOJTo8c9v1jrEBiqAl8CG5Dj5YxE="; 79 }; 80 ··· 87 88 dontFixCmake = true; 89 90 - inherit lua; 91 92 buildInputs = [ 93 gperf ··· 105 tree-sitter 106 unibilium 107 ] ++ lib.optionals stdenv.isDarwin [ libiconv CoreServices ] 108 - ++ lib.optionals doCheck [ glibcLocales procps ] 109 ; 110 111 - inherit doCheck; 112 113 # to be exhaustive, one could run 114 # make oldtests too 115 checkPhase = '' 116 make functionaltest 117 ''; 118 119 nativeBuildInputs = [ ··· 123 ]; 124 125 # extra programs test via `make functionaltest` 126 - nativeCheckInputs = [ 127 fish 128 nodejs 129 pyEnv # for src/clint.py ··· 166 ln -s \ 167 ${tree-sitter.buildGrammar { 168 inherit language src; 169 - version = "neovim-${version}"; 170 }}/parser \ 171 $out/lib/nvim/parser/${language}.so 172 '') 173 - treesitter-parsers); 174 175 shellHook='' 176 export VIMRUNTIME=$PWD/runtime ··· 199 maintainers = with maintainers; [ manveru rvolosatovs ]; 200 platforms = platforms.unix; 201 }; 202 - }
··· 12 13 # now defaults to false because some tests can be flaky (clipboard etc), see 14 # also: https://github.com/neovim/neovim/issues/16233 15 , nodejs ? null, fish ? null, python3 ? null 16 }: 17 + stdenv.mkDerivation (finalAttrs: 18 + let 19 nvim-lpeg-dylib = luapkgs: if stdenv.isDarwin 20 then (luapkgs.lpeg.overrideAttrs (oa: { 21 preConfigure = '' ··· 41 (nvim-lpeg-dylib ps) 42 luabitop 43 mpack 44 + ] ++ lib.optionals finalAttrs.doCheck [ 45 luv 46 coxpcall 47 busted ··· 63 in deterministicLuajit.withPackages(ps: [ ps.mpack (nvim-lpeg-dylib ps) ]) 64 else lua.luaOnBuild; 65 66 67 + in { 68 pname = "neovim-unwrapped"; 69 version = "0.9.5"; 70 71 + __structuredAttrs = true; 72 + 73 src = fetchFromGitHub { 74 owner = "neovim"; 75 repo = "neovim"; 76 + rev = "v${finalAttrs.version}"; 77 hash = "sha256-CcaBqA0yFCffNPmXOJTo8c9v1jrEBiqAl8CG5Dj5YxE="; 78 }; 79 ··· 86 87 dontFixCmake = true; 88 89 + inherit lua treesitter-parsers; 90 91 buildInputs = [ 92 gperf ··· 104 tree-sitter 105 unibilium 106 ] ++ lib.optionals stdenv.isDarwin [ libiconv CoreServices ] 107 + ++ lib.optionals finalAttrs.doCheck [ glibcLocales procps ] 108 ; 109 110 + doCheck = false; 111 112 # to be exhaustive, one could run 113 # make oldtests too 114 checkPhase = '' 115 + runHook preCheck 116 make functionaltest 117 + runHook postCheck 118 ''; 119 120 nativeBuildInputs = [ ··· 124 ]; 125 126 # extra programs test via `make functionaltest` 127 + nativeCheckInputs = let 128 + pyEnv = python3.withPackages(ps: with ps; [ pynvim msgpack ]); 129 + in [ 130 fish 131 nodejs 132 pyEnv # for src/clint.py ··· 169 ln -s \ 170 ${tree-sitter.buildGrammar { 171 inherit language src; 172 + version = "neovim-${finalAttrs.version}"; 173 }}/parser \ 174 $out/lib/nvim/parser/${language}.so 175 '') 176 + finalAttrs.treesitter-parsers); 177 178 shellHook='' 179 export VIMRUNTIME=$PWD/runtime ··· 202 maintainers = with maintainers; [ manveru rvolosatovs ]; 203 platforms = platforms.unix; 204 }; 205 + })
+20 -8
pkgs/applications/editors/vim/common.nix
··· 1 { lib, fetchFromGitHub }: 2 rec { 3 - version = "9.0.2116"; 4 5 src = fetchFromGitHub { 6 owner = "vim"; 7 repo = "vim"; 8 rev = "v${version}"; 9 - hash = "sha256-ZKcNg/RrjvEsxpIcTjzQYi1xig3zLeTV+PXaBb4gUuM="; 10 }; 11 12 enableParallelBuilding = true; ··· 14 15 hardeningDisable = [ "fortify" ]; 16 17 - postPatch = 18 - # Use man from $PATH; escape sequences are still problematic. 19 - '' 20 - substituteInPlace runtime/ftplugin/man.vim \ 21 - --replace "/usr/bin/man " "man " 22 - ''; 23 24 meta = with lib; { 25 description = "The most popular clone of the VI editor"; ··· 28 maintainers = with maintainers; [ das_j equirosa ]; 29 platforms = platforms.unix; 30 mainProgram = "vim"; 31 }; 32 }
··· 1 { lib, fetchFromGitHub }: 2 rec { 3 + version = "9.1.0004"; 4 + 5 + outputs = [ "out" "xxd" ]; 6 7 src = fetchFromGitHub { 8 owner = "vim"; 9 repo = "vim"; 10 rev = "v${version}"; 11 + hash = "sha256-Y5ZSJLEFdptEMA0xvstr6H1G4iiaYXpkJGSSFwoTfc0="; 12 }; 13 14 enableParallelBuilding = true; ··· 16 17 hardeningDisable = [ "fortify" ]; 18 19 + # Use man from $PATH; escape sequences are still problematic. 20 + postPatch = '' 21 + substituteInPlace runtime/ftplugin/man.vim \ 22 + --replace "/usr/bin/man " "man " 23 + ''; 24 + 25 + # man page moving is done in postFixup instead of postInstall otherwise fixupPhase moves it right back where it was 26 + postFixup = '' 27 + moveToOutput bin/xxd "$xxd" 28 + moveToOutput share/man/man1/xxd.1.gz "$xxd" 29 + for manFile in $out/share/man/*/man1/xxd.1*; do 30 + # moveToOutput does not take full paths or wildcards... 31 + moveToOutput "share/man/$(basename "$(dirname "$(dirname "$manFile")")")/man1/xxd.1.gz" "$xxd" 32 + done 33 + ''; 34 35 meta = with lib; { 36 description = "The most popular clone of the VI editor"; ··· 39 maintainers = with maintainers; [ das_j equirosa ]; 40 platforms = platforms.unix; 41 mainProgram = "vim"; 42 + outputsToInstall = [ "out" "xxd" ]; 43 }; 44 }
+1 -8
pkgs/applications/editors/vim/default.nix
··· 15 stdenv.mkDerivation { 16 pname = "vim"; 17 18 - inherit (common) version src postPatch hardeningDisable enableParallelBuilding enableParallelInstalling meta; 19 20 nativeBuildInputs = [ gettext pkg-config ]; 21 buildInputs = [ ncurses bash gawk ] ··· 62 ''; 63 64 __impureHostDeps = [ "/dev/ptmx" ]; 65 - 66 - # To fix the trouble in vim73, that it cannot cross-build with this patch 67 - # to bypass a configure script check that cannot be done cross-building. 68 - # http://groups.google.com/group/vim_dev/browse_thread/thread/66c02efd1523554b?pli=1 69 - # patchPhase = '' 70 - # sed -i -e 's/as_fn_error.*int32.*/:/' src/auto/configure 71 - # ''; 72 }
··· 15 stdenv.mkDerivation { 16 pname = "vim"; 17 18 + inherit (common) version outputs src postPatch hardeningDisable enableParallelBuilding enableParallelInstalling postFixup meta; 19 20 nativeBuildInputs = [ gettext pkg-config ]; 21 buildInputs = [ ncurses bash gawk ] ··· 62 ''; 63 64 __impureHostDeps = [ "/dev/ptmx" ]; 65 }
+2 -2
pkgs/applications/editors/vim/full.nix
··· 66 67 pname = "vim-full"; 68 69 - inherit (common) version postPatch hardeningDisable enableParallelBuilding meta; 70 71 src = builtins.getAttr source { 72 default = common.src; # latest release ··· 181 ln -sfn '${nixosRuntimepath}' "$out"/share/vim/vimrc 182 ''; 183 184 - postFixup = lib.optionalString wrapPythonDrv '' 185 wrapProgram "$out/bin/vim" --prefix PATH : "${python3}/bin" \ 186 --set NIX_PYTHONPATH "${python3}/${python3.sitePackages}" 187 '';
··· 66 67 pname = "vim-full"; 68 69 + inherit (common) version outputs postPatch hardeningDisable enableParallelBuilding meta; 70 71 src = builtins.getAttr source { 72 default = common.src; # latest release ··· 181 ln -sfn '${nixosRuntimepath}' "$out"/share/vim/vimrc 182 ''; 183 184 + postFixup = common.postFixup + lib.optionalString wrapPythonDrv '' 185 wrapProgram "$out/bin/vim" --prefix PATH : "${python3}/bin" \ 186 --set NIX_PYTHONPATH "${python3}/${python3.sitePackages}" 187 '';
+4 -9
pkgs/applications/editors/vim/plugins/overrides.nix
··· 97 , errcheck 98 , go-motion 99 , go-tools 100 - , gocode 101 , gocode-gomod 102 , godef 103 , gogetdoc ··· 110 , iferr 111 , impl 112 , reftools 113 , # hurl dependencies 114 hurl 115 , # must be lua51Packages ··· 1530 vim-go = 1531 let 1532 binPath = lib.makeBinPath [ 1533 - # TODO: package commented packages 1534 asmfmt 1535 delve 1536 errcheck 1537 go-motion 1538 - go-tools # contains staticcheck 1539 - gocode 1540 gocode-gomod 1541 godef 1542 gogetdoc ··· 1544 golangci-lint 1545 gomodifytags 1546 gopls 1547 - # gorename 1548 gotags 1549 - gotools 1550 - # guru 1551 iferr 1552 impl 1553 - # keyify 1554 reftools 1555 - # revive 1556 ]; 1557 in 1558 super.vim-go.overrideAttrs {
··· 97 , errcheck 98 , go-motion 99 , go-tools 100 , gocode-gomod 101 , godef 102 , gogetdoc ··· 109 , iferr 110 , impl 111 , reftools 112 + , revive 113 , # hurl dependencies 114 hurl 115 , # must be lua51Packages ··· 1530 vim-go = 1531 let 1532 binPath = lib.makeBinPath [ 1533 asmfmt 1534 delve 1535 errcheck 1536 go-motion 1537 + go-tools # contains staticcheck, keyify 1538 gocode-gomod 1539 godef 1540 gogetdoc ··· 1542 golangci-lint 1543 gomodifytags 1544 gopls 1545 gotags 1546 + gotools # contains guru, gorename 1547 iferr 1548 impl 1549 reftools 1550 + revive 1551 ]; 1552 in 1553 super.vim-go.overrideAttrs {
+2 -2
pkgs/applications/graphics/ImageMagick/default.nix
··· 49 50 stdenv.mkDerivation (finalAttrs: { 51 pname = "imagemagick"; 52 - version = "7.1.1-25"; 53 54 src = fetchFromGitHub { 55 owner = "ImageMagick"; 56 repo = "ImageMagick"; 57 rev = finalAttrs.version; 58 - hash = "sha256-HKDeeh8DNj0y7wS4DqctXhmNaOqZ02JeBXRFrEpH0M4="; 59 }; 60 61 outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
··· 49 50 stdenv.mkDerivation (finalAttrs: { 51 pname = "imagemagick"; 52 + version = "7.1.1-26"; 53 54 src = fetchFromGitHub { 55 owner = "ImageMagick"; 56 repo = "ImageMagick"; 57 rev = finalAttrs.version; 58 + hash = "sha256-diJhCRDT0SbAYZdBPoxZJWlrUW2Nz4/d7H0Nnybw0Yw="; 59 }; 60 61 outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
+3 -2
pkgs/applications/misc/mupdf/default.nix
··· 98 99 nativeBuildInputs = [ pkg-config ] 100 ++ lib.optional (enableGL || enableX11) copyDesktopItems 101 ++ lib.optionals (enableCxx || enablePython) [ python3 python3.pkgs.setuptools python3.pkgs.libclang ] 102 ++ lib.optionals (enablePython) [ which swig ] 103 - ++ lib.optionals stdenv.isDarwin [ desktopToDarwinBundle fixDarwinDylibNames xcbuild ]; 104 105 buildInputs = [ freetype harfbuzz openjpeg jbig2dec libjpeg gumbo ] 106 ++ lib.optionals enableX11 [ libX11 libXext libXi libXrandr ] ··· 126 done 127 ''; 128 129 - desktopItems = [ 130 (makeDesktopItem { 131 name = pname; 132 desktopName = pname;
··· 98 99 nativeBuildInputs = [ pkg-config ] 100 ++ lib.optional (enableGL || enableX11) copyDesktopItems 101 + ++ lib.optional (stdenv.isDarwin && (enableGL || enableX11)) desktopToDarwinBundle 102 ++ lib.optionals (enableCxx || enablePython) [ python3 python3.pkgs.setuptools python3.pkgs.libclang ] 103 ++ lib.optionals (enablePython) [ which swig ] 104 + ++ lib.optionals stdenv.isDarwin [ fixDarwinDylibNames xcbuild ]; 105 106 buildInputs = [ freetype harfbuzz openjpeg jbig2dec libjpeg gumbo ] 107 ++ lib.optionals enableX11 [ libX11 libXext libXi libXrandr ] ··· 127 done 128 ''; 129 130 + desktopItems = lib.optionals (enableGL || enableX11) [ 131 (makeDesktopItem { 132 name = pname; 133 desktopName = pname;
+1 -1
pkgs/applications/networking/go-graft/default.nix
··· 13 14 CGO_ENABLED = 0; 15 16 - ldflags = [ "-X github.com/mzz2017/gg/cmd.Version=${version}" "-s" "-w" "-buildid=" ]; 17 vendorHash = "sha256-fnM4ycqDyruCdCA1Cr4Ki48xeQiTG4l5dLVuAafEm14="; 18 subPackages = [ "." ]; 19
··· 13 14 CGO_ENABLED = 0; 15 16 + ldflags = [ "-X github.com/mzz2017/gg/cmd.Version=${version}" "-s" "-w" ]; 17 vendorHash = "sha256-fnM4ycqDyruCdCA1Cr4Ki48xeQiTG4l5dLVuAafEm14="; 18 subPackages = [ "." ]; 19
+12
pkgs/applications/networking/sync/rsync/configure.ac-fix-failing-IPv6-check.patch
···
··· 1 + diff -rup rsync-3.2.7/configure.sh rsync-3.2.7-fixed/configure.sh 2 + --- rsync-3.2.7/configure.sh 2022-10-20 17:57:22 3 + +++ rsync-3.2.7-fixed/configure.sh 2024-01-01 19:51:58 4 + @@ -7706,7 +7706,7 @@ else $as_nop 5 + #include <stdlib.h> 6 + #include <sys/types.h> 7 + #include <sys/socket.h> 8 + -main() 9 + +int main() 10 + { 11 + if (socket(AF_INET6, SOCK_STREAM, 0) < 0) 12 + exit(1);
+2
pkgs/applications/networking/sync/rsync/default.nix
··· 34 # https://github.com/WayneD/rsync/issues/511#issuecomment-1774612577 35 # original source: https://build.opensuse.org/package/view_file/network/rsync/rsync-fortified-strlcpy-fix.patch?expand=1&rev=3f8dd2f4a404c96c0f69176e60893714 36 ./rsync-fortified-strlcpy-fix.patch 37 ]; 38 39 buildInputs = [ libiconv zlib popt ]
··· 34 # https://github.com/WayneD/rsync/issues/511#issuecomment-1774612577 35 # original source: https://build.opensuse.org/package/view_file/network/rsync/rsync-fortified-strlcpy-fix.patch?expand=1&rev=3f8dd2f4a404c96c0f69176e60893714 36 ./rsync-fortified-strlcpy-fix.patch 37 + # https://github.com/WayneD/rsync/pull/558 38 + ./configure.ac-fix-failing-IPv6-check.patch 39 ]; 40 41 buildInputs = [ libiconv zlib popt ]
+2 -1
pkgs/applications/science/chemistry/octopus/default.nix
··· 1 - { lib, stdenv, fetchFromGitLab, gfortran, perl, procps 2 , libyaml, libxc, fftw, blas, lapack, gsl, netcdf, arpack, autoreconfHook 3 , python3 4 , enableFma ? stdenv.hostPlatform.fmaSupport ··· 22 }; 23 24 nativeBuildInputs = [ 25 perl 26 procps 27 autoreconfHook
··· 1 + { lib, stdenv, fetchFromGitLab, gfortran, which, perl, procps 2 , libyaml, libxc, fftw, blas, lapack, gsl, netcdf, arpack, autoreconfHook 3 , python3 4 , enableFma ? stdenv.hostPlatform.fmaSupport ··· 22 }; 23 24 nativeBuildInputs = [ 25 + which 26 perl 27 procps 28 autoreconfHook
+1 -1
pkgs/applications/version-management/gitsign/default.nix
··· 19 20 nativeBuildInputs = [ makeWrapper ]; 21 22 - ldflags = [ "-s" "-w" "-buildid=" "-X github.com/sigstore/gitsign/pkg/version.gitVersion=${version}" ]; 23 24 preCheck = '' 25 # test all paths
··· 19 20 nativeBuildInputs = [ makeWrapper ]; 21 22 + ldflags = [ "-s" "-w" "-X github.com/sigstore/gitsign/pkg/version.gitVersion=${version}" ]; 23 24 preCheck = '' 25 # test all paths
+3 -3
pkgs/applications/version-management/mercurial/default.nix
··· 23 24 self = python3Packages.buildPythonApplication rec { 25 pname = "mercurial${lib.optionalString fullBuild "-full"}"; 26 - version = "6.6.1"; 27 28 src = fetchurl { 29 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 30 - sha256 = "sha256-opRlo/5Ao+jUm6g0MTSsKrooa2g//rg42gz25FIflpU="; 31 }; 32 33 format = "other"; ··· 37 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 38 inherit src; 39 name = "mercurial-${version}"; 40 - sha256 = "sha256-wLV0qdCfMgGpZRxnZik/lRwZHm/66p0sJn/mYVRvRkQ="; 41 sourceRoot = "mercurial-${version}/rust"; 42 } else null; 43 cargoRoot = if rustSupport then "rust" else null;
··· 23 24 self = python3Packages.buildPythonApplication rec { 25 pname = "mercurial${lib.optionalString fullBuild "-full"}"; 26 + version = "6.6.2"; 27 28 src = fetchurl { 29 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 30 + sha256 = "sha256-y0lNe+fdwvydMXHIiDCvnAKyHHU+PlET3vrJwDc7S2A="; 31 }; 32 33 format = "other"; ··· 37 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 38 inherit src; 39 name = "mercurial-${version}"; 40 + sha256 = "sha256-yOysqMrTWDx/ENcJng8Rm338NI9vpuBGH6Yq8B7+MFg="; 41 sourceRoot = "mercurial-${version}/rust"; 42 } else null; 43 cargoRoot = if rustSupport then "rust" else null;
+2 -2
pkgs/applications/video/vlc/default.nix
··· 44 , libmtp 45 , liboggz 46 , libopus 47 - , libplacebo 48 , libpulseaudio 49 , libraw1394 50 , librsvg ··· 164 libmtp 165 liboggz 166 libopus 167 - libplacebo 168 libpulseaudio 169 libraw1394 170 librsvg
··· 44 , libmtp 45 , liboggz 46 , libopus 47 + , libplacebo_5 48 , libpulseaudio 49 , libraw1394 50 , librsvg ··· 164 libmtp 165 liboggz 166 libopus 167 + libplacebo_5 168 libpulseaudio 169 libraw1394 170 librsvg
+2 -2
pkgs/build-support/cc-wrapper/default.nix
··· 525 # additional -isystem flags will confuse gfortran (see 526 # https://github.com/NixOS/nixpkgs/pull/209870#issuecomment-1500550903) 527 + optionalString (libcxx == null && isClang && (useGccForLibs && gccForLibs.langCC or false)) '' 528 - for dir in ${gccForLibs}${lib.optionalString (hostPlatform != targetPlatform) "/${targetPlatform.config}"}/include/c++/*; do 529 echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags 530 done 531 - for dir in ${gccForLibs}${lib.optionalString (hostPlatform != targetPlatform) "/${targetPlatform.config}"}/include/c++/*/${targetPlatform.config}; do 532 echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags 533 done 534 ''
··· 525 # additional -isystem flags will confuse gfortran (see 526 # https://github.com/NixOS/nixpkgs/pull/209870#issuecomment-1500550903) 527 + optionalString (libcxx == null && isClang && (useGccForLibs && gccForLibs.langCC or false)) '' 528 + for dir in ${gccForLibs}/include/c++/*; do 529 echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags 530 done 531 + for dir in ${gccForLibs}/include/c++/*/${targetPlatform.config}; do 532 echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags 533 done 534 ''
+6
pkgs/build-support/go/module.nix
··· 39 # Not needed with buildGoModule 40 , goPackagePath ? "" 41 42 # needed for buildFlags{,Array} warning 43 , buildFlags ? "" 44 , buildFlagsArray ? "" ··· 153 154 GOFLAGS = lib.optionals (!proxyVendor) [ "-mod=vendor" ] ++ lib.optionals (!allowGoReference) [ "-trimpath" ]; 155 inherit CGO_ENABLED enableParallelBuilding GO111MODULE GOTOOLCHAIN; 156 157 configurePhase = args.configurePhase or ('' 158 runHook preConfigure ··· 301 lib.warnIf (args' ? vendorSha256) "`vendorSha256` is deprecated. Use `vendorHash` instead" 302 lib.warnIf (buildFlags != "" || buildFlagsArray != "") 303 "Use the `ldflags` and/or `tags` attributes instead of `buildFlags`/`buildFlagsArray`" 304 package
··· 39 # Not needed with buildGoModule 40 , goPackagePath ? "" 41 42 + , ldflags ? [ ] 43 + 44 # needed for buildFlags{,Array} warning 45 , buildFlags ? "" 46 , buildFlagsArray ? "" ··· 155 156 GOFLAGS = lib.optionals (!proxyVendor) [ "-mod=vendor" ] ++ lib.optionals (!allowGoReference) [ "-trimpath" ]; 157 inherit CGO_ENABLED enableParallelBuilding GO111MODULE GOTOOLCHAIN; 158 + 159 + # If not set to an explicit value, set the buildid empty for reproducibility. 160 + ldflags = ldflags ++ lib.optionals (!lib.any (lib.hasPrefix "-buildid=") ldflags) [ "-buildid=" ]; 161 162 configurePhase = args.configurePhase or ('' 163 runHook preConfigure ··· 306 lib.warnIf (args' ? vendorSha256) "`vendorSha256` is deprecated. Use `vendorHash` instead" 307 lib.warnIf (buildFlags != "" || buildFlagsArray != "") 308 "Use the `ldflags` and/or `tags` attributes instead of `buildFlags`/`buildFlagsArray`" 309 + lib.warnIf (builtins.elem "-buildid=" ldflags) "`-buildid=` is set by default as ldflag by buildGoModule" 310 package
+6
pkgs/build-support/go/package.nix
··· 37 38 , CGO_ENABLED ? go.CGO_ENABLED 39 40 # needed for buildFlags{,Array} warning 41 , buildFlags ? "" 42 , buildFlagsArray ? "" ··· 90 GOFLAGS = lib.optionals (!allowGoReference) [ "-trimpath" ]; 91 92 GOARM = toString (lib.intersectLists [(stdenv.hostPlatform.parsed.cpu.version or "")] ["5" "6" "7"]); 93 94 configurePhase = args.configurePhase or ('' 95 runHook preConfigure ··· 280 in 281 lib.warnIf (buildFlags != "" || buildFlagsArray != "") 282 "Use the `ldflags` and/or `tags` attributes instead of `buildFlags`/`buildFlagsArray`" 283 package
··· 37 38 , CGO_ENABLED ? go.CGO_ENABLED 39 40 + , ldflags ? [ ] 41 + 42 # needed for buildFlags{,Array} warning 43 , buildFlags ? "" 44 , buildFlagsArray ? "" ··· 92 GOFLAGS = lib.optionals (!allowGoReference) [ "-trimpath" ]; 93 94 GOARM = toString (lib.intersectLists [(stdenv.hostPlatform.parsed.cpu.version or "")] ["5" "6" "7"]); 95 + 96 + # If not set to an explicit value, set the buildid empty for reproducibility. 97 + ldflags = ldflags ++ lib.optionals (!lib.any (lib.hasPrefix "-buildid=") ldflags) [ "-buildid=" ]; 98 99 configurePhase = args.configurePhase or ('' 100 runHook preConfigure ··· 285 in 286 lib.warnIf (buildFlags != "" || buildFlagsArray != "") 287 "Use the `ldflags` and/or `tags` attributes instead of `buildFlags`/`buildFlagsArray`" 288 + lib.warnIf (builtins.elem "-buildid=" ldflags) "`-buildid=` is set by default as ldflag by buildGoModule" 289 package
+1 -1
pkgs/by-name/at/athens/package.nix
··· 18 vendorHash = "sha256-8+PdkanodNZW/xeFf+tDm3Ej7DRSpBBtiT/CqjnWthw="; 19 20 CGO_ENABLED = "0"; 21 - ldflags = [ "-s" "-w" "-buildid=" "-X github.com/gomods/athens/pkg/build.version=${version}" ]; 22 23 subPackages = [ "cmd/proxy" ]; 24
··· 18 vendorHash = "sha256-8+PdkanodNZW/xeFf+tDm3Ej7DRSpBBtiT/CqjnWthw="; 19 20 CGO_ENABLED = "0"; 21 + ldflags = [ "-s" "-w" "-X github.com/gomods/athens/pkg/build.version=${version}" ]; 22 23 subPackages = [ "cmd/proxy" ]; 24
+158
pkgs/by-name/bl/bluez/package.nix
···
··· 1 + { lib 2 + , stdenv 3 + , alsa-lib 4 + , dbus 5 + , docutils 6 + , ell 7 + , enableExperimental ? false 8 + , fetchpatch 9 + , fetchurl 10 + , glib 11 + , json_c 12 + , libical 13 + , pkg-config 14 + , python3 15 + , readline 16 + , systemdMinimal 17 + , udev 18 + }: 19 + 20 + stdenv.mkDerivation (finalAttrs: { 21 + pname = "bluez"; 22 + version = "5.71"; 23 + 24 + src = fetchurl { 25 + url = "mirror://kernel/linux/bluetooth/bluez-${finalAttrs.version}.tar.xz"; 26 + hash = "sha256-uCjUGMk87R9Vthb7VILPAVN0QL+zT72hpWTz7OlHNdg="; 27 + }; 28 + 29 + buildInputs = [ 30 + alsa-lib 31 + dbus 32 + ell 33 + glib 34 + json_c 35 + libical 36 + python3 37 + readline 38 + udev 39 + ]; 40 + 41 + nativeBuildInputs = [ 42 + docutils 43 + pkg-config 44 + python3.pkgs.wrapPython 45 + ]; 46 + 47 + outputs = [ "out" "dev" "test" ]; 48 + 49 + postPatch = '' 50 + substituteInPlace tools/hid2hci.rules \ 51 + --replace /sbin/udevadm ${systemdMinimal}/bin/udevadm \ 52 + --replace "hid2hci " "$out/lib/udev/hid2hci " 53 + '' + 54 + # Disable some tests: 55 + # - test-mesh-crypto depends on the following kernel settings: 56 + # CONFIG_CRYPTO_[USER|USER_API|USER_API_AEAD|USER_API_HASH|AES|CCM|AEAD|CMAC] 57 + '' 58 + if [[ ! -f unit/test-mesh-crypto.c ]]; then 59 + echo "unit/test-mesh-crypto.c no longer exists" 60 + false 61 + fi 62 + echo 'int main() { return 77; }' > unit/test-mesh-crypto.c 63 + ''; 64 + 65 + configureFlags = [ 66 + "--localstatedir=/var" 67 + (lib.enableFeature enableExperimental "experimental") 68 + (lib.enableFeature true "btpclient") 69 + (lib.enableFeature true "cups") 70 + (lib.enableFeature true "external-ell") 71 + (lib.enableFeature true "health") 72 + (lib.enableFeature true "hid2hci") 73 + (lib.enableFeature true "library") 74 + (lib.enableFeature true "logger") 75 + (lib.enableFeature true "mesh") 76 + (lib.enableFeature true "midi") 77 + (lib.enableFeature true "nfc") 78 + (lib.enableFeature true "pie") 79 + (lib.enableFeature true "sixaxis") 80 + # Set "deprecated" to provide ciptool, sdptool, and rfcomm (unmaintained); 81 + # superseded by new D-Bus APIs 82 + (lib.enableFeature true "deprecated") 83 + (lib.withFeatureAs true "dbusconfdir" "${placeholder "out"}/share") 84 + (lib.withFeatureAs true "dbussessionbusdir" "${placeholder "out"}/share/dbus-1/services") 85 + (lib.withFeatureAs true "dbussystembusdir" "${placeholder "out"}/share/dbus-1/system-services") 86 + (lib.withFeatureAs true "systemdsystemunitdir" "${placeholder "out"}/etc/systemd/system") 87 + (lib.withFeatureAs true "systemduserunitdir" "${placeholder "out"}/etc/systemd/user") 88 + (lib.withFeatureAs true "udevdir" "${placeholder "out"}/lib/udev") 89 + ]; 90 + 91 + makeFlags = [ 92 + "rulesdir=${placeholder "out"}/lib/udev/rules.d" 93 + ]; 94 + 95 + # Work around `make install' trying to create /var/lib/bluetooth. 96 + installFlags = [ 97 + "statedir=$(TMPDIR)/var/lib/bluetooth" 98 + ]; 99 + 100 + doCheck = stdenv.hostPlatform.isx86_64; 101 + 102 + postInstall = let 103 + pythonPath = with python3.pkgs; [ 104 + dbus-python 105 + pygobject3 106 + recursivePthLoader 107 + ]; 108 + in 109 + '' 110 + mkdir -p $test/{bin,test} 111 + cp -a test $test 112 + pushd $test/test 113 + for t in \ 114 + list-devices \ 115 + monitor-bluetooth \ 116 + simple-agent \ 117 + test-adapter \ 118 + test-device \ 119 + test-thermometer \ 120 + ; do 121 + ln -s ../test/$t $test/bin/bluez-$t 122 + done 123 + popd 124 + wrapPythonProgramsIn $test/test "$test/test ${toString pythonPath}" 125 + 126 + # for bluez4 compatibility for NixOS 127 + mkdir $out/sbin 128 + ln -s ../libexec/bluetooth/bluetoothd $out/sbin/bluetoothd 129 + ln -s ../libexec/bluetooth/obexd $out/sbin/obexd 130 + 131 + # Add extra configuration 132 + mkdir $out/etc/bluetooth 133 + ln -s /etc/bluetooth/main.conf $out/etc/bluetooth/main.conf 134 + 135 + # https://github.com/NixOS/nixpkgs/issues/204418 136 + ln -s /etc/bluetooth/input.conf $out/etc/bluetooth/input.conf 137 + ln -s /etc/bluetooth/network.conf $out/etc/bluetooth/network.conf 138 + 139 + # Add missing tools, ref https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/bluez 140 + for files in $(find tools/ -type f -perm -755); do 141 + filename=$(basename $files) 142 + install -Dm755 tools/$filename $out/bin/$filename 143 + done 144 + install -Dm755 attrib/gatttool $out/bin/gatttool 145 + ''; 146 + 147 + enableParallelBuilding = true; 148 + 149 + meta = { 150 + homepage = "https://www.bluez.org/"; 151 + description = "Official Linux Bluetooth protocol stack"; 152 + changelog = "https://git.kernel.org/pub/scm/bluetooth/bluez.git/tree/ChangeLog?h=${finalAttrs.version}"; 153 + license = with lib.licenses; [ bsd2 gpl2Plus lgpl21Plus mit ]; 154 + mainProgram = "btinfo"; 155 + maintainers = with lib.maintainers; [ AndersonTorres ]; 156 + platforms = lib.platforms.linux; 157 + }; 158 + })
+77
pkgs/by-name/li/libplacebo_5/package.nix
···
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitLab 4 + , meson 5 + , ninja 6 + , pkg-config 7 + , python3Packages 8 + , vulkan-headers 9 + , vulkan-loader 10 + , shaderc 11 + , lcms2 12 + , libGL 13 + , libX11 14 + , libunwind 15 + , libdovi 16 + }: 17 + 18 + stdenv.mkDerivation rec { 19 + pname = "libplacebo"; 20 + version = "5.264.1"; 21 + 22 + src = fetchFromGitLab { 23 + domain = "code.videolan.org"; 24 + owner = "videolan"; 25 + repo = pname; 26 + rev = "v${version}"; 27 + hash = "sha256-YEefuEfJURi5/wswQKskA/J1UGzessQQkBpltJ0Spq8="; 28 + }; 29 + 30 + nativeBuildInputs = [ 31 + meson 32 + ninja 33 + pkg-config 34 + vulkan-headers 35 + python3Packages.jinja2 36 + python3Packages.glad2 37 + ]; 38 + 39 + buildInputs = [ 40 + vulkan-loader 41 + shaderc 42 + lcms2 43 + libGL 44 + libX11 45 + libunwind 46 + libdovi 47 + ]; 48 + 49 + mesonFlags = with lib; [ 50 + (mesonOption "vulkan-registry" "${vulkan-headers}/share/vulkan/registry/vk.xml") 51 + (mesonBool "demos" false) # Don't build and install the demo programs 52 + (mesonEnable "d3d11" false) # Disable the Direct3D 11 based renderer 53 + (mesonEnable "glslang" false) # rely on shaderc for GLSL compilation instead 54 + ] ++ optionals stdenv.isDarwin [ 55 + (mesonEnable "unwind" false) # libplacebo doesn’t build with `darwin.libunwind` 56 + ]; 57 + 58 + postPatch = '' 59 + substituteInPlace meson.build \ 60 + --replace 'python_env.append' '#' 61 + ''; 62 + 63 + meta = with lib; { 64 + description = "Reusable library for GPU-accelerated video/image rendering primitives"; 65 + longDescription = '' 66 + Reusable library for GPU-accelerated image/view processing primitives and 67 + shaders, as well a batteries-included, extensible, high-quality rendering 68 + pipeline (similar to mpv's vo_gpu). Supports Vulkan, OpenGL and Metal (via 69 + MoltenVK). 70 + ''; 71 + homepage = "https://code.videolan.org/videolan/libplacebo"; 72 + changelog = "https://code.videolan.org/videolan/libplacebo/-/tags/v${version}"; 73 + license = licenses.lgpl21Plus; 74 + maintainers = with maintainers; [ primeos tadeokondrak ]; 75 + platforms = platforms.all; 76 + }; 77 + }
-27
pkgs/by-name/me/meson/007-darwin-case-sensitivity.patch
··· 1 - From a908a574daf8bac10bb2a0ee3771052d2167a85f Mon Sep 17 00:00:00 2001 2 - From: Randy Eckenrode <randy@largeandhighquality.com> 3 - Date: Sun, 3 Dec 2023 15:41:20 -0500 4 - Subject: [PATCH] Fix test failure on Darwin on a case-sensitive fs 5 - 6 - This was encountered while looking into an issue with 7 - https://github.com/NixOS/nixpkgs/pull/268583. 8 - 9 - I run my Nix store on case-sensitive APFS, so the test fails due to 10 - trying to link `-framework ldap` instead of `-framework LDAP`. 11 - --- 12 - test cases/osx/5 extra frameworks/meson.build | 2 +- 13 - 1 file changed, 1 insertion(+), 1 deletion(-) 14 - 15 - diff --git a/test cases/osx/5 extra frameworks/meson.build b/test cases/osx/5 extra frameworks/meson.build 16 - index f6c01e63a1bd..96532846c632 100644 17 - --- a/test cases/osx/5 extra frameworks/meson.build 18 - +++ b/test cases/osx/5 extra frameworks/meson.build 19 - @@ -7,7 +7,7 @@ dep_main = dependency('Foundation') 20 - assert(dep_main.type_name() == 'extraframeworks', 'type_name is ' + dep_main.type_name()) 21 - 22 - # https://github.com/mesonbuild/meson/issues/10002 23 - -ldap_dep = dependency('ldap', method : 'extraframework') 24 - +ldap_dep = dependency('LDAP', method : 'extraframework') 25 - assert(ldap_dep.type_name() == 'extraframeworks', 'type_name is ' + ldap_dep.type_name()) 26 - 27 - stlib = static_library('stat', 'stat.c', install : true, dependencies: [opengl_dep, ldap_dep])
···
+2 -5
pkgs/by-name/me/meson/package.nix
··· 18 in 19 python3.pkgs.buildPythonApplication rec { 20 pname = "meson"; 21 - version = "1.3.0"; 22 23 src = fetchFromGitHub { 24 owner = "mesonbuild"; 25 repo = "meson"; 26 rev = "refs/tags/${version}"; 27 - hash = "sha256-Jt3PWnbv/8P6Rvf3E/Yli2vdtfgx3CmsW+jlc9CK5KA="; 28 }; 29 30 patches = [ ··· 65 66 # Nixpkgs cctools does not have bitcode support. 67 ./006-disable-bitcode.patch 68 - 69 - # https://github.com/mesonbuild/meson/pull/12587 70 - ./007-darwin-case-sensitivity.patch 71 ]; 72 73 buildInputs = lib.optionals (python3.pythonOlder "3.9") [
··· 18 in 19 python3.pkgs.buildPythonApplication rec { 20 pname = "meson"; 21 + version = "1.3.1"; 22 23 src = fetchFromGitHub { 24 owner = "mesonbuild"; 25 repo = "meson"; 26 rev = "refs/tags/${version}"; 27 + hash = "sha256-KNNtHi3jx0MRiOgmluA4ucZJWB2WeIYdApfHuspbCqg="; 28 }; 29 30 patches = [ ··· 65 66 # Nixpkgs cctools does not have bitcode support. 67 ./006-disable-bitcode.patch 68 ]; 69 70 buildInputs = lib.optionals (python3.pythonOlder "3.9") [
+1 -1
pkgs/by-name/up/uplosi/package.nix
··· 16 vendorHash = "sha256-RsjUPLe8omoN+XGyNhHDxzNfZR7VVTkh/f/On1oCRqM="; 17 18 CGO_ENABLED = "0"; 19 - ldflags = [ "-s" "-w" "-buildid=" "-X main.version=${version}" ]; 20 flags = [ "-trimpath" ]; 21 22 meta = with lib; {
··· 16 vendorHash = "sha256-RsjUPLe8omoN+XGyNhHDxzNfZR7VVTkh/f/On1oCRqM="; 17 18 CGO_ENABLED = "0"; 19 + ldflags = [ "-s" "-w" "-X main.version=${version}" ]; 20 flags = [ "-trimpath" ]; 21 22 meta = with lib; {
+26
pkgs/by-name/vu/vulkan-volk/package.nix
···
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, vulkan-headers }: 2 + 3 + stdenv.mkDerivation (finalAttrs: { 4 + pname = "volk"; 5 + version = "1.3.275.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "zeux"; 9 + repo = "volk"; 10 + rev = "vulkan-sdk-${finalAttrs.version}"; 11 + hash = "sha256-uTjLgJMGN8nOVhVIl/GNhO2jXe9ebhc9vzAwCDwfuf4="; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + buildInputs = [ vulkan-headers ]; 16 + 17 + cmakeFlags = ["-DVOLK_INSTALL=1"]; 18 + 19 + meta = with lib; { 20 + description = " Meta loader for Vulkan API"; 21 + homepage = "https://github.com/zeux/volk"; 22 + platforms = platforms.all; 23 + license = licenses.mit; 24 + maintainers = with maintainers; [ k900 ]; 25 + }; 26 + })
+2 -2
pkgs/data/misc/iana-etc/default.nix
··· 2 3 stdenvNoCC.mkDerivation rec { 4 pname = "iana-etc"; 5 - version = "20230316"; 6 7 src = fetchzip { 8 url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz"; 9 - sha256 = "sha256-5acFYPSwevEw5tZNbQDpui3stWuMdnhaKHqC8lhnsOY="; 10 }; 11 12 installPhase = ''
··· 2 3 stdenvNoCC.mkDerivation rec { 4 pname = "iana-etc"; 5 + version = "20231227"; 6 7 src = fetchzip { 8 url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz"; 9 + sha256 = "sha256-8Pa6LtAml8axjrUS32UbFIqTtM8v124U2Tt0J4sC0Is="; 10 }; 11 12 installPhase = ''
+2
pkgs/development/compilers/gcc/common/configure-flags.nix
··· 135 # We pick "/" path to effectively avoid sysroot offset and make it work 136 # as a native case. 137 "--with-build-sysroot=/" 138 ] 139 140 # Basic configuration
··· 135 # We pick "/" path to effectively avoid sysroot offset and make it work 136 # as a native case. 137 "--with-build-sysroot=/" 138 + # Same with the stdlibc++ headers embedded in the gcc output 139 + "--with-gxx-include-dir=${placeholder "out"}/include/c++/${version}/" 140 ] 141 142 # Basic configuration
+20 -8
pkgs/development/compilers/gcc/patches/12/mangle-NIX_STORE-in-__FILE__.patch
··· 12 Typical examples are `nix` -> `nlohmann_json` and `pipewire` -> 13 `lttng-ust.dev`. 14 15 Ideally we would like to use `-fmacro-prefix-map=` feature of `gcc` as: 16 17 - -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/eeee.eee-nlohmann-json-ver 18 -fmacro-prefix-map=/nix/... 19 20 In practice it quickly exhausts argument length limit due to `gcc` ··· 25 26 Tested as: 27 28 - $ printf "# 0 \"/nix/store/01234567890123456789012345678901-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 29 ... 30 - .string "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-pppppp-vvvvvvv" 31 ... 32 33 Mangled successfully. ··· 43 /* Perform user-specified mapping of filename prefixes. Return the 44 GC-allocated new name corresponding to FILENAME or FILENAME if no 45 remapping was performed. */ 46 - @@ -76,7 +79,30 @@ remap_filename (file_prefix_map *maps, const char *filename) 47 if (filename_ncmp (filename, map->old_prefix, map->old_len) == 0) 48 break; 49 if (!map) ··· 51 + { 52 + if (maps == macro_prefix_maps) 53 + { 54 - + /* Remap all fo $NIX_STORE/.{32} paths to 55 - + * equivalent $NIX_STORE/e{32}. 56 + * 57 + * That way we avoid argument parameters explosion 58 + * and still avoid embedding headers into runtime closure: ··· 66 + { 67 + s = (char *) ggc_alloc_atomic (name_len + 1); 68 + memcpy(s, name, name_len + 1); 69 - + memset(s + nix_store_len + 1, 'e', 32); 70 + return s; 71 + } 72 + } ··· 75 name = filename + map->old_len; 76 name_len = strlen (name) + 1; 77 78 - @@ -90,7 +116,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 79 ignore it in DW_AT_producer (dwarf2out.cc). */ 80 81 /* Linked lists of file_prefix_map structures. */
··· 12 Typical examples are `nix` -> `nlohmann_json` and `pipewire` -> 13 `lttng-ust.dev`. 14 15 + For this reason we want to remove the occurrences of hashes in the 16 + expansion of `__FILE__`. `nuke-references` does it by replacing hashes 17 + by `eeeeee...` but those paths are also used for debug symbols. It is 18 + handy to be able to invert the transformation to go back to the original 19 + store path for debuginfod servers. The chosen solution is to make the 20 + hash uppercase: 21 + - it does not trigger runtime references (except for all digit hashes, 22 + which are unlikely enough) 23 + - it visually looks like a bogus store path 24 + - it is easy to find the original store path if required 25 + 26 Ideally we would like to use `-fmacro-prefix-map=` feature of `gcc` as: 27 28 + -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/$HASH1-nlohmann-json-ver 29 -fmacro-prefix-map=/nix/... 30 31 In practice it quickly exhausts argument length limit due to `gcc` ··· 36 37 Tested as: 38 39 + $ printf "# 0 \"/nix/store/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 40 ... 41 + .string "/nix/store/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA-pppppp-vvvvvvv" 42 ... 43 44 Mangled successfully. ··· 54 /* Perform user-specified mapping of filename prefixes. Return the 55 GC-allocated new name corresponding to FILENAME or FILENAME if no 56 remapping was performed. */ 57 + @@ -76,7 +79,31 @@ remap_filename (file_prefix_map *maps, const char *filename) 58 if (filename_ncmp (filename, map->old_prefix, map->old_len) == 0) 59 break; 60 if (!map) ··· 62 + { 63 + if (maps == macro_prefix_maps) 64 + { 65 + + /* Remap the 32 characters after $NIX_STORE/ to uppercase 66 + * 67 + * That way we avoid argument parameters explosion 68 + * and still avoid embedding headers into runtime closure: ··· 76 + { 77 + s = (char *) ggc_alloc_atomic (name_len + 1); 78 + memcpy(s, name, name_len + 1); 79 + + for (int i = nix_store_len + 1; i < nix_store_len + 1 + 32; i++) { 80 + + s[i] = TOUPPER(s[i]); 81 + + } 82 + return s; 83 + } 84 + } ··· 87 name = filename + map->old_len; 88 name_len = strlen (name) + 1; 89 90 + @@ -90,7 +117,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 91 ignore it in DW_AT_producer (dwarf2out.cc). */ 92 93 /* Linked lists of file_prefix_map structures. */
+60
pkgs/development/compilers/gcc/patches/13/ICE-PR110280.patch
···
··· 1 + From f4029de35fb1b293a4fd586574b1b4b73ddf7880 Mon Sep 17 00:00:00 2001 2 + From: Prathamesh Kulkarni <prathamesh.kulkarni@linaro.org> 3 + Date: Wed, 26 Jul 2023 22:36:26 +0530 4 + Subject: [PATCH] [aarch64/match.pd] Fix ICE observed in PR110280. 5 + 6 + gcc/ChangeLog: 7 + PR tree-optimization/110280 8 + * match.pd (vec_perm_expr(v, v, mask) -> v): Explicitly build vector 9 + using build_vector_from_val with the element of input operand, and 10 + mask's type if operand and mask's types don't match. 11 + 12 + gcc/testsuite/ChangeLog: 13 + PR tree-optimization/110280 14 + * gcc.target/aarch64/sve/pr110280.c: New test. 15 + 16 + (cherry picked from commit 85d8e0d8d5342ec8b4e6a54e22741c30b33c6f04) 17 + --- 18 + gcc/match.pd | 9 ++++++++- 19 + gcc/testsuite/gcc.target/aarch64/sve/pr110280.c | 12 ++++++++++++ 20 + 2 files changed, 20 insertions(+), 1 deletion(-) 21 + create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/pr110280.c 22 + 23 + diff --git a/gcc/match.pd b/gcc/match.pd 24 + index 9118244825054..c3bb4fbc0a7a2 100644 25 + --- a/gcc/match.pd 26 + +++ b/gcc/match.pd 27 + @@ -8292,7 +8292,14 @@ and, 28 + 29 + (simplify 30 + (vec_perm vec_same_elem_p@0 @0 @1) 31 + - @0) 32 + + (if (types_match (type, TREE_TYPE (@0))) 33 + + @0 34 + + (with 35 + + { 36 + + tree elem = uniform_vector_p (@0); 37 + + } 38 + + (if (elem) 39 + + { build_vector_from_val (type, elem); })))) 40 + 41 + /* Push VEC_PERM earlier if that may help FMA perception (PR101895). */ 42 + (simplify 43 + diff --git a/gcc/testsuite/gcc.target/aarch64/sve/pr110280.c b/gcc/testsuite/gcc.target/aarch64/sve/pr110280.c 44 + new file mode 100644 45 + index 0000000000000..d3279f383629f 46 + --- /dev/null 47 + +++ b/gcc/testsuite/gcc.target/aarch64/sve/pr110280.c 48 + @@ -0,0 +1,12 @@ 49 + +/* { dg-do compile } */ 50 + +/* { dg-options "-O3 -fdump-tree-optimized" } */ 51 + + 52 + +#include "arm_sve.h" 53 + + 54 + +svuint32_t l() 55 + +{ 56 + + _Alignas(16) const unsigned int lanes[4] = {0, 0, 0, 0}; 57 + + return svld1rq_u32(svptrue_b8(), lanes); 58 + +} 59 + + 60 + +/* { dg-final { scan-tree-dump-not "VEC_PERM_EXPR" "optimized" } } */
+20 -9
pkgs/development/compilers/gcc/patches/13/mangle-NIX_STORE-in-__FILE__.patch
··· 12 Typical examples are `nix` -> `nlohmann_json` and `pipewire` -> 13 `lttng-ust.dev`. 14 15 Ideally we would like to use `-fmacro-prefix-map=` feature of `gcc` as: 16 17 - -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/eeee.eee-nlohmann-json-ver 18 -fmacro-prefix-map=/nix/... 19 20 In practice it quickly exhausts argument length limit due to `gcc` ··· 25 26 Tested as: 27 28 - $ printf "# 0 \"/nix/store/01234567890123456789012345678901-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 29 ... 30 - .string "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-pppppp-vvvvvvv" 31 ... 32 33 Mangled successfully. ··· 43 /* Perform user-specified mapping of filename prefixes. Return the 44 GC-allocated new name corresponding to FILENAME or FILENAME if no 45 remapping was performed. */ 46 - @@ -102,6 +105,29 @@ remap_filename (file_prefix_map *maps, const char *filename) 47 break; 48 if (!map) 49 { 50 + if (maps == macro_prefix_maps) 51 + { 52 - + /* Remap all fo $NIX_STORE/.{32} paths to 53 - + * equivalent $NIX_STORE/e{32}. 54 + * 55 + * That way we avoid argument parameters explosion 56 + * and still avoid embedding headers into runtime closure: ··· 64 + { 65 + s = (char *) ggc_alloc_atomic (name_len + 1); 66 + memcpy(s, name, name_len + 1); 67 - + memset(s + nix_store_len + 1, 'e', 32); 68 + if (realname != filename) 69 + free (const_cast <char *> (realname)); 70 + return s; ··· 73 if (realname != filename) 74 free (const_cast <char *> (realname)); 75 return filename; 76 - @@ -124,7 +150,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 77 ignore it in DW_AT_producer (gen_command_line_string in opts.cc). */ 78 79 /* Linked lists of file_prefix_map structures. */ ··· 81 static file_prefix_map *debug_prefix_maps; /* -fdebug-prefix-map */ 82 static file_prefix_map *profile_prefix_maps; /* -fprofile-prefix-map */ 83 84 -
··· 12 Typical examples are `nix` -> `nlohmann_json` and `pipewire` -> 13 `lttng-ust.dev`. 14 15 + For this reason we want to remove the occurrences of hashes in the 16 + expansion of `__FILE__`. `nuke-references` does it by replacing hashes 17 + by `eeeeee...` but those paths are also used for debug symbols. It is 18 + handy to be able to invert the transformation to go back to the original 19 + store path for debuginfod servers. The chosen solution is to make the 20 + hash uppercase: 21 + - it does not trigger runtime references (except for all digit hashes, 22 + which are unlikely enough) 23 + - it visually looks like a bogus store path 24 + - it is easy to find the original store path if required 25 + 26 Ideally we would like to use `-fmacro-prefix-map=` feature of `gcc` as: 27 28 + -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/$HASH1-nlohmann-json-ver 29 -fmacro-prefix-map=/nix/... 30 31 In practice it quickly exhausts argument length limit due to `gcc` ··· 36 37 Tested as: 38 39 + $ printf "# 0 \"/nix/store/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 40 ... 41 + .string "/nix/store/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA-pppppp-vvvvvvv" 42 ... 43 44 Mangled successfully. ··· 54 /* Perform user-specified mapping of filename prefixes. Return the 55 GC-allocated new name corresponding to FILENAME or FILENAME if no 56 remapping was performed. */ 57 + @@ -102,6 +105,30 @@ remap_filename (file_prefix_map *maps, const char *filename) 58 break; 59 if (!map) 60 { 61 + if (maps == macro_prefix_maps) 62 + { 63 + + /* Remap all fo $NIX_STORE/.{32} paths to uppercase 64 + * 65 + * That way we avoid argument parameters explosion 66 + * and still avoid embedding headers into runtime closure: ··· 74 + { 75 + s = (char *) ggc_alloc_atomic (name_len + 1); 76 + memcpy(s, name, name_len + 1); 77 + + for (int i = nix_store_len + 1; i < nix_store_len + 1 + 32; i++) { 78 + + s[i] = TOUPPER(s[i]); 79 + + } 80 + if (realname != filename) 81 + free (const_cast <char *> (realname)); 82 + return s; ··· 85 if (realname != filename) 86 free (const_cast <char *> (realname)); 87 return filename; 88 + @@ -124,7 +151,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 89 ignore it in DW_AT_producer (gen_command_line_string in opts.cc). */ 90 91 /* Linked lists of file_prefix_map structures. */ ··· 93 static file_prefix_map *debug_prefix_maps; /* -fdebug-prefix-map */ 94 static file_prefix_map *profile_prefix_maps; /* -fprofile-prefix-map */ 95
+1
pkgs/development/compilers/gcc/patches/default.nix
··· 74 ++ optional langFortran (if atLeast12 then ./gcc-12-gfortran-driving.patch else ./gfortran-driving.patch) 75 ++ optional atLeast7 ./ppc-musl.patch 76 ++ optional is12 ./12/lambda-ICE-PR109241.patch # backport ICE fix on ccache code 77 ++ optional (atLeast9 && langD) ./libphobos.patch 78 79
··· 74 ++ optional langFortran (if atLeast12 then ./gcc-12-gfortran-driving.patch else ./gfortran-driving.patch) 75 ++ optional atLeast7 ./ppc-musl.patch 76 ++ optional is12 ./12/lambda-ICE-PR109241.patch # backport ICE fix on ccache code 77 + ++ optional is13 ./13/ICE-PR110280.patch # backport ICE fix on const_unop 78 ++ optional (atLeast9 && langD) ./libphobos.patch 79 80
+2 -2
pkgs/development/compilers/glslang/default.nix
··· 9 }: 10 stdenv.mkDerivation rec { 11 pname = "glslang"; 12 - version = "13.1.1"; 13 14 src = fetchFromGitHub { 15 owner = "KhronosGroup"; 16 repo = "glslang"; 17 rev = version; 18 - hash = "sha256-fuzNsVYdnThMzd4tLN/sTbCBXg6qXKLDJRziOKyOBGg="; 19 }; 20 21 # These get set at all-packages, keep onto them for child drvs
··· 9 }: 10 stdenv.mkDerivation rec { 11 pname = "glslang"; 12 + version = "14.0.0"; 13 14 src = fetchFromGitHub { 15 owner = "KhronosGroup"; 16 repo = "glslang"; 17 rev = version; 18 + hash = "sha256-7kIIU45pe+IF7lGltpIKSvQBmcXR+TWFvmx7ztMNrpc="; 19 }; 20 21 # These get set at all-packages, keep onto them for child drvs
+2 -2
pkgs/development/compilers/go/1.21.nix
··· 46 in 47 stdenv.mkDerivation (finalAttrs: { 48 pname = "go"; 49 - version = "1.21.5"; 50 51 src = fetchurl { 52 url = "https://go.dev/dl/go${finalAttrs.version}.src.tar.gz"; 53 - hash = "sha256-KFy730tubmLtWPNw8/bYwwgl1uVsWFPGbTwjvNsJ2xk="; 54 }; 55 56 strictDeps = true;
··· 46 in 47 stdenv.mkDerivation (finalAttrs: { 48 pname = "go"; 49 + version = "1.21.6"; 50 51 src = fetchurl { 52 url = "https://go.dev/dl/go${finalAttrs.version}.src.tar.gz"; 53 + hash = "sha256-Ekkmpi5F942qu67bnAEdl2MxhqM8I4/8HiUyDAIEYkg="; 54 }; 55 56 strictDeps = true;
+1
pkgs/development/compilers/llvm/10/default.nix
··· 158 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 159 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 160 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 161 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 162 echo "-lunwind" >> $out/nix-support/cc-ldflags 163 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
··· 158 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 159 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 160 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 161 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 163 echo "-lunwind" >> $out/nix-support/cc-ldflags 164 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/10/llvm/default.nix
··· 248 ] ++ optionals isDarwin [ 249 "-DLLVM_ENABLE_LIBCXX=ON" 250 "-DCAN_TARGET_i386=false" 251 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 252 "-DCMAKE_CROSSCOMPILING=True" 253 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 254 (
··· 248 ] ++ optionals isDarwin [ 249 "-DLLVM_ENABLE_LIBCXX=ON" 250 "-DCAN_TARGET_i386=false" 251 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 252 "-DCMAKE_CROSSCOMPILING=True" 253 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 254 (
+1
pkgs/development/compilers/llvm/11/default.nix
··· 173 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 174 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 175 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 176 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 177 echo "-lunwind" >> $out/nix-support/cc-ldflags 178 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
··· 173 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 174 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 175 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 176 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 177 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 178 echo "-lunwind" >> $out/nix-support/cc-ldflags 179 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/11/llvm/default.nix
··· 256 ] ++ optionals isDarwin [ 257 "-DLLVM_ENABLE_LIBCXX=ON" 258 "-DCAN_TARGET_i386=false" 259 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 260 "-DCMAKE_CROSSCOMPILING=True" 261 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 262 (
··· 256 ] ++ optionals isDarwin [ 257 "-DLLVM_ENABLE_LIBCXX=ON" 258 "-DCAN_TARGET_i386=false" 259 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 260 "-DCMAKE_CROSSCOMPILING=True" 261 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 262 (
+1
pkgs/development/compilers/llvm/12/default.nix
··· 173 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 174 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 175 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 176 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 177 echo "-lunwind" >> $out/nix-support/cc-ldflags 178 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
··· 173 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 174 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 175 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 176 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 177 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 178 echo "-lunwind" >> $out/nix-support/cc-ldflags 179 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/12/llvm/default.nix
··· 244 ] ++ optionals isDarwin [ 245 "-DLLVM_ENABLE_LIBCXX=ON" 246 "-DCAN_TARGET_i386=false" 247 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 248 "-DCMAKE_CROSSCOMPILING=True" 249 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 250 (
··· 244 ] ++ optionals isDarwin [ 245 "-DLLVM_ENABLE_LIBCXX=ON" 246 "-DCAN_TARGET_i386=false" 247 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 248 "-DCMAKE_CROSSCOMPILING=True" 249 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 250 (
+1
pkgs/development/compilers/llvm/13/default.nix
··· 213 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 214 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 215 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 216 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 217 echo "-lunwind" >> $out/nix-support/cc-ldflags 218 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
··· 213 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 214 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 215 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 216 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 217 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 218 echo "-lunwind" >> $out/nix-support/cc-ldflags 219 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/13/llvm/default.nix
··· 206 ] ++ optionals isDarwin [ 207 "-DLLVM_ENABLE_LIBCXX=ON" 208 "-DCAN_TARGET_i386=false" 209 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 210 "-DCMAKE_CROSSCOMPILING=True" 211 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 212 (
··· 206 ] ++ optionals isDarwin [ 207 "-DLLVM_ENABLE_LIBCXX=ON" 208 "-DCAN_TARGET_i386=false" 209 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 210 "-DCMAKE_CROSSCOMPILING=True" 211 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 212 (
+1
pkgs/development/compilers/llvm/14/default.nix
··· 216 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 217 "-lunwind" 218 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 219 }; 220 221 clangNoLibcxx = wrapCCWith rec {
··· 216 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 217 "-lunwind" 218 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 219 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 220 }; 221 222 clangNoLibcxx = wrapCCWith rec {
+1 -1
pkgs/development/compilers/llvm/14/llvm/default.nix
··· 205 ] ++ optionals isDarwin [ 206 "-DLLVM_ENABLE_LIBCXX=ON" 207 "-DCAN_TARGET_i386=false" 208 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 209 "-DCMAKE_CROSSCOMPILING=True" 210 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 211 (
··· 205 ] ++ optionals isDarwin [ 206 "-DLLVM_ENABLE_LIBCXX=ON" 207 "-DCAN_TARGET_i386=false" 208 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 209 "-DCMAKE_CROSSCOMPILING=True" 210 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 211 (
+1
pkgs/development/compilers/llvm/15/default.nix
··· 221 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 222 "-lunwind" 223 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 224 }; 225 226 clangNoLibcxx = wrapCCWith rec {
··· 221 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 222 "-lunwind" 223 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 224 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 225 }; 226 227 clangNoLibcxx = wrapCCWith rec {
+8
pkgs/development/compilers/llvm/15/libcxx/default.nix
··· 56 hash = "sha256-AaM9A6tQ4YAw7uDqCIV4VaiUyLZv+unwcOqbakwW9/k="; 57 relative = "libcxx"; 58 }) 59 ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 60 ../../libcxx-0001-musl-hacks.patch 61 ];
··· 56 hash = "sha256-AaM9A6tQ4YAw7uDqCIV4VaiUyLZv+unwcOqbakwW9/k="; 57 relative = "libcxx"; 58 }) 59 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 60 + # https://github.com/llvm/llvm-project/pull/77218 61 + (fetchpatch { 62 + name = "darwin-system-libcxxabi-link-flags.patch"; 63 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 64 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 65 + relative = "libcxx"; 66 + }) 67 ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 68 ../../libcxx-0001-musl-hacks.patch 69 ];
+1 -1
pkgs/development/compilers/llvm/15/llvm/default.nix
··· 343 ] ++ optionals isDarwin [ 344 "-DLLVM_ENABLE_LIBCXX=ON" 345 "-DCAN_TARGET_i386=false" 346 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 347 "-DCMAKE_CROSSCOMPILING=True" 348 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 349 (
··· 343 ] ++ optionals isDarwin [ 344 "-DLLVM_ENABLE_LIBCXX=ON" 345 "-DCAN_TARGET_i386=false" 346 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 347 "-DCMAKE_CROSSCOMPILING=True" 348 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 349 (
+1
pkgs/development/compilers/llvm/16/default.nix
··· 226 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 227 "-lunwind" 228 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 229 }; 230 231 clangNoLibcxx = wrapCCWith rec {
··· 226 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 227 "-lunwind" 228 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 229 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 230 }; 231 232 clangNoLibcxx = wrapCCWith rec {
+9 -1
pkgs/development/compilers/llvm/16/libcxx/default.nix
··· 1 { lib, stdenv, llvm_meta 2 - , monorepoSrc, runCommand 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 , libcxxabi, libcxxrt, libunwind ··· 47 48 patches = [ 49 ./gnu-install-dirs.patch 50 ]; 51 52 postPatch = ''
··· 1 { lib, stdenv, llvm_meta 2 + , monorepoSrc, runCommand, fetchpatch 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 , libcxxabi, libcxxrt, libunwind ··· 47 48 patches = [ 49 ./gnu-install-dirs.patch 50 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 51 + # https://github.com/llvm/llvm-project/pull/77218 52 + (fetchpatch { 53 + name = "darwin-system-libcxxabi-link-flags.patch"; 54 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 55 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 56 + relative = "libcxx"; 57 + }) 58 ]; 59 60 postPatch = ''
+1 -1
pkgs/development/compilers/llvm/16/llvm/default.nix
··· 331 ] ++ optionals isDarwin [ 332 "-DLLVM_ENABLE_LIBCXX=ON" 333 "-DCAN_TARGET_i386=false" 334 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 335 "-DCMAKE_CROSSCOMPILING=True" 336 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 337 (
··· 331 ] ++ optionals isDarwin [ 332 "-DLLVM_ENABLE_LIBCXX=ON" 333 "-DCAN_TARGET_i386=false" 334 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 335 "-DCMAKE_CROSSCOMPILING=True" 336 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 337 (
+12 -1
pkgs/development/compilers/llvm/17/libcxx/default.nix
··· 1 { lib, stdenv, llvm_meta 2 - , monorepoSrc, runCommand 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 , libcxxabi, libcxxrt, libunwind ··· 44 cd ../${basename} 45 chmod -R u+w . 46 ''; 47 48 postPatch = '' 49 cd ../runtimes
··· 1 { lib, stdenv, llvm_meta 2 + , monorepoSrc, runCommand, fetchpatch 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 , libcxxabi, libcxxrt, libunwind ··· 44 cd ../${basename} 45 chmod -R u+w . 46 ''; 47 + 48 + patches = [ 49 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 50 + # https://github.com/llvm/llvm-project/pull/77218 51 + (fetchpatch { 52 + name = "darwin-system-libcxxabi-link-flags.patch"; 53 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 54 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 55 + relative = "libcxx"; 56 + }) 57 + ]; 58 59 postPatch = '' 60 cd ../runtimes
+1 -1
pkgs/development/compilers/llvm/17/llvm/default.nix
··· 330 ] ++ optionals isDarwin [ 331 "-DLLVM_ENABLE_LIBCXX=ON" 332 "-DCAN_TARGET_i386=false" 333 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 334 "-DCMAKE_CROSSCOMPILING=True" 335 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 336 (
··· 330 ] ++ optionals isDarwin [ 331 "-DLLVM_ENABLE_LIBCXX=ON" 332 "-DCAN_TARGET_i386=false" 333 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 334 "-DCMAKE_CROSSCOMPILING=True" 335 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 336 (
+1
pkgs/development/compilers/llvm/8/default.nix
··· 161 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 163 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 164 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 165 echo "-lunwind" >> $out/nix-support/cc-ldflags 166 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
··· 161 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 163 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 164 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 165 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 166 echo "-lunwind" >> $out/nix-support/cc-ldflags 167 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/8/llvm/default.nix
··· 222 ] ++ optionals (isDarwin) [ 223 "-DLLVM_ENABLE_LIBCXX=ON" 224 "-DCAN_TARGET_i386=false" 225 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 226 "-DCMAKE_CROSSCOMPILING=True" 227 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 228 (
··· 222 ] ++ optionals (isDarwin) [ 223 "-DLLVM_ENABLE_LIBCXX=ON" 224 "-DCAN_TARGET_i386=false" 225 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 226 "-DCMAKE_CROSSCOMPILING=True" 227 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 228 (
+1
pkgs/development/compilers/llvm/9/default.nix
··· 161 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 163 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 164 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 165 echo "-lunwind" >> $out/nix-support/cc-ldflags 166 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
··· 161 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 163 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 164 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 165 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 166 echo "-lunwind" >> $out/nix-support/cc-ldflags 167 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/9/llvm/default.nix
··· 237 ] ++ optionals (isDarwin) [ 238 "-DLLVM_ENABLE_LIBCXX=ON" 239 "-DCAN_TARGET_i386=false" 240 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 241 "-DCMAKE_CROSSCOMPILING=True" 242 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 243 (
··· 237 ] ++ optionals (isDarwin) [ 238 "-DLLVM_ENABLE_LIBCXX=ON" 239 "-DCAN_TARGET_i386=false" 240 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 241 "-DCMAKE_CROSSCOMPILING=True" 242 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 243 (
+1
pkgs/development/compilers/llvm/git/default.nix
··· 216 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 217 "-lunwind" 218 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 219 }; 220 221 clangNoLibcxx = wrapCCWith rec {
··· 216 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 217 "-lunwind" 218 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 219 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 220 }; 221 222 clangNoLibcxx = wrapCCWith rec {
+12 -1
pkgs/development/compilers/llvm/git/libcxx/default.nix
··· 1 { lib, stdenv, llvm_meta 2 - , monorepoSrc, runCommand 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 , libcxxabi, libcxxrt, libunwind ··· 44 cd ../${basename} 45 chmod -R u+w . 46 ''; 47 48 postPatch = '' 49 cd ../runtimes
··· 1 { lib, stdenv, llvm_meta 2 + , monorepoSrc, runCommand, fetchpatch 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 , libcxxabi, libcxxrt, libunwind ··· 44 cd ../${basename} 45 chmod -R u+w . 46 ''; 47 + 48 + patches = [ 49 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 50 + # https://github.com/llvm/llvm-project/pull/77218 51 + (fetchpatch { 52 + name = "darwin-system-libcxxabi-link-flags.patch"; 53 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 54 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 55 + relative = "libcxx"; 56 + }) 57 + ]; 58 59 postPatch = '' 60 cd ../runtimes
+1 -1
pkgs/development/compilers/llvm/git/llvm/default.nix
··· 329 ] ++ optionals isDarwin [ 330 "-DLLVM_ENABLE_LIBCXX=ON" 331 "-DCAN_TARGET_i386=false" 332 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 333 "-DCMAKE_CROSSCOMPILING=True" 334 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 335 (
··· 329 ] ++ optionals isDarwin [ 330 "-DLLVM_ENABLE_LIBCXX=ON" 331 "-DCAN_TARGET_i386=false" 332 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 333 "-DCMAKE_CROSSCOMPILING=True" 334 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 335 (
+8 -1
pkgs/development/compilers/spirv-llvm-translator/default.nix
··· 48 inherit (branch) rev hash; 49 }; 50 51 - patches = lib.optionals (llvmMajor == "16") [ 52 # Fixes builds that link against external LLVM dynamic library 53 (fetchpatch { 54 url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/f3b9b604d7eda18d0d1029d94a6eebd33aa3a3fe.patch";
··· 48 inherit (branch) rev hash; 49 }; 50 51 + patches = [ 52 + # Fixes build after spirv-headers breaking change 53 + (fetchpatch { 54 + url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/0166a0fb86dc6c0e8903436bbc3a89bc3273ebc0.patch"; 55 + excludes = ["spirv-headers-tag.conf"]; 56 + hash = "sha256-17JJG8eCFVphElY5fVT/79hj0bByWxo8mVp1ZNjQk/M="; 57 + }) 58 + ] ++ lib.optionals (llvmMajor == "16") [ 59 # Fixes builds that link against external LLVM dynamic library 60 (fetchpatch { 61 url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/f3b9b604d7eda18d0d1029d94a6eebd33aa3a3fe.patch";
+1 -1
pkgs/development/compilers/zulu/common.nix
··· 57 isJdk8 = lib.versions.major dist.jdkVersion == "8"; 58 59 jdk = stdenv.mkDerivation rec { 60 - pname = "zulu${dist.zuluVersion}-${javaPackage}"; 61 version = dist.jdkVersion; 62 63 src = fetchurl {
··· 57 isJdk8 = lib.versions.major dist.jdkVersion == "8"; 58 59 jdk = stdenv.mkDerivation rec { 60 + pname = "zulu-${javaPackage}"; 61 version = dist.jdkVersion; 62 63 src = fetchurl {
+2 -2
pkgs/development/interpreters/ruby/rubygems/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "rubygems"; 5 - version = "3.5.3"; 6 7 src = fetchurl { 8 url = "https://rubygems.org/rubygems/rubygems-${version}.tgz"; 9 - hash = "sha256-8xFe6AgJkvJXwBYbgR4HsBLyAXXtiTSfsayYl33cXJw="; 10 }; 11 12 patches = [
··· 2 3 stdenv.mkDerivation rec { 4 pname = "rubygems"; 5 + version = "3.5.5"; 6 7 src = fetchurl { 8 url = "https://rubygems.org/rubygems/rubygems-${version}.tgz"; 9 + hash = "sha256-ErKsKMIEvs4oA8eS9v1ASfqlMOJOxeTVfCA99AIcTh0="; 10 }; 11 12 patches = [
+2 -2
pkgs/development/libraries/aws-c-auth/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "aws-c-auth"; 17 - version = "0.7.7"; 18 19 src = fetchFromGitHub { 20 owner = "awslabs"; 21 repo = "aws-c-auth"; 22 rev = "v${version}"; 23 - sha256 = "sha256-GO3Sfbi1dwsqQM6rlnEHyE7wolQjdVwD5BAu5ychEuY="; 24 }; 25 26 nativeBuildInputs = [
··· 14 15 stdenv.mkDerivation rec { 16 pname = "aws-c-auth"; 17 + version = "0.7.10"; 18 19 src = fetchFromGitHub { 20 owner = "awslabs"; 21 repo = "aws-c-auth"; 22 rev = "v${version}"; 23 + hash = "sha256-yJ0sgw0y9tIiIHgTPVnfYd8zAGjO83qfeeEzstGH9CE="; 24 }; 25 26 nativeBuildInputs = [
+7 -2
pkgs/development/libraries/catch2/3.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "catch2"; 10 - version = "3.4.0"; 11 12 src = fetchFromGitHub { 13 owner = "catchorg"; 14 repo = "Catch2"; 15 rev = "v${version}"; 16 - hash = "sha256-DqGGfNjKPW9HFJrX9arFHyNYjB61uoL6NabZatTWrr0="; 17 }; 18 19 nativeBuildInputs = [ ··· 28 # our darwin build environment https://github.com/catchorg/Catch2/issues/1691 29 "-DCMAKE_CTEST_ARGUMENTS=-E;ApprovalTests" 30 ]; 31 32 doCheck = true; 33
··· 7 8 stdenv.mkDerivation rec { 9 pname = "catch2"; 10 + version = "3.5.2"; 11 12 src = fetchFromGitHub { 13 owner = "catchorg"; 14 repo = "Catch2"; 15 rev = "v${version}"; 16 + hash = "sha256-xGPfXjk+oOnR7JqTrZd2pKJxalrlS8CMs7HWDClXaS8="; 17 }; 18 19 nativeBuildInputs = [ ··· 28 # our darwin build environment https://github.com/catchorg/Catch2/issues/1691 29 "-DCMAKE_CTEST_ARGUMENTS=-E;ApprovalTests" 30 ]; 31 + 32 + # Tests fail on x86_32 if compiled with x87 floats: https://github.com/catchorg/Catch2/issues/2796 33 + env = lib.optionalAttrs stdenv.isx86_32 { 34 + NIX_CFLAGS_COMPILE = "-msse2 -mfpmath=sse"; 35 + }; 36 37 doCheck = true; 38
+1
pkgs/development/libraries/dbus/default.nix
··· 43 ''; 44 45 outputs = [ "out" "dev" "lib" "doc" "man" ]; 46 47 strictDeps = true; 48 nativeBuildInputs = [
··· 43 ''; 44 45 outputs = [ "out" "dev" "lib" "doc" "man" ]; 46 + separateDebugInfo = true; 47 48 strictDeps = true; 49 nativeBuildInputs = [
+8
pkgs/development/libraries/editline/default.nix
··· 16 url = "https://github.com/troglobit/editline/commit/265c1fb6a0b99bedb157dc7c320f2c9629136518.patch"; 17 sha256 = "sha256-9fhQH0hT8BcykGzOUoT18HBtWjjoXnePSGDJQp8GH30="; 18 }) 19 ]; 20 21 nativeBuildInputs = [ autoreconfHook ];
··· 16 url = "https://github.com/troglobit/editline/commit/265c1fb6a0b99bedb157dc7c320f2c9629136518.patch"; 17 sha256 = "sha256-9fhQH0hT8BcykGzOUoT18HBtWjjoXnePSGDJQp8GH30="; 18 }) 19 + 20 + # Pending autoconf-2.72 upstream support: 21 + # https://github.com/troglobit/editline/pull/64 22 + (fetchpatch { 23 + name = "autoconf-2.72.patch"; 24 + url = "https://github.com/troglobit/editline/commit/f444a316f5178b8e20fe31e7b2d979e651da077e.patch"; 25 + hash = "sha256-m3jExTkPvE+ZBwHzf/A+ugzzfbLmeWYn726l7Po7f10="; 26 + }) 27 ]; 28 29 nativeBuildInputs = [ autoreconfHook ];
+3 -1
pkgs/development/libraries/enchant/2.x.nix
··· 22 hash = "sha256-wcVxnypZfOPgbJOM+5n7aX2gk96nuFfMAE3B3PG7oYI="; 23 }; 24 25 nativeBuildInputs = [ 26 groff 27 pkg-config ··· 33 nuspell 34 ]; 35 36 - nativeCheckInputs = [ 37 unittest-cpp 38 ]; 39
··· 22 hash = "sha256-wcVxnypZfOPgbJOM+5n7aX2gk96nuFfMAE3B3PG7oYI="; 23 }; 24 25 + strictDeps = true; 26 + 27 nativeBuildInputs = [ 28 groff 29 pkg-config ··· 35 nuspell 36 ]; 37 38 + checkInputs = [ 39 unittest-cpp 40 ]; 41
+12 -11
pkgs/development/libraries/ffmpeg/generic.nix
··· 44 , withFreetype ? withHeadlessDeps # Needed for drawtext filter 45 , withFrei0r ? withFullDeps # frei0r video filtering 46 , withFribidi ? withFullDeps # Needed for drawtext filter 47 - , withGlslang ? withFullDeps && !stdenv.isDarwin && lib.versionAtLeast version "5.0" 48 , withGme ? withFullDeps # Game Music Emulator 49 , withGnutls ? withHeadlessDeps 50 , withGsm ? withFullDeps # GSM de/encoder ··· 73 , withRtmp ? false # RTMP[E] support 74 , withSamba ? withFullDeps && !stdenv.isDarwin # Samba protocol 75 , withSdl2 ? withSmallDeps 76 , withSoxr ? withHeadlessDeps # Resampling via soxr 77 , withSpeex ? withHeadlessDeps # Speex de/encoder 78 , withSrt ? withHeadlessDeps # Secure Reliable Transport (SRT) protocol ··· 189 , frei0r 190 , fribidi 191 , game-music-emu 192 - , glslang 193 , gnutls 194 , gsm 195 , intel-media-sdk ··· 213 , libopenmpt 214 , libopus 215 , libplacebo 216 , libpulseaudio 217 , libraw1394 218 , librsvg ··· 244 , rtmpdump 245 , samba 246 , SDL2 247 , soxr 248 , speex 249 , srt ··· 349 ''; 350 351 patches = map (patch: fetchpatch patch) (extraPatches 352 - ++ (lib.optional (lib.versionAtLeast version "6" && lib.versionOlder version "6.1") 353 { # this can be removed post 6.1 354 name = "fix_aacps_tablegen"; 355 url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/814178f92647be2411516bbb82f48532373d2554"; 356 hash = "sha256-FQV9/PiarPXCm45ldtCsxGHjlrriL8DKpn1LaKJ8owI="; 357 } 358 ) 359 - ++ (lib.optional (stdenv.isDarwin && lib.versionAtLeast version "6.1" && lib.versionOlder version "6.2") 360 { # this can be removed post 6.1 361 name = "fix_build_failure_due_to_PropertyKey_EncoderID"; 362 url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/cb049d377f54f6b747667a93e4b719380c3e9475"; ··· 416 (enableFeature buildAvdevice "avdevice") 417 (enableFeature buildAvfilter "avfilter") 418 (enableFeature buildAvformat "avformat") 419 - ] ++ optionals (lib.versionOlder version "5") [ 420 # Ffmpeg > 4 doesn't know about the flag anymore 421 (enableFeature buildAvresample "avresample") 422 ] ++ [ ··· 476 (enableFeature withModplug "libmodplug") 477 (enableFeature withMysofa "libmysofa") 478 (enableFeature withOpus "libopus") 479 - (optionalString (versionAtLeast version "5.0" && withLibplacebo) "--enable-libplacebo") 480 (enableFeature withSvg "librsvg") 481 (enableFeature withSrt "libsrt") 482 (enableFeature withSsh "libssh") ··· 524 (enableFeature withZimg "libzimg") 525 (enableFeature withZlib "zlib") 526 (enableFeature withVulkan "vulkan") 527 - (enableFeature withGlslang "libglslang") 528 (enableFeature withSamba "libsmbclient") 529 /* 530 * Developer flags ··· 560 # TODO This was always in buildInputs before, why? 561 buildInputs = optionals withFullDeps [ libdc1394 ] 562 ++ optionals (withFullDeps && !stdenv.isDarwin) [ libraw1394 ] # TODO where does this belong to 563 - ++ optionals (withNvdec || withNvenc) [ (if (lib.versionAtLeast version "6") then nv-codec-headers-12 else nv-codec-headers) ] 564 ++ optionals withAlsa [ alsa-lib ] 565 ++ optionals withAom [ libaom ] 566 ++ optionals withAribcaption [ libaribcaption ] ··· 577 ++ optionals withFreetype [ freetype ] 578 ++ optionals withFrei0r [ frei0r ] 579 ++ optionals withFribidi [ fribidi ] 580 - ++ optionals withGlslang [ glslang ] 581 ++ optionals withGme [ game-music-emu ] 582 ++ optionals withGnutls [ gnutls ] 583 ++ optionals withGsm [ gsm ] 584 ++ optionals withIconv [ libiconv ] # On Linux this should be in libc, do we really need it? 585 ++ optionals withJack [ libjack2 ] 586 ++ optionals withLadspa [ ladspaH ] 587 - ++ optionals withLibplacebo [ libplacebo vulkan-headers ] 588 ++ optionals withLzma [ xz ] 589 ++ optionals withMfx [ intel-media-sdk ] 590 ++ optionals withModplug [ libmodplug ] ··· 604 ++ optionals withRtmp [ rtmpdump ] 605 ++ optionals withSamba [ samba ] 606 ++ optionals withSdl2 [ SDL2 ] 607 ++ optionals withSoxr [ soxr ] 608 ++ optionals withSpeex [ speex ] 609 ++ optionals withSrt [ srt ] ··· 692 meta = with lib; { 693 description = "A complete, cross-platform solution to record, convert and stream audio and video"; 694 homepage = "https://www.ffmpeg.org/"; 695 - changelog = "https://github.com/FFmpeg/FFmpeg/blob/n${version}/Changelog"; 696 longDescription = '' 697 FFmpeg is the leading multimedia framework, able to decode, encode, transcode, 698 mux, demux, stream, filter and play pretty much anything that humans and machines
··· 44 , withFreetype ? withHeadlessDeps # Needed for drawtext filter 45 , withFrei0r ? withFullDeps # frei0r video filtering 46 , withFribidi ? withFullDeps # Needed for drawtext filter 47 , withGme ? withFullDeps # Game Music Emulator 48 , withGnutls ? withHeadlessDeps 49 , withGsm ? withFullDeps # GSM de/encoder ··· 72 , withRtmp ? false # RTMP[E] support 73 , withSamba ? withFullDeps && !stdenv.isDarwin # Samba protocol 74 , withSdl2 ? withSmallDeps 75 + , withShaderc ? withFullDeps && !stdenv.isDarwin && lib.versionAtLeast version "5.0" 76 , withSoxr ? withHeadlessDeps # Resampling via soxr 77 , withSpeex ? withHeadlessDeps # Speex de/encoder 78 , withSrt ? withHeadlessDeps # Secure Reliable Transport (SRT) protocol ··· 189 , frei0r 190 , fribidi 191 , game-music-emu 192 , gnutls 193 , gsm 194 , intel-media-sdk ··· 212 , libopenmpt 213 , libopus 214 , libplacebo 215 + , libplacebo_5 216 , libpulseaudio 217 , libraw1394 218 , librsvg ··· 244 , rtmpdump 245 , samba 246 , SDL2 247 + , shaderc 248 , soxr 249 , speex 250 , srt ··· 350 ''; 351 352 patches = map (patch: fetchpatch patch) (extraPatches 353 + ++ (lib.optional (lib.versionAtLeast finalAttrs.version "6" && lib.versionOlder finalAttrs.version "6.1") 354 { # this can be removed post 6.1 355 name = "fix_aacps_tablegen"; 356 url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/814178f92647be2411516bbb82f48532373d2554"; 357 hash = "sha256-FQV9/PiarPXCm45ldtCsxGHjlrriL8DKpn1LaKJ8owI="; 358 } 359 ) 360 + ++ (lib.optional (lib.versionAtLeast finalAttrs.version "6.1" && lib.versionOlder finalAttrs.version "6.2") 361 { # this can be removed post 6.1 362 name = "fix_build_failure_due_to_PropertyKey_EncoderID"; 363 url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/cb049d377f54f6b747667a93e4b719380c3e9475"; ··· 417 (enableFeature buildAvdevice "avdevice") 418 (enableFeature buildAvfilter "avfilter") 419 (enableFeature buildAvformat "avformat") 420 + ] ++ optionals (lib.versionOlder finalAttrs.version "5") [ 421 # Ffmpeg > 4 doesn't know about the flag anymore 422 (enableFeature buildAvresample "avresample") 423 ] ++ [ ··· 477 (enableFeature withModplug "libmodplug") 478 (enableFeature withMysofa "libmysofa") 479 (enableFeature withOpus "libopus") 480 + (optionalString (versionAtLeast finalAttrs.version "5.0" && withLibplacebo) "--enable-libplacebo") 481 (enableFeature withSvg "librsvg") 482 (enableFeature withSrt "libsrt") 483 (enableFeature withSsh "libssh") ··· 525 (enableFeature withZimg "libzimg") 526 (enableFeature withZlib "zlib") 527 (enableFeature withVulkan "vulkan") 528 + (optionalString (lib.versionAtLeast finalAttrs.version "5") (enableFeature withShaderc "libshaderc")) 529 (enableFeature withSamba "libsmbclient") 530 /* 531 * Developer flags ··· 561 # TODO This was always in buildInputs before, why? 562 buildInputs = optionals withFullDeps [ libdc1394 ] 563 ++ optionals (withFullDeps && !stdenv.isDarwin) [ libraw1394 ] # TODO where does this belong to 564 + ++ optionals (withNvdec || withNvenc) [ (if (lib.versionAtLeast finalAttrs.version "6") then nv-codec-headers-12 else nv-codec-headers) ] 565 ++ optionals withAlsa [ alsa-lib ] 566 ++ optionals withAom [ libaom ] 567 ++ optionals withAribcaption [ libaribcaption ] ··· 578 ++ optionals withFreetype [ freetype ] 579 ++ optionals withFrei0r [ frei0r ] 580 ++ optionals withFribidi [ fribidi ] 581 ++ optionals withGme [ game-music-emu ] 582 ++ optionals withGnutls [ gnutls ] 583 ++ optionals withGsm [ gsm ] 584 ++ optionals withIconv [ libiconv ] # On Linux this should be in libc, do we really need it? 585 ++ optionals withJack [ libjack2 ] 586 ++ optionals withLadspa [ ladspaH ] 587 + ++ optionals withLibplacebo [ (if (lib.versionAtLeast finalAttrs.version "6.1") then libplacebo else libplacebo_5) vulkan-headers ] 588 ++ optionals withLzma [ xz ] 589 ++ optionals withMfx [ intel-media-sdk ] 590 ++ optionals withModplug [ libmodplug ] ··· 604 ++ optionals withRtmp [ rtmpdump ] 605 ++ optionals withSamba [ samba ] 606 ++ optionals withSdl2 [ SDL2 ] 607 + ++ optionals withShaderc [ shaderc ] 608 ++ optionals withSoxr [ soxr ] 609 ++ optionals withSpeex [ speex ] 610 ++ optionals withSrt [ srt ] ··· 693 meta = with lib; { 694 description = "A complete, cross-platform solution to record, convert and stream audio and video"; 695 homepage = "https://www.ffmpeg.org/"; 696 + changelog = "https://github.com/FFmpeg/FFmpeg/blob/n${finalAttrs.version}/Changelog"; 697 longDescription = '' 698 FFmpeg is the leading multimedia framework, able to decode, encode, transcode, 699 mux, demux, stream, filter and play pretty much anything that humans and machines
+12 -4
pkgs/development/libraries/folly/default.nix
··· 4 , boost 5 , cmake 6 , double-conversion 7 - , fetchpatch 8 , fmt_8 9 , gflags 10 , glog ··· 64 # temporary hack until folly builds work on aarch64, 65 # see https://github.com/facebook/folly/issues/1880 66 "-DCMAKE_LIBRARY_ARCHITECTURE=${if stdenv.isx86_64 then "x86_64" else "dummy"}" 67 ]; 68 69 postFixup = '' 70 - substituteInPlace "$out"/lib/pkgconfig/libfolly.pc \ 71 - --replace '=''${prefix}//' '=/' \ 72 - --replace '=''${exec_prefix}//' '=/' 73 ''; 74 75 # folly-config.cmake, will `find_package` these, thus there should be
··· 4 , boost 5 , cmake 6 , double-conversion 7 , fmt_8 8 , gflags 9 , glog ··· 63 # temporary hack until folly builds work on aarch64, 64 # see https://github.com/facebook/folly/issues/1880 65 "-DCMAKE_LIBRARY_ARCHITECTURE=${if stdenv.isx86_64 then "x86_64" else "dummy"}" 66 + 67 + # ensure correct dirs in $dev/lib/pkgconfig/libfolly.pc 68 + # see https://github.com/NixOS/nixpkgs/issues/144170 69 + "-DCMAKE_INSTALL_INCLUDEDIR=include" 70 + "-DCMAKE_INSTALL_LIBDIR=lib" 71 ]; 72 73 + # split outputs to reduce downstream closure sizes 74 + outputs = [ "out" "dev" ]; 75 + 76 + # patch prefix issues again 77 + # see https://github.com/NixOS/nixpkgs/issues/144170 78 postFixup = '' 79 + substituteInPlace $dev/lib/cmake/${pname}/${pname}-targets-release.cmake \ 80 + --replace '$'{_IMPORT_PREFIX}/lib/ $out/lib/ 81 ''; 82 83 # folly-config.cmake, will `find_package` these, thus there should be
+2 -13
pkgs/development/libraries/fontconfig/default.nix
··· 1 { stdenv 2 , lib 3 , fetchurl 4 - , fetchpatch2 5 , pkg-config 6 , python3 7 , freetype ··· 15 16 stdenv.mkDerivation rec { 17 pname = "fontconfig"; 18 - version = "2.14.2"; 19 20 outputs = [ "bin" "dev" "lib" "out" ]; # $out contains all the config 21 22 src = fetchurl { 23 url = "https://www.freedesktop.org/software/fontconfig/release/${pname}-${version}.tar.xz"; 24 - hash = "sha256-26aVtXvOFQI9LO7e+CBiwrkl5R9dTMSu9zbPE/YKRos="; 25 }; 26 - 27 - patches = [ 28 - # Provide 11-lcdfilter-none.conf for NixOS module 29 - # https://gitlab.freedesktop.org/fontconfig/fontconfig/-/merge_requests/268 30 - (fetchpatch2 { 31 - name = "add-optional-11-lcdfilter-none-configuration.patch"; 32 - url = "https://gitlab.freedesktop.org/fontconfig/fontconfig/-/commit/c2666a6d9a6ed18b1bfcef8176e25f62993e24db.patch"; 33 - hash = "sha256-UBzkxy3uxFO+g0aQtPnBZv7OncgQdinwzNwWS8ngjcE="; 34 - }) 35 - ]; 36 37 nativeBuildInputs = [ 38 autoreconfHook
··· 1 { stdenv 2 , lib 3 , fetchurl 4 , pkg-config 5 , python3 6 , freetype ··· 14 15 stdenv.mkDerivation rec { 16 pname = "fontconfig"; 17 + version = "2.15.0"; 18 19 outputs = [ "bin" "dev" "lib" "out" ]; # $out contains all the config 20 21 src = fetchurl { 22 url = "https://www.freedesktop.org/software/fontconfig/release/${pname}-${version}.tar.xz"; 23 + hash = "sha256-Y6BljQ4G4PqIYQZFK1jvBPIfWCAuoCqUw53g0zNdfA4="; 24 }; 25 26 nativeBuildInputs = [ 27 autoreconfHook
+17 -4
pkgs/development/libraries/fontconfig/make-fonts-conf.nix
··· 1 - { runCommand, stdenv, lib, libxslt, fontconfig, dejavu_fonts, fontDirectories }: 2 3 runCommand "fonts.conf" 4 { 5 nativeBuildInputs = [ libxslt ]; 6 buildInputs = [ fontconfig ]; 7 # Add a default font for non-nixos systems, <1MB and in nixos defaults. 8 - fontDirectories = fontDirectories ++ [ dejavu_fonts.minimal ] 9 - # further non-nixos fonts on darwin 10 - ++ lib.optionals stdenv.isDarwin [ "/System/Library/Fonts" "/Library/Fonts" "~/Library/Fonts" ]; 11 } 12 '' 13 xsltproc --stringparam fontDirectories "$fontDirectories" \ 14 --path ${fontconfig.out}/share/xml/fontconfig \ 15 ${./make-fonts-conf.xsl} ${fontconfig.out}/etc/fonts/fonts.conf \ 16 > $out
··· 1 + { runCommand, stdenv, lib, libxslt, fontconfig, dejavu_fonts, fontDirectories 2 + , impureFontDirectories ? [ 3 + # nix user profile 4 + "~/.nix-profile/lib/X11/fonts" "~/.nix-profile/share/fonts" 5 + ] 6 + ++ lib.optional stdenv.isDarwin "~/Library/Fonts" 7 + ++ [ 8 + # FHS paths for non-NixOS platforms 9 + "/usr/share/fonts" "/usr/local/share/fonts" 10 + ] 11 + # darwin paths 12 + ++ lib.optionals stdenv.isDarwin [ "/Library/Fonts" "/System/Library/Fonts" ] 13 + # nix default profile 14 + ++ [ "/nix/var/nix/profiles/default/lib/X11/fonts" "/nix/var/nix/profiles/default/share/fonts" ] }: 15 16 runCommand "fonts.conf" 17 { 18 nativeBuildInputs = [ libxslt ]; 19 buildInputs = [ fontconfig ]; 20 + inherit fontDirectories; 21 # Add a default font for non-nixos systems, <1MB and in nixos defaults. 22 + impureFontDirectories = impureFontDirectories ++ [ dejavu_fonts.minimal ]; 23 } 24 '' 25 xsltproc --stringparam fontDirectories "$fontDirectories" \ 26 + --stringparam impureFontDirectories "$impureFontDirectories" \ 27 --path ${fontconfig.out}/share/xml/fontconfig \ 28 ${./make-fonts-conf.xsl} ${fontconfig.out}/etc/fonts/fonts.conf \ 29 > $out
+9 -11
pkgs/development/libraries/fontconfig/make-fonts-conf.xsl
··· 15 <xsl:output method='xml' encoding="UTF-8" doctype-system="urn:fontconfig:fonts.dtd" /> 16 17 <xsl:param name="fontDirectories" /> 18 19 <xsl:template match="/fontconfig"> 20 ··· 23 24 <!-- the first cachedir will be used to store the cache --> 25 <cachedir prefix="xdg">fontconfig</cachedir> 26 <!-- /var/cache/fontconfig is useful for non-nixos systems --> 27 <cachedir>/var/cache/fontconfig</cachedir> 28 29 <!-- system-wide config --> 30 <include ignore_missing="yes">/etc/fonts/conf.d</include> 31 32 <dir prefix="xdg">fonts</dir> 33 <xsl:for-each select="str:tokenize($fontDirectories)"> 34 <dir><xsl:value-of select="." /></dir> 35 <xsl:text>&#0010;</xsl:text> 36 </xsl:for-each> 37 38 - <!-- nix user profile --> 39 - <dir>~/.nix-profile/lib/X11/fonts</dir> 40 - <dir>~/.nix-profile/share/fonts</dir> 41 - 42 - <!-- FHS paths for non-NixOS platforms --> 43 - <dir>/usr/share/fonts</dir> 44 - <dir>/usr/local/share/fonts</dir> 45 - 46 - <!-- nix default profile --> 47 - <dir>/nix/var/nix/profiles/default/lib/X11/fonts</dir> 48 - <dir>/nix/var/nix/profiles/default/share/fonts</dir> 49 50 </fontconfig> 51
··· 15 <xsl:output method='xml' encoding="UTF-8" doctype-system="urn:fontconfig:fonts.dtd" /> 16 17 <xsl:param name="fontDirectories" /> 18 + <xsl:param name="impureFontDirectories" /> 19 20 <xsl:template match="/fontconfig"> 21 ··· 24 25 <!-- the first cachedir will be used to store the cache --> 26 <cachedir prefix="xdg">fontconfig</cachedir> 27 + <xsl:text>&#0010;</xsl:text> 28 <!-- /var/cache/fontconfig is useful for non-nixos systems --> 29 <cachedir>/var/cache/fontconfig</cachedir> 30 + <xsl:text>&#0010;</xsl:text> 31 32 <!-- system-wide config --> 33 <include ignore_missing="yes">/etc/fonts/conf.d</include> 34 + <xsl:text>&#0010;</xsl:text> 35 36 <dir prefix="xdg">fonts</dir> 37 + <xsl:text>&#0010;</xsl:text> 38 <xsl:for-each select="str:tokenize($fontDirectories)"> 39 <dir><xsl:value-of select="." /></dir> 40 <xsl:text>&#0010;</xsl:text> 41 </xsl:for-each> 42 43 + <xsl:for-each select="str:tokenize($impureFontDirectories)"> 44 + <dir><xsl:value-of select="." /></dir> 45 + <xsl:text>&#0010;</xsl:text> 46 + </xsl:for-each> 47 48 </fontconfig> 49
+2 -2
pkgs/development/libraries/gd/default.nix
··· 44 45 nativeBuildInputs = [ autoconf automake pkg-config ]; 46 47 - buildInputs = [ zlib fontconfig freetype libpng libjpeg libwebp libtiff libavif ] 48 - ++ lib.optional withXorg libXpm; 49 50 outputs = [ "bin" "dev" "out" ]; 51
··· 44 45 nativeBuildInputs = [ autoconf automake pkg-config ]; 46 47 + buildInputs = [ zlib freetype libpng libjpeg libwebp libtiff libavif ] 48 + ++ lib.optionals withXorg [ fontconfig libXpm ]; 49 50 outputs = [ "bin" "dev" "out" ]; 51
+2 -2
pkgs/development/libraries/gnutls/default.nix
··· 35 36 stdenv.mkDerivation rec { 37 pname = "gnutls"; 38 - version = "3.8.2"; 39 40 src = fetchurl { 41 url = "mirror://gnupg/gnutls/v${lib.versions.majorMinor version}/gnutls-${version}.tar.xz"; 42 - hash = "sha256-52XlAW/6m53SQ+NjoEYNV3B0RE7iSRJn2y6WycKt73c="; 43 }; 44 45 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
··· 35 36 stdenv.mkDerivation rec { 37 pname = "gnutls"; 38 + version = "3.8.3"; 39 40 src = fetchurl { 41 url = "mirror://gnupg/gnutls/v${lib.versions.majorMinor version}/gnutls-${version}.tar.xz"; 42 + hash = "sha256-90/FlUsn1Oxt+7Ed6ph4iLWxJCiaNwOvytoO5SD0Fz4="; 43 }; 44 45 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
+3 -1
pkgs/development/libraries/gperftools/default.nix
··· 4 , fetchpatch 5 , autoreconfHook 6 , libunwind 7 }: 8 9 stdenv.mkDerivation rec { ··· 29 nativeBuildInputs = [ autoreconfHook ]; 30 31 # tcmalloc uses libunwind in a way that works correctly only on non-ARM dynamically linked linux 32 - buildInputs = lib.optional (stdenv.isLinux && !(stdenv.hostPlatform.isAarch || stdenv.hostPlatform.isStatic )) libunwind; 33 34 # Disable general dynamic TLS on AArch to support dlopen()'ing the library: 35 # https://bugzilla.redhat.com/show_bug.cgi?id=1483558
··· 4 , fetchpatch 5 , autoreconfHook 6 , libunwind 7 + , perl 8 }: 9 10 stdenv.mkDerivation rec { ··· 30 nativeBuildInputs = [ autoreconfHook ]; 31 32 # tcmalloc uses libunwind in a way that works correctly only on non-ARM dynamically linked linux 33 + buildInputs = [ perl ] 34 + ++ lib.optional (stdenv.isLinux && !(stdenv.hostPlatform.isAarch || stdenv.hostPlatform.isStatic )) libunwind; 35 36 # Disable general dynamic TLS on AArch to support dlopen()'ing the library: 37 # https://bugzilla.redhat.com/show_bug.cgi?id=1483558
+3
pkgs/development/libraries/jellyfin-ffmpeg/default.nix
··· 15 hash = "sha256-LMwGxx++z6TpZLnpeRGraid4653Mp8T4pY5EP4Z7GXY="; 16 }; 17 18 buildInputs = old.buildInputs ++ [ chromaprint ]; 19 20 configureFlags = old.configureFlags ++ [
··· 15 hash = "sha256-LMwGxx++z6TpZLnpeRGraid4653Mp8T4pY5EP4Z7GXY="; 16 }; 17 18 + # Clobber upstream patches as they don't apply to the Jellyfin fork 19 + patches = []; 20 + 21 buildInputs = old.buildInputs ++ [ chromaprint ]; 22 23 configureFlags = old.configureFlags ++ [
+1 -1
pkgs/development/libraries/kde-frameworks/fetch.sh
··· 1 - WGET_ARGS=( https://download.kde.org/stable/frameworks/5.113/ -A '*.tar.xz' )
··· 1 + WGET_ARGS=( https://download.kde.org/stable/frameworks/5.114/ -A '*.tar.xz' )
+332 -332
pkgs/development/libraries/kde-frameworks/srcs.nix
··· 4 5 { 6 attica = { 7 - version = "5.113.0"; 8 src = fetchurl { 9 - url = "${mirror}/stable/frameworks/5.113/attica-5.113.0.tar.xz"; 10 - sha256 = "0p6n2jvky5x9gpwmp31mdxf0bzywaljgnkszgbklyc35xk9i6j14"; 11 - name = "attica-5.113.0.tar.xz"; 12 }; 13 }; 14 baloo = { 15 - version = "5.113.0"; 16 src = fetchurl { 17 - url = "${mirror}/stable/frameworks/5.113/baloo-5.113.0.tar.xz"; 18 - sha256 = "1jv7202dj2w0vcv49bgp0iv1sfy3kdqr974rcr77pcfzhhda9bix"; 19 - name = "baloo-5.113.0.tar.xz"; 20 }; 21 }; 22 bluez-qt = { 23 - version = "5.113.0"; 24 src = fetchurl { 25 - url = "${mirror}/stable/frameworks/5.113/bluez-qt-5.113.0.tar.xz"; 26 - sha256 = "1y6nkl9zc5298jc6klxz88h6srmma085w1q5l4jmjihgys2zkcx7"; 27 - name = "bluez-qt-5.113.0.tar.xz"; 28 }; 29 }; 30 breeze-icons = { 31 - version = "5.113.0"; 32 src = fetchurl { 33 - url = "${mirror}/stable/frameworks/5.113/breeze-icons-5.113.0.tar.xz"; 34 - sha256 = "0kb3wchx84dpi77zsi1b9pzlkhg3sjagxcsf1pdappagq3xn1p48"; 35 - name = "breeze-icons-5.113.0.tar.xz"; 36 }; 37 }; 38 extra-cmake-modules = { 39 - version = "5.113.0"; 40 src = fetchurl { 41 - url = "${mirror}/stable/frameworks/5.113/extra-cmake-modules-5.113.0.tar.xz"; 42 - sha256 = "1i1vpf9860cwrq5b01yrgf94hmzk9dx637j638shgjmyxr058pi6"; 43 - name = "extra-cmake-modules-5.113.0.tar.xz"; 44 }; 45 }; 46 frameworkintegration = { 47 - version = "5.113.0"; 48 src = fetchurl { 49 - url = "${mirror}/stable/frameworks/5.113/frameworkintegration-5.113.0.tar.xz"; 50 - sha256 = "17i7frachq23kfg78ar33x5acwf7pmwl1a5c02qif44mml8b09hi"; 51 - name = "frameworkintegration-5.113.0.tar.xz"; 52 }; 53 }; 54 kactivities = { 55 - version = "5.113.0"; 56 src = fetchurl { 57 - url = "${mirror}/stable/frameworks/5.113/kactivities-5.113.0.tar.xz"; 58 - sha256 = "1d9lkhp344wdss9vab3gh9h31f1k6fifdhp17fblpkykgyvbb26y"; 59 - name = "kactivities-5.113.0.tar.xz"; 60 }; 61 }; 62 kactivities-stats = { 63 - version = "5.113.0"; 64 src = fetchurl { 65 - url = "${mirror}/stable/frameworks/5.113/kactivities-stats-5.113.0.tar.xz"; 66 - sha256 = "136z2njw3k2l71xp4vg10sm5q925xh8yfr9a784wnr0kwngdb71i"; 67 - name = "kactivities-stats-5.113.0.tar.xz"; 68 }; 69 }; 70 kapidox = { 71 - version = "5.113.0"; 72 src = fetchurl { 73 - url = "${mirror}/stable/frameworks/5.113/kapidox-5.113.0.tar.xz"; 74 - sha256 = "05407c01wnjyslbbz0w5wipjpx6ng3izya41mg13g700ainj9q1x"; 75 - name = "kapidox-5.113.0.tar.xz"; 76 }; 77 }; 78 karchive = { 79 - version = "5.113.0"; 80 src = fetchurl { 81 - url = "${mirror}/stable/frameworks/5.113/karchive-5.113.0.tar.xz"; 82 - sha256 = "03a3p85hmx4ycfp0y5l9yw4cy3i9jwy7jd27psmckr4q0538k91d"; 83 - name = "karchive-5.113.0.tar.xz"; 84 }; 85 }; 86 kauth = { 87 - version = "5.113.0"; 88 src = fetchurl { 89 - url = "${mirror}/stable/frameworks/5.113/kauth-5.113.0.tar.xz"; 90 - sha256 = "0ncpyq2l53p4yhhxkvk23x0ji9amrbnm6kbz8dp573cqww79pih2"; 91 - name = "kauth-5.113.0.tar.xz"; 92 }; 93 }; 94 kbookmarks = { 95 - version = "5.113.0"; 96 src = fetchurl { 97 - url = "${mirror}/stable/frameworks/5.113/kbookmarks-5.113.0.tar.xz"; 98 - sha256 = "1fgnh8amy2ghn50i59al0iyqvj05pzdxai9qxqzbvi65f1pibi7d"; 99 - name = "kbookmarks-5.113.0.tar.xz"; 100 }; 101 }; 102 kcalendarcore = { 103 - version = "5.113.0"; 104 src = fetchurl { 105 - url = "${mirror}/stable/frameworks/5.113/kcalendarcore-5.113.0.tar.xz"; 106 - sha256 = "18psjzqcfzaplcfjpjda983mrpv306il0j49q3rm9hj9ycj54wc2"; 107 - name = "kcalendarcore-5.113.0.tar.xz"; 108 }; 109 }; 110 kcmutils = { 111 - version = "5.113.0"; 112 src = fetchurl { 113 - url = "${mirror}/stable/frameworks/5.113/kcmutils-5.113.0.tar.xz"; 114 - sha256 = "1xbfzw2zfl966zp70jzfp3hjzn334zf4hnwr82priffafgrin57s"; 115 - name = "kcmutils-5.113.0.tar.xz"; 116 }; 117 }; 118 kcodecs = { 119 - version = "5.113.0"; 120 src = fetchurl { 121 - url = "${mirror}/stable/frameworks/5.113/kcodecs-5.113.0.tar.xz"; 122 - sha256 = "1xvaq0yg4n4lwyq3yx2m8jrvfg7f0qrwgxxam4rmp2l245bvn34i"; 123 - name = "kcodecs-5.113.0.tar.xz"; 124 }; 125 }; 126 kcompletion = { 127 - version = "5.113.0"; 128 src = fetchurl { 129 - url = "${mirror}/stable/frameworks/5.113/kcompletion-5.113.0.tar.xz"; 130 - sha256 = "016280h98j1ssvc3a4b3vyh4s93s9y9hn1jrpbfbkm9xxnvi7k79"; 131 - name = "kcompletion-5.113.0.tar.xz"; 132 }; 133 }; 134 kconfig = { 135 - version = "5.113.0"; 136 src = fetchurl { 137 - url = "${mirror}/stable/frameworks/5.113/kconfig-5.113.0.tar.xz"; 138 - sha256 = "0fwhn3yp4gfwjiy5dx7gs0zd65yjlrrzkqpy7fpg7n97qf99q2a8"; 139 - name = "kconfig-5.113.0.tar.xz"; 140 }; 141 }; 142 kconfigwidgets = { 143 - version = "5.113.0"; 144 src = fetchurl { 145 - url = "${mirror}/stable/frameworks/5.113/kconfigwidgets-5.113.0.tar.xz"; 146 - sha256 = "0bmk5qxiss7a71xpfsbqj831wkcf94b7wfbw9xisvnxlfmf60y4v"; 147 - name = "kconfigwidgets-5.113.0.tar.xz"; 148 }; 149 }; 150 kcontacts = { 151 - version = "5.113.0"; 152 src = fetchurl { 153 - url = "${mirror}/stable/frameworks/5.113/kcontacts-5.113.0.tar.xz"; 154 - sha256 = "1y9cdv1g2ypwl4b0hk1sxk7lvb5qkbm4n1gh62plqsran62jsimm"; 155 - name = "kcontacts-5.113.0.tar.xz"; 156 }; 157 }; 158 kcoreaddons = { 159 - version = "5.113.0"; 160 src = fetchurl { 161 - url = "${mirror}/stable/frameworks/5.113/kcoreaddons-5.113.0.tar.xz"; 162 - sha256 = "1bhanzfjw2i49sx2hjnim8k72vvbs7gyig7nkqkgbaxzpa8qgwrf"; 163 - name = "kcoreaddons-5.113.0.tar.xz"; 164 }; 165 }; 166 kcrash = { 167 - version = "5.113.0"; 168 src = fetchurl { 169 - url = "${mirror}/stable/frameworks/5.113/kcrash-5.113.0.tar.xz"; 170 - sha256 = "1mg90xm6ckcd30s07psn30sgh81lx8kfs0p1h6cblg4q8bkgkndv"; 171 - name = "kcrash-5.113.0.tar.xz"; 172 }; 173 }; 174 kdav = { 175 - version = "5.113.0"; 176 src = fetchurl { 177 - url = "${mirror}/stable/frameworks/5.113/kdav-5.113.0.tar.xz"; 178 - sha256 = "1djng9c741xairr84nvjbkq4dk551p7yk91g8d4nndy8s1kiz1dv"; 179 - name = "kdav-5.113.0.tar.xz"; 180 }; 181 }; 182 kdbusaddons = { 183 - version = "5.113.0"; 184 src = fetchurl { 185 - url = "${mirror}/stable/frameworks/5.113/kdbusaddons-5.113.0.tar.xz"; 186 - sha256 = "101a406f8i0wgaxd0ilvfcb3plzjgvxw9bhhm5pin6fpr0xkjrnk"; 187 - name = "kdbusaddons-5.113.0.tar.xz"; 188 }; 189 }; 190 kdeclarative = { 191 - version = "5.113.0"; 192 src = fetchurl { 193 - url = "${mirror}/stable/frameworks/5.113/kdeclarative-5.113.0.tar.xz"; 194 - sha256 = "1wj9arkmjdrac04cq2w5bw5184jnlq5xn2cw6n7lajc31yrbc0rk"; 195 - name = "kdeclarative-5.113.0.tar.xz"; 196 }; 197 }; 198 kded = { 199 - version = "5.113.0"; 200 src = fetchurl { 201 - url = "${mirror}/stable/frameworks/5.113/kded-5.113.0.tar.xz"; 202 - sha256 = "1vb3z7r2l206n7p70a4cbkrm7fvyk7hqqf0bz7514r4g86l4l5n4"; 203 - name = "kded-5.113.0.tar.xz"; 204 }; 205 }; 206 kdelibs4support = { 207 - version = "5.113.0"; 208 src = fetchurl { 209 - url = "${mirror}/stable/frameworks/5.113/portingAids/kdelibs4support-5.113.0.tar.xz"; 210 - sha256 = "1z843zq1g5n3b8gb20y8266hyikvbzdsgc77gvcgzvqfdxk19l24"; 211 - name = "kdelibs4support-5.113.0.tar.xz"; 212 }; 213 }; 214 kdesignerplugin = { 215 - version = "5.113.0"; 216 src = fetchurl { 217 - url = "${mirror}/stable/frameworks/5.113/portingAids/kdesignerplugin-5.113.0.tar.xz"; 218 - sha256 = "05hwq8rpm1f9ad5fyk2gjqxm6gvvx2gx2zdbklww9ghlh8qndl9i"; 219 - name = "kdesignerplugin-5.113.0.tar.xz"; 220 }; 221 }; 222 kdesu = { 223 - version = "5.113.0"; 224 src = fetchurl { 225 - url = "${mirror}/stable/frameworks/5.113/kdesu-5.113.0.tar.xz"; 226 - sha256 = "085d3d6qpl4m7z8smm0bq9khfjjglpb1gd9n8q0d541127y2cpq4"; 227 - name = "kdesu-5.113.0.tar.xz"; 228 }; 229 }; 230 kdewebkit = { 231 - version = "5.113.0"; 232 src = fetchurl { 233 - url = "${mirror}/stable/frameworks/5.113/portingAids/kdewebkit-5.113.0.tar.xz"; 234 - sha256 = "18bmg88xj07h8y5f3f2ckjs9m61mf8jrxrg4vg8hrf4nabxz20xn"; 235 - name = "kdewebkit-5.113.0.tar.xz"; 236 }; 237 }; 238 kdnssd = { 239 - version = "5.113.0"; 240 src = fetchurl { 241 - url = "${mirror}/stable/frameworks/5.113/kdnssd-5.113.0.tar.xz"; 242 - sha256 = "1hbb9zy1f13m45b6kzndxw619vnmx0s418brqgkdaxgsh12j5anq"; 243 - name = "kdnssd-5.113.0.tar.xz"; 244 }; 245 }; 246 kdoctools = { 247 - version = "5.113.0"; 248 src = fetchurl { 249 - url = "${mirror}/stable/frameworks/5.113/kdoctools-5.113.0.tar.xz"; 250 - sha256 = "0cfs4znhp7psrz99j3brp8q39gg0bpzvkrdx90zl6vvrc06d2zaa"; 251 - name = "kdoctools-5.113.0.tar.xz"; 252 }; 253 }; 254 kemoticons = { 255 - version = "5.113.0"; 256 src = fetchurl { 257 - url = "${mirror}/stable/frameworks/5.113/kemoticons-5.113.0.tar.xz"; 258 - sha256 = "127frvsp1h9hg755vz2i609wxqqgzgsz15iqr7hcpbmmf6xvm8i2"; 259 - name = "kemoticons-5.113.0.tar.xz"; 260 }; 261 }; 262 kfilemetadata = { 263 - version = "5.113.0"; 264 src = fetchurl { 265 - url = "${mirror}/stable/frameworks/5.113/kfilemetadata-5.113.0.tar.xz"; 266 - sha256 = "1ap25y66y1r185fghvkkkkp4f6acnkazny8wxw5hv1gg25ilpsir"; 267 - name = "kfilemetadata-5.113.0.tar.xz"; 268 }; 269 }; 270 kglobalaccel = { 271 - version = "5.113.0"; 272 src = fetchurl { 273 - url = "${mirror}/stable/frameworks/5.113/kglobalaccel-5.113.0.tar.xz"; 274 - sha256 = "0ibm1wd7fhi3j5za0agyq2zrs9nx5a8b47iijkzgkpz9ylxniwrs"; 275 - name = "kglobalaccel-5.113.0.tar.xz"; 276 }; 277 }; 278 kguiaddons = { 279 - version = "5.113.0"; 280 src = fetchurl { 281 - url = "${mirror}/stable/frameworks/5.113/kguiaddons-5.113.0.tar.xz"; 282 - sha256 = "1ykhxgx89x1qv916pcz3j0q14ylalg9v23jjw0dbwpg5hlj4qlyc"; 283 - name = "kguiaddons-5.113.0.tar.xz"; 284 }; 285 }; 286 kholidays = { 287 - version = "5.113.0"; 288 src = fetchurl { 289 - url = "${mirror}/stable/frameworks/5.113/kholidays-5.113.0.tar.xz"; 290 - sha256 = "1wq397j3m3s9a45k9h5hsdsfansvb3a5q8biag2w3fsb1i84id0i"; 291 - name = "kholidays-5.113.0.tar.xz"; 292 }; 293 }; 294 khtml = { 295 - version = "5.113.0"; 296 src = fetchurl { 297 - url = "${mirror}/stable/frameworks/5.113/portingAids/khtml-5.113.0.tar.xz"; 298 - sha256 = "0m284rwq8f49j71lcapzr4qi0f72a0adnv67mfg5blar867161mq"; 299 - name = "khtml-5.113.0.tar.xz"; 300 }; 301 }; 302 ki18n = { 303 - version = "5.113.0"; 304 src = fetchurl { 305 - url = "${mirror}/stable/frameworks/5.113/ki18n-5.113.0.tar.xz"; 306 - sha256 = "0hl0qp3653xiwa5ndk82ygy2kgrc0pygqkknb1cx5w54s56bm57w"; 307 - name = "ki18n-5.113.0.tar.xz"; 308 }; 309 }; 310 kiconthemes = { 311 - version = "5.113.0"; 312 src = fetchurl { 313 - url = "${mirror}/stable/frameworks/5.113/kiconthemes-5.113.0.tar.xz"; 314 - sha256 = "0q2c1s8pwl7dnx9v7q061zn5n1prk0vv0j77kki9wfncjaf15g0g"; 315 - name = "kiconthemes-5.113.0.tar.xz"; 316 }; 317 }; 318 kidletime = { 319 - version = "5.113.0"; 320 src = fetchurl { 321 - url = "${mirror}/stable/frameworks/5.113/kidletime-5.113.0.tar.xz"; 322 - sha256 = "1cdfhn3mcxvizba1gpf0viba3g0mnva3l226lkca3p9ps8c4z3rm"; 323 - name = "kidletime-5.113.0.tar.xz"; 324 }; 325 }; 326 kimageformats = { 327 - version = "5.113.0"; 328 src = fetchurl { 329 - url = "${mirror}/stable/frameworks/5.113/kimageformats-5.113.0.tar.xz"; 330 - sha256 = "0gys83sazgbj7h3yiaacqr464z951ixygrhzcw16cnqjm8phic44"; 331 - name = "kimageformats-5.113.0.tar.xz"; 332 }; 333 }; 334 kinit = { 335 - version = "5.113.0"; 336 src = fetchurl { 337 - url = "${mirror}/stable/frameworks/5.113/kinit-5.113.0.tar.xz"; 338 - sha256 = "1ydmgxyr5j9zi0a5vlb64kkjxka3rsyvzj10y3dww92qyapnn2bv"; 339 - name = "kinit-5.113.0.tar.xz"; 340 }; 341 }; 342 kio = { 343 - version = "5.113.0"; 344 src = fetchurl { 345 - url = "${mirror}/stable/frameworks/5.113/kio-5.113.0.tar.xz"; 346 - sha256 = "1bjmv3wdpmzqbv1xzzl0ydirccbknnjyqn6wzb057zgy7kpi1cd8"; 347 - name = "kio-5.113.0.tar.xz"; 348 }; 349 }; 350 kirigami2 = { 351 - version = "5.113.0"; 352 src = fetchurl { 353 - url = "${mirror}/stable/frameworks/5.113/kirigami2-5.113.0.tar.xz"; 354 - sha256 = "0zy3s841q2xw4d048a3qh4cfh9kb3qaqxml4ny5zi73crm173h8y"; 355 - name = "kirigami2-5.113.0.tar.xz"; 356 }; 357 }; 358 kitemmodels = { 359 - version = "5.113.0"; 360 src = fetchurl { 361 - url = "${mirror}/stable/frameworks/5.113/kitemmodels-5.113.0.tar.xz"; 362 - sha256 = "01i1s7rw7ndp3gnl3bg0pv8a9qz95rmz0jxkw97p72gcah2q2yvk"; 363 - name = "kitemmodels-5.113.0.tar.xz"; 364 }; 365 }; 366 kitemviews = { 367 - version = "5.113.0"; 368 src = fetchurl { 369 - url = "${mirror}/stable/frameworks/5.113/kitemviews-5.113.0.tar.xz"; 370 - sha256 = "0wnmgm72kv7vxadsrkdbnjknb4lkzrmn6gk7car7jx2i91kz7xdd"; 371 - name = "kitemviews-5.113.0.tar.xz"; 372 }; 373 }; 374 kjobwidgets = { 375 - version = "5.113.0"; 376 src = fetchurl { 377 - url = "${mirror}/stable/frameworks/5.113/kjobwidgets-5.113.0.tar.xz"; 378 - sha256 = "0f5shrapjvwp8bc34vypzfsfl07pj7nmdflf9lcwc8h3kwf2rxqr"; 379 - name = "kjobwidgets-5.113.0.tar.xz"; 380 }; 381 }; 382 kjs = { 383 - version = "5.113.0"; 384 src = fetchurl { 385 - url = "${mirror}/stable/frameworks/5.113/portingAids/kjs-5.113.0.tar.xz"; 386 - sha256 = "0h50jyd9mddnavafikn9haqqcq1mql2v8qcc1c233ffplkx1f6hb"; 387 - name = "kjs-5.113.0.tar.xz"; 388 }; 389 }; 390 kjsembed = { 391 - version = "5.113.0"; 392 src = fetchurl { 393 - url = "${mirror}/stable/frameworks/5.113/portingAids/kjsembed-5.113.0.tar.xz"; 394 - sha256 = "0bwsj0n3d038vs3n2mw6x8srbg4da40bw59q14cpv70ws1sg2r2n"; 395 - name = "kjsembed-5.113.0.tar.xz"; 396 }; 397 }; 398 kmediaplayer = { 399 - version = "5.113.0"; 400 src = fetchurl { 401 - url = "${mirror}/stable/frameworks/5.113/portingAids/kmediaplayer-5.113.0.tar.xz"; 402 - sha256 = "1nyn7x28j17yrb7zx31519h2ghp5h3pwk6baxais0q1mv9azyfay"; 403 - name = "kmediaplayer-5.113.0.tar.xz"; 404 }; 405 }; 406 knewstuff = { 407 - version = "5.113.0"; 408 src = fetchurl { 409 - url = "${mirror}/stable/frameworks/5.113/knewstuff-5.113.0.tar.xz"; 410 - sha256 = "0fj17rxyp9wmmc9jh8zjpgwpia9r4xlvabvkb4ynd1vhy58k8w51"; 411 - name = "knewstuff-5.113.0.tar.xz"; 412 }; 413 }; 414 knotifications = { 415 - version = "5.113.0"; 416 src = fetchurl { 417 - url = "${mirror}/stable/frameworks/5.113/knotifications-5.113.0.tar.xz"; 418 - sha256 = "1yzpf12wsi3h3v7z68b42rjdrnfkah6avq4y611b0r004shgkl1x"; 419 - name = "knotifications-5.113.0.tar.xz"; 420 }; 421 }; 422 knotifyconfig = { 423 - version = "5.113.0"; 424 src = fetchurl { 425 - url = "${mirror}/stable/frameworks/5.113/knotifyconfig-5.113.0.tar.xz"; 426 - sha256 = "1gdzyxcc371lmnzc153k8wdyxgsv7r2y44j8d5srld36amssxnc6"; 427 - name = "knotifyconfig-5.113.0.tar.xz"; 428 }; 429 }; 430 kpackage = { 431 - version = "5.113.0"; 432 src = fetchurl { 433 - url = "${mirror}/stable/frameworks/5.113/kpackage-5.113.0.tar.xz"; 434 - sha256 = "04605kr2w0yhwx64lqq1qc1zmmip7vkxnxv3fs2846864814fkk2"; 435 - name = "kpackage-5.113.0.tar.xz"; 436 }; 437 }; 438 kparts = { 439 - version = "5.113.0"; 440 src = fetchurl { 441 - url = "${mirror}/stable/frameworks/5.113/kparts-5.113.0.tar.xz"; 442 - sha256 = "0mx95xrr6pad4q5p0sn2iqmc59787bpfkvkyiz9li56wynh1jf48"; 443 - name = "kparts-5.113.0.tar.xz"; 444 }; 445 }; 446 kpeople = { 447 - version = "5.113.0"; 448 src = fetchurl { 449 - url = "${mirror}/stable/frameworks/5.113/kpeople-5.113.0.tar.xz"; 450 - sha256 = "08g44hq1iywycf44imdqkql4gx2vyg87n1nxxqq6ssva0kybia7n"; 451 - name = "kpeople-5.113.0.tar.xz"; 452 }; 453 }; 454 kplotting = { 455 - version = "5.113.0"; 456 src = fetchurl { 457 - url = "${mirror}/stable/frameworks/5.113/kplotting-5.113.0.tar.xz"; 458 - sha256 = "16pfia711y9iqnl0svyg00g7a2x4ln8yaxmrmy74xj7y0dj5jcyj"; 459 - name = "kplotting-5.113.0.tar.xz"; 460 }; 461 }; 462 kpty = { 463 - version = "5.113.0"; 464 src = fetchurl { 465 - url = "${mirror}/stable/frameworks/5.113/kpty-5.113.0.tar.xz"; 466 - sha256 = "0hzn18lidiiaxr08fjhk0r5zh0m01ls46w1fyjnv42bvf7vd7v5y"; 467 - name = "kpty-5.113.0.tar.xz"; 468 }; 469 }; 470 kquickcharts = { 471 - version = "5.113.0"; 472 src = fetchurl { 473 - url = "${mirror}/stable/frameworks/5.113/kquickcharts-5.113.0.tar.xz"; 474 - sha256 = "0v47c6mdx72rdz441zk4csc6a2bj6wi7772vlpz2yr3ay70l8f5d"; 475 - name = "kquickcharts-5.113.0.tar.xz"; 476 }; 477 }; 478 kross = { 479 - version = "5.113.0"; 480 src = fetchurl { 481 - url = "${mirror}/stable/frameworks/5.113/portingAids/kross-5.113.0.tar.xz"; 482 - sha256 = "1cqdcm086a4kjrb9k6cwqn05fg5ij3zppc8bi7dxrgrfxc494c8s"; 483 - name = "kross-5.113.0.tar.xz"; 484 }; 485 }; 486 krunner = { 487 - version = "5.113.0"; 488 src = fetchurl { 489 - url = "${mirror}/stable/frameworks/5.113/krunner-5.113.0.tar.xz"; 490 - sha256 = "0z7d6nyvrlgr7aw9ibz1xgp62220iwzvhqpqikwlxhc9hjggmdlh"; 491 - name = "krunner-5.113.0.tar.xz"; 492 }; 493 }; 494 kservice = { 495 - version = "5.113.0"; 496 src = fetchurl { 497 - url = "${mirror}/stable/frameworks/5.113/kservice-5.113.0.tar.xz"; 498 - sha256 = "09ph72jb40pkw1nzayvzzav4m6240amkj6jvx390dmsvr7jzn0nb"; 499 - name = "kservice-5.113.0.tar.xz"; 500 }; 501 }; 502 ktexteditor = { 503 - version = "5.113.0"; 504 src = fetchurl { 505 - url = "${mirror}/stable/frameworks/5.113/ktexteditor-5.113.0.tar.xz"; 506 - sha256 = "02nclhfgqximsl8w6la5w0fshzcj71nrz5kjb2p1s28xdf1ahvgg"; 507 - name = "ktexteditor-5.113.0.tar.xz"; 508 }; 509 }; 510 ktextwidgets = { 511 - version = "5.113.0"; 512 src = fetchurl { 513 - url = "${mirror}/stable/frameworks/5.113/ktextwidgets-5.113.0.tar.xz"; 514 - sha256 = "060grfna4kj8nhxgk38yf3csqfgxg0358dkwmg8aw5y5k0jys2az"; 515 - name = "ktextwidgets-5.113.0.tar.xz"; 516 }; 517 }; 518 kunitconversion = { 519 - version = "5.113.0"; 520 src = fetchurl { 521 - url = "${mirror}/stable/frameworks/5.113/kunitconversion-5.113.0.tar.xz"; 522 - sha256 = "1x7gwrz43wvd3r87x545bxxyzhqj87mhhx05dqh0b09vqk6gxzza"; 523 - name = "kunitconversion-5.113.0.tar.xz"; 524 }; 525 }; 526 kwallet = { 527 - version = "5.113.0"; 528 src = fetchurl { 529 - url = "${mirror}/stable/frameworks/5.113/kwallet-5.113.0.tar.xz"; 530 - sha256 = "0aq8d5c5p9j19bzspd205gh297n7fh5f26m49826fx5mp1im4lwn"; 531 - name = "kwallet-5.113.0.tar.xz"; 532 }; 533 }; 534 kwayland = { 535 - version = "5.113.0"; 536 src = fetchurl { 537 - url = "${mirror}/stable/frameworks/5.113/kwayland-5.113.0.tar.xz"; 538 - sha256 = "1anhvz4b1q835py451jznnfj9z2jh1fwnx4lfwhi67viaplpiwqg"; 539 - name = "kwayland-5.113.0.tar.xz"; 540 }; 541 }; 542 kwidgetsaddons = { 543 - version = "5.113.0"; 544 src = fetchurl { 545 - url = "${mirror}/stable/frameworks/5.113/kwidgetsaddons-5.113.0.tar.xz"; 546 - sha256 = "01rabfl2v5l9r3fgwgy75krib1486mdc4k3kfi035s6dvg8iy015"; 547 - name = "kwidgetsaddons-5.113.0.tar.xz"; 548 }; 549 }; 550 kwindowsystem = { 551 - version = "5.113.0"; 552 src = fetchurl { 553 - url = "${mirror}/stable/frameworks/5.113/kwindowsystem-5.113.0.tar.xz"; 554 - sha256 = "1hzavawsl14rsl9qb874zahvsvkrbcin7fg1xn1d7ssypphlis51"; 555 - name = "kwindowsystem-5.113.0.tar.xz"; 556 }; 557 }; 558 kxmlgui = { 559 - version = "5.113.0"; 560 src = fetchurl { 561 - url = "${mirror}/stable/frameworks/5.113/kxmlgui-5.113.0.tar.xz"; 562 - sha256 = "022l557z9jgrz2hj8hh9z7cjkvfhl5rdp81jhk2gd3wzmyf5zzmq"; 563 - name = "kxmlgui-5.113.0.tar.xz"; 564 }; 565 }; 566 kxmlrpcclient = { 567 - version = "5.113.0"; 568 src = fetchurl { 569 - url = "${mirror}/stable/frameworks/5.113/portingAids/kxmlrpcclient-5.113.0.tar.xz"; 570 - sha256 = "141vlxxnyll5q0wg2va5prg0wf0hpymlzfkg37h1ngjwjs2x2yc1"; 571 - name = "kxmlrpcclient-5.113.0.tar.xz"; 572 }; 573 }; 574 modemmanager-qt = { 575 - version = "5.113.0"; 576 src = fetchurl { 577 - url = "${mirror}/stable/frameworks/5.113/modemmanager-qt-5.113.0.tar.xz"; 578 - sha256 = "069irg7ckws06qzq5mwkxvzx4r2xqwagwif6dq284hjihrz38l8b"; 579 - name = "modemmanager-qt-5.113.0.tar.xz"; 580 }; 581 }; 582 networkmanager-qt = { 583 - version = "5.113.0"; 584 src = fetchurl { 585 - url = "${mirror}/stable/frameworks/5.113/networkmanager-qt-5.113.0.tar.xz"; 586 - sha256 = "03wdbw6dr9a49qcs1j2lm9q894rvdl8xqjpwm3yrrjb866yyhcg1"; 587 - name = "networkmanager-qt-5.113.0.tar.xz"; 588 }; 589 }; 590 oxygen-icons = { 591 - version = "5.113.0"; 592 src = fetchurl { 593 - url = "${mirror}/stable/frameworks/5.113/oxygen-icons-5.113.0.tar.xz"; 594 - sha256 = "0grdn0gz59lfp4n5mmlan71x3iwgm87dnhk8mla02dn7hv0fl0xx"; 595 - name = "oxygen-icons-5.113.0.tar.xz"; 596 }; 597 }; 598 plasma-framework = { 599 - version = "5.113.0"; 600 src = fetchurl { 601 - url = "${mirror}/stable/frameworks/5.113/plasma-framework-5.113.0.tar.xz"; 602 - sha256 = "0iijawnh9ri1n6qgdrraf3lq5sy7z0jy5ihmfzk22pn10ba992ky"; 603 - name = "plasma-framework-5.113.0.tar.xz"; 604 }; 605 }; 606 prison = { 607 - version = "5.113.0"; 608 src = fetchurl { 609 - url = "${mirror}/stable/frameworks/5.113/prison-5.113.0.tar.xz"; 610 - sha256 = "18y4gxj5zml59a8i7gzr5cbbzi5wyknbva2ihfdpqf85vw3x2wdp"; 611 - name = "prison-5.113.0.tar.xz"; 612 }; 613 }; 614 purpose = { 615 - version = "5.113.0"; 616 src = fetchurl { 617 - url = "${mirror}/stable/frameworks/5.113/purpose-5.113.0.tar.xz"; 618 - sha256 = "0p5zcvrkaw71w8795x2a4lx3z977j6jcnwbi9wi1956gcx4avhhf"; 619 - name = "purpose-5.113.0.tar.xz"; 620 }; 621 }; 622 qqc2-desktop-style = { 623 - version = "5.113.0"; 624 src = fetchurl { 625 - url = "${mirror}/stable/frameworks/5.113/qqc2-desktop-style-5.113.0.tar.xz"; 626 - sha256 = "0sk0sk7cq511m0rjmgsg1z8s4sy064qmbql472ljyblafm71wj6p"; 627 - name = "qqc2-desktop-style-5.113.0.tar.xz"; 628 }; 629 }; 630 solid = { 631 - version = "5.113.0"; 632 src = fetchurl { 633 - url = "${mirror}/stable/frameworks/5.113/solid-5.113.0.tar.xz"; 634 - sha256 = "0vhhkn15axfvlwrf9np91hnipw1lb2x9zh0ajpngvxzcnj6kvn7r"; 635 - name = "solid-5.113.0.tar.xz"; 636 }; 637 }; 638 sonnet = { 639 - version = "5.113.0"; 640 src = fetchurl { 641 - url = "${mirror}/stable/frameworks/5.113/sonnet-5.113.0.tar.xz"; 642 - sha256 = "17v3a2j0vhx7mzv0wfgqky248m57gasyv1xbjqpzjdr3x2f1zhy6"; 643 - name = "sonnet-5.113.0.tar.xz"; 644 }; 645 }; 646 syndication = { 647 - version = "5.113.0"; 648 src = fetchurl { 649 - url = "${mirror}/stable/frameworks/5.113/syndication-5.113.0.tar.xz"; 650 - sha256 = "1nzcfk4qsjvrgci3vk78jjpbig61pm0y73h3qs83yld1zw3az3jx"; 651 - name = "syndication-5.113.0.tar.xz"; 652 }; 653 }; 654 syntax-highlighting = { 655 - version = "5.113.0"; 656 src = fetchurl { 657 - url = "${mirror}/stable/frameworks/5.113/syntax-highlighting-5.113.0.tar.xz"; 658 - sha256 = "1blifnqikvrlkcskwjdk54mvh8yd4r0vzz282mi64w7alimlilgl"; 659 - name = "syntax-highlighting-5.113.0.tar.xz"; 660 }; 661 }; 662 threadweaver = { 663 - version = "5.113.0"; 664 src = fetchurl { 665 - url = "${mirror}/stable/frameworks/5.113/threadweaver-5.113.0.tar.xz"; 666 - sha256 = "1x7i7mdg5v22y04m720k9fqj7xagm8qnlssb1xjs9nj0aqif8jgp"; 667 - name = "threadweaver-5.113.0.tar.xz"; 668 }; 669 }; 670 }
··· 4 5 { 6 attica = { 7 + version = "5.114.0"; 8 src = fetchurl { 9 + url = "${mirror}/stable/frameworks/5.114/attica-5.114.0.tar.xz"; 10 + sha256 = "0gkdsm1vyyyxxyl4rni9s2bdz5w6zphzjl58fddjl899da06hqfq"; 11 + name = "attica-5.114.0.tar.xz"; 12 }; 13 }; 14 baloo = { 15 + version = "5.114.0"; 16 src = fetchurl { 17 + url = "${mirror}/stable/frameworks/5.114/baloo-5.114.0.tar.xz"; 18 + sha256 = "19sib1y0m5h2gnnpr9rfk810p6pdfm4zzxlm0a44r7910llp8i50"; 19 + name = "baloo-5.114.0.tar.xz"; 20 }; 21 }; 22 bluez-qt = { 23 + version = "5.114.0"; 24 src = fetchurl { 25 + url = "${mirror}/stable/frameworks/5.114/bluez-qt-5.114.0.tar.xz"; 26 + sha256 = "1ni50jwnb5ww8mkql0p3q8660c0srj8p0ik27lvxakwdq4wf6l9s"; 27 + name = "bluez-qt-5.114.0.tar.xz"; 28 }; 29 }; 30 breeze-icons = { 31 + version = "5.114.0"; 32 src = fetchurl { 33 + url = "${mirror}/stable/frameworks/5.114/breeze-icons-5.114.0.tar.xz"; 34 + sha256 = "0z5cpv10jyjdwjfkm7nj6hyp4vj29apm476hvbpb4gan27jyb91y"; 35 + name = "breeze-icons-5.114.0.tar.xz"; 36 }; 37 }; 38 extra-cmake-modules = { 39 + version = "5.114.0"; 40 src = fetchurl { 41 + url = "${mirror}/stable/frameworks/5.114/extra-cmake-modules-5.114.0.tar.xz"; 42 + sha256 = "0z4nqravsfzlsgvkg5rha2d0qxfr3pfncw7z2fxzzqvzj7mfk6im"; 43 + name = "extra-cmake-modules-5.114.0.tar.xz"; 44 }; 45 }; 46 frameworkintegration = { 47 + version = "5.114.0"; 48 src = fetchurl { 49 + url = "${mirror}/stable/frameworks/5.114/frameworkintegration-5.114.0.tar.xz"; 50 + sha256 = "1dqgzhhh8gnvl8jsvh2i6pjn935d61avh63b4z9kpllhvp9a2lnd"; 51 + name = "frameworkintegration-5.114.0.tar.xz"; 52 }; 53 }; 54 kactivities = { 55 + version = "5.114.0"; 56 src = fetchurl { 57 + url = "${mirror}/stable/frameworks/5.114/kactivities-5.114.0.tar.xz"; 58 + sha256 = "10pyynqz8c22la9aqms080iqlisj3irbi1kwnn3s0vg5dsjxr1p3"; 59 + name = "kactivities-5.114.0.tar.xz"; 60 }; 61 }; 62 kactivities-stats = { 63 + version = "5.114.0"; 64 src = fetchurl { 65 + url = "${mirror}/stable/frameworks/5.114/kactivities-stats-5.114.0.tar.xz"; 66 + sha256 = "1zhrs2p3c831rwx7ww87i82k5i236vfywdxv7zhz93k3vffyqby7"; 67 + name = "kactivities-stats-5.114.0.tar.xz"; 68 }; 69 }; 70 kapidox = { 71 + version = "5.114.0"; 72 src = fetchurl { 73 + url = "${mirror}/stable/frameworks/5.114/kapidox-5.114.0.tar.xz"; 74 + sha256 = "0xxw3lvipyax8r1af3ypwjj6waarbp2z9n11fjb4kvyigsypglmb"; 75 + name = "kapidox-5.114.0.tar.xz"; 76 }; 77 }; 78 karchive = { 79 + version = "5.114.0"; 80 src = fetchurl { 81 + url = "${mirror}/stable/frameworks/5.114/karchive-5.114.0.tar.xz"; 82 + sha256 = "015gc1zarny8r478p7g9m6r67l5dk3r0vcp28ilmfmznxy0k0hda"; 83 + name = "karchive-5.114.0.tar.xz"; 84 }; 85 }; 86 kauth = { 87 + version = "5.114.0"; 88 src = fetchurl { 89 + url = "${mirror}/stable/frameworks/5.114/kauth-5.114.0.tar.xz"; 90 + sha256 = "1rkf9mc9718wn8pzd3d3wcg3lsn0vkr9a2cqnz86rbg3cf2qdbir"; 91 + name = "kauth-5.114.0.tar.xz"; 92 }; 93 }; 94 kbookmarks = { 95 + version = "5.114.0"; 96 src = fetchurl { 97 + url = "${mirror}/stable/frameworks/5.114/kbookmarks-5.114.0.tar.xz"; 98 + sha256 = "06lnsyjhh80mdcqjww40glinmrjydbmkhv27a267vf34r7kam9rc"; 99 + name = "kbookmarks-5.114.0.tar.xz"; 100 }; 101 }; 102 kcalendarcore = { 103 + version = "5.114.0"; 104 src = fetchurl { 105 + url = "${mirror}/stable/frameworks/5.114/kcalendarcore-5.114.0.tar.xz"; 106 + sha256 = "0aimda01zqw4fz5ldvz4vh767bi10r00kvm62n89nxhsq46wlk7p"; 107 + name = "kcalendarcore-5.114.0.tar.xz"; 108 }; 109 }; 110 kcmutils = { 111 + version = "5.114.0"; 112 src = fetchurl { 113 + url = "${mirror}/stable/frameworks/5.114/kcmutils-5.114.0.tar.xz"; 114 + sha256 = "1pblf3c60m0gn3vhdprw28f8y54kij02jwz91r2vnmng8d1xkrp9"; 115 + name = "kcmutils-5.114.0.tar.xz"; 116 }; 117 }; 118 kcodecs = { 119 + version = "5.114.0"; 120 src = fetchurl { 121 + url = "${mirror}/stable/frameworks/5.114/kcodecs-5.114.0.tar.xz"; 122 + sha256 = "080zvcqd8iq05p5x3qaf3rryx75lg2l2j1dr18sp50ir50zfwh2w"; 123 + name = "kcodecs-5.114.0.tar.xz"; 124 }; 125 }; 126 kcompletion = { 127 + version = "5.114.0"; 128 src = fetchurl { 129 + url = "${mirror}/stable/frameworks/5.114/kcompletion-5.114.0.tar.xz"; 130 + sha256 = "0qvdxqlh1dklkbmqfjg5gc3dkdicgzn6q5lgvyf8cv46dinj6mwc"; 131 + name = "kcompletion-5.114.0.tar.xz"; 132 }; 133 }; 134 kconfig = { 135 + version = "5.114.0"; 136 src = fetchurl { 137 + url = "${mirror}/stable/frameworks/5.114/kconfig-5.114.0.tar.xz"; 138 + sha256 = "0hghdh4p6cq9ckp4g5jdgd8w47pdsxxvzimrdfjrs71lmy8ydiy2"; 139 + name = "kconfig-5.114.0.tar.xz"; 140 }; 141 }; 142 kconfigwidgets = { 143 + version = "5.114.0"; 144 src = fetchurl { 145 + url = "${mirror}/stable/frameworks/5.114/kconfigwidgets-5.114.0.tar.xz"; 146 + sha256 = "16layydkcwfbvzxqjzprkq8bbxifn0z0wm7mc9bzwrfxy761rjnj"; 147 + name = "kconfigwidgets-5.114.0.tar.xz"; 148 }; 149 }; 150 kcontacts = { 151 + version = "5.114.0"; 152 src = fetchurl { 153 + url = "${mirror}/stable/frameworks/5.114/kcontacts-5.114.0.tar.xz"; 154 + sha256 = "0lyqvbs216p5zpssaf4pyccph7nbwkbvhpmhbi32y2rm23cmxlwf"; 155 + name = "kcontacts-5.114.0.tar.xz"; 156 }; 157 }; 158 kcoreaddons = { 159 + version = "5.114.0"; 160 src = fetchurl { 161 + url = "${mirror}/stable/frameworks/5.114/kcoreaddons-5.114.0.tar.xz"; 162 + sha256 = "1wv3s3xsiii96k17nzs2fb0ih2lyg52krf58v44nlk9wfi4wmnqx"; 163 + name = "kcoreaddons-5.114.0.tar.xz"; 164 }; 165 }; 166 kcrash = { 167 + version = "5.114.0"; 168 src = fetchurl { 169 + url = "${mirror}/stable/frameworks/5.114/kcrash-5.114.0.tar.xz"; 170 + sha256 = "1avi4yd3kpjqxrvci1nicxbh9mjafj1w2vgfmqanq66b76s4kxj1"; 171 + name = "kcrash-5.114.0.tar.xz"; 172 }; 173 }; 174 kdav = { 175 + version = "5.114.0"; 176 src = fetchurl { 177 + url = "${mirror}/stable/frameworks/5.114/kdav-5.114.0.tar.xz"; 178 + sha256 = "11959fxz24snk2l31kw8w96wah0s2fjimimrxh6xhppiy5qp2fp2"; 179 + name = "kdav-5.114.0.tar.xz"; 180 }; 181 }; 182 kdbusaddons = { 183 + version = "5.114.0"; 184 src = fetchurl { 185 + url = "${mirror}/stable/frameworks/5.114/kdbusaddons-5.114.0.tar.xz"; 186 + sha256 = "0pzzznyxhi48z5hhdsdxz3vaaihrdshpx65ha2v2nn2gh3ww7ikm"; 187 + name = "kdbusaddons-5.114.0.tar.xz"; 188 }; 189 }; 190 kdeclarative = { 191 + version = "5.114.0"; 192 src = fetchurl { 193 + url = "${mirror}/stable/frameworks/5.114/kdeclarative-5.114.0.tar.xz"; 194 + sha256 = "0w98pj8acxb4m9645963rzq5vja1fbih5czz24mf9zdqlg2dkz8g"; 195 + name = "kdeclarative-5.114.0.tar.xz"; 196 }; 197 }; 198 kded = { 199 + version = "5.114.0"; 200 src = fetchurl { 201 + url = "${mirror}/stable/frameworks/5.114/kded-5.114.0.tar.xz"; 202 + sha256 = "00n4isc4ahii0ldrg761lkmnq27kmrfqs9zkmpvmgbg57259mvc3"; 203 + name = "kded-5.114.0.tar.xz"; 204 }; 205 }; 206 kdelibs4support = { 207 + version = "5.114.0"; 208 src = fetchurl { 209 + url = "${mirror}/stable/frameworks/5.114/portingAids/kdelibs4support-5.114.0.tar.xz"; 210 + sha256 = "17473him2fjfcw5f88diarqac815wsakfyb9fka82a4qqh9l41mc"; 211 + name = "kdelibs4support-5.114.0.tar.xz"; 212 }; 213 }; 214 kdesignerplugin = { 215 + version = "5.114.0"; 216 src = fetchurl { 217 + url = "${mirror}/stable/frameworks/5.114/portingAids/kdesignerplugin-5.114.0.tar.xz"; 218 + sha256 = "0zlvkayv6zl5rp1076bscmdzyw93y7sxqb5848w11vs0g9amcj9n"; 219 + name = "kdesignerplugin-5.114.0.tar.xz"; 220 }; 221 }; 222 kdesu = { 223 + version = "5.114.0"; 224 src = fetchurl { 225 + url = "${mirror}/stable/frameworks/5.114/kdesu-5.114.0.tar.xz"; 226 + sha256 = "14dcf32izn4lxr8vx372rfznflc1rcxwanx06phkd8mx9zyg4jxr"; 227 + name = "kdesu-5.114.0.tar.xz"; 228 }; 229 }; 230 kdewebkit = { 231 + version = "5.114.0"; 232 src = fetchurl { 233 + url = "${mirror}/stable/frameworks/5.114/portingAids/kdewebkit-5.114.0.tar.xz"; 234 + sha256 = "04zc2qs13k04gsn124mnh6sqi3pax8c014jcb0qdh3h2r2y72bz3"; 235 + name = "kdewebkit-5.114.0.tar.xz"; 236 }; 237 }; 238 kdnssd = { 239 + version = "5.114.0"; 240 src = fetchurl { 241 + url = "${mirror}/stable/frameworks/5.114/kdnssd-5.114.0.tar.xz"; 242 + sha256 = "1zw5rkprr54j05ic8zljk57zahp2v6333slr253r3n1679zqlv64"; 243 + name = "kdnssd-5.114.0.tar.xz"; 244 }; 245 }; 246 kdoctools = { 247 + version = "5.114.0"; 248 src = fetchurl { 249 + url = "${mirror}/stable/frameworks/5.114/kdoctools-5.114.0.tar.xz"; 250 + sha256 = "15s58r2zvdckw30x9q9ir8h1i8q2ncfgjn9h4jnmylwm79z3z27v"; 251 + name = "kdoctools-5.114.0.tar.xz"; 252 }; 253 }; 254 kemoticons = { 255 + version = "5.114.0"; 256 src = fetchurl { 257 + url = "${mirror}/stable/frameworks/5.114/kemoticons-5.114.0.tar.xz"; 258 + sha256 = "0w87prkhdmba7y8ylbycdpwdzd2djmp7hvv5ljb9s4aqqhnn3vw4"; 259 + name = "kemoticons-5.114.0.tar.xz"; 260 }; 261 }; 262 kfilemetadata = { 263 + version = "5.114.0"; 264 src = fetchurl { 265 + url = "${mirror}/stable/frameworks/5.114/kfilemetadata-5.114.0.tar.xz"; 266 + sha256 = "15va29chlsrxii02w1ax718hp1b14ym59lcfyzh7w30zlf681560"; 267 + name = "kfilemetadata-5.114.0.tar.xz"; 268 }; 269 }; 270 kglobalaccel = { 271 + version = "5.114.0"; 272 src = fetchurl { 273 + url = "${mirror}/stable/frameworks/5.114/kglobalaccel-5.114.0.tar.xz"; 274 + sha256 = "19mmav055fnzyl760fyhf0pdvaidd5i1h04l2hcnpin4p1jnpfap"; 275 + name = "kglobalaccel-5.114.0.tar.xz"; 276 }; 277 }; 278 kguiaddons = { 279 + version = "5.114.0"; 280 src = fetchurl { 281 + url = "${mirror}/stable/frameworks/5.114/kguiaddons-5.114.0.tar.xz"; 282 + sha256 = "0riya9plcz9c1ndhdbsradssndshbm12705swn7vf7am17n7f947"; 283 + name = "kguiaddons-5.114.0.tar.xz"; 284 }; 285 }; 286 kholidays = { 287 + version = "5.114.0"; 288 src = fetchurl { 289 + url = "${mirror}/stable/frameworks/5.114/kholidays-5.114.0.tar.xz"; 290 + sha256 = "19r8dxglz5ll6iyvigsccil3ikvcsnyy5nwcpjvjr1c0brigcjmy"; 291 + name = "kholidays-5.114.0.tar.xz"; 292 }; 293 }; 294 khtml = { 295 + version = "5.114.0"; 296 src = fetchurl { 297 + url = "${mirror}/stable/frameworks/5.114/portingAids/khtml-5.114.0.tar.xz"; 298 + sha256 = "1mf84zs9hjvmi74f8rgqzrfkqjq597f9k64dn1bqcj13v0w10vry"; 299 + name = "khtml-5.114.0.tar.xz"; 300 }; 301 }; 302 ki18n = { 303 + version = "5.114.0"; 304 src = fetchurl { 305 + url = "${mirror}/stable/frameworks/5.114/ki18n-5.114.0.tar.xz"; 306 + sha256 = "1yg03awcx5ay6lgbgwv91i0ankrm94z9m0wky4v03gnwnvw8pa0v"; 307 + name = "ki18n-5.114.0.tar.xz"; 308 }; 309 }; 310 kiconthemes = { 311 + version = "5.114.0"; 312 src = fetchurl { 313 + url = "${mirror}/stable/frameworks/5.114/kiconthemes-5.114.0.tar.xz"; 314 + sha256 = "0ndiqmcs1ybj4acc6k3p9jwq09slqc4nj12ifqvlxrfj3ak6sb28"; 315 + name = "kiconthemes-5.114.0.tar.xz"; 316 }; 317 }; 318 kidletime = { 319 + version = "5.114.0"; 320 src = fetchurl { 321 + url = "${mirror}/stable/frameworks/5.114/kidletime-5.114.0.tar.xz"; 322 + sha256 = "06sc9w54g4n7s5gjkqz08rgcz6v3pr0bdgx3gbjgzass6l4m8w7p"; 323 + name = "kidletime-5.114.0.tar.xz"; 324 }; 325 }; 326 kimageformats = { 327 + version = "5.114.0"; 328 src = fetchurl { 329 + url = "${mirror}/stable/frameworks/5.114/kimageformats-5.114.0.tar.xz"; 330 + sha256 = "1nfzpgnrbwncx9zp9cwa169jlfv7i85p00a07d4jc5hrdyvvkn0w"; 331 + name = "kimageformats-5.114.0.tar.xz"; 332 }; 333 }; 334 kinit = { 335 + version = "5.114.0"; 336 src = fetchurl { 337 + url = "${mirror}/stable/frameworks/5.114/kinit-5.114.0.tar.xz"; 338 + sha256 = "0b6z9gq05vz20hm5y9ai3sbqq3gxwm3a3z88dkvi7dywk7vbqcph"; 339 + name = "kinit-5.114.0.tar.xz"; 340 }; 341 }; 342 kio = { 343 + version = "5.114.0"; 344 src = fetchurl { 345 + url = "${mirror}/stable/frameworks/5.114/kio-5.114.0.tar.xz"; 346 + sha256 = "0nwmxbfhvfw69q07vxvflri7rkdczyc89xv4ll3nrzrhgf15kb2z"; 347 + name = "kio-5.114.0.tar.xz"; 348 }; 349 }; 350 kirigami2 = { 351 + version = "5.114.0"; 352 src = fetchurl { 353 + url = "${mirror}/stable/frameworks/5.114/kirigami2-5.114.0.tar.xz"; 354 + sha256 = "1bd232gs4394fa3aq31mjqrn8f3vjsghx7817szi7ryvnn6fnqkw"; 355 + name = "kirigami2-5.114.0.tar.xz"; 356 }; 357 }; 358 kitemmodels = { 359 + version = "5.114.0"; 360 src = fetchurl { 361 + url = "${mirror}/stable/frameworks/5.114/kitemmodels-5.114.0.tar.xz"; 362 + sha256 = "1bfmcrbcbrvp2rcaf32vzvarqwp41gn6s4xpf56hnxbwf9kgk1fl"; 363 + name = "kitemmodels-5.114.0.tar.xz"; 364 }; 365 }; 366 kitemviews = { 367 + version = "5.114.0"; 368 src = fetchurl { 369 + url = "${mirror}/stable/frameworks/5.114/kitemviews-5.114.0.tar.xz"; 370 + sha256 = "00vl2ck0pq0sqcxvhlr2pimgr27hd9v7y9dz6w4arb5smi5q1ixg"; 371 + name = "kitemviews-5.114.0.tar.xz"; 372 }; 373 }; 374 kjobwidgets = { 375 + version = "5.114.0"; 376 src = fetchurl { 377 + url = "${mirror}/stable/frameworks/5.114/kjobwidgets-5.114.0.tar.xz"; 378 + sha256 = "1ymlqi5cqcs79nj1vff8pqwgvy0dxj5vv7l529w3a3n315hkrny8"; 379 + name = "kjobwidgets-5.114.0.tar.xz"; 380 }; 381 }; 382 kjs = { 383 + version = "5.114.0"; 384 src = fetchurl { 385 + url = "${mirror}/stable/frameworks/5.114/portingAids/kjs-5.114.0.tar.xz"; 386 + sha256 = "08nh6yr6bqifpb5s9a4wbjwmwnm7zp5k8hcdmyb6mlcbam9qp6j7"; 387 + name = "kjs-5.114.0.tar.xz"; 388 }; 389 }; 390 kjsembed = { 391 + version = "5.114.0"; 392 src = fetchurl { 393 + url = "${mirror}/stable/frameworks/5.114/portingAids/kjsembed-5.114.0.tar.xz"; 394 + sha256 = "1xglisxv7nfsbj9lgpvc4c5ql4f6m7n71vf7vih5ff3aqybrkgxa"; 395 + name = "kjsembed-5.114.0.tar.xz"; 396 }; 397 }; 398 kmediaplayer = { 399 + version = "5.114.0"; 400 src = fetchurl { 401 + url = "${mirror}/stable/frameworks/5.114/portingAids/kmediaplayer-5.114.0.tar.xz"; 402 + sha256 = "092yvzvrkvr8xxncw7h5ghfd2bggzxsqfj67c2vhymhfw4i0c54x"; 403 + name = "kmediaplayer-5.114.0.tar.xz"; 404 }; 405 }; 406 knewstuff = { 407 + version = "5.114.0"; 408 src = fetchurl { 409 + url = "${mirror}/stable/frameworks/5.114/knewstuff-5.114.0.tar.xz"; 410 + sha256 = "15xmx7rnnrsz2cj044aviyr4hi9h8r0nnva9qzcjcq2hkkgj7wjj"; 411 + name = "knewstuff-5.114.0.tar.xz"; 412 }; 413 }; 414 knotifications = { 415 + version = "5.114.0"; 416 src = fetchurl { 417 + url = "${mirror}/stable/frameworks/5.114/knotifications-5.114.0.tar.xz"; 418 + sha256 = "0cjd5ml9hyzprjgmrc132cmp7g9hnl0h5swlxw2ifqnxxyfkg72b"; 419 + name = "knotifications-5.114.0.tar.xz"; 420 }; 421 }; 422 knotifyconfig = { 423 + version = "5.114.0"; 424 src = fetchurl { 425 + url = "${mirror}/stable/frameworks/5.114/knotifyconfig-5.114.0.tar.xz"; 426 + sha256 = "049n64qlr69zv1dc1dhgbsca37179hp06xfsxnhg97lblz3p3gds"; 427 + name = "knotifyconfig-5.114.0.tar.xz"; 428 }; 429 }; 430 kpackage = { 431 + version = "5.114.0"; 432 src = fetchurl { 433 + url = "${mirror}/stable/frameworks/5.114/kpackage-5.114.0.tar.xz"; 434 + sha256 = "0v165az3k5lfszxy0kl2464573y0dcq92fyfiklwnkkcjsvba69d"; 435 + name = "kpackage-5.114.0.tar.xz"; 436 }; 437 }; 438 kparts = { 439 + version = "5.114.0"; 440 src = fetchurl { 441 + url = "${mirror}/stable/frameworks/5.114/kparts-5.114.0.tar.xz"; 442 + sha256 = "1rrf765p554r7l8j23gx5zxdq6wimh0v91qdkwz7ilm2qr16vd5v"; 443 + name = "kparts-5.114.0.tar.xz"; 444 }; 445 }; 446 kpeople = { 447 + version = "5.114.0"; 448 src = fetchurl { 449 + url = "${mirror}/stable/frameworks/5.114/kpeople-5.114.0.tar.xz"; 450 + sha256 = "04v0s3amn6lbb16qvp1r6figckva6xk8z7djk8jda8fbnx8dx2r1"; 451 + name = "kpeople-5.114.0.tar.xz"; 452 }; 453 }; 454 kplotting = { 455 + version = "5.114.0"; 456 src = fetchurl { 457 + url = "${mirror}/stable/frameworks/5.114/kplotting-5.114.0.tar.xz"; 458 + sha256 = "17x58pplln0plqiyhjpzdiqxngylxq5gkc5gk7b91xzm783x2k0n"; 459 + name = "kplotting-5.114.0.tar.xz"; 460 }; 461 }; 462 kpty = { 463 + version = "5.114.0"; 464 src = fetchurl { 465 + url = "${mirror}/stable/frameworks/5.114/kpty-5.114.0.tar.xz"; 466 + sha256 = "0fm7bfp89kvg1a64q8piiyal71p6vjnqcm13zak6r9fbfwcm0gs9"; 467 + name = "kpty-5.114.0.tar.xz"; 468 }; 469 }; 470 kquickcharts = { 471 + version = "5.114.0"; 472 src = fetchurl { 473 + url = "${mirror}/stable/frameworks/5.114/kquickcharts-5.114.0.tar.xz"; 474 + sha256 = "1f91x92qdzxp31z7ixx9jn41hq9f3w9hjia94pab9vsnaz8prbd1"; 475 + name = "kquickcharts-5.114.0.tar.xz"; 476 }; 477 }; 478 kross = { 479 + version = "5.114.0"; 480 src = fetchurl { 481 + url = "${mirror}/stable/frameworks/5.114/portingAids/kross-5.114.0.tar.xz"; 482 + sha256 = "0bbpi63lxbb4ylx2jd172a2bqyxkd606n7w8zrvcjy466lkv3sz4"; 483 + name = "kross-5.114.0.tar.xz"; 484 }; 485 }; 486 krunner = { 487 + version = "5.114.0"; 488 src = fetchurl { 489 + url = "${mirror}/stable/frameworks/5.114/krunner-5.114.0.tar.xz"; 490 + sha256 = "1rjs9b87bi4f6pdm9fwnha2sj2mrq260l80iz2jq1zah83p546sw"; 491 + name = "krunner-5.114.0.tar.xz"; 492 }; 493 }; 494 kservice = { 495 + version = "5.114.0"; 496 src = fetchurl { 497 + url = "${mirror}/stable/frameworks/5.114/kservice-5.114.0.tar.xz"; 498 + sha256 = "0jdvlplnsb9w628wh3ip6awxvhgyc097zh7ls9614ymkbnpc9xca"; 499 + name = "kservice-5.114.0.tar.xz"; 500 }; 501 }; 502 ktexteditor = { 503 + version = "5.114.0"; 504 src = fetchurl { 505 + url = "${mirror}/stable/frameworks/5.114/ktexteditor-5.114.0.tar.xz"; 506 + sha256 = "06amzk6290imi2gj3v1k3f56zdlad7zbz4wwlf34v4iibj9mfgw8"; 507 + name = "ktexteditor-5.114.0.tar.xz"; 508 }; 509 }; 510 ktextwidgets = { 511 + version = "5.114.0"; 512 src = fetchurl { 513 + url = "${mirror}/stable/frameworks/5.114/ktextwidgets-5.114.0.tar.xz"; 514 + sha256 = "0w1wwyd3fy351rmkhf3i55is5031j2zxvswm0b1sb3pd159v888v"; 515 + name = "ktextwidgets-5.114.0.tar.xz"; 516 }; 517 }; 518 kunitconversion = { 519 + version = "5.114.0"; 520 src = fetchurl { 521 + url = "${mirror}/stable/frameworks/5.114/kunitconversion-5.114.0.tar.xz"; 522 + sha256 = "1qyqvl8fy105zwma5nrkz9zg5932w2f33daw0azhj322iffrm39n"; 523 + name = "kunitconversion-5.114.0.tar.xz"; 524 }; 525 }; 526 kwallet = { 527 + version = "5.114.0"; 528 src = fetchurl { 529 + url = "${mirror}/stable/frameworks/5.114/kwallet-5.114.0.tar.xz"; 530 + sha256 = "1cji8bvy5m77zljyrrgipsw8pxcds1sgikxlq3sdfxymcsw2wr36"; 531 + name = "kwallet-5.114.0.tar.xz"; 532 }; 533 }; 534 kwayland = { 535 + version = "5.114.0"; 536 src = fetchurl { 537 + url = "${mirror}/stable/frameworks/5.114/kwayland-5.114.0.tar.xz"; 538 + sha256 = "1lzmlbv5vl656cigjj07hbc0gj6g1i2xqanvnhxj360109kzilf1"; 539 + name = "kwayland-5.114.0.tar.xz"; 540 }; 541 }; 542 kwidgetsaddons = { 543 + version = "5.114.0"; 544 src = fetchurl { 545 + url = "${mirror}/stable/frameworks/5.114/kwidgetsaddons-5.114.0.tar.xz"; 546 + sha256 = "1cc8lsk9v0cp2wiy1q26mlkf8np0yj01sq8a7w13ga5s6hv4sh2n"; 547 + name = "kwidgetsaddons-5.114.0.tar.xz"; 548 }; 549 }; 550 kwindowsystem = { 551 + version = "5.114.0"; 552 src = fetchurl { 553 + url = "${mirror}/stable/frameworks/5.114/kwindowsystem-5.114.0.tar.xz"; 554 + sha256 = "03xbsf1pmswd2kpn3pdszp4vndclsh7j02fp22npxaxllmfr4va9"; 555 + name = "kwindowsystem-5.114.0.tar.xz"; 556 }; 557 }; 558 kxmlgui = { 559 + version = "5.114.0"; 560 src = fetchurl { 561 + url = "${mirror}/stable/frameworks/5.114/kxmlgui-5.114.0.tar.xz"; 562 + sha256 = "0gvjf32ssc0r0bdpb1912ldsr5rjls8vrscwy5gm9g5gw504hmmr"; 563 + name = "kxmlgui-5.114.0.tar.xz"; 564 }; 565 }; 566 kxmlrpcclient = { 567 + version = "5.114.0"; 568 src = fetchurl { 569 + url = "${mirror}/stable/frameworks/5.114/portingAids/kxmlrpcclient-5.114.0.tar.xz"; 570 + sha256 = "1fgjai3vj3yk67ynhd7blilyrdhdn5nvma3v3j1sbdg98pr7qzar"; 571 + name = "kxmlrpcclient-5.114.0.tar.xz"; 572 }; 573 }; 574 modemmanager-qt = { 575 + version = "5.114.0"; 576 src = fetchurl { 577 + url = "${mirror}/stable/frameworks/5.114/modemmanager-qt-5.114.0.tar.xz"; 578 + sha256 = "16jqhmcpsffl9a7c0bb4hwjy3bw5rakdsnc5n6y8djc6237jl9pi"; 579 + name = "modemmanager-qt-5.114.0.tar.xz"; 580 }; 581 }; 582 networkmanager-qt = { 583 + version = "5.114.0"; 584 src = fetchurl { 585 + url = "${mirror}/stable/frameworks/5.114/networkmanager-qt-5.114.0.tar.xz"; 586 + sha256 = "10anjsnrzawrfjlznjvvl2sbxrajl2ddnq2kgl314b5dk7z3yk4n"; 587 + name = "networkmanager-qt-5.114.0.tar.xz"; 588 }; 589 }; 590 oxygen-icons = { 591 + version = "5.114.0"; 592 src = fetchurl { 593 + url = "${mirror}/stable/frameworks/5.114/oxygen-icons-5.114.0.tar.xz"; 594 + sha256 = "0f6hv5g8y2ggagrq9x9b78bqxqg6bqcpm1xxhf69ybgjikrqdf2r"; 595 + name = "oxygen-icons-5.114.0.tar.xz"; 596 }; 597 }; 598 plasma-framework = { 599 + version = "5.114.0"; 600 src = fetchurl { 601 + url = "${mirror}/stable/frameworks/5.114/plasma-framework-5.114.0.tar.xz"; 602 + sha256 = "058hl76q35bw3rzmv348azk1lmhkpgmfrxr3jd9s1hphijr8sgcx"; 603 + name = "plasma-framework-5.114.0.tar.xz"; 604 }; 605 }; 606 prison = { 607 + version = "5.114.0"; 608 src = fetchurl { 609 + url = "${mirror}/stable/frameworks/5.114/prison-5.114.0.tar.xz"; 610 + sha256 = "1wbr1lryxmrx65ilq1bhqsdhhikrih977nhpb02fq0cqnvv7v9i7"; 611 + name = "prison-5.114.0.tar.xz"; 612 }; 613 }; 614 purpose = { 615 + version = "5.114.0"; 616 src = fetchurl { 617 + url = "${mirror}/stable/frameworks/5.114/purpose-5.114.0.tar.xz"; 618 + sha256 = "1lj67f0x4gvbh9by3c3crbbwwnx7b9ifjna9ggziya4m6zj0m4z1"; 619 + name = "purpose-5.114.0.tar.xz"; 620 }; 621 }; 622 qqc2-desktop-style = { 623 + version = "5.114.0"; 624 src = fetchurl { 625 + url = "${mirror}/stable/frameworks/5.114/qqc2-desktop-style-5.114.0.tar.xz"; 626 + sha256 = "1y5g91vybjvhwmzpfwrc70q5j7jxf5b972f9fh2vzb930jir6c8g"; 627 + name = "qqc2-desktop-style-5.114.0.tar.xz"; 628 }; 629 }; 630 solid = { 631 + version = "5.114.0"; 632 src = fetchurl { 633 + url = "${mirror}/stable/frameworks/5.114/solid-5.114.0.tar.xz"; 634 + sha256 = "1slxlj5jhp8g745l328932934633nl81sq3n8fd73h655hymsk4s"; 635 + name = "solid-5.114.0.tar.xz"; 636 }; 637 }; 638 sonnet = { 639 + version = "5.114.0"; 640 src = fetchurl { 641 + url = "${mirror}/stable/frameworks/5.114/sonnet-5.114.0.tar.xz"; 642 + sha256 = "0zxi96i3gfpx759qc1nyz7jqlswg5ivgr1w9gbbsm1x5fi9ikadx"; 643 + name = "sonnet-5.114.0.tar.xz"; 644 }; 645 }; 646 syndication = { 647 + version = "5.114.0"; 648 src = fetchurl { 649 + url = "${mirror}/stable/frameworks/5.114/syndication-5.114.0.tar.xz"; 650 + sha256 = "13rjb1zm9yd8vbm9h7avqih5v0rr2srqwglm29l7mcnankqlh4n7"; 651 + name = "syndication-5.114.0.tar.xz"; 652 }; 653 }; 654 syntax-highlighting = { 655 + version = "5.114.0"; 656 src = fetchurl { 657 + url = "${mirror}/stable/frameworks/5.114/syntax-highlighting-5.114.0.tar.xz"; 658 + sha256 = "1skblg2m0sar63qrgkjsg0w9scixggm5qj7lp4gzjn4hwq6m3n63"; 659 + name = "syntax-highlighting-5.114.0.tar.xz"; 660 }; 661 }; 662 threadweaver = { 663 + version = "5.114.0"; 664 src = fetchurl { 665 + url = "${mirror}/stable/frameworks/5.114/threadweaver-5.114.0.tar.xz"; 666 + sha256 = "1y07g58w6z3i11y3djg3aaxanhp9hzaciq61l4dn1gqwghn09xgh"; 667 + name = "threadweaver-5.114.0.tar.xz"; 668 }; 669 }; 670 }
+2 -2
pkgs/development/libraries/libcamera/default.nix
··· 22 23 stdenv.mkDerivation rec { 24 pname = "libcamera"; 25 - version = "0.0.5"; 26 27 src = fetchgit { 28 url = "https://git.libcamera.org/libcamera/libcamera.git"; 29 rev = "v${version}"; 30 - hash = "sha256-rd1YIEosg4+H/FJBYCoxdQlV9F0evU5fckHJrSdVPOE="; 31 }; 32 33 outputs = [ "out" "dev" "doc" ];
··· 22 23 stdenv.mkDerivation rec { 24 pname = "libcamera"; 25 + version = "0.1.0"; 26 27 src = fetchgit { 28 url = "https://git.libcamera.org/libcamera/libcamera.git"; 29 rev = "v${version}"; 30 + hash = "sha256-icHZtv25QvJEv0DlELT3cDxho3Oz2BJAMNKr5W4bshk="; 31 }; 32 33 outputs = [ "out" "dev" "doc" ];
+2 -2
pkgs/development/libraries/libdrm/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "libdrm"; 9 - version = "2.4.119"; 10 11 src = fetchurl { 12 url = "https://dri.freedesktop.org/${pname}/${pname}-${version}.tar.xz"; 13 - hash = "sha256-CknxLwm1tuaOqq/z8Cynz/mqkmk5shLTQxYdPorFYpE="; 14 }; 15 16 outputs = [ "out" "dev" "bin" ];
··· 6 7 stdenv.mkDerivation rec { 8 pname = "libdrm"; 9 + version = "2.4.120"; 10 11 src = fetchurl { 12 url = "https://dri.freedesktop.org/${pname}/${pname}-${version}.tar.xz"; 13 + hash = "sha256-O/VTY/dsclCUZEGrUdOmzArlGAVcD/AXMkq3bN77Mno="; 14 }; 15 16 outputs = [ "out" "dev" "bin" ];
+2 -2
pkgs/development/libraries/libjxl/default.nix
··· 9 , libjpeg 10 , libpng 11 , libwebp 12 - , openexr 13 , pkg-config 14 , zlib 15 , buildDocs ? true ··· 79 libjpeg 80 libpng 81 libwebp 82 - openexr 83 zlib 84 ]; 85
··· 9 , libjpeg 10 , libpng 11 , libwebp 12 + , openexr_3 13 , pkg-config 14 , zlib 15 , buildDocs ? true ··· 79 libjpeg 80 libpng 81 libwebp 82 + openexr_3 83 zlib 84 ]; 85
+2 -21
pkgs/development/libraries/libmbim/default.nix
··· 1 { lib 2 , stdenv 3 , fetchFromGitLab 4 - , fetchpatch 5 , meson 6 , ninja 7 , pkg-config ··· 19 20 stdenv.mkDerivation rec { 21 pname = "libmbim"; 22 - version = "1.28.4"; 23 24 outputs = [ "out" "dev" ] 25 ++ lib.optionals withDocs [ "man" ]; ··· 29 owner = "mobile-broadband"; 30 repo = "libmbim"; 31 rev = version; 32 - hash = "sha256-aaYjvJ2OMTzkUyqWCyHdmsKJ3VGqBmKQzb1DWK/1cPU="; 33 }; 34 - 35 - patches = [ 36 - # Intel Mutual Authentication - FCC lock. Part of 1.30, backported to 37 - # openSUSE and Fedora and ChromeOS. 38 - # https://src.fedoraproject.org/rpms/libmbim/blob/rawhide/f/libmbim.spec 39 - (fetchpatch { 40 - url = "https://cgit.freedesktop.org/libmbim/libmbim/patch/?id=910db9cb2b6fde303d3b4720890cf6dc6fc00880"; 41 - hash = "sha256-412sXdWb8WsSexe1scI/C57dwENgNWoREGO1GxSF4hs="; 42 - }) 43 - 44 - # Intel Tools. Allows tracing various commands. Part of 1.30, backported to 45 - # openSUSE, Fedora and ChromeOS. 46 - # https://src.fedoraproject.org/rpms/libmbim/blob/rawhide/f/libmbim.spec 47 - (fetchpatch { 48 - url = "https://cgit.freedesktop.org/libmbim/libmbim/patch/?id=8a6dec6ed11931601e605c9537da9904b3be5bc0"; 49 - hash = "sha256-tU4zkUl5aZJE+g/qbnWprUHe/PmZvqVKB9qecSaUBhk="; 50 - }) 51 - ]; 52 53 mesonFlags = [ 54 "-Dudevdir=${placeholder "out"}/lib/udev"
··· 1 { lib 2 , stdenv 3 , fetchFromGitLab 4 , meson 5 , ninja 6 , pkg-config ··· 18 19 stdenv.mkDerivation rec { 20 pname = "libmbim"; 21 + version = "1.30.0"; 22 23 outputs = [ "out" "dev" ] 24 ++ lib.optionals withDocs [ "man" ]; ··· 28 owner = "mobile-broadband"; 29 repo = "libmbim"; 30 rev = version; 31 + hash = "sha256-sHTpu9WeMZroT+1I18ObEHWSzcyj/Relyz8UNe+WawI="; 32 }; 33 34 mesonFlags = [ 35 "-Dudevdir=${placeholder "out"}/lib/udev"
+13 -11
pkgs/development/libraries/libplacebo/default.nix
··· 10 , shaderc 11 , lcms2 12 , libGL 13 - , xorg 14 , libunwind 15 , libdovi 16 }: 17 18 stdenv.mkDerivation rec { 19 pname = "libplacebo"; 20 - version = "5.264.1"; 21 22 src = fetchFromGitLab { 23 domain = "code.videolan.org"; 24 owner = "videolan"; 25 repo = pname; 26 rev = "v${version}"; 27 - hash = "sha256-YEefuEfJURi5/wswQKskA/J1UGzessQQkBpltJ0Spq8="; 28 }; 29 30 nativeBuildInputs = [ ··· 41 shaderc 42 lcms2 43 libGL 44 - xorg.libX11 45 libunwind 46 libdovi 47 ]; 48 49 - mesonFlags = [ 50 - "-Dvulkan-registry=${vulkan-headers}/share/vulkan/registry/vk.xml" 51 - "-Ddemos=false" # Don't build and install the demo programs 52 - "-Dd3d11=disabled" # Disable the Direct3D 11 based renderer 53 - "-Dglslang=disabled" # rely on shaderc for GLSL compilation instead 54 - ] ++ lib.optionals stdenv.isDarwin [ 55 - "-Dunwind=disabled" # libplacebo doesn’t build with `darwin.libunwind` 56 ]; 57 58 postPatch = ''
··· 10 , shaderc 11 , lcms2 12 , libGL 13 + , libX11 14 , libunwind 15 , libdovi 16 + , xxHash 17 }: 18 19 stdenv.mkDerivation rec { 20 pname = "libplacebo"; 21 + version = "6.338.1"; 22 23 src = fetchFromGitLab { 24 domain = "code.videolan.org"; 25 owner = "videolan"; 26 repo = pname; 27 rev = "v${version}"; 28 + hash = "sha256-NZmwR3+lIC2PF+k+kqCjoMYkMM/PKOJmDwAq7t6YONY="; 29 }; 30 31 nativeBuildInputs = [ ··· 42 shaderc 43 lcms2 44 libGL 45 + libX11 46 libunwind 47 libdovi 48 + xxHash 49 ]; 50 51 + mesonFlags = with lib; [ 52 + (mesonOption "vulkan-registry" "${vulkan-headers}/share/vulkan/registry/vk.xml") 53 + (mesonBool "demos" false) # Don't build and install the demo programs 54 + (mesonEnable "d3d11" false) # Disable the Direct3D 11 based renderer 55 + (mesonEnable "glslang" false) # rely on shaderc for GLSL compilation instead 56 + ] ++ optionals stdenv.isDarwin [ 57 + (mesonEnable "unwind" false) # libplacebo doesn’t build with `darwin.libunwind` 58 ]; 59 60 postPatch = ''
+2 -2
pkgs/development/libraries/libqmi/default.nix
··· 23 24 stdenv.mkDerivation rec { 25 pname = "libqmi"; 26 - version = "1.32.4"; 27 28 outputs = [ "out" "dev" ] 29 ++ lib.optional withIntrospection "devdoc"; ··· 33 owner = "mobile-broadband"; 34 repo = "libqmi"; 35 rev = version; 36 - hash = "sha256-cczGvoD+2+G6uiAt0Iv1BO4/FqzO9bkqhFsEwOfp7qw="; 37 }; 38 39 nativeBuildInputs = [
··· 23 24 stdenv.mkDerivation rec { 25 pname = "libqmi"; 26 + version = "1.34.0"; 27 28 outputs = [ "out" "dev" ] 29 ++ lib.optional withIntrospection "devdoc"; ··· 33 owner = "mobile-broadband"; 34 repo = "libqmi"; 35 rev = version; 36 + hash = "sha256-l9ev9ZOWicVNZ/Wj//KNd3NHcefIrLVriqJhEpwWvtQ="; 37 }; 38 39 nativeBuildInputs = [
+2 -11
pkgs/development/libraries/libraw/default.nix
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 - , fetchpatch 5 , autoreconfHook 6 , lcms2 7 , pkg-config ··· 16 17 stdenv.mkDerivation rec { 18 pname = "libraw"; 19 - version = "0.21.1"; 20 21 src = fetchFromGitHub { 22 owner = "LibRaw"; 23 repo = "LibRaw"; 24 rev = version; 25 - sha256 = "sha256-K9mULf6V/TCl5Vu4iuIdSGF9HzQlgNQLRFHIpNbmAlY"; 26 }; 27 - 28 - patches = [ 29 - (fetchpatch { 30 - name = "CVE-2023-1729.patch"; 31 - url = "https://github.com/LibRaw/LibRaw/commit/9ab70f6dca19229cb5caad7cc31af4e7501bac93.patch"; 32 - hash = "sha256-OAyqphxvtSM15NI77HwtGTmTmP9YNu3xhZ6D1CceJ7I="; 33 - }) 34 - ]; 35 36 outputs = [ "out" "lib" "dev" "doc" ]; 37
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 , autoreconfHook 5 , lcms2 6 , pkg-config ··· 15 16 stdenv.mkDerivation rec { 17 pname = "libraw"; 18 + version = "0.21.2"; 19 20 src = fetchFromGitHub { 21 owner = "LibRaw"; 22 repo = "LibRaw"; 23 rev = version; 24 + hash = "sha256-p9CmOCulvV7+KKn1lXwpcysOo0+mD5UgPqy2ki0cIFE="; 25 }; 26 27 outputs = [ "out" "lib" "dev" "doc" ]; 28
+8 -14
pkgs/development/libraries/libunwind/default.nix
··· 1 - { stdenv, lib, fetchurl, fetchpatch, autoreconfHook, xz, buildPackages }: 2 3 stdenv.mkDerivation rec { 4 pname = "libunwind"; 5 - version = "1.6.2"; 6 7 - src = fetchurl { 8 - url = "mirror://savannah/libunwind/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-SmrsZmmR+0XQiJxErt6K1usQgHHDVU/N/2cfnJR5SXY="; 10 }; 11 - 12 - patches = [ 13 - # Fix for aarch64 and non-4K pages. Remove once upgraded past 1.6.2. 14 - (fetchpatch { 15 - url = "https://github.com/libunwind/libunwind/commit/e85b65cec757ef589f28957d0c6c21c498a03bdf.patch"; 16 - sha256 = "1lnlygvhqrdrjgw303pg2k2k4ms4gaghpjsgmhk47q83vy1yjwfg"; 17 - }) 18 - ]; 19 20 postPatch = if (stdenv.cc.isClang || stdenv.hostPlatform.isStatic) then '' 21 substituteInPlace configure.ac --replace "-lgcc_s" "" ··· 50 description = "A portable and efficient API to determine the call-chain of a program"; 51 maintainers = with maintainers; [ orivej ]; 52 # https://github.com/libunwind/libunwind#libunwind 53 - platforms = [ "aarch64-linux" "armv5tel-linux" "armv6l-linux" "armv7a-linux" "armv7l-linux" "i686-freebsd13" "i686-linux" "mips64el-linux" "mipsel-linux" "powerpc64-linux" "powerpc64le-linux" "riscv64-linux" "s390x-linux" "x86_64-freebsd13" "x86_64-linux" "x86_64-solaris" ]; 54 # libunwind relies on getcontext/setcontext, 55 # and only has a musl implementation for some platforms 56 # https://github.com/libunwind/libunwind/issues/33
··· 1 + { stdenv, lib, fetchFromGitHub, fetchpatch, autoreconfHook, xz, buildPackages }: 2 3 stdenv.mkDerivation rec { 4 pname = "libunwind"; 5 + version = "1.7.2"; 6 7 + src = fetchFromGitHub { 8 + owner = "libunwind"; 9 + repo = "libunwind"; 10 + rev = "v${version}"; 11 + hash = "sha256-z5YCue0zadQnMEbGFniFvDjXNy6dSHQDQnXRXS6Uh/Y="; 12 }; 13 14 postPatch = if (stdenv.cc.isClang || stdenv.hostPlatform.isStatic) then '' 15 substituteInPlace configure.ac --replace "-lgcc_s" "" ··· 44 description = "A portable and efficient API to determine the call-chain of a program"; 45 maintainers = with maintainers; [ orivej ]; 46 # https://github.com/libunwind/libunwind#libunwind 47 + platforms = [ "aarch64-linux" "armv5tel-linux" "armv6l-linux" "armv7a-linux" "armv7l-linux" "i686-freebsd13" "i686-linux" "loongarch64-linux" "mips64el-linux" "mipsel-linux" "powerpc64-linux" "powerpc64le-linux" "riscv64-linux" "s390x-linux" "x86_64-freebsd13" "x86_64-linux" "x86_64-solaris" ]; 48 # libunwind relies on getcontext/setcontext, 49 # and only has a musl implementation for some platforms 50 # https://github.com/libunwind/libunwind/issues/33
+2 -2
pkgs/development/libraries/libxmlb/default.nix
··· 18 19 stdenv.mkDerivation rec { 20 pname = "libxmlb"; 21 - version = "0.3.14"; 22 23 outputs = [ "out" "lib" "dev" "devdoc" "installedTests" ]; 24 ··· 26 owner = "hughsie"; 27 repo = "libxmlb"; 28 rev = version; 29 - hash = "sha256-lpVXl/n/ecDLbbLQg9T+o4GdGZM7pNXGYTyVogNCl2E="; 30 }; 31 32 patches = [
··· 18 19 stdenv.mkDerivation rec { 20 pname = "libxmlb"; 21 + version = "0.3.15"; 22 23 outputs = [ "out" "lib" "dev" "devdoc" "installedTests" ]; 24 ··· 26 owner = "hughsie"; 27 repo = "libxmlb"; 28 rev = version; 29 + hash = "sha256-S0wBVhfRa81mAmqpYYAKAyKLnfnVsXJEcGA21i5tdzo="; 30 }; 31 32 patches = [
+2
pkgs/development/libraries/libxslt/default.nix
··· 60 "--without-crypto" 61 ]; 62 63 postFixup = '' 64 moveToOutput bin/xslt-config "$dev" 65 moveToOutput lib/xsltConf.sh "$dev"
··· 60 "--without-crypto" 61 ]; 62 63 + enableParallelBuilding = true; 64 + 65 postFixup = '' 66 moveToOutput bin/xslt-config "$dev" 67 moveToOutput lib/xsltConf.sh "$dev"
+10
pkgs/development/libraries/libzip/default.nix
··· 1 { lib, stdenv 2 , cmake 3 , fetchurl 4 , perl 5 , zlib ··· 23 url = "https://libzip.org/download/${finalAttrs.pname}-${finalAttrs.version}.tar.gz"; 24 sha256 = "sha256-lmmuXf46xbOJdTbchGaodMjPLA47H90I11snOIQpk2M="; 25 }; 26 27 outputs = [ "out" "dev" "man" ]; 28
··· 1 { lib, stdenv 2 , cmake 3 + , fetchpatch2 4 , fetchurl 5 , perl 6 , zlib ··· 24 url = "https://libzip.org/download/${finalAttrs.pname}-${finalAttrs.version}.tar.gz"; 25 sha256 = "sha256-lmmuXf46xbOJdTbchGaodMjPLA47H90I11snOIQpk2M="; 26 }; 27 + 28 + patches = [ 29 + # https://github.com/nih-at/libzip/issues/404 30 + (fetchpatch2 { 31 + name = "Check-for-zstd_TARGET-before-using-it-in-a-regex.patch"; 32 + url = "https://github.com/nih-at/libzip/commit/c719428916b4d19e838f873b1a177b126a080d61.patch"; 33 + hash = "sha256-4ksbXEM8kNvs3wtbIaXLEQNSKaxl0es/sIg0EINaTHE="; 34 + }) 35 + ]; 36 37 outputs = [ "out" "dev" "man" ]; 38
+3 -4
pkgs/development/libraries/openexr/default.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "openexr"; 12 - version = "2.5.8"; 13 14 outputs = [ "bin" "dev" "out" "doc" ]; 15 ··· 17 owner = "AcademySoftwareFoundation"; 18 repo = "openexr"; 19 rev = "v${version}"; 20 - sha256 = "sha256-N7XdDaDsYdx4TXvHplQDTvhHNUmW5rntdaTKua4C0es="; 21 }; 22 23 patches = [ ··· 36 sha256 = "sha256-DrpldpNgN5pWKzIuuPIrynGX3EpP8YhJlu+lLfNFGxQ="; 37 }) 38 39 - # Backport gcc-13 fix: 40 - # https://github.com/AcademySoftwareFoundation/openexr/pull/1264 41 ./gcc-13.patch 42 ]; 43
··· 9 10 stdenv.mkDerivation rec { 11 pname = "openexr"; 12 + version = "2.5.10"; 13 14 outputs = [ "bin" "dev" "out" "doc" ]; 15 ··· 17 owner = "AcademySoftwareFoundation"; 18 repo = "openexr"; 19 rev = "v${version}"; 20 + hash = "sha256-xdC+T79ZQBx/XhuIXtP93Roj0N9lF+E65ReEKQ4kIsg="; 21 }; 22 23 patches = [ ··· 36 sha256 = "sha256-DrpldpNgN5pWKzIuuPIrynGX3EpP8YhJlu+lLfNFGxQ="; 37 }) 38 39 + # GCC 13 fixes 40 ./gcc-13.patch 41 ]; 42
+19 -27
pkgs/development/libraries/openexr/gcc-13.patch
··· 1 - https://github.com/AcademySoftwareFoundation/openexr/pull/1264 2 - https://github.com/AcademySoftwareFoundation/openexr/commit/d0088a3c6943a9a53fc24e29885414d082d531fe.patch 3 4 - --- a/OpenEXR/IlmImf/ImfDwaCompressor.cpp 5 - +++ b/OpenEXR/IlmImf/ImfDwaCompressor.cpp 6 - @@ -159,6 +159,7 @@ 7 - #include <limits> 8 - 9 - #include <cstddef> 10 - +#include <cstdint> 11 - 12 - 13 - // Windows specific addition to prevent the indirect import of the redefined min/max macros 14 - --- a/OpenEXR/IlmImf/ImfHuf.cpp 15 - +++ b/OpenEXR/IlmImf/ImfHuf.cpp 16 - @@ -53,6 +53,7 @@ 17 - #include <cstring> 18 - #include <cassert> 19 #include <algorithm> 20 +#include <cstdint> 21 22 - 23 - using namespace std; 24 - --- a/OpenEXR/IlmImf/ImfMisc.cpp 25 - +++ b/OpenEXR/IlmImf/ImfMisc.cpp 26 - @@ -52,6 +52,7 @@ 27 - #include <ImfConvert.h> 28 - #include <ImfPartType.h> 29 - #include <ImfTileDescription.h> 30 - +#include <cstdint> 31 #include "ImfNamespace.h" 32 33 - OPENEXR_IMF_INTERNAL_NAMESPACE_SOURCE_ENTER
··· 1 + From 8aa103fe6e815514990e59708468eabc36f7f332 Mon Sep 17 00:00:00 2001 2 + From: =?UTF-8?q?=C3=A9clairevoyant?= 3 + <848000+eclairevoyant@users.noreply.github.com> 4 + Date: Fri, 5 Jan 2024 18:12:16 -0500 5 + Subject: [PATCH] gcc13 6 7 + --- 8 + OpenEXR/IlmImf/ImfTiledMisc.cpp | 1 + 9 + 1 file changed, 1 insertion(+) 10 + 11 + diff --git a/OpenEXR/IlmImf/ImfTiledMisc.cpp b/OpenEXR/IlmImf/ImfTiledMisc.cpp 12 + index 06ea3144..749537d4 100644 13 + --- a/OpenEXR/IlmImf/ImfTiledMisc.cpp 14 + +++ b/OpenEXR/IlmImf/ImfTiledMisc.cpp 15 + @@ -46,6 +46,7 @@ 16 + #include <ImfTileDescription.h> 17 #include <algorithm> 18 + #include <limits> 19 +#include <cstdint> 20 21 #include "ImfNamespace.h" 22 23 + -- 24 + 2.42.0 25 +
+2 -2
pkgs/development/libraries/pipewire/default.nix
··· 81 82 self = stdenv.mkDerivation rec { 83 pname = "pipewire"; 84 - version = "1.0.0"; 85 86 outputs = [ 87 "out" ··· 97 owner = "pipewire"; 98 repo = "pipewire"; 99 rev = version; 100 - sha256 = "sha256-mfnMluxJAxDbB6JlIM6HJ0zg7e1q3ia3uFbht6zeHCk="; 101 }; 102 103 patches = [
··· 81 82 self = stdenv.mkDerivation rec { 83 pname = "pipewire"; 84 + version = "1.0.1"; 85 86 outputs = [ 87 "out" ··· 97 owner = "pipewire"; 98 repo = "pipewire"; 99 rev = version; 100 + sha256 = "sha256-rvf0sZRgDDLcqroLg7hcMUqXD/4JT+3lBRX6/m+3Ry8="; 101 }; 102 103 patches = [
+26 -8
pkgs/development/libraries/pixman/default.nix
··· 1 { lib 2 , stdenv 3 , fetchurl 4 , pkg-config 5 , libpng 6 , glib /*just passthru*/ ··· 12 , tigervnc 13 , wlroots 14 , xwayland 15 }: 16 17 stdenv.mkDerivation rec { 18 pname = "pixman"; 19 - version = "0.42.2"; 20 21 src = fetchurl { 22 urls = [ 23 "mirror://xorg/individual/lib/${pname}-${version}.tar.gz" 24 "https://cairographics.org/releases/${pname}-${version}.tar.gz" 25 ]; 26 - hash = "sha256-6hSA762i/ZSLx1Nm98NJ4cltMpfQmj/mJibjjiNKYl4="; 27 }; 28 29 separateDebugInfo = !stdenv.hostPlatform.isStatic; 30 31 - nativeBuildInputs = [ pkg-config ]; 32 33 buildInputs = [ libpng ]; 34 35 - configureFlags = lib.optional stdenv.isAarch32 "--disable-arm-iwmmxt" 36 - # Disable until https://gitlab.freedesktop.org/pixman/pixman/-/issues/46 is resolved 37 - ++ lib.optional (stdenv.isAarch64 && !stdenv.cc.isGNU) "--disable-arm-a64-neon"; 38 39 preConfigure = '' 40 # https://gitlab.freedesktop.org/pixman/pixman/-/issues/62 41 export OMP_NUM_THREADS=$((NIX_BUILD_CORES > 184 ? 184 : NIX_BUILD_CORES)) 42 ''; 43 44 doCheck = true; 45 46 postInstall = glib.flattenInclude; 47 48 - passthru.tests = { 49 - inherit cairo qemu scribus tigervnc wlroots xwayland; 50 }; 51 52 meta = with lib; {
··· 1 { lib 2 , stdenv 3 , fetchurl 4 + , meson 5 + , ninja 6 , pkg-config 7 , libpng 8 , glib /*just passthru*/ ··· 14 , tigervnc 15 , wlroots 16 , xwayland 17 + 18 + , gitUpdater 19 }: 20 21 stdenv.mkDerivation rec { 22 pname = "pixman"; 23 + version = "0.43.0"; 24 25 src = fetchurl { 26 urls = [ 27 "mirror://xorg/individual/lib/${pname}-${version}.tar.gz" 28 "https://cairographics.org/releases/${pname}-${version}.tar.gz" 29 ]; 30 + hash = "sha256-plwoIJhY+xa+5Q2AnID5Co5BXA5P2DIQeKGCJ4WlVgo="; 31 }; 32 33 separateDebugInfo = !stdenv.hostPlatform.isStatic; 34 35 + nativeBuildInputs = [ meson ninja pkg-config ]; 36 37 buildInputs = [ libpng ]; 38 39 + # Default "enabled" value attempts to enable CPU features on all 40 + # architectures and requires used to disable them: 41 + # https://gitlab.freedesktop.org/pixman/pixman/-/issues/88 42 + mesonAutoFeatures = "auto"; 43 + mesonFlags = [ 44 + "-Diwmmxt=disabled" 45 + ] 46 + # Disable until https://gitlab.freedesktop.org/pixman/pixman/-/issues/46 is resolved 47 + ++ lib.optional (stdenv.isAarch64 && !stdenv.cc.isGNU) "-Da64-neon=disabled"; 48 49 preConfigure = '' 50 # https://gitlab.freedesktop.org/pixman/pixman/-/issues/62 51 export OMP_NUM_THREADS=$((NIX_BUILD_CORES > 184 ? 184 : NIX_BUILD_CORES)) 52 ''; 53 54 + enableParallelBuilding = true; 55 + 56 doCheck = true; 57 58 postInstall = glib.flattenInclude; 59 60 + passthru = { 61 + tests = { 62 + inherit cairo qemu scribus tigervnc wlroots xwayland; 63 + }; 64 + updateScript = gitUpdater { 65 + url = "https://gitlab.freedesktop.org/pixman/pixman.git"; 66 + rev-prefix = "pixman-"; 67 + }; 68 }; 69 70 meta = with lib; {
+8 -7
pkgs/development/libraries/qrencode/default.nix
··· 1 { lib, stdenv, fetchurl, pkg-config, SDL2, libpng, libiconv, libobjc }: 2 3 - stdenv.mkDerivation rec { 4 pname = "qrencode"; 5 version = "4.1.1"; 6 ··· 16 buildInputs = [ libiconv libpng ] 17 ++ lib.optionals stdenv.isDarwin [ libobjc ]; 18 19 - configureFlags = [ 20 - "--with-tests" 21 - ]; 22 - 23 nativeCheckInputs = [ SDL2 ]; 24 25 - doCheck = true; 26 27 checkPhase = '' 28 runHook preCheck ··· 34 runHook postCheck 35 ''; 36 37 meta = with lib; { 38 homepage = "https://fukuchi.org/works/qrencode/"; 39 description = "C library for encoding data in a QR Code symbol"; ··· 47 platforms = platforms.all; 48 mainProgram = "qrencode"; 49 }; 50 - }
··· 1 { lib, stdenv, fetchurl, pkg-config, SDL2, libpng, libiconv, libobjc }: 2 3 + stdenv.mkDerivation (finalAttrs: rec { 4 pname = "qrencode"; 5 version = "4.1.1"; 6 ··· 16 buildInputs = [ libiconv libpng ] 17 ++ lib.optionals stdenv.isDarwin [ libobjc ]; 18 19 nativeCheckInputs = [ SDL2 ]; 20 21 + doCheck = false; 22 23 checkPhase = '' 24 runHook preCheck ··· 30 runHook postCheck 31 ''; 32 33 + passthru.tests = finalAttrs.finalPackage.overrideAttrs (_: { 34 + configureFlags = [ "--with-tests" ]; 35 + doCheck = true; 36 + }); 37 + 38 meta = with lib; { 39 homepage = "https://fukuchi.org/works/qrencode/"; 40 description = "C library for encoding data in a QR Code symbol"; ··· 48 platforms = platforms.all; 49 mainProgram = "qrencode"; 50 }; 51 + })
+2
pkgs/development/libraries/qt-5/5.15/default.nix
··· 51 ./qtdeclarative.patch 52 # prevent headaches from stale qmlcache data 53 ./qtdeclarative-default-disable-qmlcache.patch 54 ]; 55 qtlocation = lib.optionals stdenv.cc.isClang [ 56 # Fix build with Clang 16
··· 51 ./qtdeclarative.patch 52 # prevent headaches from stale qmlcache data 53 ./qtdeclarative-default-disable-qmlcache.patch 54 + # add version specific QML import path 55 + ./qtdeclarative-qml-paths.patch 56 ]; 57 qtlocation = lib.optionals stdenv.cc.isClang [ 58 # Fix build with Clang 16
+33
pkgs/development/libraries/qt-5/5.15/qtdeclarative-qml-paths.patch
···
··· 1 + diff --git a/src/qml/qml/qqmlimport.cpp b/src/qml/qml/qqmlimport.cpp 2 + index 289f11d006..9b0a48c6c7 100644 3 + --- a/src/qml/qml/qqmlimport.cpp 4 + +++ b/src/qml/qml/qqmlimport.cpp 5 + @@ -1897,17 +1897,22 @@ QQmlImportDatabase::QQmlImportDatabase(QQmlEngine *e) 6 + addImportPath(installImportsPath); 7 + 8 + // env import paths 9 + - if (Q_UNLIKELY(!qEnvironmentVariableIsEmpty("QML2_IMPORT_PATH"))) { 10 + - const QString envImportPath = qEnvironmentVariable("QML2_IMPORT_PATH"); 11 + + auto addEnvImportPath = [this](const char *var) { 12 + #if defined(Q_OS_WIN) 13 + QLatin1Char pathSep(';'); 14 + #else 15 + QLatin1Char pathSep(':'); 16 + #endif 17 + - QStringList paths = envImportPath.split(pathSep, Qt::SkipEmptyParts); 18 + - for (int ii = paths.count() - 1; ii >= 0; --ii) 19 + - addImportPath(paths.at(ii)); 20 + - } 21 + + if (Q_UNLIKELY(!qEnvironmentVariableIsEmpty(var))) { 22 + + const QString envImportPath = qEnvironmentVariable(var); 23 + + QStringList paths = envImportPath.split(pathSep, Qt::SkipEmptyParts); 24 + + for (int ii = paths.count() - 1; ii >= 0; --ii) 25 + + addImportPath(paths.at(ii)); 26 + + } 27 + + }; 28 + + 29 + + addEnvImportPath("QML2_IMPORT_PATH"); 30 + + addEnvImportPath("NIXPKGS_QT5_QML_IMPORT_PATH"); 31 + 32 + addImportPath(QStringLiteral("qrc:/qt-project.org/imports")); 33 + addImportPath(QCoreApplication::applicationDirPath());
+1 -1
pkgs/development/libraries/qt-5/hooks/wrap-qt-apps-hook.sh
··· 31 local qmlDir="$1/${qtQmlPrefix:?}" 32 if [ -d "$qmlDir" ] 33 then 34 - qtWrapperArgs+=(--prefix QML2_IMPORT_PATH : "$qmlDir") 35 fi 36 } 37 addEnvHooks "$targetOffset" qtHostPathHook
··· 31 local qmlDir="$1/${qtQmlPrefix:?}" 32 if [ -d "$qmlDir" ] 33 then 34 + qtWrapperArgs+=(--prefix NIXPKGS_QT5_QML_IMPORT_PATH : "$qmlDir") 35 fi 36 } 37 addEnvHooks "$targetOffset" qtHostPathHook
+1 -1
pkgs/development/libraries/qt-6/hooks/wrap-qt-apps-hook.sh
··· 31 32 local qmlDir="$1/${qtQmlPrefix:?}" 33 if [ -d "$qmlDir" ]; then 34 - qtWrapperArgs+=(--prefix QML2_IMPORT_PATH : "$qmlDir") 35 fi 36 } 37 addEnvHooks "$targetOffset" qtHostPathHook
··· 31 32 local qmlDir="$1/${qtQmlPrefix:?}" 33 if [ -d "$qmlDir" ]; then 34 + qtWrapperArgs+=(--prefix NIXPKGS_QT6_QML_IMPORT_PATH : "$qmlDir") 35 fi 36 } 37 addEnvHooks "$targetOffset" qtHostPathHook
+2
pkgs/development/libraries/qt-6/modules/qtdeclarative.nix
··· 12 patches = [ 13 # prevent headaches from stale qmlcache data 14 ../patches/qtdeclarative-default-disable-qmlcache.patch 15 ]; 16 }
··· 12 patches = [ 13 # prevent headaches from stale qmlcache data 14 ../patches/qtdeclarative-default-disable-qmlcache.patch 15 + # add version specific QML import path 16 + ../patches/qtdeclarative-qml-paths.patch 17 ]; 18 }
+12
pkgs/development/libraries/qt-6/patches/qtdeclarative-qml-paths.patch
···
··· 1 + diff --git a/src/qml/qml/qqmlimport.cpp b/src/qml/qml/qqmlimport.cpp 2 + index 2e482c220d..4873809bec 100644 3 + --- a/src/qml/qml/qqmlimport.cpp 4 + +++ b/src/qml/qml/qqmlimport.cpp 5 + @@ -1517,6 +1517,7 @@ QQmlImportDatabase::QQmlImportDatabase(QQmlEngine *e) 6 + // env import paths 7 + addEnvImportPath("QML_IMPORT_PATH"); 8 + addEnvImportPath("QML2_IMPORT_PATH"); 9 + + addEnvImportPath("NIXPKGS_QT6_QML_IMPORT_PATH"); 10 + 11 + addImportPath(QStringLiteral("qrc:/qt/qml")); 12 + addImportPath(QStringLiteral("qrc:/qt-project.org/imports"));
+2 -2
pkgs/development/libraries/rapidfuzz-cpp/default.nix
··· 7 8 stdenv.mkDerivation (finalAttrs: { 9 pname = "rapidfuzz-cpp"; 10 - version = "2.2.3"; 11 12 src = fetchFromGitHub { 13 owner = "maxbachmann"; 14 repo = "rapidfuzz-cpp"; 15 rev = "v${finalAttrs.version}"; 16 - hash = "sha256-yEDihPvTGGL5gsd4QMYNRyfLucKLItIQM4pm6W0i2W8="; 17 }; 18 19 nativeBuildInputs = [
··· 7 8 stdenv.mkDerivation (finalAttrs: { 9 pname = "rapidfuzz-cpp"; 10 + version = "3.0.0"; 11 12 src = fetchFromGitHub { 13 owner = "maxbachmann"; 14 repo = "rapidfuzz-cpp"; 15 rev = "v${finalAttrs.version}"; 16 + hash = "sha256-N9yGOxlk1+wgRXWLbDIXWQz+/pwbnYVs3ub4/16Nzws="; 17 }; 18 19 nativeBuildInputs = [
+3
pkgs/development/libraries/readline/readline-8.2-patches.nix
··· 8 (patch "005" "16ac25jz1a1mgkpfp1sydqf6qpsfh0s0dcmrnjpqbhg5va3s6av2") 9 (patch "006" "18gmh6y3klh0vv28cyqz4is3rlb32pl7f1kf5r482kfjq3w5zd67") 10 (patch "007" "1xmnpahs983n4w0gn3j0wr8nh1dpva33yj7fvfmhm46ph2wsa4ar") 11 ]
··· 8 (patch "005" "16ac25jz1a1mgkpfp1sydqf6qpsfh0s0dcmrnjpqbhg5va3s6av2") 9 (patch "006" "18gmh6y3klh0vv28cyqz4is3rlb32pl7f1kf5r482kfjq3w5zd67") 10 (patch "007" "1xmnpahs983n4w0gn3j0wr8nh1dpva33yj7fvfmhm46ph2wsa4ar") 11 + (patch "008" "0smjjzhwxi2ibpdisnk53lh1pzgka6rhlqyh3662xy69v34ysxx1") 12 + (patch "009" "05m1fwbs7mbs3pz3pg87gbbayandrrcgaqawzliqb6g1jbk8b61x") 13 + (patch "010" "0k3vyrjs2g6y2cfs03l2gp37fhxgqpiwvxb1c7z4q88cbb32x3km") 14 ]
+2 -2
pkgs/development/libraries/science/math/liblapack/default.nix
··· 11 12 stdenv.mkDerivation (finalAttrs: { 13 pname = "liblapack"; 14 - version = "3.11"; 15 16 src = fetchFromGitHub { 17 owner = "Reference-LAPACK"; 18 repo = "lapack"; 19 rev = "v${finalAttrs.version}"; 20 - sha256 = "sha256-AYD78u70y8cY19hmM/aDjQEzxO8u9lPWhCFxRe5cqXI="; 21 }; 22 23 nativeBuildInputs = [ gfortran cmake ];
··· 11 12 stdenv.mkDerivation (finalAttrs: { 13 pname = "liblapack"; 14 + version = "3.12.0"; 15 16 src = fetchFromGitHub { 17 owner = "Reference-LAPACK"; 18 repo = "lapack"; 19 rev = "v${finalAttrs.version}"; 20 + sha256 = "sha256-xn9HL4YF8JPka1gwet5bGGo2k505H3RfWpxkUIYNecQ="; 21 }; 22 23 nativeBuildInputs = [ gfortran cmake ];
+2 -2
pkgs/development/libraries/spirv-headers/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "spirv-headers"; 5 - version = "1.3.268.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "SPIRV-Headers"; 10 rev = "vulkan-sdk-${version}"; 11 - hash = "sha256-uOnSTih14bUPtrJgp7vVb3/UfdKsF6jFQqjlFeJ81AI="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "spirv-headers"; 5 + version = "1.3.275.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "SPIRV-Headers"; 10 rev = "vulkan-sdk-${version}"; 11 + hash = "sha256-/I9dJlBE0kvFvqooKuqMETtOE72Jmva3zIGnq0o4+aE="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/srt/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "srt"; 11 - version = "1.5.2"; 12 13 src = fetchFromGitHub { 14 owner = "Haivision"; 15 repo = "srt"; 16 rev = "v${version}"; 17 - sha256 = "sha256-HW5l26k9w4F6IJrtiahU/8/CPY6M/cKn8AgESsntC6A="; 18 }; 19 20 nativeBuildInputs = [ cmake ];
··· 8 9 stdenv.mkDerivation rec { 10 pname = "srt"; 11 + version = "1.5.3"; 12 13 src = fetchFromGitHub { 14 owner = "Haivision"; 15 repo = "srt"; 16 rev = "v${version}"; 17 + sha256 = "sha256-HmfbBPyR+z5d9/XBvNhosk8pSSPToNtM+V0hEyb2G2w="; 18 }; 19 20 nativeBuildInputs = [ cmake ];
+3
pkgs/development/libraries/tiledb/default.nix
··· 58 cmake/Modules/FindOpenSSL_EP.cmake 59 ''; 60 61 # (bundled) blosc headers have a warning on some archs that it will be using 62 # unaccelerated routines. 63 cmakeFlags = [
··· 58 cmake/Modules/FindOpenSSL_EP.cmake 59 ''; 60 61 + # upstream will hopefully fix this in some newer release 62 + env.CXXFLAGS = "-include random"; 63 + 64 # (bundled) blosc headers have a warning on some archs that it will be using 65 # unaccelerated routines. 66 cmakeFlags = [
+2 -2
pkgs/development/libraries/vulkan-headers/default.nix
··· 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 stdenv.mkDerivation rec { 3 pname = "vulkan-headers"; 4 - version = "1.3.268.0"; 5 6 nativeBuildInputs = [ cmake ]; 7 ··· 9 owner = "KhronosGroup"; 10 repo = "Vulkan-Headers"; 11 rev = "vulkan-sdk-${version}"; 12 - hash = "sha256-CDjWTXXnUgj9QaLDNuSVy+wf8If5LehwOZ0t0Fuh2Ro="; 13 }; 14 15 passthru.updateScript = ./update.sh;
··· 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 stdenv.mkDerivation rec { 3 pname = "vulkan-headers"; 4 + version = "1.3.275.0"; 5 6 nativeBuildInputs = [ cmake ]; 7 ··· 9 owner = "KhronosGroup"; 10 repo = "Vulkan-Headers"; 11 rev = "vulkan-sdk-${version}"; 12 + hash = "sha256-kBOkj7mr4stPXUCBhNJpNL3A+9BebEwrIBEIroxdH8Y="; 13 }; 14 15 passthru.updateScript = ./update.sh;
+1
pkgs/development/libraries/vulkan-headers/update.sh
··· 11 "vulkan-tools-lunarg" 12 "vulkan-extension-layer" 13 "vulkan-utility-libraries" 14 "spirv-headers" 15 "spirv-cross" 16 "spirv-tools"
··· 11 "vulkan-tools-lunarg" 12 "vulkan-extension-layer" 13 "vulkan-utility-libraries" 14 + "vulkan-volk" 15 "spirv-headers" 16 "spirv-cross" 17 "spirv-tools"
+2 -2
pkgs/development/libraries/vulkan-loader/default.nix
··· 3 4 stdenv.mkDerivation rec { 5 pname = "vulkan-loader"; 6 - version = "1.3.268.0"; 7 8 src = fetchFromGitHub { 9 owner = "KhronosGroup"; 10 repo = "Vulkan-Loader"; 11 rev = "vulkan-sdk-${version}"; 12 - hash = "sha256-TDn8eVz1fhGfvUiGcxqOk2BN9tuIF5+ssIXtOo3weS0="; 13 }; 14 15 patches = [ ./fix-pkgconfig.patch ];
··· 3 4 stdenv.mkDerivation rec { 5 pname = "vulkan-loader"; 6 + version = "1.3.275.0"; 7 8 src = fetchFromGitHub { 9 owner = "KhronosGroup"; 10 repo = "Vulkan-Loader"; 11 rev = "vulkan-sdk-${version}"; 12 + hash = "sha256-53PUXAWiK38ciV6oMvD7ZHdXi4RU4r0RmDWUUHU3mE0="; 13 }; 14 15 patches = [ ./fix-pkgconfig.patch ];
+3 -3
pkgs/development/libraries/vulkan-utility-libraries/default.nix
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "vulkan-utility-libraries"; 5 - version = "1.3.268"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "Vulkan-Utility-Libraries"; 10 - rev = "v${finalAttrs.version}"; 11 - hash = "sha256-l6PiHCre/JQg8PSs1k/0Zzfwwv55AqVdZtBbjeKLS6E="; 12 }; 13 14 nativeBuildInputs = [ cmake python3 ];
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "vulkan-utility-libraries"; 5 + version = "1.3.275.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "Vulkan-Utility-Libraries"; 10 + rev = "vulkan-sdk-${finalAttrs.version}"; 11 + hash = "sha256-gvia+Xb9BpOjPARKo3Sgp85Bfh1roFZ2PzCtXVFYeIU="; 12 }; 13 14 nativeBuildInputs = [ cmake python3 ];
+6 -1
pkgs/development/libraries/xapian/default.nix
··· 28 enableParallelBuilding = true; 29 30 doCheck = true; 31 - env.AUTOMATED_TESTING = true; # https://trac.xapian.org/changeset/8be35f5e1/git 32 33 # the configure script thinks that Darwin has ___exp10 34 # but it’s not available on my systems (or hydra apparently)
··· 28 enableParallelBuilding = true; 29 30 doCheck = true; 31 + 32 + env = { 33 + AUTOMATED_TESTING = true; # https://trac.xapian.org/changeset/8be35f5e1/git 34 + } // lib.optionalAttrs stdenv.is32bit { 35 + NIX_CFLAGS_COMPILE = "-fpermissive"; 36 + }; 37 38 # the configure script thinks that Darwin has ___exp10 39 # but it’s not available on my systems (or hydra apparently)
+1 -1
pkgs/development/libraries/xsimd/default.nix
··· 54 description = "C++ wrappers for SIMD intrinsics"; 55 homepage = "https://github.com/xtensor-stack/xsimd"; 56 license = licenses.bsd3; 57 - maintainers = with maintainers; [ tobim ]; 58 platforms = platforms.all; 59 }; 60 })
··· 54 description = "C++ wrappers for SIMD intrinsics"; 55 homepage = "https://github.com/xtensor-stack/xsimd"; 56 license = licenses.bsd3; 57 + maintainers = with maintainers; [ tobim doronbehar ]; 58 platforms = platforms.all; 59 }; 60 })
+2 -2
pkgs/development/libraries/zxing-cpp/default.nix
··· 9 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "zxing-cpp"; 12 - version = "2.1.0"; 13 14 src = fetchFromGitHub { 15 owner = "zxing-cpp"; 16 repo = "zxing-cpp"; 17 rev = "v${finalAttrs.version}"; 18 - hash = "sha256-B/jGsHImRfj0iEio2b6R6laWBI1LL3OI407O7sren8s="; 19 }; 20 21 nativeBuildInputs = [
··· 9 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "zxing-cpp"; 12 + version = "2.2.1"; 13 14 src = fetchFromGitHub { 15 owner = "zxing-cpp"; 16 repo = "zxing-cpp"; 17 rev = "v${finalAttrs.version}"; 18 + hash = "sha256-teFspdATn9M7Z1vSr/7PdJx/xAv+TVai8rIekxqpBZk="; 19 }; 20 21 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/acme/default.nix
··· 3 , cryptography 4 , pyasn1 5 , pyopenssl 6 - , pyRFC3339 7 , josepy 8 , pytz 9 , requests ··· 20 format = "setuptools"; 21 22 propagatedBuildInputs = [ 23 - cryptography pyasn1 pyopenssl pyRFC3339 pytz requests requests-toolbelt six 24 werkzeug ndg-httpsclient josepy 25 ]; 26
··· 3 , cryptography 4 , pyasn1 5 , pyopenssl 6 + , pyrfc3339 7 , josepy 8 , pytz 9 , requests ··· 20 format = "setuptools"; 21 22 propagatedBuildInputs = [ 23 + cryptography pyasn1 pyopenssl pyrfc3339 pytz requests requests-toolbelt six 24 werkzeug ndg-httpsclient josepy 25 ]; 26
+2 -2
pkgs/development/python-modules/awslambdaric/default.nix
··· 5 , fetchpatch 6 , isPy27 7 , pytestCheckHook 8 - , autoconf 9 , automake 10 , cmake 11 , gcc ··· 44 45 propagatedBuildInputs = [ simplejson ]; 46 47 - nativeBuildInputs = [ autoconf automake cmake libtool perl setuptools ]; 48 49 buildInputs = [ gcc ]; 50
··· 5 , fetchpatch 6 , isPy27 7 , pytestCheckHook 8 + , autoconf271 9 , automake 10 , cmake 11 , gcc ··· 44 45 propagatedBuildInputs = [ simplejson ]; 46 47 + nativeBuildInputs = [ autoconf271 automake cmake libtool perl setuptools ]; 48 49 buildInputs = [ gcc ]; 50
+2 -2
pkgs/development/python-modules/certbot/default.nix
··· 10 , distro 11 , josepy 12 , parsedatetime 13 - , pyRFC3339 14 , pyopenssl 15 , pytz 16 , requests ··· 47 distro 48 josepy 49 parsedatetime 50 - pyRFC3339 51 pyopenssl 52 pytz 53 requests
··· 10 , distro 11 , josepy 12 , parsedatetime 13 + , pyrfc3339 14 , pyopenssl 15 , pytz 16 , requests ··· 47 distro 48 josepy 49 parsedatetime 50 + pyrfc3339 51 pyopenssl 52 pytz 53 requests
+1 -1
pkgs/development/python-modules/fonttools/default.nix
··· 60 pytestCheckHook 61 ] ++ lib.concatLists (lib.attrVals ([ 62 "woff" 63 - "interpolatable" 64 "ufo" 65 ] ++ lib.optionals (!skia-pathops.meta.broken) [ 66 "pathops" # broken
··· 60 pytestCheckHook 61 ] ++ lib.concatLists (lib.attrVals ([ 62 "woff" 63 + # "interpolatable" is not included because it only contains 2 tests at the time of writing but adds 270 extra dependencies 64 "ufo" 65 ] ++ lib.optionals (!skia-pathops.meta.broken) [ 66 "pathops" # broken
+2 -2
pkgs/development/python-modules/img2pdf/default.nix
··· 12 , exiftool 13 , ghostscript 14 , imagemagick 15 - , mupdf 16 , netpbm 17 , numpy 18 , poppler_utils ··· 74 exiftool 75 ghostscript 76 imagemagick 77 - mupdf 78 netpbm 79 numpy 80 poppler_utils
··· 12 , exiftool 13 , ghostscript 14 , imagemagick 15 + , mupdf-headless 16 , netpbm 17 , numpy 18 , poppler_utils ··· 74 exiftool 75 ghostscript 76 imagemagick 77 + mupdf-headless 78 netpbm 79 numpy 80 poppler_utils
+43 -39
pkgs/development/python-modules/jinja2/default.nix
··· 9 , pytestCheckHook 10 , sphinxHook 11 , pallets-sphinx-themes 12 , sphinxcontrib-log-cabinet 13 , sphinx-issues 14 }: 15 16 buildPythonPackage rec { 17 - pname = "Jinja2"; 18 - version = "3.1.2"; 19 20 disabled = pythonOlder "3.7"; 21 22 src = fetchPypi { 23 - inherit pname version; 24 - hash = "sha256-MTUacCpAip51laj8YVD8P0O7a/fjGXcMvA2535Q36FI="; 25 }; 26 27 propagatedBuildInputs = [ 28 - babel 29 markupsafe 30 ]; 31 32 # Multiple tests run out of stack space on 32bit systems with python2. 33 # See https://github.com/pallets/jinja/issues/1158 34 doCheck = !stdenv.is32bit; 35 36 nativeCheckInputs = [ 37 pytestCheckHook 38 - ]; 39 - 40 - pytestFlagsArray = [ 41 - # Avoid failure due to deprecation warning 42 - # Fixed in https://github.com/python/cpython/pull/28153 43 - # Remove after cpython 3.9.8 44 - "-p no:warnings" 45 - ]; 46 47 - passthru = { 48 - doc = stdenv.mkDerivation { 49 - # Forge look and feel of multi-output derivation as best as we can. 50 - # 51 - # Using 'outputs = [ "doc" ];' breaks a lot of assumptions. 52 - name = "${pname}-${version}-doc"; 53 - inherit src pname version; 54 55 - patches = [ 56 - # Fix import of "sphinxcontrib-log-cabinet" 57 - ./patches/import-order.patch 58 - ]; 59 60 - postInstallSphinx = '' 61 - mv $out/share/doc/* $out/share/doc/python$pythonVersion-$pname-$version 62 - ''; 63 64 - nativeBuildInputs = [ 65 - sphinxHook 66 - sphinxcontrib-log-cabinet 67 - pallets-sphinx-themes 68 - sphinx-issues 69 - ]; 70 71 - inherit (python) pythonVersion; 72 - inherit meta; 73 - }; 74 }; 75 76 meta = with lib; { 77 - homepage = "https://jinja.palletsprojects.com/"; 78 - description = "Stand-alone template engine"; 79 license = licenses.bsd3; 80 longDescription = '' 81 Jinja is a fast, expressive, extensible templating engine. Special 82 placeholders in the template allow writing code similar to Python 83 syntax. Then the template is passed data to render the final document. 84 - an optional sandboxed environment. 85 ''; 86 maintainers = with maintainers; [ pierron ]; 87 };
··· 9 , pytestCheckHook 10 , sphinxHook 11 , pallets-sphinx-themes 12 + , setuptools 13 , sphinxcontrib-log-cabinet 14 , sphinx-issues 15 }: 16 17 buildPythonPackage rec { 18 + pname = "jinja2"; 19 + version = "3.1.3"; 20 + pyproject = true; 21 22 disabled = pythonOlder "3.7"; 23 24 src = fetchPypi { 25 + pname = "Jinja2"; 26 + inherit version; 27 + hash = "sha256-rIvWVE1Lssl5K/OhWegLuo/afwfoG8Ou1WVDLVklupA="; 28 }; 29 30 + nativeBuildInputs = [ 31 + setuptools 32 + ]; 33 + 34 propagatedBuildInputs = [ 35 markupsafe 36 ]; 37 38 + passthru.optional-dependencies = { 39 + i18n = [ 40 + babel 41 + ]; 42 + }; 43 + 44 # Multiple tests run out of stack space on 32bit systems with python2. 45 # See https://github.com/pallets/jinja/issues/1158 46 doCheck = !stdenv.is32bit; 47 48 nativeCheckInputs = [ 49 pytestCheckHook 50 + ] ++ passthru.optional-dependencies.i18n; 51 52 + passthru.doc = stdenv.mkDerivation { 53 + # Forge look and feel of multi-output derivation as best as we can. 54 + # 55 + # Using 'outputs = [ "doc" ];' breaks a lot of assumptions. 56 + name = "${pname}-${version}-doc"; 57 + inherit src pname version; 58 59 + patches = [ 60 + # Fix import of "sphinxcontrib-log-cabinet" 61 + ./patches/import-order.patch 62 + ]; 63 64 + postInstallSphinx = '' 65 + mv $out/share/doc/* $out/share/doc/python$pythonVersion-$pname-$version 66 + ''; 67 68 + nativeBuildInputs = [ 69 + sphinxHook 70 + sphinxcontrib-log-cabinet 71 + pallets-sphinx-themes 72 + sphinx-issues 73 + ]; 74 75 + inherit (python) pythonVersion; 76 + inherit meta; 77 }; 78 79 meta = with lib; { 80 + changelog = "https://github.com/pallets/jinja/blob/${version}/CHANGES.rst"; 81 + description = "Very fast and expressive template engine"; 82 + downloadPage = "https://github.com/pallets/jinja"; 83 + homepage = "https://jinja.palletsprojects.com"; 84 license = licenses.bsd3; 85 longDescription = '' 86 Jinja is a fast, expressive, extensible templating engine. Special 87 placeholders in the template allow writing code similar to Python 88 syntax. Then the template is passed data to render the final document. 89 ''; 90 maintainers = with maintainers; [ pierron ]; 91 };
+2 -1
pkgs/development/python-modules/levenshtein/default.nix
··· 22 owner = "maxbachmann"; 23 repo = "Levenshtein"; 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-O39Xe26WKAGcv6DEvwuOL8NZJBem5SYZDX1TPAY7/uA="; 26 }; 27 28 nativeBuildInputs = [
··· 22 owner = "maxbachmann"; 23 repo = "Levenshtein"; 24 rev = "refs/tags/v${version}"; 25 + hash = "sha256-xQimslz/G6nf2uYerLSaRAK5gvmfDmWTzEx/fh+nqg0="; 26 + fetchSubmodules = true; ## for vendored `rapidfuzz-cpp` 27 }; 28 29 nativeBuildInputs = [
+5 -14
pkgs/development/python-modules/matplotlib/default.nix
··· 6 , isPyPy 7 , pythonOlder 8 9 - # https://github.com/matplotlib/matplotlib/blob/main/doc/devel/dependencies.rst 10 # build-system 11 , certifi 12 - , oldest-supported-numpy 13 , pkg-config 14 , pybind11 15 , setuptools ··· 109 substituteInPlace src/_c_internal_utils.c \ 110 --replace libX11.so.6 ${libX11}/lib/libX11.so.6 \ 111 --replace libwayland-client.so.0 ${wayland}/lib/libwayland-client.so.0 112 - '' + 113 - # bring our own system libraries 114 - # https://github.com/matplotlib/matplotlib/blob/main/doc/devel/dependencies.rst#c-libraries 115 - '' 116 - echo "[libs] 117 - system_freetype=true 118 - system_qhull=true" > mplsetup.cfg 119 ''; 120 121 nativeBuildInputs = [ 122 certifi 123 numpy 124 - oldest-supported-numpy # TODO remove after updating to 3.8.0 125 pkg-config 126 pybind11 127 setuptools ··· 184 libs = { 185 system_freetype = true; 186 system_qhull = true; 187 - } // lib.optionalAttrs stdenv.isDarwin { 188 # LTO not working in darwin stdenv, see #19312 189 - enable_lto = false; 190 }; 191 }; 192 193 env.MPLSETUPCFG = writeText "mplsetup.cfg" (lib.generators.toINI {} passthru.config); 194 195 - # Matplotlib needs to be built against a specific version of freetype in 196 - # order for all of the tests to pass. 197 doCheck = false; 198 199 meta = with lib; {
··· 6 , isPyPy 7 , pythonOlder 8 9 # build-system 10 , certifi 11 , pkg-config 12 , pybind11 13 , setuptools ··· 107 substituteInPlace src/_c_internal_utils.c \ 108 --replace libX11.so.6 ${libX11}/lib/libX11.so.6 \ 109 --replace libwayland-client.so.0 ${wayland}/lib/libwayland-client.so.0 110 ''; 111 112 nativeBuildInputs = [ 113 certifi 114 numpy 115 pkg-config 116 pybind11 117 setuptools ··· 174 libs = { 175 system_freetype = true; 176 system_qhull = true; 177 # LTO not working in darwin stdenv, see #19312 178 + enable_lto = !stdenv.isDarwin; 179 }; 180 }; 181 182 env.MPLSETUPCFG = writeText "mplsetup.cfg" (lib.generators.toINI {} passthru.config); 183 184 + # Encountering a ModuleNotFoundError, as describved and investigated at: 185 + # https://github.com/NixOS/nixpkgs/issues/255262 . It could be that some of 186 + # which may fail due to a freetype version that doesn't match the freetype 187 + # version used by upstream. 188 doCheck = false; 189 190 meta = with lib; {
+1 -1
pkgs/development/python-modules/meson-python/default.nix
··· 48 description = "Meson Python build backend (PEP 517)"; 49 homepage = "https://github.com/mesonbuild/meson-python"; 50 license = [ lib.licenses.mit ]; 51 - maintainers = [ lib.maintainers.fridh ]; 52 }; 53 }
··· 48 description = "Meson Python build backend (PEP 517)"; 49 homepage = "https://github.com/mesonbuild/meson-python"; 50 license = [ lib.licenses.mit ]; 51 + maintainers = with lib.maintainers; [ fridh doronbehar ]; 52 }; 53 }
+3 -5
pkgs/development/python-modules/ocrmypdf/default.nix
··· 25 , tqdm 26 , typing-extensions 27 , unpaper 28 - , wheel 29 , installShellFiles 30 }: 31 32 buildPythonPackage rec { 33 pname = "ocrmypdf"; 34 - version = "15.4.4"; 35 36 - disabled = pythonOlder "3.9"; 37 38 pyproject = true; 39 ··· 47 postFetch = '' 48 rm "$out/.git_archival.txt" 49 ''; 50 - hash = "sha256-Ff0OrSJFglVPpSNB0KvDMnatj+P57zWdcVAFaM+Sg0s="; 51 }; 52 53 patches = [ ··· 64 nativeBuildInputs = [ 65 setuptools 66 setuptools-scm 67 - wheel 68 installShellFiles 69 ]; 70
··· 25 , tqdm 26 , typing-extensions 27 , unpaper 28 , installShellFiles 29 }: 30 31 buildPythonPackage rec { 32 pname = "ocrmypdf"; 33 + version = "16.0.4"; 34 35 + disabled = pythonOlder "3.10"; 36 37 pyproject = true; 38 ··· 46 postFetch = '' 47 rm "$out/.git_archival.txt" 48 ''; 49 + hash = "sha256-1Bg1R8c5VtJsd8NHd+WWdJRA39Jjgv9JUMcijZm942o="; 50 }; 51 52 patches = [ ··· 63 nativeBuildInputs = [ 64 setuptools 65 setuptools-scm 66 installShellFiles 67 ]; 68
+5 -7
pkgs/development/python-modules/pikepdf/default.nix
··· 7 , jbig2dec 8 , deprecated 9 , lxml 10 - , mupdf 11 , numpy 12 , packaging 13 , pillow ··· 20 , qpdf 21 , setuptools 22 , substituteAll 23 - , wheel 24 }: 25 26 buildPythonPackage rec { 27 pname = "pikepdf"; 28 - version = "8.9.0"; 29 pyproject = true; 30 31 disabled = pythonOlder "3.8"; ··· 40 postFetch = '' 41 rm "$out/.git_archival.txt" 42 ''; 43 - hash = "sha256-ia+D0OeB/MQWRniYkBEWZsDCwEApYGgu0++I/HupK6w="; 44 }; 45 46 patches = [ 47 (substituteAll { 48 src = ./paths.patch; 49 - jbig2dec = "${lib.getBin jbig2dec}/bin/jbig2dec"; 50 - mudraw = "${lib.getBin mupdf}/bin/mudraw"; 51 }) 52 ]; 53 ··· 63 nativeBuildInputs = [ 64 pybind11 65 setuptools 66 - wheel 67 ]; 68 69 nativeCheckInputs = [
··· 7 , jbig2dec 8 , deprecated 9 , lxml 10 + , mupdf-headless 11 , numpy 12 , packaging 13 , pillow ··· 20 , qpdf 21 , setuptools 22 , substituteAll 23 }: 24 25 buildPythonPackage rec { 26 pname = "pikepdf"; 27 + version = "8.11.2"; 28 pyproject = true; 29 30 disabled = pythonOlder "3.8"; ··· 39 postFetch = '' 40 rm "$out/.git_archival.txt" 41 ''; 42 + hash = "sha256-mxUXXD7/ERC6mfmLLo+zdsVblIplrlcnzTNQ7YUk3Q4="; 43 }; 44 45 patches = [ 46 (substituteAll { 47 src = ./paths.patch; 48 + jbig2dec = lib.getExe' jbig2dec "jbig2dec"; 49 + mutool = lib.getExe' mupdf-headless "mutool"; 50 }) 51 ]; 52 ··· 62 nativeBuildInputs = [ 63 pybind11 64 setuptools 65 ]; 66 67 nativeCheckInputs = [
+5 -5
pkgs/development/python-modules/pikepdf/paths.patch
··· 1 diff --git a/src/pikepdf/_methods.py b/src/pikepdf/_methods.py 2 - index d27c660..6796984 100644 3 --- a/src/pikepdf/_methods.py 4 +++ b/src/pikepdf/_methods.py 5 - @@ -72,7 +72,7 @@ def _mudraw(buffer, fmt) -> bytes: 6 tmp_in.flush() 7 8 proc = run( 9 - - ['mudraw', '-F', fmt, '-o', '-', tmp_in.name], 10 - + ['@mudraw@', '-F', fmt, '-o', '-', tmp_in.name], 11 capture_output=True, 12 check=True, 13 ) 14 diff --git a/src/pikepdf/jbig2.py b/src/pikepdf/jbig2.py 15 - index f89b4f9..f187ebd 100644 16 --- a/src/pikepdf/jbig2.py 17 +++ b/src/pikepdf/jbig2.py 18 @@ -63,7 +63,7 @@ class JBIG2Decoder(JBIG2DecoderInterface):
··· 1 diff --git a/src/pikepdf/_methods.py b/src/pikepdf/_methods.py 2 + index da40043f..4f566f01 100644 3 --- a/src/pikepdf/_methods.py 4 +++ b/src/pikepdf/_methods.py 5 + @@ -74,7 +74,7 @@ def _mudraw(buffer, fmt) -> bytes: 6 tmp_in.flush() 7 8 proc = run( 9 + - ['mutool', 'draw', '-F', fmt, '-o', '-', tmp_in.name], 10 + + ['@mutool@', 'draw', '-F', fmt, '-o', '-', tmp_in.name], 11 capture_output=True, 12 check=True, 13 ) 14 diff --git a/src/pikepdf/jbig2.py b/src/pikepdf/jbig2.py 15 + index f89b4f90..f187ebdf 100644 16 --- a/src/pikepdf/jbig2.py 17 +++ b/src/pikepdf/jbig2.py 18 @@ -63,7 +63,7 @@ class JBIG2Decoder(JBIG2DecoderInterface):
+2 -2
pkgs/development/python-modules/pycryptodome/default.nix
··· 10 in 11 buildPythonPackage rec { 12 pname = "pycryptodome"; 13 - version = "3.19.0"; 14 format = "setuptools"; 15 16 src = fetchFromGitHub { 17 owner = "Legrandin"; 18 repo = "pycryptodome"; 19 rev = "refs/tags/v${version}"; 20 - hash = "sha256-WD+OEjePVtqlmn7h1CIfraLuEQlodkvjmYQ8q7nNoGU="; 21 }; 22 23 postPatch = ''
··· 10 in 11 buildPythonPackage rec { 12 pname = "pycryptodome"; 13 + version = "3.19.1"; 14 format = "setuptools"; 15 16 src = fetchFromGitHub { 17 owner = "Legrandin"; 18 repo = "pycryptodome"; 19 rev = "refs/tags/v${version}"; 20 + hash = "sha256-+m0gF47l3c9gZ9dLdOUNW0I2W1O+OGrmsdysu7QdjvI="; 21 }; 22 23 postPatch = ''
+1
pkgs/development/python-modules/pycurl/default.nix
··· 70 # https://github.com/pycurl/pycurl/issues/819 71 "test_multi_socket_select" 72 # https://github.com/pycurl/pycurl/issues/729 73 "test_multi_socket_action" 74 # https://github.com/pycurl/pycurl/issues/822 75 "test_request_with_verifypeer"
··· 70 # https://github.com/pycurl/pycurl/issues/819 71 "test_multi_socket_select" 72 # https://github.com/pycurl/pycurl/issues/729 73 + "test_easy_pause_unpause" 74 "test_multi_socket_action" 75 # https://github.com/pycurl/pycurl/issues/822 76 "test_request_with_verifypeer"
+3 -4
pkgs/development/python-modules/pymemcache/default.nix
··· 5 , mock 6 , six 7 , pytestCheckHook 8 , pythonOlder 9 , zstd 10 , stdenv ··· 32 faker 33 mock 34 pytestCheckHook 35 zstd 36 ]; 37 ··· 39 sed -i "/--cov/d" setup.cfg 40 ''; 41 42 - disabledTests = [ 43 - # python-memcached is not available (last release in 2017) 44 - "TestClientSocketConnect" 45 - ] ++ lib.optionals stdenv.is32bit [ 46 # test_compressed_complex is broken on 32-bit platforms 47 # this can be removed on the next version bump 48 # see also https://github.com/pinterest/pymemcache/pull/480
··· 5 , mock 6 , six 7 , pytestCheckHook 8 + , python-memcached 9 , pythonOlder 10 , zstd 11 , stdenv ··· 33 faker 34 mock 35 pytestCheckHook 36 + python-memcached 37 zstd 38 ]; 39 ··· 41 sed -i "/--cov/d" setup.cfg 42 ''; 43 44 + disabledTests = lib.optionals stdenv.is32bit [ 45 # test_compressed_complex is broken on 32-bit platforms 46 # this can be removed on the next version bump 47 # see also https://github.com/pinterest/pymemcache/pull/480
+3 -2
pkgs/development/python-modules/pyrfc3339/default.nix
··· 14 }: 15 16 buildPythonPackage rec { 17 - pname = "pyRFC3339"; 18 version = "1.1"; 19 pyproject = true; 20 21 src = fetchPypi { 22 - inherit pname version; 23 sha256 = "06jv7ar7lpvvk0dixzwdr3wgm0g1lipxs429s2z7knwwa7hwpf41"; 24 }; 25
··· 14 }: 15 16 buildPythonPackage rec { 17 + pname = "pyrfc3339"; 18 version = "1.1"; 19 pyproject = true; 20 21 src = fetchPypi { 22 + pname = "pyRFC3339"; 23 + inherit version; 24 sha256 = "06jv7ar7lpvvk0dixzwdr3wgm0g1lipxs429s2z7knwwa7hwpf41"; 25 }; 26
+6 -6
pkgs/development/python-modules/python-memcached/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 - , six 5 , mock 6 , pytestCheckHook 7 }: 8 9 buildPythonPackage rec { 10 pname = "python-memcached"; 11 - version = "1.59"; 12 - format = "setuptools"; 13 14 src = fetchFromGitHub { 15 owner = "linsomniac"; 16 repo = "python-memcached"; 17 rev = version; 18 - hash = "sha256-tHqkwNloPTXOrEGtuDLu1cTw4SKJ4auv8UUbqdNp698="; 19 }; 20 21 - propagatedBuildInputs = [ 22 - six 23 ]; 24 25 nativeCheckInputs = [
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 + , setuptools 5 , mock 6 , pytestCheckHook 7 }: 8 9 buildPythonPackage rec { 10 pname = "python-memcached"; 11 + version = "1.61"; 12 + pyproject = true; 13 14 src = fetchFromGitHub { 15 owner = "linsomniac"; 16 repo = "python-memcached"; 17 rev = version; 18 + hash = "sha256-7bUCVAmOJ6znVmTZg9AJokOuym07NHL12gZgQ2uhfNo="; 19 }; 20 21 + nativeBuildInputs = [ 22 + setuptools 23 ]; 24 25 nativeCheckInputs = [
+5 -9
pkgs/development/python-modules/pythran/default.nix
··· 25 26 in buildPythonPackage rec { 27 pname = "pythran"; 28 - version = "0.14.0"; 29 pyproject = true; 30 31 src = fetchFromGitHub { 32 owner = "serge-sans-paille"; 33 repo = "pythran"; 34 rev = version; 35 - hash = "sha256-in0ty0aBAIx7Is13hjiHZGS8eKbhxb6TL3bENzfx5vQ="; 36 }; 37 38 patches = [ ··· 41 src = ./0001-hardcode-path-to-libgomp.patch; 42 gomp = "${if stdenv.cc.isClang then openmp else stdenv.cc.cc.lib}/lib/libgomp${stdenv.hostPlatform.extensions.sharedLibrary}"; 43 }) 44 - (fetchpatch { 45 - # Python 3.12 support 46 - url = "https://github.com/serge-sans-paille/pythran/commit/258ab9aaf26172f669eab1bf2a346b5f65db3ac0.patch"; 47 - hash = "sha256-T+FLptDYIgzHBSXShULqHr/G8ttBFamq1M5JlB2HxDM="; 48 - }) 49 ]; 50 51 # xsimd: unvendor this header-only C++ lib 52 postPatch = '' 53 - rm -r third_party/xsimd 54 - ln -s '${lib.getDev xsimd}'/include/xsimd third_party/ 55 ''; 56 57 nativeBuildInputs = [ ··· 84 description = "Ahead of Time compiler for numeric kernels"; 85 homepage = "https://github.com/serge-sans-paille/pythran"; 86 license = lib.licenses.bsd3; 87 }; 88 }
··· 25 26 in buildPythonPackage rec { 27 pname = "pythran"; 28 + version = "0.15.0"; 29 pyproject = true; 30 31 src = fetchFromGitHub { 32 owner = "serge-sans-paille"; 33 repo = "pythran"; 34 rev = version; 35 + hash = "sha256-TpD8YZnnv48PKYrUqR0/qvJG1XRbcMBcrkcERh6Q4q0="; 36 }; 37 38 patches = [ ··· 41 src = ./0001-hardcode-path-to-libgomp.patch; 42 gomp = "${if stdenv.cc.isClang then openmp else stdenv.cc.cc.lib}/lib/libgomp${stdenv.hostPlatform.extensions.sharedLibrary}"; 43 }) 44 ]; 45 46 # xsimd: unvendor this header-only C++ lib 47 postPatch = '' 48 + rm -r pythran/xsimd 49 + ln -s '${lib.getDev xsimd}'/include/xsimd pythran/ 50 ''; 51 52 nativeBuildInputs = [ ··· 79 description = "Ahead of Time compiler for numeric kernels"; 80 homepage = "https://github.com/serge-sans-paille/pythran"; 81 license = lib.licenses.bsd3; 82 + maintainers = with lib.maintainers; [ doronbehar ]; 83 }; 84 }
+3 -3
pkgs/development/python-modules/rapidfuzz/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "rapidfuzz"; 21 - version = "3.5.2"; 22 - format = "pyproject"; 23 24 disabled = pythonOlder "3.7"; 25 ··· 27 owner = "maxbachmann"; 28 repo = "RapidFuzz"; 29 rev = "refs/tags/v${version}"; 30 - hash = "sha256-D7Z0xKqAJAPKSAEK+3Mpz/LaEKqKYczp+m6SqfzufwA="; 31 }; 32 33 postPatch = ''
··· 18 19 buildPythonPackage rec { 20 pname = "rapidfuzz"; 21 + version = "3.6.1"; 22 + pyproject = true; 23 24 disabled = pythonOlder "3.7"; 25 ··· 27 owner = "maxbachmann"; 28 repo = "RapidFuzz"; 29 rev = "refs/tags/v${version}"; 30 + hash = "sha256-QJVRT+d/IIGxkWfSNoXFSmbW017+8CTKuWD4W+TzvBs="; 31 }; 32 33 postPatch = ''
+2 -2
pkgs/development/python-modules/scikit-learn/default.nix
··· 24 25 buildPythonPackage rec { 26 pname = "scikit-learn"; 27 - version = "1.3.2"; 28 pyproject = true; 29 30 disabled = pythonOlder "3.6"; 31 32 src = fetchPypi { 33 inherit pname version; 34 - hash = "sha256-ovVMdqzMFaNL+5Bm5selbB5yNd2ldiuZB5IzC1LM+wU="; 35 }; 36 37 buildInputs = [
··· 24 25 buildPythonPackage rec { 26 pname = "scikit-learn"; 27 + version = "1.4.0"; 28 pyproject = true; 29 30 disabled = pythonOlder "3.6"; 31 32 src = fetchPypi { 33 inherit pname version; 34 + hash = "sha256-1Dc8mE66IOOTIW7dUaPj7t5Wy+k9QkdRbSBWQ8O5MSE="; 35 }; 36 37 buildInputs = [
+13 -42
pkgs/development/python-modules/scipy/default.nix
··· 13 , pkg-config 14 , pythran 15 , wheel 16 , pytestCheckHook 17 , pytest-xdist 18 , numpy ··· 31 # nix-shell maintainers/scripts/update.nix --argstr package python3.pkgs.scipy 32 # 33 # The update script uses sed regexes to replace them with the updated hashes. 34 - version = "1.11.4"; 35 - srcHash = "sha256-hNAZOMDFYqZpb67Pzg/WALWagFYvqYO1jOmcipDDRbE="; 36 datasetsHashes = { 37 ascent = "1qjp35ncrniq9rhzb14icwwykqg2208hcssznn3hz27w39615kh3"; 38 ecg = "1bwbjp43b7znnwha5hv6wiz3g0bhwrpqpi75s12zidxrbwvd62pj"; ··· 75 }) 76 ]; 77 78 - # Relax deps a bit 79 postPatch = '' 80 substituteInPlace pyproject.toml \ 81 - --replace 'meson-python>=0.12.1,<0.15.0' 'meson-python' \ 82 - --replace 'numpy==' 'numpy>=' \ 83 - --replace "pybind11>=2.10.4,<2.11.1" "pybind11>=2.10.4,<2.12.0" \ 84 - --replace 'wheel<0.41.0' 'wheel' 85 ''; 86 87 nativeBuildInputs = [ ··· 91 pythran 92 pkg-config 93 wheel 94 ]; 95 96 buildInputs = [ ··· 108 __darwinAllowLocalNetworking = true; 109 110 nativeCheckInputs = [ 111 pytestCheckHook 112 pytest-xdist 113 ]; ··· 157 # 158 hardeningDisable = lib.optionals (stdenv.isAarch64 && stdenv.isDarwin) [ "stackprotector" ]; 159 160 - checkPhase = '' 161 - runHook preCheck 162 - 163 - # Adapted from pytestCheckHook because scipy uses a custom check phase. 164 - # It needs to pass `$args` as a Python list to `scipy.test` rather than as 165 - # arguments to pytest on the command-line. 166 - args="" 167 - if [ -n "$disabledTests" ]; then 168 - disabledTestsString=$(_pytestComputeDisabledTestsString "''${disabledTests[@]}") 169 - args+="'-k','$disabledTestsString'" 170 - fi 171 - 172 - if [ -n "''${disabledTestPaths-}" ]; then 173 - eval "disabledTestPaths=($disabledTestPaths)" 174 - fi 175 - 176 - for path in ''${disabledTestPaths[@]}; do 177 - if [ ! -e "$path" ]; then 178 - echo "Disabled tests path \"$path\" does not exist. Aborting" 179 - exit 1 180 - fi 181 - args+="''${args:+,}'--ignore=\"$path\"'" 182 - done 183 - args+="''${args:+,}$(printf \'%s\', "''${pytestFlagsArray[@]}")" 184 - args=''${args%,} 185 - 186 - pushd "$out" 187 export OMP_NUM_THREADS=$(( $NIX_BUILD_CORES / 4 )) 188 - ${python.interpreter} -c "import scipy, sys; sys.exit(scipy.test( 189 - 'fast', 190 - verbose=10, 191 - extra_argv=[$args], 192 - parallel=$NIX_BUILD_CORES 193 - ) != True)" 194 - popd 195 - runHook postCheck 196 ''; 197 198 requiredSystemFeatures = [ "big-parallel" ]; # the tests need lots of CPU time
··· 13 , pkg-config 14 , pythran 15 , wheel 16 + , nose 17 + , setuptools 18 + , hypothesis 19 , pytestCheckHook 20 , pytest-xdist 21 , numpy ··· 34 # nix-shell maintainers/scripts/update.nix --argstr package python3.pkgs.scipy 35 # 36 # The update script uses sed regexes to replace them with the updated hashes. 37 + version = "1.12.0"; 38 + srcHash = "sha256-PuiyYTgSegDTV9Kae5N68FOXT1jyJrNv9p2aFP70Z20="; 39 datasetsHashes = { 40 ascent = "1qjp35ncrniq9rhzb14icwwykqg2208hcssznn3hz27w39615kh3"; 41 ecg = "1bwbjp43b7znnwha5hv6wiz3g0bhwrpqpi75s12zidxrbwvd62pj"; ··· 78 }) 79 ]; 80 81 + # Upstream complicated numpy version pinning is causing issues in the 82 + # configurePhase, so we pass on it. 83 postPatch = '' 84 substituteInPlace pyproject.toml \ 85 + --replace-fail 'numpy==' 'numpy>=' \ 86 ''; 87 88 nativeBuildInputs = [ ··· 92 pythran 93 pkg-config 94 wheel 95 + setuptools 96 ]; 97 98 buildInputs = [ ··· 110 __darwinAllowLocalNetworking = true; 111 112 nativeCheckInputs = [ 113 + nose 114 + hypothesis 115 pytestCheckHook 116 pytest-xdist 117 ]; ··· 161 # 162 hardeningDisable = lib.optionals (stdenv.isAarch64 && stdenv.isDarwin) [ "stackprotector" ]; 163 164 + preCheck = '' 165 export OMP_NUM_THREADS=$(( $NIX_BUILD_CORES / 4 )) 166 + cd $out 167 ''; 168 169 requiredSystemFeatures = [ "big-parallel" ]; # the tests need lots of CPU time
+7 -2
pkgs/development/python-modules/sip/default.nix
··· 9 , ply 10 , toml 11 , tomli 12 }: 13 14 buildPythonPackage rec { 15 pname = "sip"; 16 - version = "6.8.0"; 17 18 format = "pyproject"; 19 20 src = fetchPypi { 21 inherit pname version; 22 - hash = "sha256-LtGQSCDLZhtyB+sdzPrr7BpUY9ytkDukSK0ZRVAtCJw="; 23 }; 24 25 nativeBuildInputs = [ ··· 35 doCheck = false; 36 37 pythonImportsCheck = [ "sipbuild" ]; 38 39 meta = with lib; { 40 description = "Creates C++ bindings for Python modules";
··· 9 , ply 10 , toml 11 , tomli 12 + , poppler-qt5 13 }: 14 15 buildPythonPackage rec { 16 pname = "sip"; 17 + version = "6.8.1"; 18 19 format = "pyproject"; 20 21 src = fetchPypi { 22 inherit pname version; 23 + hash = "sha256-MALfQV4WisP/45OULbxxMcuCreUAAOFSb0aoit4m9Zg="; 24 }; 25 26 nativeBuildInputs = [ ··· 36 doCheck = false; 37 38 pythonImportsCheck = [ "sipbuild" ]; 39 + 40 + passthru.tests = { 41 + inherit poppler-qt5; 42 + }; 43 44 meta = with lib; { 45 description = "Creates C++ bindings for Python modules";
+4 -2
pkgs/development/python-modules/sphinxcontrib-apidoc/default.nix
··· 2 , buildPythonPackage 3 , fetchPypi 4 , pbr 5 }: 6 7 buildPythonPackage rec { 8 pname = "sphinxcontrib-apidoc"; 9 version = "0.4.0"; 10 - format = "setuptools"; 11 12 src = fetchPypi { 13 inherit pname version; ··· 19 rm test-requirements.txt requirements.txt 20 ''; 21 22 - propagatedBuildInputs = [ 23 pbr 24 ]; 25 26 # Check is disabled due to circular dependency of sphinx
··· 2 , buildPythonPackage 3 , fetchPypi 4 , pbr 5 + , setuptools 6 }: 7 8 buildPythonPackage rec { 9 pname = "sphinxcontrib-apidoc"; 10 version = "0.4.0"; 11 + pyproject = true; 12 13 src = fetchPypi { 14 inherit pname version; ··· 20 rm test-requirements.txt requirements.txt 21 ''; 22 23 + nativeBuildInputs = [ 24 pbr 25 + setuptools 26 ]; 27 28 # Check is disabled due to circular dependency of sphinx
+2 -2
pkgs/development/ruby-modules/bundler/default.nix
··· 4 inherit ruby; 5 name = "${gemName}-${version}"; 6 gemName = "bundler"; 7 - version = "2.5.3"; 8 - source.sha256 = "sha256-JJzQdaxPM1rnD3iMm+D0wYgJOk2n0FvVO+K67z8l58s="; 9 dontPatchShebangs = true; 10 11 postFixup = ''
··· 4 inherit ruby; 5 name = "${gemName}-${version}"; 6 gemName = "bundler"; 7 + version = "2.5.5"; 8 + source.sha256 = "sha256-E8f+JpAw4qZAKmVMBt7/Aa72dM7WSds76YtVA6CApGI="; 9 dontPatchShebangs = true; 10 11 postFixup = ''
+1 -1
pkgs/development/ruby-modules/gem/default.nix
··· 34 , stdenv ? ruby.stdenv 35 , namePrefix ? (let 36 rubyName = builtins.parseDrvName ruby.name; 37 - in "${rubyName.name}${rubyName.version}-") 38 , nativeBuildInputs ? [] 39 , buildInputs ? [] 40 , meta ? {}
··· 34 , stdenv ? ruby.stdenv 35 , namePrefix ? (let 36 rubyName = builtins.parseDrvName ruby.name; 37 + in "${rubyName.name}${lib.versions.majorMinor rubyName.version}-") 38 , nativeBuildInputs ? [] 39 , buildInputs ? [] 40 , meta ? {}
+8 -8
pkgs/development/tools/documentation/doxygen/default.nix
··· 8 , qt5 9 , CoreServices 10 , libiconv 11 - , withSqlite ? true, sqlite 12 }: 13 14 stdenv.mkDerivation rec { 15 pname = "doxygen"; 16 - version = "1.9.8"; 17 18 src = fetchFromGitHub { 19 owner = "doxygen"; 20 repo = "doxygen"; 21 rev = "Release_${lib.replaceStrings [ "." ] [ "_" ] version}"; 22 - sha256 = "sha256-uQ1Fl2kmY7qmzy34NOmZCgPxVGwmqRqDvV6yEab5P4w="; 23 }; 24 25 nativeBuildInputs = [ ··· 29 bison 30 ]; 31 32 - buildInputs = [ libiconv ] 33 - ++ lib.optionals withSqlite [ sqlite ] 34 ++ lib.optionals (qt5 != null) (with qt5; [ qtbase wrapQtAppsHook ]) 35 ++ lib.optionals stdenv.isDarwin [ CoreServices ]; 36 37 - cmakeFlags = [ "-DICONV_INCLUDE_DIR=${libiconv}/include" ] 38 - ++ lib.optional withSqlite "-Duse_sqlite3=ON" 39 - ++ lib.optional (qt5 != null) "-Dbuild_wizard=YES"; 40 41 env.NIX_CFLAGS_COMPILE = 42 lib.optionalString stdenv.isDarwin "-mmacosx-version-min=10.9";
··· 8 , qt5 9 , CoreServices 10 , libiconv 11 + , sqlite 12 }: 13 14 stdenv.mkDerivation rec { 15 pname = "doxygen"; 16 + version = "1.10.0"; 17 18 src = fetchFromGitHub { 19 owner = "doxygen"; 20 repo = "doxygen"; 21 rev = "Release_${lib.replaceStrings [ "." ] [ "_" ] version}"; 22 + sha256 = "sha256-FPI5ICdn9Tne/g9SP6jAQS813AAyoDNooDR/Hyvq6R4="; 23 }; 24 25 nativeBuildInputs = [ ··· 29 bison 30 ]; 31 32 + buildInputs = [ libiconv sqlite ] 33 ++ lib.optionals (qt5 != null) (with qt5; [ qtbase wrapQtAppsHook ]) 34 ++ lib.optionals stdenv.isDarwin [ CoreServices ]; 35 36 + cmakeFlags = [ 37 + "-DICONV_INCLUDE_DIR=${libiconv}/include" 38 + "-Duse_sys_sqlite3=ON" 39 + ] ++ lib.optional (qt5 != null) "-Dbuild_wizard=YES"; 40 41 env.NIX_CFLAGS_COMPILE = 42 lib.optionalString stdenv.isDarwin "-mmacosx-version-min=10.9";
-43
pkgs/development/tools/gocode/default.nix
··· 1 - { lib, buildGoPackage, fetchFromGitHub }: 2 - 3 - buildGoPackage rec { 4 - pname = "gocode-unstable"; 5 - version = "2020-04-06"; 6 - rev = "4acdcbdea79de6b3dee1c637eca5cbea0fdbe37c"; 7 - 8 - goPackagePath = "github.com/mdempsky/gocode"; 9 - 10 - # we must allow references to the original `go` package, 11 - # because `gocode` needs to dig into $GOROOT to provide completions for the 12 - # standard packages. 13 - allowGoReference = true; 14 - 15 - src = fetchFromGitHub { 16 - inherit rev; 17 - 18 - owner = "mdempsky"; 19 - repo = "gocode"; 20 - sha256 = "0i1hc089gb6a4mcgg56vn5l0q96wrlza2n08l4349s3dc2j559fb"; 21 - }; 22 - 23 - goDeps = ./deps.nix; 24 - 25 - meta = with lib; { 26 - description = "An autocompletion daemon for the Go programming language"; 27 - longDescription = '' 28 - Gocode is a helper tool which is intended to be integrated with your 29 - source code editor, like vim, neovim and emacs. It provides several 30 - advanced capabilities, which currently includes: 31 - 32 - - Context-sensitive autocompletion 33 - 34 - It is called daemon, because it uses client/server architecture for 35 - caching purposes. In particular, it makes autocompletions very fast. 36 - Typical autocompletion time with warm cache is 30ms, which is barely 37 - noticeable. 38 - ''; 39 - homepage = "https://github.com/mdempsky/gocode"; 40 - license = licenses.mit; 41 - maintainers = with maintainers; [ kalbasit ]; 42 - }; 43 - }
···
-12
pkgs/development/tools/gocode/deps.nix
··· 1 - # This file was generated by https://github.com/kamilchm/go2nix v1.3.0 2 - [ 3 - { 4 - goPackagePath = "golang.org/x/tools"; 5 - fetch = { 6 - type = "git"; 7 - url = "https://go.googlesource.com/tools"; 8 - rev = "72e4a01eba4315301fd9ce00c8c2f492580ded8a"; 9 - sha256 = "0a8c7j4w784w441j3j3bh640vy1g6g214641qv485wyi0xj49anf"; 10 - }; 11 - } 12 - ]
···
+5 -1
pkgs/development/tools/gofumpt/default.nix
··· 21 22 CGO_ENABLED = "0"; 23 24 - ldflags = "-s -w -X main.version=v${version}"; 25 26 checkFlags = [ 27 # Requires network access (Error: module lookup disabled by GOPROXY=off).
··· 21 22 CGO_ENABLED = "0"; 23 24 + ldflags = [ 25 + "-s" 26 + "-w" 27 + "-X main.version=v${version}" 28 + ]; 29 30 checkFlags = [ 31 # Requires network access (Error: module lookup disabled by GOPROXY=off).
+1 -1
pkgs/development/tools/kind/default.nix
··· 20 21 CGO_ENABLED = 0; 22 GOFLAGS = [ "-trimpath" ]; 23 - ldflags = [ "-buildid=" "-w" ]; 24 25 doCheck = false; 26
··· 20 21 CGO_ENABLED = 0; 22 GOFLAGS = [ "-trimpath" ]; 23 + ldflags = [ "-w" ]; 24 25 doCheck = false; 26
+69
pkgs/development/tools/misc/autoconf/2.71.nix
···
··· 1 + { lib, stdenv, fetchurl, m4, perl, texinfo }: 2 + 3 + # Note: this package is used for bootstrapping fetchurl, and thus 4 + # cannot use fetchpatch! All mutable patches (generated by GitHub or 5 + # cgit) that are needed here should be included directly in Nixpkgs as 6 + # files. 7 + 8 + stdenv.mkDerivation rec { 9 + pname = "autoconf"; 10 + version = "2.71"; 11 + outputs = [ "out" "doc" ]; 12 + 13 + src = fetchurl { 14 + url = "mirror://gnu/autoconf/autoconf-${version}.tar.xz"; 15 + sha256 = "197sl23irn6s9pd54rxj5vcp5y8dv65jb9yfqgr2g56cxg7q6k7i"; 16 + }; 17 + patches = [ 18 + # fix stale autom4te cache race condition: 19 + # https://savannah.gnu.org/support/index.php?110521 20 + ./2.71-fix-race.patch 21 + ]; 22 + 23 + strictDeps = true; 24 + nativeBuildInputs = [ m4 perl texinfo ]; 25 + buildInputs = [ m4 ]; 26 + postBuild = " 27 + make html 28 + "; 29 + 30 + postInstall = " 31 + make install-html 32 + "; 33 + 34 + # Work around a known issue in Cygwin. See 35 + # http://thread.gmane.org/gmane.comp.sysutils.autoconf.bugs/6822 for 36 + # details. 37 + # There are many test failures on `i386-pc-solaris2.11'. 38 + doCheck = ((!stdenv.isCygwin) && (!stdenv.isSunOS)); 39 + 40 + # Don't fixup "#! /bin/sh" in Autoconf, otherwise it will use the 41 + # "fixed" path in generated files! 42 + dontPatchShebangs = true; 43 + 44 + enableParallelBuilding = true; 45 + 46 + # Make the Autotest test suite run in parallel. 47 + preCheck ='' 48 + export TESTSUITEFLAGS="-j$NIX_BUILD_CORES" 49 + ''; 50 + 51 + meta = { 52 + homepage = "https://www.gnu.org/software/autoconf/"; 53 + description = "Part of the GNU Build System"; 54 + 55 + longDescription = '' 56 + GNU Autoconf is an extensible package of M4 macros that produce 57 + shell scripts to automatically configure software source code 58 + packages. These scripts can adapt the packages to many kinds of 59 + UNIX-like systems without manual user intervention. Autoconf 60 + creates a configuration script for a package from a template 61 + file that lists the operating system features that the package 62 + can use, in the form of M4 macro calls. 63 + ''; 64 + 65 + license = lib.licenses.gpl3Plus; 66 + 67 + platforms = lib.platforms.all; 68 + }; 69 + }
+2 -7
pkgs/development/tools/misc/autoconf/default.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "autoconf"; 10 - version = "2.71"; 11 outputs = [ "out" "doc" ]; 12 13 src = fetchurl { 14 url = "mirror://gnu/autoconf/autoconf-${version}.tar.xz"; 15 - sha256 = "197sl23irn6s9pd54rxj5vcp5y8dv65jb9yfqgr2g56cxg7q6k7i"; 16 }; 17 - patches = [ 18 - # fix stale autom4te cache race condition: 19 - # https://savannah.gnu.org/support/index.php?110521 20 - ./2.71-fix-race.patch 21 - ]; 22 23 strictDeps = true; 24 nativeBuildInputs = [ m4 perl texinfo ];
··· 7 8 stdenv.mkDerivation rec { 9 pname = "autoconf"; 10 + version = "2.72"; 11 outputs = [ "out" "doc" ]; 12 13 src = fetchurl { 14 url = "mirror://gnu/autoconf/autoconf-${version}.tar.xz"; 15 + hash = "sha256-uohcExlXjWyU1G6bDc60AUyq/iSQ5Deg28o/JwoiP1o="; 16 }; 17 18 strictDeps = true; 19 nativeBuildInputs = [ m4 perl texinfo ];
+2 -2
pkgs/development/tools/misc/lttng-ust/default.nix
··· 1 import ./generic.nix { 2 - version = "2.13.6"; 3 - sha256 = "sha256-5+BFlt1zrHqpnifNAA+UnbsP7VG9KQmfmwiiXB3wztU="; 4 }
··· 1 import ./generic.nix { 2 + version = "2.13.7"; 3 + sha256 = "sha256-X7TxfDB8jBt5xoVh6JvpVi0H50Jb9A5yjE1mdVNCpes="; 4 }
-5
pkgs/development/tools/misc/ycmd/default.nix
··· 1 { stdenv, lib, fetchFromGitHub, cmake, ninja, python 2 - , withGocode ? true, gocode 3 , withGodef ? true, godef 4 , withGotools? true, gotools 5 , withTypescript ? true, typescript ··· 63 mkdir -p $out/lib/ycmd/third_party 64 cp -r third_party/* $out/lib/ycmd/third_party/ 65 66 - '' + lib.optionalString withGocode '' 67 - TARGET=$out/lib/ycmd/third_party/gocode 68 - mkdir -p $TARGET 69 - ln -sf ${gocode}/bin/gocode $TARGET 70 '' + lib.optionalString withGodef '' 71 TARGET=$out/lib/ycmd/third_party/godef 72 mkdir -p $TARGET
··· 1 { stdenv, lib, fetchFromGitHub, cmake, ninja, python 2 , withGodef ? true, godef 3 , withGotools? true, gotools 4 , withTypescript ? true, typescript ··· 62 mkdir -p $out/lib/ycmd/third_party 63 cp -r third_party/* $out/lib/ycmd/third_party/ 64 65 '' + lib.optionalString withGodef '' 66 TARGET=$out/lib/ycmd/third_party/godef 67 mkdir -p $TARGET
+3 -3
pkgs/development/tools/rust/maturin/default.nix
··· 9 10 rustPlatform.buildRustPackage rec { 11 pname = "maturin"; 12 - version = "1.3.0"; 13 14 src = fetchFromGitHub { 15 owner = "PyO3"; 16 repo = "maturin"; 17 rev = "v${version}"; 18 - hash = "sha256-MVmu9m+9XhWuPBEEoaYmsSbMFziSZaM5Gg5kOr1DT54="; 19 }; 20 21 - cargoHash = "sha256-hrdrGFtL2vGczINnvDa4rclkXsNWnEqtTt3NVaRay8w="; 22 23 buildInputs = lib.optionals stdenv.isDarwin [ Security libiconv ]; 24
··· 9 10 rustPlatform.buildRustPackage rec { 11 pname = "maturin"; 12 + version = "1.4.0"; 13 14 src = fetchFromGitHub { 15 owner = "PyO3"; 16 repo = "maturin"; 17 rev = "v${version}"; 18 + hash = "sha256-mD/7wWeclV5Xqii9hcZMustvR6tf7MoyTZ3WsvEc61U="; 19 }; 20 21 + cargoHash = "sha256-w8XpCJ8GS2VszW/9/O2suy82zVO1UpWTrU1lFGYwhvw="; 22 23 buildInputs = lib.optionals stdenv.isDarwin [ Security libiconv ]; 24
+2 -2
pkgs/development/tools/spirv-tools/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "spirv-tools"; 5 - version = "1.3.268.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "SPIRV-Tools"; 10 rev = "vulkan-sdk-${version}"; 11 - hash = "sha256-Bned5Pa6zCFByfNvqD0M5t3l4uAJYkDlpe6wu8e7a3U="; 12 }; 13 14 # The cmake options are sufficient for turning on static building, but not
··· 2 3 stdenv.mkDerivation rec { 4 pname = "spirv-tools"; 5 + version = "1.3.275.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "SPIRV-Tools"; 10 rev = "vulkan-sdk-${version}"; 11 + hash = "sha256-RzGvoDt1Qc+f6mZsfs99MxX4YB3yFc5FP92Yx/WGrsI="; 12 }; 13 14 # The cmake options are sufficient for turning on static building, but not
+2 -2
pkgs/development/tools/vulkan-validation-layers/default.nix
··· 23 in 24 stdenv.mkDerivation rec { 25 pname = "vulkan-validation-layers"; 26 - version = "1.3.268.0"; 27 28 src = fetchFromGitHub { 29 owner = "KhronosGroup"; 30 repo = "Vulkan-ValidationLayers"; 31 rev = "vulkan-sdk-${version}"; 32 - hash = "sha256-DwkSUclStYKe54tC1H3jMv1KOSScgqf25tR5ajQZ6os="; 33 }; 34 35 nativeBuildInputs = [
··· 23 in 24 stdenv.mkDerivation rec { 25 pname = "vulkan-validation-layers"; 26 + version = "1.3.275.0"; 27 28 src = fetchFromGitHub { 29 owner = "KhronosGroup"; 30 repo = "Vulkan-ValidationLayers"; 31 rev = "vulkan-sdk-${version}"; 32 + hash = "sha256-hJx8gn0zCN3+DhO6niylZJXPHgQ+VhQV5tL8qAeRaUg="; 33 }; 34 35 nativeBuildInputs = [
+2 -2
pkgs/development/web/nodejs/v20.nix
··· 8 in 9 buildNodejs { 10 inherit enableNpm; 11 - version = "20.10.0"; 12 - sha256 = "sha256-MuslbuvYys1VdOZjHlS0K+fsjr4lrUeoymhUA7rRVTU="; 13 patches = [ 14 ./revert-arm64-pointer-auth.patch 15 ./disable-darwin-v8-system-instrumentation-node19.patch
··· 8 in 9 buildNodejs { 10 inherit enableNpm; 11 + version = "20.11.0"; 12 + sha256 = "sha256-MYB+vu6wScU/F2XkqVrtaUdqS2lt0QDLU5q2aNeVC0A="; 13 patches = [ 14 ./revert-arm64-pointer-auth.patch 15 ./disable-darwin-v8-system-instrumentation-node19.patch
-164
pkgs/os-specific/linux/bluez/default.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , fetchpatch 5 - , alsa-lib 6 - , dbus 7 - , ell 8 - , glib 9 - , json_c 10 - , libical 11 - , docutils 12 - , pkg-config 13 - , python3 14 - , readline 15 - , systemdMinimal 16 - , udev 17 - , withExperimental ? false 18 - }: let 19 - pythonPath = with python3.pkgs; [ 20 - dbus-python 21 - pygobject3 22 - recursivePthLoader 23 - ]; 24 - in stdenv.mkDerivation rec { 25 - pname = "bluez"; 26 - version = "5.70"; 27 - 28 - src = fetchurl { 29 - url = "mirror://kernel/linux/bluetooth/${pname}-${version}.tar.xz"; 30 - sha256 = "sha256-N+Ny6RaVXhRMuIL4iOS+QImPEK47fCE93N1V7pwAkng="; 31 - }; 32 - 33 - patches = [ 34 - # replace use of a non-standard symbol to fix build with musl libc (pkgsMusl.bluez) 35 - (fetchpatch { 36 - url = "https://git.alpinelinux.org/aports/plain/main/bluez/max-input.patch?id=32b31b484cb13009bd8081c4106e4cf064ec2f1f"; 37 - sha256 = "sha256-SczbXtsxBkCO+izH8XOBcrJEO2f7MdtYVT3+2fCV8wU="; 38 - }) 39 - # Fix device pairing regression 40 - # FIXME: remove in next release 41 - (fetchpatch { 42 - url = "https://github.com/bluez/bluez/commit/3a9c637010f8dc1ba3e8382abe01065761d4f5bb.patch"; 43 - hash = "sha256-UUmYMHnxYrw663nEEC2mv3zj5e0omkLNejmmPUtgS3c="; 44 - }) 45 - # CVE-2023-45866 / https://github.com/skysafe/reblog/tree/main/cve-2023-45866 46 - (fetchpatch { 47 - name = "CVE-2023-45866.patch"; 48 - url = "https://git.kernel.org/pub/scm/bluetooth/bluez.git/patch/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675"; 49 - sha256 = "sha256-IuPQ18yN0EO/PkqdT/JETyOxdZCKewBiDjGN4CG2GLo="; 50 - }) 51 - ]; 52 - 53 - buildInputs = [ 54 - alsa-lib 55 - dbus 56 - ell 57 - glib 58 - json_c 59 - libical 60 - python3 61 - readline 62 - udev 63 - ]; 64 - 65 - nativeBuildInputs = [ 66 - docutils 67 - pkg-config 68 - python3.pkgs.wrapPython 69 - ]; 70 - 71 - outputs = [ "out" "dev" "test" ]; 72 - 73 - postPatch = '' 74 - substituteInPlace tools/hid2hci.rules \ 75 - --replace /sbin/udevadm ${systemdMinimal}/bin/udevadm \ 76 - --replace "hid2hci " "$out/lib/udev/hid2hci " 77 - # Disable some tests: 78 - # - test-mesh-crypto depends on the following kernel settings: 79 - # CONFIG_CRYPTO_[USER|USER_API|USER_API_AEAD|USER_API_HASH|AES|CCM|AEAD|CMAC] 80 - if [[ ! -f unit/test-mesh-crypto.c ]]; then echo "unit/test-mesh-crypto.c no longer exists"; false; fi 81 - echo 'int main() { return 77; }' > unit/test-mesh-crypto.c 82 - ''; 83 - 84 - configureFlags = [ 85 - "--localstatedir=/var" 86 - "--enable-library" 87 - "--enable-cups" 88 - "--enable-pie" 89 - "--enable-external-ell" 90 - "--with-dbusconfdir=${placeholder "out"}/share" 91 - "--with-dbussystembusdir=${placeholder "out"}/share/dbus-1/system-services" 92 - "--with-dbussessionbusdir=${placeholder "out"}/share/dbus-1/services" 93 - "--with-systemdsystemunitdir=${placeholder "out"}/etc/systemd/system" 94 - "--with-systemduserunitdir=${placeholder "out"}/etc/systemd/user" 95 - "--with-udevdir=${placeholder "out"}/lib/udev" 96 - "--enable-health" 97 - "--enable-mesh" 98 - "--enable-midi" 99 - "--enable-nfc" 100 - "--enable-sixaxis" 101 - "--enable-btpclient" 102 - "--enable-hid2hci" 103 - "--enable-logger" 104 - 105 - # To provide ciptool, sdptool, and rfcomm (unmaintained) 106 - # superseded by new D-Bus APIs 107 - "--enable-deprecated" 108 - ] ++ lib.optional withExperimental "--enable-experimental"; 109 - 110 - 111 - # Work around `make install' trying to create /var/lib/bluetooth. 112 - installFlags = [ "statedir=$(TMPDIR)/var/lib/bluetooth" ]; 113 - 114 - makeFlags = [ "rulesdir=${placeholder "out"}/lib/udev/rules.d" ]; 115 - 116 - doCheck = stdenv.hostPlatform.isx86_64; 117 - 118 - postInstall = '' 119 - mkdir -p $test/{bin,test} 120 - cp -a test $test 121 - pushd $test/test 122 - for a in \ 123 - simple-agent \ 124 - test-adapter \ 125 - test-device \ 126 - test-thermometer \ 127 - list-devices \ 128 - monitor-bluetooth \ 129 - ; do 130 - ln -s ../test/$a $test/bin/bluez-$a 131 - done 132 - popd 133 - wrapPythonProgramsIn $test/test "$test/test ${toString pythonPath}" 134 - '' + '' 135 - # for bluez4 compatibility for NixOS 136 - mkdir $out/sbin 137 - ln -s ../libexec/bluetooth/bluetoothd $out/sbin/bluetoothd 138 - ln -s ../libexec/bluetooth/obexd $out/sbin/obexd 139 - 140 - # Add extra configuration 141 - mkdir $out/etc/bluetooth 142 - ln -s /etc/bluetooth/main.conf $out/etc/bluetooth/main.conf 143 - 144 - # https://github.com/NixOS/nixpkgs/issues/204418 145 - ln -s /etc/bluetooth/input.conf $out/etc/bluetooth/input.conf 146 - ln -s /etc/bluetooth/network.conf $out/etc/bluetooth/network.conf 147 - 148 - # Add missing tools, ref https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/bluez 149 - for files in `find tools/ -type f -perm -755`; do 150 - filename=$(basename $files) 151 - install -Dm755 tools/$filename $out/bin/$filename 152 - done 153 - install -Dm755 attrib/gatttool $out/bin/gatttool 154 - ''; 155 - 156 - enableParallelBuilding = true; 157 - 158 - meta = with lib; { 159 - description = "Bluetooth support for Linux"; 160 - homepage = "http://www.bluez.org/"; 161 - license = with licenses; [ gpl2 lgpl21 ]; 162 - platforms = platforms.linux; 163 - }; 164 - }
···
+2 -2
pkgs/os-specific/linux/hwdata/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "hwdata"; 5 - version = "0.377-2"; 6 7 src = fetchFromGitHub { 8 owner = "vcrhonek"; 9 repo = "hwdata"; 10 rev = "v${version}"; 11 - hash = "sha256-Nh+EIsJ/98NnflndQeSgiV2iOC0icTEfgwAySPbG6Lo="; 12 }; 13 14 configureFlags = [ "--datadir=${placeholder "out"}/share" ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "hwdata"; 5 + version = "0.378"; 6 7 src = fetchFromGitHub { 8 owner = "vcrhonek"; 9 repo = "hwdata"; 10 rev = "v${version}"; 11 + hash = "sha256-YCx0b4crg8A7mGXwqk1XQZKsm/3TUE8C2bOYKnb/FSA="; 12 }; 13 14 configureFlags = [ "--datadir=${placeholder "out"}/share" ];
+10
pkgs/os-specific/linux/kernel/common-config.nix
··· 381 DRM_VC4_HDMI_CEC = yes; 382 }; 383 384 sound = { 385 SND_DYNAMIC_MINORS = yes; 386 SND_AC97_POWER_SAVE = yes; # AC97 Power-Saving Mode
··· 381 DRM_VC4_HDMI_CEC = yes; 382 }; 383 384 + # Enables Rust support in the Linux kernel. This is currently not enabled by default, because it occasionally requires 385 + # patching the Linux kernel for the specific Rust toolchain in nixpkgs. These patches usually take a bit 386 + # of time to appear and this would hold up Linux kernel and Rust toolchain updates. 387 + # 388 + # Once Rust in the kernel has more users, we can reconsider enabling it by default. 389 + rust = optionalAttrs ((features.rust or false) && versionAtLeast version "6.7") { 390 + RUST = yes; 391 + GCC_PLUGINS = no; 392 + }; 393 + 394 sound = { 395 SND_DYNAMIC_MINORS = yes; 396 SND_AC97_POWER_SAVE = yes; # AC97 Power-Saving Mode
+11 -2
pkgs/os-specific/linux/kernel/generic.nix
··· 9 , pahole 10 , lib 11 , stdenv 12 13 , # The kernel source tarball. 14 src ··· 115 map ({extraConfig ? "", ...}: extraConfig) kernelPatches; 116 in lib.concatStringsSep "\n" ([baseConfigStr] ++ configFromPatches); 117 118 configfile = stdenv.mkDerivation { 119 inherit ignoreConfigErrors autoModules preferBuiltin kernelArch extraMakeFlags; 120 pname = "linux-config"; ··· 128 depsBuildBuild = [ buildPackages.stdenv.cc ]; 129 nativeBuildInputs = [ perl gmp libmpc mpfr ] 130 ++ lib.optionals (lib.versionAtLeast version "4.16") [ bison flex ] 131 - ++ lib.optional (lib.versionAtLeast version "5.2") pahole; 132 133 platformName = stdenv.hostPlatform.linux-kernel.name; 134 # e.g. "defconfig" ··· 200 inherit kernelPatches randstructSeed extraMakeFlags extraMeta configfile; 201 pos = builtins.unsafeGetAttrPos "version" args; 202 203 - config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 204 } // lib.optionalAttrs (modDirVersion != null) { inherit modDirVersion; }); 205 206 passthru = basicArgs // {
··· 9 , pahole 10 , lib 11 , stdenv 12 + , rustc 13 + , rustPlatform 14 + , rust-bindgen 15 16 , # The kernel source tarball. 17 src ··· 118 map ({extraConfig ? "", ...}: extraConfig) kernelPatches; 119 in lib.concatStringsSep "\n" ([baseConfigStr] ++ configFromPatches); 120 121 + withRust = ((configfile.moduleStructuredConfig.settings.RUST or {}).tristate or null) == "y"; 122 + 123 configfile = stdenv.mkDerivation { 124 inherit ignoreConfigErrors autoModules preferBuiltin kernelArch extraMakeFlags; 125 pname = "linux-config"; ··· 133 depsBuildBuild = [ buildPackages.stdenv.cc ]; 134 nativeBuildInputs = [ perl gmp libmpc mpfr ] 135 ++ lib.optionals (lib.versionAtLeast version "4.16") [ bison flex ] 136 + ++ lib.optional (lib.versionAtLeast version "5.2") pahole 137 + ++ lib.optionals withRust [ rust-bindgen rustc ] 138 + ; 139 + 140 + RUST_LIB_SRC = lib.optionalString withRust rustPlatform.rustLibSrc; 141 142 platformName = stdenv.hostPlatform.linux-kernel.name; 143 # e.g. "defconfig" ··· 209 inherit kernelPatches randstructSeed extraMakeFlags extraMeta configfile; 210 pos = builtins.unsafeGetAttrPos "version" args; 211 212 + config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; } // lib.optionalAttrs withRust { CONFIG_RUST = "y"; }; 213 } // lib.optionalAttrs (modDirVersion != null) { inherit modDirVersion; }); 214 215 passthru = basicArgs // {
+25 -18
pkgs/os-specific/linux/kernel/manual-config.nix
··· 1 { lib, stdenv, buildPackages, runCommand, nettools, bc, bison, flex, perl, rsync, gmp, libmpc, mpfr, openssl 2 , libelf, cpio, elfutils, zstd, python3Minimal, zlib, pahole, kmod, ubootTools 3 , fetchpatch 4 }: 5 6 let ··· 56 inherit (lib) 57 hasAttr getAttr optional optionals optionalString optionalAttrs maintainers platforms; 58 59 - # Dependencies that are required to build kernel modules 60 - moduleBuildDependencies = [ 61 - pahole 62 - perl 63 - libelf 64 - # module makefiles often run uname commands to find out the kernel version 65 - (buildPackages.deterministic-uname.override { inherit modDirVersion; }) 66 - ] ++ optional (lib.versionAtLeast version "5.13") zstd; 67 - 68 drvAttrs = config_: kernelConf: kernelPatches: configfile: 69 let 70 config = let attrName = attr: "CONFIG_" + attr; in { ··· 84 } // config_; 85 86 isModular = config.isYes "MODULES"; 87 88 buildDTBs = kernelConf.DTB or false; 89 90 in (optionalAttrs isModular { outputs = [ "out" "dev" ]; }) // { 91 passthru = rec { 92 inherit version modDirVersion config kernelPatches configfile 93 moduleBuildDependencies stdenv; 94 - inherit isZen isHardened isLibre; 95 isXen = lib.warn "The isXen attribute is deprecated. All Nixpkgs kernels that support it now have Xen enabled." true; 96 baseVersion = lib.head (lib.splitString "-rc" version); 97 kernelOlder = lib.versionOlder baseVersion; ··· 99 }; 100 101 inherit src; 102 103 patches = 104 map (p: p.patch) kernelPatches ··· 362 inherit version; 363 364 enableParallelBuilding = true; 365 - 366 - depsBuildBuild = [ buildPackages.stdenv.cc ]; 367 - nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal kmod ubootTools ] 368 - ++ optional (lib.versionOlder version "5.8") libelf 369 - ++ optionals (lib.versionAtLeast version "4.16") [ bison flex ] 370 - ++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ] 371 - ++ optional (lib.versionAtLeast version "5.8") elfutils 372 - ; 373 374 hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 375
··· 1 { lib, stdenv, buildPackages, runCommand, nettools, bc, bison, flex, perl, rsync, gmp, libmpc, mpfr, openssl 2 , libelf, cpio, elfutils, zstd, python3Minimal, zlib, pahole, kmod, ubootTools 3 , fetchpatch 4 + , rustc, rust-bindgen, rustPlatform 5 }: 6 7 let ··· 57 inherit (lib) 58 hasAttr getAttr optional optionals optionalString optionalAttrs maintainers platforms; 59 60 drvAttrs = config_: kernelConf: kernelPatches: configfile: 61 let 62 config = let attrName = attr: "CONFIG_" + attr; in { ··· 76 } // config_; 77 78 isModular = config.isYes "MODULES"; 79 + withRust = config.isYes "RUST"; 80 81 buildDTBs = kernelConf.DTB or false; 82 83 + # Dependencies that are required to build kernel modules 84 + moduleBuildDependencies = [ 85 + pahole 86 + perl 87 + libelf 88 + # module makefiles often run uname commands to find out the kernel version 89 + (buildPackages.deterministic-uname.override { inherit modDirVersion; }) 90 + ] 91 + ++ optional (lib.versionAtLeast version "5.13") zstd 92 + ++ optionals withRust [ rustc rust-bindgen ] 93 + ; 94 + 95 in (optionalAttrs isModular { outputs = [ "out" "dev" ]; }) // { 96 passthru = rec { 97 inherit version modDirVersion config kernelPatches configfile 98 moduleBuildDependencies stdenv; 99 + inherit isZen isHardened isLibre withRust; 100 isXen = lib.warn "The isXen attribute is deprecated. All Nixpkgs kernels that support it now have Xen enabled." true; 101 baseVersion = lib.head (lib.splitString "-rc" version); 102 kernelOlder = lib.versionOlder baseVersion; ··· 104 }; 105 106 inherit src; 107 + 108 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 109 + nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal kmod ubootTools ] 110 + ++ optional (lib.versionOlder version "5.8") libelf 111 + ++ optionals (lib.versionAtLeast version "4.16") [ bison flex ] 112 + ++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ] 113 + ++ optional (lib.versionAtLeast version "5.8") elfutils 114 + ++ optionals withRust [ rustc rust-bindgen ]; 115 + 116 + RUST_LIB_SRC = lib.optionalString withRust rustPlatform.rustLibSrc; 117 118 patches = 119 map (p: p.patch) kernelPatches ··· 377 inherit version; 378 379 enableParallelBuilding = true; 380 381 hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 382
+2 -2
pkgs/os-specific/linux/libcap-ng/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "libcap-ng"; 5 - version = "0.8.3"; 6 7 src = fetchurl { 8 url = "https://people.redhat.com/sgrubb/libcap-ng/libcap-ng-${version}.tar.gz"; 9 - sha256 = "sha256-vtb2hI4iuy+Dtfdksq7w7TkwVOgDqOOocRyyo55rSS0="; 10 }; 11 12 outputs = [ "out" "dev" "man" ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "libcap-ng"; 5 + version = "0.8.4"; 6 7 src = fetchurl { 8 url = "https://people.redhat.com/sgrubb/libcap-ng/libcap-ng-${version}.tar.gz"; 9 + sha256 = "sha256-aFgdOzjnVTy29t33gTsfyZ5ShW8hQh97R3zlq9JgWoo="; 10 }; 11 12 outputs = [ "out" "dev" "man" ];
+2 -2
pkgs/os-specific/linux/lvm2/2_03.nix
··· 1 import ./common.nix { 2 - version = "2.03.22"; 3 - hash = "sha256-TFppI70aznzgRHRgioSTfOBTupGxrOnwsAFyaOcy3Hw="; 4 }
··· 1 import ./common.nix { 2 + version = "2.03.23"; 3 + hash = "sha256-dOeUqene4bz4ogZfZbkZbET98yHiLWO5jtfejJqhel0="; 4 }
+2 -2
pkgs/os-specific/linux/lvm2/common.nix
··· 103 })) 104 # Musl fix from Alpine 105 ./fix-stdio-usage.patch 106 - ] ++ lib.optionals stdenv.hostPlatform.isStatic [ 107 - ./no-shared.patch 108 ]; 109 110 doCheck = false; # requires root
··· 103 })) 104 # Musl fix from Alpine 105 ./fix-stdio-usage.patch 106 + # https://gitlab.com/lvmteam/lvm2/-/merge_requests/8 107 + ./fix-static.patch 108 ]; 109 110 doCheck = false; # requires root
+28
pkgs/os-specific/linux/lvm2/fix-static.patch
···
··· 1 + From 0cbe7f0adc86c92c61156c417b27b063f156b31b Mon Sep 17 00:00:00 2001 2 + From: Alyssa Ross <hi@alyssa.is> 3 + Date: Tue, 2 Jan 2024 18:15:20 +0100 4 + Subject: [PATCH] makefiles: fix disabling shared link 5 + 6 + LIB_SHARED still gets set when shared linking has been disabled, so 7 + the previous version of this check still attempted to build the 8 + shared library. 9 + --- 10 + libdm/make.tmpl.in | 2 +- 11 + 1 file changed, 1 insertion(+), 1 deletion(-) 12 + 13 + diff --git a/libdm/make.tmpl.in b/libdm/make.tmpl.in 14 + index 2dd9625d4d..69ba2c35ab 100644 15 + --- a/libdm/make.tmpl.in 16 + +++ b/libdm/make.tmpl.in 17 + @@ -436,7 +436,7 @@ DEFS+=-D_FILE_OFFSET_BITS=64 18 + @echo " [CC] $(<F)" 19 + $(Q) $(CC) -c $(CFLAGS) $(CLDFLAGS) $< $(LIBS) -o $@ 20 + 21 + -ifneq (,$(LIB_SHARED)) 22 + +ifeq ("@SHARED_LINK@", "yes") 23 + 24 + TARGETS += $(LIB_SHARED).$(LIB_VERSION) 25 + $(LIB_SHARED).$(LIB_VERSION): $(OBJECTS) $(LDDEPS) 26 + -- 27 + GitLab 28 +
-46
pkgs/os-specific/linux/lvm2/no-shared.patch
··· 1 - diff --git a/libdm/Makefile.in b/libdm/Makefile.in 2 - index 2758648e6..f305a12b0 100644 3 - --- a/libdm/Makefile.in 4 - +++ b/libdm/Makefile.in 5 - @@ -47,7 +47,6 @@ endif 6 - 7 - LIB_SHARED = $(interface)/libdevmapper.$(LIB_SUFFIX) 8 - LIB_VERSION = $(LIB_VERSION_DM) 9 - -TARGETS = libdevmapper.$(LIB_SUFFIX) libdevmapper.$(LIB_SUFFIX).$(LIB_VERSION) .symver_check 10 - 11 - CFLOW_LIST = $(SOURCES) 12 - CFLOW_LIST_TARGET = libdevmapper.cflow 13 - diff --git a/libdm/make.tmpl.in b/libdm/make.tmpl.in 14 - index a731687c2..9366cdf1c 100644 15 - --- a/libdm/make.tmpl.in 16 - +++ b/libdm/make.tmpl.in 17 - @@ -314,7 +314,7 @@ SUBDIRS.cflow := $(SUBDIRS:=.cflow) 18 - SUBDIRS.clean := $(SUBDIRS:=.clean) 19 - SUBDIRS.distclean := $(SUBDIRS:=.distclean) 20 - 21 - -TARGETS += $(LIB_SHARED) $(LIB_STATIC) 22 - +TARGETS += $(LIB_STATIC) 23 - 24 - all: $(SUBDIRS) $(TARGETS) 25 - 26 - @@ -431,7 +431,6 @@ DEFS+=-D_FILE_OFFSET_BITS=64 27 - 28 - ifneq (,$(LIB_SHARED)) 29 - 30 - -TARGETS += $(LIB_SHARED).$(LIB_VERSION) 31 - $(LIB_SHARED).$(LIB_VERSION): $(OBJECTS) $(LDDEPS) 32 - @echo " [CC] $@" 33 - ifeq ("@LIB_SUFFIX@","so") 34 - diff --git a/make.tmpl.in b/make.tmpl.in 35 - index b73176f5a..6100d0dfd 100644 36 - --- a/make.tmpl.in 37 - +++ b/make.tmpl.in 38 - @@ -368,7 +368,7 @@ SUBDIRS.cflow := $(SUBDIRS:=.cflow) 39 - SUBDIRS.clean := $(SUBDIRS:=.clean) 40 - SUBDIRS.distclean := $(SUBDIRS:=.distclean) 41 - 42 - -TARGETS += $(LIB_SHARED) $(LIB_STATIC) 43 - +TARGETS += $(LIB_STATIC) 44 - 45 - INTERNAL_LIBS = \ 46 - $(top_builddir)/libdaemon/client/libdaemonclient.a \
···
+13 -4
pkgs/os-specific/linux/pam/default.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "linux-pam"; 10 - version = "1.5.2"; 11 12 src = fetchurl { 13 - url = "https://github.com/linux-pam/linux-pam/releases/download/v${version}/Linux-PAM-${version}.tar.xz"; 14 - sha256 = "sha256-5OxxMakdpEUSV0Jo9JPG2MoQXIcJFpG46bVspoXU+U0="; 15 }; 16 17 patches = [ ··· 24 url = "https://github.com/linux-pam/linux-pam/commit/77bd338125cde583ecdfb9fd69619bcd2baf15c2.patch"; 25 hash = "sha256-tlc9RcLZpEH315NFD4sdN9yOco8qhC6+bszl4OHm+AI="; 26 }) 27 - ]; 28 29 # Case-insensitivity workaround for https://github.com/linux-pam/linux-pam/issues/569 30 postPatch = if stdenv.buildPlatform.isDarwin && stdenv.buildPlatform != stdenv.hostPlatform then '' ··· 57 configureFlags = [ 58 "--includedir=${placeholder "out"}/include/security" 59 "--enable-sconfigdir=/etc/security" 60 ]; 61 62 installFlags = [
··· 7 8 stdenv.mkDerivation rec { 9 pname = "linux-pam"; 10 + version = "1.5.3"; 11 12 src = fetchurl { 13 + url = "https://github.com/linux-pam/linux-pam/releases/download/v${version}/Linux-PAM-${version}.tar.xz"; 14 + hash = "sha256-esS1D+7gBKn6iPHf0tL6c4qCiWdjBQzXc7PFSwqBgoM="; 15 }; 16 17 patches = [ ··· 24 url = "https://github.com/linux-pam/linux-pam/commit/77bd338125cde583ecdfb9fd69619bcd2baf15c2.patch"; 25 hash = "sha256-tlc9RcLZpEH315NFD4sdN9yOco8qhC6+bszl4OHm+AI="; 26 }) 27 + ] 28 + ++ lib.optional stdenv.hostPlatform.isMusl (fetchpatch { 29 + name = "missing-termio.patch"; 30 + url = "https://github.com/linux-pam/linux-pam/commit/5374f677e4cae669eb9accf2449178b602e8a40a.patch"; 31 + hash = "sha256-b6n8f16ETSNj5h+5/Yhn32XMfVO8xEnZRRhw+nuLP/8="; 32 + }) 33 + ; 34 35 # Case-insensitivity workaround for https://github.com/linux-pam/linux-pam/issues/569 36 postPatch = if stdenv.buildPlatform.isDarwin && stdenv.buildPlatform != stdenv.hostPlatform then '' ··· 63 configureFlags = [ 64 "--includedir=${placeholder "out"}/include/security" 65 "--enable-sconfigdir=/etc/security" 66 + # The module is deprecated. We re-enable it explicitly until NixOS 67 + # module stops using it. 68 + "--enable-lastlog" 69 ]; 70 71 installFlags = [
+28
pkgs/os-specific/linux/rust-out-of-tree-module/default.nix
···
··· 1 + { lib, fetchFromGitHub, kernel }: 2 + kernel.stdenv.mkDerivation { 3 + name = "rust-out-of-tree-module"; 4 + 5 + src = fetchFromGitHub { 6 + owner = "Rust-for-linux"; 7 + repo = "rust-out-of-tree-module"; 8 + 9 + rev = "7addf9dafba795524f6179a557f7272ecbe1b165"; 10 + hash = "sha256-Bj7WonZ499W/FajbxjM7yBkU9iTxTW7CrRbCSzWbsSc="; 11 + }; 12 + 13 + nativeBuildInputs = kernel.moduleBuildDependencies; 14 + makeFlags = kernel.makeFlags ++ [ "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" ]; 15 + 16 + installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ]; 17 + installTargets = [ "modules_install" ]; 18 + 19 + meta = { 20 + broken = !kernel.withRust; 21 + description = "A basic template for an out-of-tree Linux kernel module written in Rust"; 22 + homepage = "https://github.com/Rust-for-Linux/rust-out-of-tree-module"; 23 + license = lib.licenses.gpl2Only; 24 + maintainers = [ lib.maintainers.blitz ]; 25 + platforms = lib.platforms.linux; 26 + }; 27 + 28 + }
+2 -2
pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch
··· 13 1 file changed, 4 deletions(-) 14 15 diff --git a/rules.d/99-systemd.rules.in b/rules.d/99-systemd.rules.in 16 - index c0defc31de..8f80235731 100644 17 --- a/rules.d/99-systemd.rules.in 18 +++ b/rules.d/99-systemd.rules.in 19 - @@ -20,10 +20,6 @@ SUBSYSTEM=="block", TAG+="systemd" 20 SUBSYSTEM=="block", ENV{DM_SUSPENDED}=="1", IMPORT{db}="SYSTEMD_READY", GOTO="systemd_end" 21 SUBSYSTEM=="block", ACTION=="add", ENV{DM_UDEV_DISABLE_OTHER_RULES_FLAG}=="1", ENV{SYSTEMD_READY}="0" 22
··· 13 1 file changed, 4 deletions(-) 14 15 diff --git a/rules.d/99-systemd.rules.in b/rules.d/99-systemd.rules.in 16 + index 0d68f31d36..6b52f7ed4b 100644 17 --- a/rules.d/99-systemd.rules.in 18 +++ b/rules.d/99-systemd.rules.in 19 + @@ -22,10 +22,6 @@ SUBSYSTEM=="block", TAG+="systemd" 20 SUBSYSTEM=="block", ENV{DM_SUSPENDED}=="1", IMPORT{db}="SYSTEMD_READY", GOTO="systemd_end" 21 SUBSYSTEM=="block", ACTION=="add", ENV{DM_UDEV_DISABLE_OTHER_RULES_FLAG}=="1", ENV{SYSTEMD_READY}="0" 22
+3 -3
pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch
··· 14 2 files changed, 6 insertions(+), 2 deletions(-) 15 16 diff --git a/src/shared/fstab-util.c b/src/shared/fstab-util.c 17 - index 4ffec25c75..b99031c54e 100644 18 --- a/src/shared/fstab-util.c 19 +++ b/src/shared/fstab-util.c 20 - @@ -43,6 +43,8 @@ bool fstab_is_extrinsic(const char *mount, const char *opts) { 21 /* Don't bother with the OS data itself */ 22 if (PATH_IN_SET(mount, 23 "/", ··· 27 "/etc")) 28 return true; 29 diff --git a/src/shutdown/umount.c b/src/shutdown/umount.c 30 - index 1586c2e214..fcae95f824 100644 31 --- a/src/shutdown/umount.c 32 +++ b/src/shutdown/umount.c 33 @@ -170,8 +170,10 @@ int mount_points_list_get(const char *mountinfo, MountPoint **head) {
··· 14 2 files changed, 6 insertions(+), 2 deletions(-) 15 16 diff --git a/src/shared/fstab-util.c b/src/shared/fstab-util.c 17 + index 55e76b6e16..015a608035 100644 18 --- a/src/shared/fstab-util.c 19 +++ b/src/shared/fstab-util.c 20 + @@ -66,6 +66,8 @@ bool fstab_is_extrinsic(const char *mount, const char *opts) { 21 /* Don't bother with the OS data itself */ 22 if (PATH_IN_SET(mount, 23 "/", ··· 27 "/etc")) 28 return true; 29 diff --git a/src/shutdown/umount.c b/src/shutdown/umount.c 30 + index 1a9b99d761..04ef9af1ea 100644 31 --- a/src/shutdown/umount.c 32 +++ b/src/shutdown/umount.c 33 @@ -170,8 +170,10 @@ int mount_points_list_get(const char *mountinfo, MountPoint **head) {
+3 -3
pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch
··· 10 1 file changed, 2 insertions(+) 11 12 diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c 13 - index e170958fc5..898a674631 100644 14 --- a/src/nspawn/nspawn.c 15 +++ b/src/nspawn/nspawn.c 16 - @@ -5648,6 +5648,7 @@ static int run(int argc, char *argv[]) { 17 goto finish; 18 } 19 } else { ··· 21 _cleanup_free_ char *p = NULL; 22 23 if (arg_pivot_root_new) 24 - @@ -5662,6 +5663,7 @@ static int run(int argc, char *argv[]) { 25 "Directory %s doesn't look like it has an OS tree (/usr/ directory is missing). Refusing.", arg_directory); 26 goto finish; 27 }
··· 10 1 file changed, 2 insertions(+) 11 12 diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c 13 + index 38196ef3d6..57d1750b00 100644 14 --- a/src/nspawn/nspawn.c 15 +++ b/src/nspawn/nspawn.c 16 + @@ -5602,6 +5602,7 @@ static int run(int argc, char *argv[]) { 17 goto finish; 18 } 19 } else { ··· 21 _cleanup_free_ char *p = NULL; 22 23 if (arg_pivot_root_new) 24 + @@ -5618,6 +5619,7 @@ static int run(int argc, char *argv[]) { 25 "Directory %s doesn't look like it has an OS tree (/usr/ directory is missing). Refusing.", arg_directory); 26 goto finish; 27 }
+14 -13
pkgs/os-specific/linux/systemd/0004-Add-some-NixOS-specific-unit-directories.patch
··· 11 12 Original-Author: Eelco Dolstra <eelco.dolstra@logicblox.com> 13 --- 14 - src/basic/path-lookup.c | 17 ++--------------- 15 src/core/systemd.pc.in | 8 ++++---- 16 - 2 files changed, 6 insertions(+), 19 deletions(-) 17 18 diff --git a/src/basic/path-lookup.c b/src/basic/path-lookup.c 19 - index 7d158a8295..f9bd62b631 100644 20 --- a/src/basic/path-lookup.c 21 +++ b/src/basic/path-lookup.c 22 @@ -92,11 +92,7 @@ int xdg_user_data_dir(char **ret, const char *suffix) { ··· 31 NULL 32 }; 33 34 - @@ -617,15 +613,13 @@ int lookup_paths_init( 35 persistent_config, 36 SYSTEM_CONFIG_UNIT_DIR, 37 "/etc/systemd/system", ··· 44 - "/usr/local/lib/systemd/system", 45 SYSTEM_DATA_UNIT_DIR, 46 - "/usr/lib/systemd/system", 47 - STRV_IFNOTNULL(flags & LOOKUP_PATHS_SPLIT_USR ? "/lib/systemd/system" : NULL), 48 STRV_IFNOTNULL(generator_late)); 49 break; 50 51 - @@ -641,14 +635,11 @@ int lookup_paths_init( 52 persistent_config, 53 USER_CONFIG_UNIT_DIR, 54 "/etc/systemd/user", ··· 64 STRV_IFNOTNULL(generator_late)); 65 break; 66 67 - @@ -808,7 +799,6 @@ char **generator_binary_paths(RuntimeScope scope) { 68 case RUNTIME_SCOPE_SYSTEM: 69 add = strv_new("/run/systemd/system-generators", 70 "/etc/systemd/system-generators", ··· 72 SYSTEM_GENERATOR_DIR); 73 break; 74 75 - @@ -816,7 +806,6 @@ char **generator_binary_paths(RuntimeScope scope) { 76 case RUNTIME_SCOPE_USER: 77 add = strv_new("/run/systemd/user-generators", 78 "/etc/systemd/user-generators", ··· 80 USER_GENERATOR_DIR); 81 break; 82 83 - @@ -855,14 +844,12 @@ char **env_generator_binary_paths(RuntimeScope runtime_scope) { 84 case RUNTIME_SCOPE_SYSTEM: 85 add = strv_new("/run/systemd/system-environment-generators", 86 "/etc/systemd/system-environment-generators", ··· 96 break; 97 98 diff --git a/src/core/systemd.pc.in b/src/core/systemd.pc.in 99 - index 693433b34b..5932a21b5b 100644 100 --- a/src/core/systemd.pc.in 101 +++ b/src/core/systemd.pc.in 102 - @@ -38,10 +38,10 @@ systemdsystemconfdir=${systemd_system_conf_dir} 103 systemd_user_conf_dir=${sysconfdir}/systemd/user 104 systemduserconfdir=${systemd_user_conf_dir} 105 ··· 111 +systemd_user_unit_path=${systemd_user_conf_dir}:/etc/systemd/user:/nix/var/nix/profiles/default/lib/systemd/user:/run/systemd/user:${systemduserunitdir} 112 systemduserunitpath=${systemd_user_unit_path} 113 114 - systemd_system_generator_dir=${root_prefix}/lib/systemd/system-generators 115 - @@ -50,10 +50,10 @@ systemdsystemgeneratordir=${systemd_system_generator_dir} 116 systemd_user_generator_dir=${prefix}/lib/systemd/user-generators 117 systemdusergeneratordir=${systemd_user_generator_dir} 118 ··· 124 +systemd_user_generator_path=/run/systemd/user-generators:/etc/systemd/user-generators:${systemd_user_generator_dir} 125 systemdusergeneratorpath=${systemd_user_generator_path} 126 127 - systemd_sleep_dir=${root_prefix}/lib/systemd/system-sleep
··· 11 12 Original-Author: Eelco Dolstra <eelco.dolstra@logicblox.com> 13 --- 14 + src/basic/path-lookup.c | 18 ++---------------- 15 src/core/systemd.pc.in | 8 ++++---- 16 + 2 files changed, 6 insertions(+), 20 deletions(-) 17 18 diff --git a/src/basic/path-lookup.c b/src/basic/path-lookup.c 19 + index 4e3d59fc56..0d18b9a2d0 100644 20 --- a/src/basic/path-lookup.c 21 +++ b/src/basic/path-lookup.c 22 @@ -92,11 +92,7 @@ int xdg_user_data_dir(char **ret, const char *suffix) { ··· 31 NULL 32 }; 33 34 + @@ -613,16 +609,13 @@ int lookup_paths_init( 35 persistent_config, 36 SYSTEM_CONFIG_UNIT_DIR, 37 "/etc/systemd/system", ··· 44 - "/usr/local/lib/systemd/system", 45 SYSTEM_DATA_UNIT_DIR, 46 - "/usr/lib/systemd/system", 47 + - /* To be used ONLY for images which might be legacy split-usr */ 48 - STRV_IFNOTNULL(flags & LOOKUP_PATHS_SPLIT_USR ? "/lib/systemd/system" : NULL), 49 STRV_IFNOTNULL(generator_late)); 50 break; 51 52 + @@ -638,14 +631,11 @@ int lookup_paths_init( 53 persistent_config, 54 USER_CONFIG_UNIT_DIR, 55 "/etc/systemd/user", ··· 65 STRV_IFNOTNULL(generator_late)); 66 break; 67 68 + @@ -805,7 +795,6 @@ char **generator_binary_paths(RuntimeScope scope) { 69 case RUNTIME_SCOPE_SYSTEM: 70 add = strv_new("/run/systemd/system-generators", 71 "/etc/systemd/system-generators", ··· 73 SYSTEM_GENERATOR_DIR); 74 break; 75 76 + @@ -813,7 +802,6 @@ char **generator_binary_paths(RuntimeScope scope) { 77 case RUNTIME_SCOPE_USER: 78 add = strv_new("/run/systemd/user-generators", 79 "/etc/systemd/user-generators", ··· 81 USER_GENERATOR_DIR); 82 break; 83 84 + @@ -852,14 +840,12 @@ char **env_generator_binary_paths(RuntimeScope runtime_scope) { 85 case RUNTIME_SCOPE_SYSTEM: 86 add = strv_new("/run/systemd/system-environment-generators", 87 "/etc/systemd/system-environment-generators", ··· 97 break; 98 99 diff --git a/src/core/systemd.pc.in b/src/core/systemd.pc.in 100 + index f3b85b0190..8ae544b495 100644 101 --- a/src/core/systemd.pc.in 102 +++ b/src/core/systemd.pc.in 103 + @@ -43,10 +43,10 @@ systemdsystemconfdir=${systemd_system_conf_dir} 104 systemd_user_conf_dir=${sysconfdir}/systemd/user 105 systemduserconfdir=${systemd_user_conf_dir} 106 ··· 112 +systemd_user_unit_path=${systemd_user_conf_dir}:/etc/systemd/user:/nix/var/nix/profiles/default/lib/systemd/user:/run/systemd/user:${systemduserunitdir} 113 systemduserunitpath=${systemd_user_unit_path} 114 115 + systemd_system_generator_dir=${prefix}/lib/systemd/system-generators 116 + @@ -55,10 +55,10 @@ systemdsystemgeneratordir=${systemd_system_generator_dir} 117 systemd_user_generator_dir=${prefix}/lib/systemd/user-generators 118 systemdusergeneratordir=${systemd_user_generator_dir} 119 ··· 125 +systemd_user_generator_path=/run/systemd/user-generators:/etc/systemd/user-generators:${systemd_user_generator_dir} 126 systemdusergeneratorpath=${systemd_user_generator_path} 127 128 + systemd_sleep_dir=${prefix}/lib/systemd/system-sleep
+2 -2
pkgs/os-specific/linux/systemd/0005-Get-rid-of-a-useless-message-in-user-sessions.patch
··· 13 1 file changed, 2 insertions(+), 1 deletion(-) 14 15 diff --git a/src/core/manager.c b/src/core/manager.c 16 - index 22ec6e79b1..771e8e7f16 100644 17 --- a/src/core/manager.c 18 +++ b/src/core/manager.c 19 - @@ -1559,7 +1559,8 @@ static unsigned manager_dispatch_stop_when_bound_queue(Manager *m) { 20 if (!unit_is_bound_by_inactive(u, &culprit)) 21 continue; 22
··· 13 1 file changed, 2 insertions(+), 1 deletion(-) 14 15 diff --git a/src/core/manager.c b/src/core/manager.c 16 + index e61ebee253..22cc5cc843 100644 17 --- a/src/core/manager.c 18 +++ b/src/core/manager.c 19 + @@ -1562,7 +1562,8 @@ static unsigned manager_dispatch_stop_when_bound_queue(Manager *m) { 20 if (!unit_is_bound_by_inactive(u, &culprit)) 21 continue; 22
+6 -6
pkgs/os-specific/linux/systemd/0006-hostnamed-localed-timedated-disable-methods-that-cha.patch
··· 11 3 files changed, 25 insertions(+) 12 13 diff --git a/src/hostname/hostnamed.c b/src/hostname/hostnamed.c 14 - index 9ef45f8e75..99b1ec2e36 100644 15 --- a/src/hostname/hostnamed.c 16 +++ b/src/hostname/hostnamed.c 17 @@ -1053,6 +1053,9 @@ static int method_set_static_hostname(sd_bus_message *m, void *userdata, sd_bus_ ··· 35 36 context_read_machine_info(c); 37 diff --git a/src/locale/localed.c b/src/locale/localed.c 38 - index f544a73580..ce00c262cc 100644 39 --- a/src/locale/localed.c 40 +++ b/src/locale/localed.c 41 @@ -229,6 +229,9 @@ static int method_set_locale(sd_bus_message *m, void *userdata, sd_bus_error *er ··· 69 70 r = x11_context_verify_and_warn(&in, LOG_ERR, error); 71 diff --git a/src/timedate/timedated.c b/src/timedate/timedated.c 72 - index ad1d492d6b..331af34505 100644 73 --- a/src/timedate/timedated.c 74 +++ b/src/timedate/timedated.c 75 - @@ -665,6 +665,10 @@ static int method_set_timezone(sd_bus_message *m, void *userdata, sd_bus_error * 76 if (r < 0) 77 return r; 78 ··· 83 if (!timezone_is_valid(z, LOG_DEBUG)) 84 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid or not installed time zone '%s'", z); 85 86 - @@ -743,6 +747,9 @@ static int method_set_local_rtc(sd_bus_message *m, void *userdata, sd_bus_error 87 if (r < 0) 88 return r; 89 ··· 93 if (lrtc == c->local_rtc && !fix_system) 94 return sd_bus_reply_method_return(m, NULL); 95 96 - @@ -923,6 +930,9 @@ static int method_set_ntp(sd_bus_message *m, void *userdata, sd_bus_error *error 97 if (r < 0) 98 return r; 99
··· 11 3 files changed, 25 insertions(+) 12 13 diff --git a/src/hostname/hostnamed.c b/src/hostname/hostnamed.c 14 + index e1d53f2395..a224e6dadc 100644 15 --- a/src/hostname/hostnamed.c 16 +++ b/src/hostname/hostnamed.c 17 @@ -1053,6 +1053,9 @@ static int method_set_static_hostname(sd_bus_message *m, void *userdata, sd_bus_ ··· 35 36 context_read_machine_info(c); 37 diff --git a/src/locale/localed.c b/src/locale/localed.c 38 + index 5d96237fae..9af35cd29c 100644 39 --- a/src/locale/localed.c 40 +++ b/src/locale/localed.c 41 @@ -229,6 +229,9 @@ static int method_set_locale(sd_bus_message *m, void *userdata, sd_bus_error *er ··· 69 70 r = x11_context_verify_and_warn(&in, LOG_ERR, error); 71 diff --git a/src/timedate/timedated.c b/src/timedate/timedated.c 72 + index c7be30f563..50f8aa8675 100644 73 --- a/src/timedate/timedated.c 74 +++ b/src/timedate/timedated.c 75 + @@ -659,6 +659,10 @@ static int method_set_timezone(sd_bus_message *m, void *userdata, sd_bus_error * 76 if (r < 0) 77 return r; 78 ··· 83 if (!timezone_is_valid(z, LOG_DEBUG)) 84 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid or not installed time zone '%s'", z); 85 86 + @@ -737,6 +741,9 @@ static int method_set_local_rtc(sd_bus_message *m, void *userdata, sd_bus_error 87 if (r < 0) 88 return r; 89 ··· 93 if (lrtc == c->local_rtc && !fix_system) 94 return sd_bus_reply_method_return(m, NULL); 95 96 + @@ -917,6 +924,9 @@ static int method_set_ntp(sd_bus_message *m, void *userdata, sd_bus_error *error 97 if (r < 0) 98 return r; 99
-24
pkgs/os-specific/linux/systemd/0007-Fix-hwdb-paths.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: Nikolay Amiantov <ab@fmap.me> 3 - Date: Thu, 7 Jul 2016 02:47:13 +0300 4 - Subject: [PATCH] Fix hwdb paths 5 - 6 - Patch by vcunat. 7 - --- 8 - src/libsystemd/sd-hwdb/hwdb-internal.h | 6 +----- 9 - 1 file changed, 1 insertion(+), 5 deletions(-) 10 - 11 - diff --git a/src/libsystemd/sd-hwdb/hwdb-internal.h b/src/libsystemd/sd-hwdb/hwdb-internal.h 12 - index 5302679a62..39e59a527f 100644 13 - --- a/src/libsystemd/sd-hwdb/hwdb-internal.h 14 - +++ b/src/libsystemd/sd-hwdb/hwdb-internal.h 15 - @@ -83,8 +83,4 @@ struct trie_value_entry2_f { 16 - } _packed_; 17 - 18 - #define hwdb_bin_paths \ 19 - - "/etc/systemd/hwdb/hwdb.bin\0" \ 20 - - "/etc/udev/hwdb.bin\0" \ 21 - - "/usr/lib/systemd/hwdb/hwdb.bin\0" \ 22 - - _CONF_PATHS_SPLIT_USR_NULSTR("systemd/hwdb/hwdb.bin") \ 23 - - UDEVLIBEXECDIR "/hwdb.bin\0" 24 - + "/etc/udev/hwdb.bin\0"
···
+13 -13
pkgs/os-specific/linux/systemd/0008-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch pkgs/os-specific/linux/systemd/0007-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch
··· 35 <literal>Etc/UTC</literal>. The resulting link should lead to the 36 corresponding binary 37 diff --git a/src/basic/time-util.c b/src/basic/time-util.c 38 - index 1db630003a..31744c3e68 100644 39 --- a/src/basic/time-util.c 40 +++ b/src/basic/time-util.c 41 - @@ -1350,7 +1350,7 @@ static int get_timezones_from_zone1970_tab(char ***ret) { 42 43 assert(ret); 44 ··· 47 if (!f) 48 return -errno; 49 50 - @@ -1391,7 +1391,7 @@ static int get_timezones_from_tzdata_zi(char ***ret) { 51 52 assert(ret); 53 ··· 56 if (!f) 57 return -errno; 58 59 - @@ -1503,7 +1503,7 @@ int verify_timezone(const char *name, int log_level) { 60 if (p - name >= PATH_MAX) 61 return -ENAMETOOLONG; 62 ··· 65 66 fd = open(t, O_RDONLY|O_CLOEXEC); 67 if (fd < 0) 68 - @@ -1563,7 +1563,7 @@ int get_timezone(char **ret) { 69 if (r < 0) 70 return r; /* returns EINVAL if not a symlink */ 71 ··· 75 return -EINVAL; 76 77 diff --git a/src/firstboot/firstboot.c b/src/firstboot/firstboot.c 78 - index 1956ab3b13..9ef356f8af 100644 79 --- a/src/firstboot/firstboot.c 80 +++ b/src/firstboot/firstboot.c 81 - @@ -630,7 +630,7 @@ static int process_timezone(int rfd) { 82 if (isempty(arg_timezone)) 83 return 0; 84 ··· 88 r = symlinkat_atomic_full(e, pfd, f, /* make_relative= */ false); 89 if (r < 0) 90 diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c 91 - index 898a674631..c41a416e04 100644 92 --- a/src/nspawn/nspawn.c 93 +++ b/src/nspawn/nspawn.c 94 - @@ -1924,8 +1924,8 @@ int userns_mkdir(const char *root, const char *path, mode_t mode, uid_t uid, gid 95 static const char *timezone_from_path(const char *path) { 96 return PATH_STARTSWITH_SET( 97 path, ··· 103 104 static bool etc_writable(void) { 105 diff --git a/src/timedate/timedated.c b/src/timedate/timedated.c 106 - index 331af34505..722c4b5b4f 100644 107 --- a/src/timedate/timedated.c 108 +++ b/src/timedate/timedated.c 109 - @@ -282,7 +282,7 @@ static int context_read_data(Context *c) { 110 111 r = get_timezone(&t); 112 if (r == -EINVAL) ··· 115 else if (r < 0) 116 log_warning_errno(r, "Failed to get target of /etc/localtime: %m"); 117 118 - @@ -306,7 +306,7 @@ static int context_write_data_timezone(Context *c) { 119 120 if (isempty(c->zone) || streq(c->zone, "UTC")) { 121 ··· 124 125 if (unlink("/etc/localtime") < 0 && errno != ENOENT) 126 return -errno; 127 - @@ -314,9 +314,9 @@ static int context_write_data_timezone(Context *c) { 128 return 0; 129 } 130
··· 35 <literal>Etc/UTC</literal>. The resulting link should lead to the 36 corresponding binary 37 diff --git a/src/basic/time-util.c b/src/basic/time-util.c 38 + index f9014dc560..3ee0363369 100644 39 --- a/src/basic/time-util.c 40 +++ b/src/basic/time-util.c 41 + @@ -1412,7 +1412,7 @@ static int get_timezones_from_zone1970_tab(char ***ret) { 42 43 assert(ret); 44 ··· 47 if (!f) 48 return -errno; 49 50 + @@ -1453,7 +1453,7 @@ static int get_timezones_from_tzdata_zi(char ***ret) { 51 52 assert(ret); 53 ··· 56 if (!f) 57 return -errno; 58 59 + @@ -1565,7 +1565,7 @@ int verify_timezone(const char *name, int log_level) { 60 if (p - name >= PATH_MAX) 61 return -ENAMETOOLONG; 62 ··· 65 66 fd = open(t, O_RDONLY|O_CLOEXEC); 67 if (fd < 0) 68 + @@ -1625,7 +1625,7 @@ int get_timezone(char **ret) { 69 if (r < 0) 70 return r; /* returns EINVAL if not a symlink */ 71 ··· 75 return -EINVAL; 76 77 diff --git a/src/firstboot/firstboot.c b/src/firstboot/firstboot.c 78 + index f77a5f6266..63bac85b29 100644 79 --- a/src/firstboot/firstboot.c 80 +++ b/src/firstboot/firstboot.c 81 + @@ -632,7 +632,7 @@ static int process_timezone(int rfd) { 82 if (isempty(arg_timezone)) 83 return 0; 84 ··· 88 r = symlinkat_atomic_full(e, pfd, f, /* make_relative= */ false); 89 if (r < 0) 90 diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c 91 + index e48ebe8342..41796f3358 100644 92 --- a/src/nspawn/nspawn.c 93 +++ b/src/nspawn/nspawn.c 94 + @@ -1845,8 +1845,8 @@ int userns_mkdir(const char *root, const char *path, mode_t mode, uid_t uid, gid 95 static const char *timezone_from_path(const char *path) { 96 return PATH_STARTSWITH_SET( 97 path, ··· 103 104 static bool etc_writable(void) { 105 diff --git a/src/timedate/timedated.c b/src/timedate/timedated.c 106 + index 50f8aa8675..aff156ab42 100644 107 --- a/src/timedate/timedated.c 108 +++ b/src/timedate/timedated.c 109 + @@ -276,7 +276,7 @@ static int context_read_data(Context *c) { 110 111 r = get_timezone(&t); 112 if (r == -EINVAL) ··· 115 else if (r < 0) 116 log_warning_errno(r, "Failed to get target of /etc/localtime: %m"); 117 118 + @@ -300,7 +300,7 @@ static int context_write_data_timezone(Context *c) { 119 120 if (isempty(c->zone) || streq(c->zone, "UTC")) { 121 ··· 124 125 if (unlink("/etc/localtime") < 0 && errno != ENOENT) 126 return -errno; 127 + @@ -308,9 +308,9 @@ static int context_write_data_timezone(Context *c) { 128 return 0; 129 } 130
+1 -1
pkgs/os-specific/linux/systemd/0009-localectl-use-etc-X11-xkb-for-list-x11.patch pkgs/os-specific/linux/systemd/0008-localectl-use-etc-X11-xkb-for-list-x11.patch
··· 10 1 file changed, 1 insertion(+), 1 deletion(-) 11 12 diff --git a/src/locale/localectl.c b/src/locale/localectl.c 13 - index d8db9d9d22..4601bb5431 100644 14 --- a/src/locale/localectl.c 15 +++ b/src/locale/localectl.c 16 @@ -297,7 +297,7 @@ static int list_x11_keymaps(int argc, char **argv, void *userdata) {
··· 10 1 file changed, 1 insertion(+), 1 deletion(-) 11 12 diff --git a/src/locale/localectl.c b/src/locale/localectl.c 13 + index 32354027f1..1d231f1afc 100644 14 --- a/src/locale/localectl.c 15 +++ b/src/locale/localectl.c 16 @@ -297,7 +297,7 @@ static int list_x11_keymaps(int argc, char **argv, void *userdata) {
-23
pkgs/os-specific/linux/systemd/0010-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: Franz Pletz <fpletz@fnordicwalking.de> 3 - Date: Sun, 11 Feb 2018 04:37:44 +0100 4 - Subject: [PATCH] build: don't create statedir and don't touch prefixdir 5 - 6 - --- 7 - meson.build | 3 --- 8 - 1 file changed, 3 deletions(-) 9 - 10 - diff --git a/meson.build b/meson.build 11 - index 395eca1943..082cd748bb 100644 12 - --- a/meson.build 13 - +++ b/meson.build 14 - @@ -4707,9 +4707,6 @@ install_data('LICENSE.GPL2', 15 - install_subdir('LICENSES', 16 - install_dir : docdir) 17 - 18 - -meson.add_install_script('sh', '-c', mkdir_p.format(systemdstatedir)) 19 - -meson.add_install_script('sh', '-c', 'touch $DESTDIR@0@'.format(prefixdir)) 20 - - 21 - ############################################################ 22 - 23 - # Ensure that changes to the docs/ directory do not break the
···
+8 -8
pkgs/os-specific/linux/systemd/0011-add-rootprefix-to-lookup-dir-paths.patch pkgs/os-specific/linux/systemd/0009-add-rootprefix-to-lookup-dir-paths.patch
··· 12 1 file changed, 4 insertions(+), 2 deletions(-) 13 14 diff --git a/src/basic/constants.h b/src/basic/constants.h 15 - index 3f96786da9..6e8fb40c08 100644 16 --- a/src/basic/constants.h 17 +++ b/src/basic/constants.h 18 - @@ -74,13 +74,15 @@ 19 "/run/" n "\0" \ 20 "/usr/local/lib/" n "\0" \ 21 - "/usr/lib/" n "\0" \ 22 - - _CONF_PATHS_SPLIT_USR_NULSTR(n) 23 - + _CONF_PATHS_SPLIT_USR_NULSTR(n) \ 24 - + ROOTPREFIX "/lib/" n "\0" 25 26 #define CONF_PATHS_USR(n) \ 27 "/etc/" n, \ ··· 29 "/usr/local/lib/" n, \ 30 - "/usr/lib/" n 31 + "/usr/lib/" n, \ 32 - + ROOTPREFIX "/lib/" n 33 34 #define CONF_PATHS(n) \ 35 - CONF_PATHS_USR(n) \
··· 12 1 file changed, 4 insertions(+), 2 deletions(-) 13 14 diff --git a/src/basic/constants.h b/src/basic/constants.h 15 + index 6bb5f3c281..678d13737d 100644 16 --- a/src/basic/constants.h 17 +++ b/src/basic/constants.h 18 + @@ -65,13 +65,15 @@ 19 + "/etc/" n "\0" \ 20 "/run/" n "\0" \ 21 "/usr/local/lib/" n "\0" \ 22 + - "/usr/lib/" n "\0" 23 + + "/usr/lib/" n "\0" \ 24 + + PREFIX "/lib/" n "\0" 25 26 #define CONF_PATHS_USR(n) \ 27 "/etc/" n, \ ··· 29 "/usr/local/lib/" n, \ 30 - "/usr/lib/" n 31 + "/usr/lib/" n, \ 32 + + PREFIX "/lib/" n 33 34 #define CONF_PATHS(n) \ 35 + CONF_PATHS_USR(n)
+28
pkgs/os-specific/linux/systemd/0012-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
···
··· 1 + From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 + From: Florian Klink <flokli@flokli.de> 3 + Date: Sun, 8 Mar 2020 01:05:54 +0100 4 + Subject: [PATCH] path-util.h: add placeholder for DEFAULT_PATH_NORMAL 5 + 6 + This will be the $PATH used to lookup ExecStart= etc. options, which 7 + systemd itself uses extensively. 8 + --- 9 + src/basic/path-util.h | 6 +++--- 10 + 1 file changed, 3 insertions(+), 3 deletions(-) 11 + 12 + diff --git a/src/basic/path-util.h b/src/basic/path-util.h 13 + index 6d943e967f..d4380aa7e3 100644 14 + --- a/src/basic/path-util.h 15 + +++ b/src/basic/path-util.h 16 + @@ -25,9 +25,9 @@ 17 + # define PATH_SBIN_BIN_NULSTR(x) PATH_NORMAL_SBIN_BIN_NULSTR(x) 18 + #endif 19 + 20 + -#define DEFAULT_PATH PATH_SBIN_BIN("/usr/local/") ":" PATH_SBIN_BIN("/usr/") 21 + -#define DEFAULT_PATH_NULSTR PATH_SBIN_BIN_NULSTR("/usr/local/") PATH_SBIN_BIN_NULSTR("/usr/") 22 + -#define DEFAULT_PATH_COMPAT PATH_SPLIT_SBIN_BIN("/usr/local/") ":" PATH_SPLIT_SBIN_BIN("/usr/") ":" PATH_SPLIT_SBIN_BIN("/") 23 + +#define DEFAULT_PATH "@defaultPathNormal@" 24 + +#define DEFAULT_PATH_NULSTR "@defaultPathNormal@\0" 25 + +#define DEFAULT_PATH_COMPAT DEFAULT_PATH 26 + 27 + #ifndef DEFAULT_USER_PATH 28 + # define DEFAULT_USER_PATH DEFAULT_PATH
+2 -2
pkgs/os-specific/linux/systemd/0012-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch pkgs/os-specific/linux/systemd/0010-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch
··· 10 1 file changed, 1 insertion(+) 11 12 diff --git a/src/shutdown/shutdown.c b/src/shutdown/shutdown.c 13 - index 8395bb429d..14fbc85bb4 100644 14 --- a/src/shutdown/shutdown.c 15 +++ b/src/shutdown/shutdown.c 16 - @@ -334,6 +334,7 @@ static void init_watchdog(void) { 17 int main(int argc, char *argv[]) { 18 static const char* const dirs[] = { 19 SYSTEM_SHUTDOWN_PATH,
··· 10 1 file changed, 1 insertion(+) 11 12 diff --git a/src/shutdown/shutdown.c b/src/shutdown/shutdown.c 13 + index b976b7d8cf..b1c02df6fd 100644 14 --- a/src/shutdown/shutdown.c 15 +++ b/src/shutdown/shutdown.c 16 + @@ -336,6 +336,7 @@ static void init_watchdog(void) { 17 int main(int argc, char *argv[]) { 18 static const char* const dirs[] = { 19 SYSTEM_SHUTDOWN_PATH,
+2 -2
pkgs/os-specific/linux/systemd/0013-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch pkgs/os-specific/linux/systemd/0011-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
··· 9 1 file changed, 1 insertion(+) 10 11 diff --git a/src/sleep/sleep.c b/src/sleep/sleep.c 12 - index de1f6c7ec1..d0cdebd80a 100644 13 --- a/src/sleep/sleep.c 14 +++ b/src/sleep/sleep.c 15 - @@ -224,6 +224,7 @@ static int execute( 16 }; 17 static const char* const dirs[] = { 18 SYSTEM_SLEEP_PATH,
··· 9 1 file changed, 1 insertion(+) 10 11 diff --git a/src/sleep/sleep.c b/src/sleep/sleep.c 12 + index 21af3e9e52..6d096e3c78 100644 13 --- a/src/sleep/sleep.c 14 +++ b/src/sleep/sleep.c 15 + @@ -215,6 +215,7 @@ static int execute( 16 }; 17 static const char* const dirs[] = { 18 SYSTEM_SLEEP_PATH,
-30
pkgs/os-specific/linux/systemd/0014-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: Florian Klink <flokli@flokli.de> 3 - Date: Sun, 8 Mar 2020 01:05:54 +0100 4 - Subject: [PATCH] path-util.h: add placeholder for DEFAULT_PATH_NORMAL 5 - 6 - This will be the $PATH used to lookup ExecStart= etc. options, which 7 - systemd itself uses extensively. 8 - --- 9 - src/basic/path-util.h | 6 +++--- 10 - 1 file changed, 3 insertions(+), 3 deletions(-) 11 - 12 - diff --git a/src/basic/path-util.h b/src/basic/path-util.h 13 - index 97175bee11..3839704901 100644 14 - --- a/src/basic/path-util.h 15 - +++ b/src/basic/path-util.h 16 - @@ -25,11 +25,11 @@ 17 - # define PATH_SBIN_BIN_NULSTR(x) PATH_NORMAL_SBIN_BIN_NULSTR(x) 18 - #endif 19 - 20 - -#define DEFAULT_PATH_NORMAL PATH_SBIN_BIN("/usr/local/") ":" PATH_SBIN_BIN("/usr/") 21 - -#define DEFAULT_PATH_NORMAL_NULSTR PATH_SBIN_BIN_NULSTR("/usr/local/") PATH_SBIN_BIN_NULSTR("/usr/") 22 - +#define DEFAULT_PATH_NORMAL "@defaultPathNormal@" 23 - +#define DEFAULT_PATH_NORMAL_NULSTR "@defaultPathNormal@\0" 24 - #define DEFAULT_PATH_SPLIT_USR DEFAULT_PATH_NORMAL ":" PATH_SBIN_BIN("/") 25 - #define DEFAULT_PATH_SPLIT_USR_NULSTR DEFAULT_PATH_NORMAL_NULSTR PATH_SBIN_BIN_NULSTR("/") 26 - -#define DEFAULT_PATH_COMPAT PATH_SPLIT_SBIN_BIN("/usr/local/") ":" PATH_SPLIT_SBIN_BIN("/usr/") ":" PATH_SPLIT_SBIN_BIN("/") 27 - +#define DEFAULT_PATH_COMPAT DEFAULT_PATH_NORMAL 28 - 29 - #if HAVE_SPLIT_USR 30 - # define DEFAULT_PATH DEFAULT_PATH_SPLIT_USR
···
-30
pkgs/os-specific/linux/systemd/0015-pkg-config-derive-prefix-from-prefix.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= <joerg@thalheim.io> 3 - Date: Sun, 6 Dec 2020 08:34:19 +0100 4 - Subject: [PATCH] pkg-config: derive prefix from --prefix 5 - 6 - Point prefix to the one configured, instead of `/usr` `systemd` has limited 7 - support for making the pkgconfig prefix overridable, and interpolates those 8 - values later down. 9 - 10 - So we only need to patch this one value to get the correct paths. 11 - See systemd/systemd@bc4e6e27922a2873985ab9367d79fb099f70b505 for details. 12 - 13 - Co-Authored-By: Florian Klink <flokli@flokli.de> 14 - --- 15 - src/core/systemd.pc.in | 2 +- 16 - 1 file changed, 1 insertion(+), 1 deletion(-) 17 - 18 - diff --git a/src/core/systemd.pc.in b/src/core/systemd.pc.in 19 - index 5932a21b5b..20bf8e316d 100644 20 - --- a/src/core/systemd.pc.in 21 - +++ b/src/core/systemd.pc.in 22 - @@ -11,7 +11,7 @@ 23 - # considered deprecated (though there is no plan to remove them). New names 24 - # shall have underscores. 25 - 26 - -prefix=/usr 27 - +prefix={{PREFIX}} 28 - root_prefix={{ROOTPREFIX_NOSLASH}} 29 - rootprefix=${root_prefix} 30 - sysconf_dir={{SYSCONF_DIR}}
···
+2 -2
pkgs/os-specific/linux/systemd/0016-inherit-systemd-environment-when-calling-generators.patch pkgs/os-specific/linux/systemd/0013-inherit-systemd-environment-when-calling-generators.patch
··· 16 1 file changed, 8 insertions(+) 17 18 diff --git a/src/core/manager.c b/src/core/manager.c 19 - index 771e8e7f16..acf3ead8d7 100644 20 --- a/src/core/manager.c 21 +++ b/src/core/manager.c 22 - @@ -3899,9 +3899,17 @@ static int build_generator_environment(Manager *m, char ***ret) { 23 * adjust generated units to that. Let's pass down some bits of information that are easy for us to 24 * determine (but a bit harder for generator scripts to determine), as environment variables. */ 25
··· 16 1 file changed, 8 insertions(+) 17 18 diff --git a/src/core/manager.c b/src/core/manager.c 19 + index 22cc5cc843..5dc7d4504f 100644 20 --- a/src/core/manager.c 21 +++ b/src/core/manager.c 22 + @@ -3914,9 +3914,17 @@ static int build_generator_environment(Manager *m, char ***ret) { 23 * adjust generated units to that. Let's pass down some bits of information that are easy for us to 24 * determine (but a bit harder for generator scripts to determine), as environment variables. */ 25
+7 -8
pkgs/os-specific/linux/systemd/0017-core-don-t-taint-on-unmerged-usr.patch pkgs/os-specific/linux/systemd/0014-core-don-t-taint-on-unmerged-usr.patch
··· 13 14 See also: https://github.com/systemd/systemd/issues/24191 15 --- 16 - src/core/manager.c | 4 ---- 17 - 1 file changed, 4 deletions(-) 18 19 diff --git a/src/core/manager.c b/src/core/manager.c 20 - index acf3ead8d7..bdbab16829 100644 21 --- a/src/core/manager.c 22 +++ b/src/core/manager.c 23 - @@ -4754,10 +4754,6 @@ char* manager_taint_string(const Manager *m) { 24 - if (m->taint_usr) 25 - stage[n++] = "split-usr"; 26 27 - _cleanup_free_ char *usrbin = NULL; 28 - if (readlink_malloc("/bin", &usrbin) < 0 || !PATH_IN_SET(usrbin, "usr/bin", "/usr/bin")) 29 - stage[n++] = "unmerged-usr"; 30 - - 31 if (access("/proc/cgroups", F_OK) < 0) 32 stage[n++] = "cgroups-missing"; 33 -
··· 13 14 See also: https://github.com/systemd/systemd/issues/24191 15 --- 16 + src/core/manager.c | 3 --- 17 + 1 file changed, 3 deletions(-) 18 19 diff --git a/src/core/manager.c b/src/core/manager.c 20 + index 5dc7d4504f..6208c9aa31 100644 21 --- a/src/core/manager.c 22 +++ b/src/core/manager.c 23 + @@ -4800,9 +4800,6 @@ char* manager_taint_string(const Manager *m) { 24 + const char* stage[12] = {}; 25 + size_t n = 0; 26 27 - _cleanup_free_ char *usrbin = NULL; 28 - if (readlink_malloc("/bin", &usrbin) < 0 || !PATH_IN_SET(usrbin, "usr/bin", "/usr/bin")) 29 - stage[n++] = "unmerged-usr"; 30 + 31 if (access("/proc/cgroups", F_OK) < 0) 32 stage[n++] = "cgroups-missing";
+21
pkgs/os-specific/linux/systemd/0017-meson.build-do-not-create-systemdstatedir.patch
···
··· 1 + From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 + From: nikstur <nikstur@outlook.com> 3 + Date: Mon, 6 Nov 2023 22:51:38 +0100 4 + Subject: [PATCH] meson.build: do not create systemdstatedir 5 + 6 + --- 7 + meson.build | 1 - 8 + 1 file changed, 1 deletion(-) 9 + 10 + diff --git a/meson.build b/meson.build 11 + index 7419e2b0b0..c82a527976 100644 12 + --- a/meson.build 13 + +++ b/meson.build 14 + @@ -2497,7 +2497,6 @@ install_data('LICENSE.GPL2', 15 + install_subdir('LICENSES', 16 + install_dir : docdir) 17 + 18 + -install_emptydir(systemdstatedir) 19 + 20 + ############################################################ 21 +
+3 -3
pkgs/os-specific/linux/systemd/0018-tpm2_context_init-fix-driver-name-checking.patch pkgs/os-specific/linux/systemd/0015-tpm2_context_init-fix-driver-name-checking.patch
··· 27 1 file changed, 1 insertion(+), 1 deletion(-) 28 29 diff --git a/src/shared/tpm2-util.c b/src/shared/tpm2-util.c 30 - index ae8a8bc073..c284b244f8 100644 31 --- a/src/shared/tpm2-util.c 32 +++ b/src/shared/tpm2-util.c 33 - @@ -582,7 +582,7 @@ int tpm2_context_new(const char *device, Tpm2Context **ret_context) { 34 fn = strjoina("libtss2-tcti-", driver, ".so.0"); 35 36 /* Better safe than sorry, let's refuse strings that cannot possibly be valid driver early, before going to disk. */ 37 - if (!filename_is_valid(fn)) 38 + if (!path_is_valid(fn)) 39 - return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "TPM2 driver name '%s' not valid, refusing.", driver); 40 41 context->tcti_dl = dlopen(fn, RTLD_NOW);
··· 27 1 file changed, 1 insertion(+), 1 deletion(-) 28 29 diff --git a/src/shared/tpm2-util.c b/src/shared/tpm2-util.c 30 + index 5e07b88a89..8dd7315009 100644 31 --- a/src/shared/tpm2-util.c 32 +++ b/src/shared/tpm2-util.c 33 + @@ -654,7 +654,7 @@ int tpm2_context_new(const char *device, Tpm2Context **ret_context) { 34 fn = strjoina("libtss2-tcti-", driver, ".so.0"); 35 36 /* Better safe than sorry, let's refuse strings that cannot possibly be valid driver early, before going to disk. */ 37 - if (!filename_is_valid(fn)) 38 + if (!path_is_valid(fn)) 39 + return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "TPM2 driver name '%s' not valid, refusing.", driver); 40 41 context->tcti_dl = dlopen(fn, RTLD_NOW);
+2 -2
pkgs/os-specific/linux/systemd/0019-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch pkgs/os-specific/linux/systemd/0016-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch
··· 30 1 file changed, 3 insertions(+) 31 32 diff --git a/src/systemctl/systemctl-edit.c b/src/systemctl/systemctl-edit.c 33 - index e3f25d52d5..81c9c6f6b7 100644 34 --- a/src/systemctl/systemctl-edit.c 35 +++ b/src/systemctl/systemctl-edit.c 36 - @@ -323,6 +323,9 @@ int verb_edit(int argc, char *argv[], void *userdata) { 37 sd_bus *bus; 38 int r; 39
··· 30 1 file changed, 3 insertions(+) 31 32 diff --git a/src/systemctl/systemctl-edit.c b/src/systemctl/systemctl-edit.c 33 + index 367afa20f7..5777154d01 100644 34 --- a/src/systemctl/systemctl-edit.c 35 +++ b/src/systemctl/systemctl-edit.c 36 + @@ -322,6 +322,9 @@ int verb_edit(int argc, char *argv[], void *userdata) { 37 sd_bus *bus; 38 int r; 39
pkgs/os-specific/linux/systemd/0020-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch pkgs/os-specific/linux/systemd/0018-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch
+176 -141
pkgs/os-specific/linux/systemd/default.nix
··· 5 , nixosTests 6 , pkgsCross 7 , fetchFromGitHub 8 - , fetchpatch 9 , fetchzip 10 , buildPackages 11 , makeBinaryWrapper ··· 20 21 # glib is only used during tests (test-bus-gvariant, test-bus-marshal) 22 , glib 23 - , substituteAll 24 , gettext 25 , python3Packages 26 ··· 52 , intltool 53 , bzip2 54 , pcre2 55 - , e2fsprogs 56 , elfutils 57 , linuxHeaders ? stdenv.cc.libc.linuxHeaders 58 , gnutls ··· 68 , libmicrohttpd 69 , libfido2 70 , p11-kit 71 72 # the (optional) BPF feature requires bpftool, libbpf, clang and llvm-strip to be available during build time. 73 # Only libbpf should be a runtime dependency. ··· 106 , withHostnamed ? true 107 , withHwdb ? true 108 , withImportd ? !stdenv.hostPlatform.isMusl 109 , withKmod ? true 110 , withLibBPF ? lib.versionAtLeast buildPackages.llvmPackages.clang.version "10.0" 111 && (stdenv.hostPlatform.isAarch -> lib.versionAtLeast stdenv.hostPlatform.parsed.cpu.version "6") # assumes hard floats ··· 126 , withNss ? !stdenv.hostPlatform.isMusl 127 , withOomd ? true 128 , withPam ? true 129 - , withPasswordQuality ? false 130 , withPCRE2 ? true 131 , withPolkit ? true 132 , withPortabled ? !stdenv.hostPlatform.isMusl 133 , withRemote ? !stdenv.hostPlatform.isMusl 134 , withResolved ? true 135 , withShellCompletions ? true ··· 141 , withUkify ? false # adds python to closure which is too much by default 142 , withUserDb ? true 143 , withUtmp ? !stdenv.hostPlatform.isMusl 144 # tests assume too much system access for them to be feasible for us right now 145 , withTests ? false 146 # build only libudev and libsystemd ··· 163 assert withUkify -> (withEfi && withBootloader); 164 assert withRepart -> withCryptsetup; 165 assert withBootloader -> withEfi; 166 - # passwdqc is not packaged in nixpkgs yet, if you want to fix this, please submit a PR. 167 - assert !withPasswordQuality; 168 169 let 170 wantCurl = withRemote || withImportd; 171 wantGcrypt = withResolved || withImportd; 172 - version = "254.6"; 173 174 # Bump this variable on every (major) version change. See below (in the meson options list) for why. 175 # command: 176 # $ curl -s https://api.github.com/repos/systemd/systemd/releases/latest | \ 177 # jq '.created_at|strptime("%Y-%m-%dT%H:%M:%SZ")|mktime' 178 - releaseTimestamp = "1690536449"; 179 in 180 stdenv.mkDerivation (finalAttrs: { 181 inherit pname version; ··· 186 owner = "systemd"; 187 repo = "systemd-stable"; 188 rev = "v${version}"; 189 - hash = "sha256-Ku24ecDeQt0t7A8/adR3Jm47QZ19+wdMPyJRzCxU4uU="; 190 }; 191 192 # On major changes, or when otherwise required, you *must* reformat the patches, ··· 201 ./0004-Add-some-NixOS-specific-unit-directories.patch 202 ./0005-Get-rid-of-a-useless-message-in-user-sessions.patch 203 ./0006-hostnamed-localed-timedated-disable-methods-that-cha.patch 204 - ./0007-Fix-hwdb-paths.patch 205 - ./0008-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch 206 - ./0009-localectl-use-etc-X11-xkb-for-list-x11.patch 207 - ./0010-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch 208 - ./0011-add-rootprefix-to-lookup-dir-paths.patch 209 - ./0012-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch 210 - ./0013-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch 211 - ./0014-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch 212 - ./0015-pkg-config-derive-prefix-from-prefix.patch 213 - ./0016-inherit-systemd-environment-when-calling-generators.patch 214 - ./0017-core-don-t-taint-on-unmerged-usr.patch 215 - ./0018-tpm2_context_init-fix-driver-name-checking.patch 216 - ./0019-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch 217 ] ++ lib.optional (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 218 - ./0020-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch 219 ] ++ lib.optional stdenv.hostPlatform.isMusl ( 220 let 221 oe-core = fetchzip { ··· 299 { name = "libbpf.so.1"; pkg = opt withLibBPF libbpf; } 300 { name = "libbpf.so.0"; pkg = null; } 301 302 - # We did never provide support for libxkbcommon & qrencode 303 { name = "libxkbcommon.so.0"; pkg = null; } 304 - { name = "libqrencode.so.4"; pkg = null; } 305 { name = "libqrencode.so.3"; pkg = null; } 306 307 - # We did not provide libpwquality before so it is safe to disable it for 308 - # now. 309 - { name = "libpwquality.so.1"; pkg = null; } 310 311 # Only include cryptsetup if it is enabled. We might not be able to 312 # provide it during "bootstrap" in e.g. the minimal systemd build as ··· 338 # Support for PKCS#11 in systemd-cryptsetup, systemd-cryptenroll and systemd-homed 339 { name = "libp11-kit.so.0"; pkg = opt (withHomed || withCryptsetup) p11-kit; } 340 341 - # Password quality support 342 - { name = "libpasswdqc.so.1"; pkg = opt withPasswordQuality null; } 343 ]; 344 345 patchDlOpen = dl: ··· 434 ++ lib.optional withApparmor libapparmor 435 ++ lib.optional withAudit audit 436 ++ lib.optional wantCurl (lib.getDev curl) 437 - ++ lib.optionals withCompression [ bzip2 lz4 xz zstd ] 438 ++ lib.optional withCoredump elfutils 439 ++ lib.optional withCryptsetup (lib.getDev cryptsetup.dev) 440 ++ lib.optional withKexectools kexec-tools 441 ++ lib.optional withKmod kmod 442 ++ lib.optional withLibidn2 libidn2 443 ++ lib.optional withLibseccomp libseccomp 444 - ++ lib.optional withNetworkd iptables 445 ++ lib.optional withPam pam 446 ++ lib.optional withPCRE2 pcre2 447 ++ lib.optional withSelinux libselinux ··· 451 ++ lib.optionals withLibBPF [ libbpf ] 452 ++ lib.optional withTpm2Tss tpm2-tss 453 ++ lib.optional withUkify (python3Packages.python.withPackages (ps: with ps; [ pefile ])) 454 ; 455 456 mesonBuildType = "release"; 457 458 mesonFlags = [ 459 - "-Dversion-tag=${version}" 460 # We bump this variable on every (major) version change to ensure 461 # that we have known-good value for a timestamp that is in the (not so distant) past. 462 # This serves as a lower bound for valid system timestamps during startup. Systemd will 463 # reset the system timestamp if this date is +- 15 years from the system time. 464 # See the systemd v250 release notes for further details: 465 # https://github.com/systemd/systemd/blob/60e930fc3e6eb8a36fbc184773119eb8d2f30364/NEWS#L258-L266 466 - "-Dtime-epoch=${releaseTimestamp}" 467 468 - "-Dmode=release" 469 - "-Ddbuspolicydir=${placeholder "out"}/share/dbus-1/system.d" 470 - "-Ddbussessionservicedir=${placeholder "out"}/share/dbus-1/services" 471 - "-Ddbussystemservicedir=${placeholder "out"}/share/dbus-1/system-services" 472 - "-Dpam=${lib.boolToString withPam}" 473 - "-Dpamconfdir=${placeholder "out"}/etc/pam.d" 474 - "-Drootprefix=${placeholder "out"}" 475 - "-Dpkgconfiglibdir=${placeholder "dev"}/lib/pkgconfig" 476 - "-Dpkgconfigdatadir=${placeholder "dev"}/share/pkgconfig" 477 - "-Dloadkeys-path=${kbd}/bin/loadkeys" 478 - "-Dsetfont-path=${kbd}/bin/setfont" 479 - "-Dtty-gid=3" # tty in NixOS has gid 3 480 - "-Ddebug-shell=${bashInteractive}/bin/bash" 481 - "-Dglib=${lib.boolToString withTests}" 482 - # while we do not run tests we should also not build them. Removes about 600 targets 483 - "-Dtests=false" 484 - "-Dacl=${lib.boolToString withAcl}" 485 - "-Danalyze=${lib.boolToString withAnalyze}" 486 - "-Daudit=${lib.boolToString withAudit}" 487 - "-Dgcrypt=${lib.boolToString wantGcrypt}" 488 - "-Dimportd=${lib.boolToString withImportd}" 489 - "-Dlz4=${lib.boolToString withCompression}" 490 - "-Dhomed=${lib.boolToString withHomed}" 491 - "-Dlogind=${lib.boolToString withLogind}" 492 - "-Dlocaled=${lib.boolToString withLocaled}" 493 - "-Dhostnamed=${lib.boolToString withHostnamed}" 494 - "-Dmachined=${lib.boolToString withMachined}" 495 - "-Dnetworkd=${lib.boolToString withNetworkd}" 496 - "-Doomd=${lib.boolToString withOomd}" 497 - "-Dpolkit=${lib.boolToString withPolkit}" 498 - "-Dlibcryptsetup=${lib.boolToString withCryptsetup}" 499 - "-Dportabled=${lib.boolToString withPortabled}" 500 - "-Dhwdb=${lib.boolToString withHwdb}" 501 - "-Dremote=${lib.boolToString withRemote}" 502 - "-Dtimedated=${lib.boolToString withTimedated}" 503 - "-Dtimesyncd=${lib.boolToString withTimesyncd}" 504 - "-Duserdb=${lib.boolToString withUserDb}" 505 - "-Dcoredump=${lib.boolToString withCoredump}" 506 - "-Dfirstboot=false" 507 - "-Dresolve=${lib.boolToString withResolved}" 508 - "-Dsplit-usr=false" 509 - "-Dlibcurl=${lib.boolToString wantCurl}" 510 - "-Dlibidn=false" 511 - "-Dlibidn2=${lib.boolToString withLibidn2}" 512 - "-Dfirstboot=${lib.boolToString withFirstboot}" 513 - "-Dsysusers=${lib.boolToString withSysusers}" 514 - "-Drepart=${lib.boolToString withRepart}" 515 - "-Dsysupdate=${lib.boolToString withSysupdate}" 516 - "-Dquotacheck=false" 517 - "-Dldconfig=false" 518 - "-Dsmack=true" 519 - "-Db_pie=true" 520 - "-Dinstall-sysconfdir=false" 521 - "-Dsbat-distro=nixos" 522 - "-Dsbat-distro-summary=NixOS" 523 - "-Dsbat-distro-url=https://nixos.org/" 524 - "-Dsbat-distro-pkgname=${pname}" 525 - "-Dsbat-distro-version=${version}" 526 - /* 527 - As of now, systemd doesn't allow runtime configuration of these values. So 528 - the settings in /etc/login.defs have no effect on it. Many people think this 529 - should be supported however, see 530 - - https://github.com/systemd/systemd/issues/3855 531 - - https://github.com/systemd/systemd/issues/4850 532 - - https://github.com/systemd/systemd/issues/9769 533 - - https://github.com/systemd/systemd/issues/9843 534 - - https://github.com/systemd/systemd/issues/10184 535 - */ 536 - "-Dsystem-uid-max=999" 537 - "-Dsystem-gid-max=999" 538 539 - "-Dsysvinit-path=" 540 - "-Dsysvrcnd-path=" 541 542 - "-Dsulogin-path=${util-linux.login}/bin/sulogin" 543 - "-Dnologin-path=${util-linux.login}/bin/nologin" 544 - "-Dmount-path=${lib.getOutput "mount" util-linux}/bin/mount" 545 - "-Dumount-path=${lib.getOutput "mount" util-linux}/bin/umount" 546 - "-Dcreate-log-dirs=false" 547 548 - # Use cgroupsv2. This is already the upstream default, but better be explicit. 549 - "-Ddefault-hierarchy=unified" 550 - # Upstream defaulted to disable manpages since they optimize for the much 551 - # more frequent development builds 552 - "-Dman=true" 553 554 - "-Defi=${lib.boolToString withEfi}" 555 - "-Dbootloader=${lib.boolToString withBootloader}" 556 557 - "-Dukify=${lib.boolToString withUkify}" 558 ] ++ lib.optionals (withShellCompletions == false) [ 559 - "-Dbashcompletiondir=no" 560 - "-Dzshcompletiondir=no" 561 - ] ++ lib.optionals (!withNss) [ 562 - "-Dnss-myhostname=false" 563 - "-Dnss-mymachines=false" 564 - "-Dnss-resolve=false" 565 - "-Dnss-systemd=false" 566 - ] ++ lib.optionals withLibBPF [ 567 - "-Dbpf-framework=true" 568 - ] ++ lib.optionals withTpm2Tss [ 569 - "-Dtpm2=true" 570 - ] ++ lib.optionals (!withUtmp) [ 571 - "-Dutmp=false" 572 ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 573 - "-Dgshadow=false" 574 - "-Didn=false" 575 - ] ++ lib.optionals withKmod [ 576 - "-Dkmod=true" 577 - "-Dkmod-path=${kmod}/bin/kmod" 578 - ] ++ lib.optionals withLogTrace [ 579 - "-Dlog-trace=true" 580 ]; 581 preConfigure = 582 let ··· 753 754 # Wrap in the correct path for LUKS2 tokens. 755 postFixup = lib.optionalString withCryptsetup '' 756 - for f in lib/systemd/systemd-cryptsetup bin/systemd-cryptenroll; do 757 # This needs to be in LD_LIBRARY_PATH because rpath on a binary is not propagated to libraries using dlopen, in this case `libcryptsetup.so` 758 wrapProgram $out/$f --prefix LD_LIBRARY_PATH : ${placeholder "out"}/lib/cryptsetup 759 done ··· 763 # To cross compile a derivation that builds a UKI with ukify, we need to wrap 764 # ukify with the correct binutils. When wrapping, no splicing happens so we 765 # have to explicitly pull binutils from targetPackages. 766 - wrapProgram $out/lib/systemd/ukify --prefix PATH : ${lib.makeBinPath [ targetPackages.stdenv.cc.bintools ] }:${placeholder "out"}/lib/systemd 767 ''; 768 769 disallowedReferences = lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform)
··· 5 , nixosTests 6 , pkgsCross 7 , fetchFromGitHub 8 , fetchzip 9 , buildPackages 10 , makeBinaryWrapper ··· 19 20 # glib is only used during tests (test-bus-gvariant, test-bus-marshal) 21 , glib 22 , gettext 23 , python3Packages 24 ··· 50 , intltool 51 , bzip2 52 , pcre2 53 , elfutils 54 , linuxHeaders ? stdenv.cc.libc.linuxHeaders 55 , gnutls ··· 65 , libmicrohttpd 66 , libfido2 67 , p11-kit 68 + , libpwquality 69 + , qrencode 70 71 # the (optional) BPF feature requires bpftool, libbpf, clang and llvm-strip to be available during build time. 72 # Only libbpf should be a runtime dependency. ··· 105 , withHostnamed ? true 106 , withHwdb ? true 107 , withImportd ? !stdenv.hostPlatform.isMusl 108 + , withIptables ? true 109 , withKmod ? true 110 , withLibBPF ? lib.versionAtLeast buildPackages.llvmPackages.clang.version "10.0" 111 && (stdenv.hostPlatform.isAarch -> lib.versionAtLeast stdenv.hostPlatform.parsed.cpu.version "6") # assumes hard floats ··· 126 , withNss ? !stdenv.hostPlatform.isMusl 127 , withOomd ? true 128 , withPam ? true 129 + , withPasswordQuality ? true 130 , withPCRE2 ? true 131 , withPolkit ? true 132 , withPortabled ? !stdenv.hostPlatform.isMusl 133 + , withQrencode ? true 134 , withRemote ? !stdenv.hostPlatform.isMusl 135 , withResolved ? true 136 , withShellCompletions ? true ··· 142 , withUkify ? false # adds python to closure which is too much by default 143 , withUserDb ? true 144 , withUtmp ? !stdenv.hostPlatform.isMusl 145 + , withVmspawn ? true 146 # tests assume too much system access for them to be feasible for us right now 147 , withTests ? false 148 # build only libudev and libsystemd ··· 165 assert withUkify -> (withEfi && withBootloader); 166 assert withRepart -> withCryptsetup; 167 assert withBootloader -> withEfi; 168 169 let 170 wantCurl = withRemote || withImportd; 171 wantGcrypt = withResolved || withImportd; 172 + version = "255.2"; 173 174 # Bump this variable on every (major) version change. See below (in the meson options list) for why. 175 # command: 176 # $ curl -s https://api.github.com/repos/systemd/systemd/releases/latest | \ 177 # jq '.created_at|strptime("%Y-%m-%dT%H:%M:%SZ")|mktime' 178 + releaseTimestamp = "1701895110"; 179 in 180 stdenv.mkDerivation (finalAttrs: { 181 inherit pname version; ··· 186 owner = "systemd"; 187 repo = "systemd-stable"; 188 rev = "v${version}"; 189 + hash = "sha256-8SfJY/pcH4yrDeJi0GfIUpetTbpMwyswvSu+RSfgqfY="; 190 }; 191 192 # On major changes, or when otherwise required, you *must* reformat the patches, ··· 201 ./0004-Add-some-NixOS-specific-unit-directories.patch 202 ./0005-Get-rid-of-a-useless-message-in-user-sessions.patch 203 ./0006-hostnamed-localed-timedated-disable-methods-that-cha.patch 204 + ./0007-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch 205 + ./0008-localectl-use-etc-X11-xkb-for-list-x11.patch 206 + ./0009-add-rootprefix-to-lookup-dir-paths.patch 207 + ./0010-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch 208 + ./0011-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch 209 + ./0012-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch 210 + ./0013-inherit-systemd-environment-when-calling-generators.patch 211 + ./0014-core-don-t-taint-on-unmerged-usr.patch 212 + ./0015-tpm2_context_init-fix-driver-name-checking.patch 213 + ./0016-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch 214 + ./0017-meson.build-do-not-create-systemdstatedir.patch 215 ] ++ lib.optional (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 216 + ./0018-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch 217 ] ++ lib.optional stdenv.hostPlatform.isMusl ( 218 let 219 oe-core = fetchzip { ··· 297 { name = "libbpf.so.1"; pkg = opt withLibBPF libbpf; } 298 { name = "libbpf.so.0"; pkg = null; } 299 300 + # We did never provide support for libxkbcommon 301 { name = "libxkbcommon.so.0"; pkg = null; } 302 + 303 + # qrencode 304 + { name = "libqrencode.so.4"; pkg = opt withQrencode qrencode; } 305 { name = "libqrencode.so.3"; pkg = null; } 306 307 + # Password quality 308 + # We currently do not package passwdqc, only libpwquality. 309 + { name = "libpwquality.so.1"; pkg = opt withPasswordQuality libpwquality; } 310 + { name = "libpasswdqc.so.1"; pkg = null; } 311 312 # Only include cryptsetup if it is enabled. We might not be able to 313 # provide it during "bootstrap" in e.g. the minimal systemd build as ··· 339 # Support for PKCS#11 in systemd-cryptsetup, systemd-cryptenroll and systemd-homed 340 { name = "libp11-kit.so.0"; pkg = opt (withHomed || withCryptsetup) p11-kit; } 341 342 + { name = "libip4tc.so.2"; pkg = opt withIptables iptables; } 343 ]; 344 345 patchDlOpen = dl: ··· 434 ++ lib.optional withApparmor libapparmor 435 ++ lib.optional withAudit audit 436 ++ lib.optional wantCurl (lib.getDev curl) 437 + ++ lib.optionals withCompression [ zlib bzip2 lz4 xz zstd ] 438 ++ lib.optional withCoredump elfutils 439 ++ lib.optional withCryptsetup (lib.getDev cryptsetup.dev) 440 ++ lib.optional withKexectools kexec-tools 441 ++ lib.optional withKmod kmod 442 ++ lib.optional withLibidn2 libidn2 443 ++ lib.optional withLibseccomp libseccomp 444 + ++ lib.optional withIptables iptables 445 ++ lib.optional withPam pam 446 ++ lib.optional withPCRE2 pcre2 447 ++ lib.optional withSelinux libselinux ··· 451 ++ lib.optionals withLibBPF [ libbpf ] 452 ++ lib.optional withTpm2Tss tpm2-tss 453 ++ lib.optional withUkify (python3Packages.python.withPackages (ps: with ps; [ pefile ])) 454 + ++ lib.optionals withPasswordQuality [ libpwquality ] 455 + ++ lib.optionals withQrencode [ qrencode ] 456 ; 457 458 mesonBuildType = "release"; 459 460 mesonFlags = [ 461 + # Options 462 + 463 # We bump this variable on every (major) version change to ensure 464 # that we have known-good value for a timestamp that is in the (not so distant) past. 465 # This serves as a lower bound for valid system timestamps during startup. Systemd will 466 # reset the system timestamp if this date is +- 15 years from the system time. 467 # See the systemd v250 release notes for further details: 468 # https://github.com/systemd/systemd/blob/60e930fc3e6eb8a36fbc184773119eb8d2f30364/NEWS#L258-L266 469 + (lib.mesonOption "time-epoch" releaseTimestamp) 470 + 471 + (lib.mesonOption "version-tag" version) 472 + (lib.mesonOption "mode" "release") 473 + (lib.mesonOption "tty-gid" "3") # tty in NixOS has gid 3 474 + (lib.mesonOption "debug-shell" "${bashInteractive}/bin/bash") 475 + (lib.mesonOption "pamconfdir" "${placeholder "out"}/etc/pam.d") 476 + # Use cgroupsv2. This is already the upstream default, but better be explicit. 477 + (lib.mesonOption "default-hierarchy" "unified") 478 + (lib.mesonOption "kmod-path" "${kmod}/bin/kmod") 479 + 480 + # D-Bus 481 + (lib.mesonOption "dbuspolicydir" "${placeholder "out"}/share/dbus-1/system.d") 482 + (lib.mesonOption "dbussessionservicedir" "${placeholder "out"}/share/dbus-1/services") 483 + (lib.mesonOption "dbussystemservicedir" "${placeholder "out"}/share/dbus-1/system-services") 484 + 485 + # pkgconfig 486 + (lib.mesonOption "pkgconfiglibdir" "${placeholder "dev"}/lib/pkgconfig") 487 + (lib.mesonOption "pkgconfigdatadir" "${placeholder "dev"}/share/pkgconfig") 488 + 489 + # Keyboard 490 + (lib.mesonOption "loadkeys-path" "${kbd}/bin/loadkeys") 491 + (lib.mesonOption "setfont-path" "${kbd}/bin/setfont") 492 + 493 + # SBAT 494 + (lib.mesonOption "sbat-distro" "nixos") 495 + (lib.mesonOption "sbat-distro-summary" "NixOS") 496 + (lib.mesonOption "sbat-distro-url" "https://nixos.org/") 497 + (lib.mesonOption "sbat-distro-pkgname" pname) 498 + (lib.mesonOption "sbat-distro-version" version) 499 + 500 + # Users 501 + (lib.mesonOption "system-uid-max" "999") 502 + (lib.mesonOption "system-gid-max" "999") 503 + 504 + # SysVinit 505 + (lib.mesonOption "sysvinit-path" "") 506 + (lib.mesonOption "sysvrcnd-path" "") 507 + 508 + # Login 509 + (lib.mesonOption "sulogin-path" "${util-linux.login}/bin/sulogin") 510 + (lib.mesonOption "nologin-path" "${util-linux.login}/bin/nologin") 511 + 512 + # Mount 513 + (lib.mesonOption "mount-path" "${lib.getOutput "mount" util-linux}/bin/mount") 514 + (lib.mesonOption "umount-path" "${lib.getOutput "mount" util-linux}/bin/umount") 515 + 516 + 517 + # Features 518 + 519 + # Tests 520 + (lib.mesonBool "tests" withTests) 521 + (lib.mesonEnable "glib" withTests) 522 + (lib.mesonEnable "dbus" withTests) 523 + 524 + # Compression 525 + (lib.mesonEnable "bzip2" withCompression) 526 + (lib.mesonEnable "lz4" withCompression) 527 + (lib.mesonEnable "xz" withCompression) 528 + (lib.mesonEnable "zstd" withCompression) 529 + (lib.mesonEnable "zlib" withCompression) 530 + 531 + # NSS 532 + (lib.mesonEnable "nss-mymachines" withNss) 533 + (lib.mesonEnable "nss-resolve" withNss) 534 + (lib.mesonBool "nss-myhostname" withNss) 535 + (lib.mesonBool "nss-systemd" withNss) 536 + 537 + # Cryptsetup 538 + (lib.mesonEnable "libcryptsetup" withCryptsetup) 539 + (lib.mesonEnable "libcryptsetup-plugins" withCryptsetup) 540 + (lib.mesonEnable "p11kit" (withHomed || withCryptsetup)) 541 542 + # FIDO2 543 + (lib.mesonEnable "libfido2" withFido2) 544 + (lib.mesonEnable "openssl" withFido2) 545 546 + # Password Quality 547 + (lib.mesonEnable "pwquality" withPasswordQuality) 548 + (lib.mesonEnable "passwdqc" false) 549 550 + # Remote 551 + (lib.mesonEnable "remote" withRemote) 552 + (lib.mesonEnable "microhttpd" withRemote) 553 554 + (lib.mesonEnable "pam" withPam) 555 + (lib.mesonEnable "acl" withAcl) 556 + (lib.mesonEnable "audit" withAudit) 557 + (lib.mesonEnable "apparmor" withApparmor) 558 + (lib.mesonEnable "gcrypt" wantGcrypt) 559 + (lib.mesonEnable "importd" withImportd) 560 + (lib.mesonEnable "homed" withHomed) 561 + (lib.mesonEnable "polkit" withPolkit) 562 + (lib.mesonEnable "elfutils" withCoredump) 563 + (lib.mesonEnable "libcurl" wantCurl) 564 + (lib.mesonEnable "libidn" false) 565 + (lib.mesonEnable "libidn2" withLibidn2) 566 + (lib.mesonEnable "libiptc" withIptables) 567 + (lib.mesonEnable "repart" withRepart) 568 + (lib.mesonEnable "sysupdate" withSysupdate) 569 + (lib.mesonEnable "selinux" withSelinux) 570 + (lib.mesonEnable "tpm2" withTpm2Tss) 571 + (lib.mesonEnable "pcre2" withPCRE2) 572 + (lib.mesonEnable "bpf-framework" withLibBPF) 573 + (lib.mesonEnable "bootloader" withBootloader) 574 + (lib.mesonEnable "ukify" withUkify) 575 + (lib.mesonEnable "kmod" withKmod) 576 + (lib.mesonEnable "qrencode" withQrencode) 577 + (lib.mesonEnable "vmspawn" withVmspawn) 578 + (lib.mesonEnable "xenctrl" false) 579 + (lib.mesonEnable "gnutls" false) 580 + (lib.mesonEnable "xkbcommon" false) 581 + (lib.mesonEnable "man" true) 582 583 + (lib.mesonBool "analyze" withAnalyze) 584 + (lib.mesonBool "logind" withLogind) 585 + (lib.mesonBool "localed" withLocaled) 586 + (lib.mesonBool "hostnamed" withHostnamed) 587 + (lib.mesonBool "machined" withMachined) 588 + (lib.mesonBool "networkd" withNetworkd) 589 + (lib.mesonBool "oomd" withOomd) 590 + (lib.mesonBool "portabled" withPortabled) 591 + (lib.mesonBool "hwdb" withHwdb) 592 + (lib.mesonBool "timedated" withTimedated) 593 + (lib.mesonBool "timesyncd" withTimesyncd) 594 + (lib.mesonBool "userdb" withUserDb) 595 + (lib.mesonBool "coredump" withCoredump) 596 + (lib.mesonBool "firstboot" withFirstboot) 597 + (lib.mesonBool "resolve" withResolved) 598 + (lib.mesonBool "sysusers" withSysusers) 599 + (lib.mesonBool "efi" withEfi) 600 + (lib.mesonBool "utmp" withUtmp) 601 + (lib.mesonBool "log-trace" withLogTrace) 602 + (lib.mesonBool "quotacheck" false) 603 + (lib.mesonBool "ldconfig" false) 604 + (lib.mesonBool "install-sysconfdir" false) 605 + (lib.mesonBool "create-log-dirs" false) 606 + (lib.mesonBool "smack" true) 607 + (lib.mesonBool "b_pie" true) 608 609 ] ++ lib.optionals (withShellCompletions == false) [ 610 + (lib.mesonOption "bashcompletiondir" "no") 611 + (lib.mesonOption "zshcompletiondir" "no") 612 ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 613 + (lib.mesonBool "gshadow" false) 614 + (lib.mesonBool "idn" false) 615 ]; 616 preConfigure = 617 let ··· 788 789 # Wrap in the correct path for LUKS2 tokens. 790 postFixup = lib.optionalString withCryptsetup '' 791 + for f in bin/systemd-cryptsetup bin/systemd-cryptenroll; do 792 # This needs to be in LD_LIBRARY_PATH because rpath on a binary is not propagated to libraries using dlopen, in this case `libcryptsetup.so` 793 wrapProgram $out/$f --prefix LD_LIBRARY_PATH : ${placeholder "out"}/lib/cryptsetup 794 done ··· 798 # To cross compile a derivation that builds a UKI with ukify, we need to wrap 799 # ukify with the correct binutils. When wrapping, no splicing happens so we 800 # have to explicitly pull binutils from targetPackages. 801 + wrapProgram $out/bin/ukify --prefix PATH : ${lib.makeBinPath [ targetPackages.stdenv.cc.bintools ] }:${placeholder "out"}/lib/systemd 802 ''; 803 804 disallowedReferences = lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform)
+2 -2
pkgs/servers/firebird/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, libedit, autoreconfHook, zlib, unzip, libtommath, libtomcrypt, icu, superServer ? false }: 2 3 let base = { 4 pname = "firebird"; ··· 13 maintainers = with maintainers; [ marcweber ]; 14 }; 15 16 - nativeBuildInputs = [ autoreconfHook ]; 17 18 buildInputs = [ libedit icu ]; 19
··· 1 + { lib, stdenv, fetchFromGitHub, libedit, autoreconfHook271, zlib, unzip, libtommath, libtomcrypt, icu, superServer ? false }: 2 3 let base = { 4 pname = "firebird"; ··· 13 maintainers = with maintainers; [ marcweber ]; 14 }; 15 16 + nativeBuildInputs = [ autoreconfHook271 ]; 17 18 buildInputs = [ libedit icu ]; 19
+2 -2
pkgs/servers/mqtt/flashmq/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "flashmq"; 5 - version = "1.4.5"; 6 7 src = fetchFromGitHub { 8 owner = "halfgaar"; 9 repo = "FlashMQ"; 10 rev = "v${version}"; 11 - hash = "sha256-DcxwwUNpnMeK8A3LuyfrWAMCng0yIcX9bKxNGY0uDSo="; 12 }; 13 14 nativeBuildInputs = [ cmake installShellFiles ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "flashmq"; 5 + version = "1.8.4"; 6 7 src = fetchFromGitHub { 8 owner = "halfgaar"; 9 repo = "FlashMQ"; 10 rev = "v${version}"; 11 + hash = "sha256-CMZim7FSTzjUaViVFq5OABOAUX3Aee+I3/HQhNIdIVM="; 12 }; 13 14 nativeBuildInputs = [ cmake installShellFiles ];
+11 -4
pkgs/servers/nosql/redis/default.nix
··· 1 - { lib, stdenv, fetchurl, lua, jemalloc, pkg-config, nixosTests 2 , tcl, which, ps, getconf 3 , withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, systemd 4 # dependency ordering is broken at the moment when building with openssl ··· 12 13 stdenv.mkDerivation (finalAttrs: { 14 pname = "redis"; 15 - version = "7.2.3"; 16 17 src = fetchurl { 18 url = "https://download.redis.io/releases/redis-${finalAttrs.version}.tar.gz"; 19 - hash = "sha256-PisZbW603bnnQwiL/CkVzLtC1A9aij7djLaccW7DS+c="; 20 }; 21 22 - patches = lib.optionals useSystemJemalloc [ 23 # use system jemalloc 24 (fetchurl { 25 url = "https://gitlab.archlinux.org/archlinux/packaging/packages/redis/-/raw/102cc861713c796756abd541bf341a4512eb06e6/redis-5.0-use-system-jemalloc.patch";
··· 1 + { lib, stdenv, fetchurl, fetchpatch, lua, jemalloc, pkg-config, nixosTests 2 , tcl, which, ps, getconf 3 , withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, systemd 4 # dependency ordering is broken at the moment when building with openssl ··· 12 13 stdenv.mkDerivation (finalAttrs: { 14 pname = "redis"; 15 + version = "7.2.4"; 16 17 src = fetchurl { 18 url = "https://download.redis.io/releases/redis-${finalAttrs.version}.tar.gz"; 19 + hash = "sha256-jRBMJqFUsp/WfWVotPN1ISISrUHgwsqj1mSA5429O1k="; 20 }; 21 22 + patches = [ 23 + # fixes: make test [exception]: Executing test client: permission denied 24 + # https://github.com/redis/redis/issues/12792 25 + (fetchpatch { 26 + url = "https://github.com/redis/redis/pull/12887.diff"; 27 + hash = "sha256-VZEMShW7Ckn5hLJHffQvE94Uly41WZW1bwvxny+Y3W8="; 28 + }) 29 + ] ++ lib.optionals useSystemJemalloc [ 30 # use system jemalloc 31 (fetchurl { 32 url = "https://gitlab.archlinux.org/archlinux/packaging/packages/redis/-/raw/102cc861713c796756abd541bf341a4512eb06e6/redis-5.0-use-system-jemalloc.patch";
+26 -1
pkgs/stdenv/generic/setup.sh
··· 815 ###################################################################### 816 # Textual substitution functions. 817 818 819 substituteStream() { 820 local var=$1 ··· 822 shift 2 823 824 while (( "$#" )); do 825 case "$1" in 826 --replace) 827 pattern="$2" 828 replacement="$3" 829 shift 3 ··· 832 eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}' 833 if [ "$pattern" != "$replacement" ]; then 834 if [ "${!var}" == "$savedvar" ]; then 835 - echo "substituteStream(): WARNING: pattern '$pattern' doesn't match anything in $description" >&2 836 fi 837 fi 838 ;;
··· 815 ###################################################################### 816 # Textual substitution functions. 817 818 + # only log once, due to max logging limit on hydra 819 + _substituteStream_has_warned_replace_deprecation="" 820 821 substituteStream() { 822 local var=$1 ··· 824 shift 2 825 826 while (( "$#" )); do 827 + local is_required=1 828 + local is_quiet="" 829 case "$1" in 830 + --replace-quiet) 831 + is_quiet=1 832 + ;& 833 --replace) 834 + # deprecated 2023-11-22 835 + # this will either get removed, or switch to the behaviour of --replace-fail in the future 836 + if [ -z "$_substituteStream_has_warned_replace_deprecation" ]; then 837 + echo "substituteStream(): WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. ($description)" >&2 838 + _substituteStream_has_warned_replace_deprecation=1 839 + fi 840 + ;& 841 + --replace-warn) 842 + is_required="" 843 + ;& 844 + --replace-fail) 845 pattern="$2" 846 replacement="$3" 847 shift 3 ··· 850 eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}' 851 if [ "$pattern" != "$replacement" ]; then 852 if [ "${!var}" == "$savedvar" ]; then 853 + if [ -z "$is_required" ]; then 854 + if [ -z "$is_quiet" ]; then 855 + printf "substituteStream(): WARNING: pattern %q doesn't match anything in %s\n" "$pattern" "$description" >&2 856 + fi 857 + else 858 + printf "substituteStream(): ERROR: pattern %q doesn't match anything in %s\n" "$pattern" "$description" >&2 859 + return 1 860 + fi 861 fi 862 fi 863 ;;
+2 -2
pkgs/tools/graphics/spirv-cross/default.nix
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "spirv-cross"; 5 - version = "1.3.268.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "SPIRV-Cross"; 10 rev = "vulkan-sdk-${finalAttrs.version}"; 11 - hash = "sha256-UIk5hihUPjXNzEeO2laS4dUef/rEExxXAZjMcftx+3A="; 12 }; 13 14 nativeBuildInputs = [ cmake python3 ];
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "spirv-cross"; 5 + version = "1.3.275.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "SPIRV-Cross"; 10 rev = "vulkan-sdk-${finalAttrs.version}"; 11 + hash = "sha256-Mhr3Yxm5MeLLQFmxWmtXLsq+ZcOE+KMs+3iiTYF8t30="; 12 }; 13 14 nativeBuildInputs = [ cmake python3 ];
+2 -2
pkgs/tools/graphics/vulkan-extension-layer/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "vulkan-extension-layer"; 5 - version = "1.3.268.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "Vulkan-ExtensionLayer"; 10 rev = "vulkan-sdk-${version}"; 11 - hash = "sha256-rSKPTeTDOz6IeJGRt9aIu1VH8VfVzXNYZfjdiSXEJxg="; 12 }; 13 14 nativeBuildInputs = [ cmake pkg-config jq ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "vulkan-extension-layer"; 5 + version = "1.3.275.0"; 6 7 src = fetchFromGitHub { 8 owner = "KhronosGroup"; 9 repo = "Vulkan-ExtensionLayer"; 10 rev = "vulkan-sdk-${version}"; 11 + hash = "sha256-zQycF3yKoa54KBUIuG1BqFGB00yc6oZQzdcDel2rXN0="; 12 }; 13 14 nativeBuildInputs = [ cmake pkg-config jq ];
+2 -2
pkgs/tools/graphics/vulkan-tools-lunarg/default.nix
··· 26 27 stdenv.mkDerivation rec { 28 pname = "vulkan-tools-lunarg"; 29 - version = "1.3.268.0"; 30 31 src = fetchFromGitHub { 32 owner = "LunarG"; 33 repo = "VulkanTools"; 34 rev = "vulkan-sdk-${version}"; 35 - hash = "sha256-2ZUD+RBsl35QV3250JOPCIoJb4sJcBsiRE4SZaS6ROs="; 36 }; 37 38 nativeBuildInputs = [ cmake python3 jq which pkg-config libsForQt5.qt5.wrapQtAppsHook ];
··· 26 27 stdenv.mkDerivation rec { 28 pname = "vulkan-tools-lunarg"; 29 + version = "1.3.275.0"; 30 31 src = fetchFromGitHub { 32 owner = "LunarG"; 33 repo = "VulkanTools"; 34 rev = "vulkan-sdk-${version}"; 35 + hash = "sha256-MEQX90HL90jyVBWWcvOF7QLzm1+fNE5TW3MWdK4w53M="; 36 }; 37 38 nativeBuildInputs = [ cmake python3 jq which pkg-config libsForQt5.qt5.wrapQtAppsHook ];
+4 -2
pkgs/tools/graphics/vulkan-tools/default.nix
··· 14 , libXrandr 15 , vulkan-headers 16 , vulkan-loader 17 , wayland 18 , wayland-protocols 19 , moltenvk ··· 23 24 stdenv.mkDerivation rec { 25 pname = "vulkan-tools"; 26 - version = "1.3.268.0"; 27 28 src = fetchFromGitHub { 29 owner = "KhronosGroup"; 30 repo = "Vulkan-Tools"; 31 rev = "vulkan-sdk-${version}"; 32 - hash = "sha256-IsMxiAR4ak6kC3BNYhtI+JVNkEka4ZceSElxk39THXg="; 33 }; 34 35 nativeBuildInputs = [ ··· 42 glslang 43 vulkan-headers 44 vulkan-loader 45 ] ++ lib.optionals (!stdenv.isDarwin) [ 46 libffi 47 libX11
··· 14 , libXrandr 15 , vulkan-headers 16 , vulkan-loader 17 + , vulkan-volk 18 , wayland 19 , wayland-protocols 20 , moltenvk ··· 24 25 stdenv.mkDerivation rec { 26 pname = "vulkan-tools"; 27 + version = "1.3.275.0"; 28 29 src = fetchFromGitHub { 30 owner = "KhronosGroup"; 31 repo = "Vulkan-Tools"; 32 rev = "vulkan-sdk-${version}"; 33 + hash = "sha256-0sAwO8gXzpMst+7l7LS1oiDLo9E6otDktCti+v8jwDw="; 34 }; 35 36 nativeBuildInputs = [ ··· 43 glslang 44 vulkan-headers 45 vulkan-loader 46 + vulkan-volk 47 ] ++ lib.optionals (!stdenv.isDarwin) [ 48 libffi 49 libX11
+2 -2
pkgs/tools/inputmethods/m17n-lib/default.nix
··· 7 }: 8 stdenv.mkDerivation rec { 9 pname = "m17n-lib"; 10 - version = "1.8.2"; 11 12 src = fetchurl { 13 url = "https://download.savannah.gnu.org/releases/m17n/m17n-lib-${version}.tar.gz"; 14 - hash = "sha256-5bA0SvnxFdlJV6P5ud68T45nG2n4wf1eC2iKeU16J/I="; 15 }; 16 17 strictDeps = true;
··· 7 }: 8 stdenv.mkDerivation rec { 9 pname = "m17n-lib"; 10 + version = "1.8.4"; 11 12 src = fetchurl { 13 url = "https://download.savannah.gnu.org/releases/m17n/m17n-lib-${version}.tar.gz"; 14 + hash = "sha256-xqJYLG5PKowueihE+lx+s2Oq0lOLBS8gPHEGSd1CHMg="; 15 }; 16 17 strictDeps = true;
+4 -2
pkgs/tools/networking/curl/default.nix
··· 15 ), libkrb5 16 , http2Support ? true, nghttp2 17 , http3Support ? false, nghttp3, ngtcp2 18 , idnSupport ? false, libidn2 19 , ldapSupport ? false, openldap 20 , opensslSupport ? zlibSupport, openssl ··· 47 48 stdenv.mkDerivation (finalAttrs: { 49 pname = "curl"; 50 - version = "8.4.0"; 51 52 src = fetchurl { 53 urls = [ 54 "https://curl.haxx.se/download/curl-${finalAttrs.version}.tar.xz" 55 "https://github.com/curl/curl/releases/download/curl-${builtins.replaceStrings [ "." ] [ "_" ] finalAttrs.version}/curl-${finalAttrs.version}.tar.xz" 56 ]; 57 - hash = "sha256-FsYqnErw9wPSi9pte783ukcFWtNBTXDexj4uYzbyqC0="; 58 }; 59 60 patches = [ ··· 111 (lib.enableFeature c-aresSupport "ares") 112 (lib.enableFeature ldapSupport "ldap") 113 (lib.enableFeature ldapSupport "ldaps") 114 # --with-ca-fallback is only supported for openssl and gnutls https://github.com/curl/curl/blame/curl-8_0_1/acinclude.m4#L1640 115 (lib.withFeature (opensslSupport || gnutlsSupport) "ca-fallback") 116 (lib.withFeature http3Support "nghttp3")
··· 15 ), libkrb5 16 , http2Support ? true, nghttp2 17 , http3Support ? false, nghttp3, ngtcp2 18 + , websocketSupport ? false 19 , idnSupport ? false, libidn2 20 , ldapSupport ? false, openldap 21 , opensslSupport ? zlibSupport, openssl ··· 48 49 stdenv.mkDerivation (finalAttrs: { 50 pname = "curl"; 51 + version = "8.5.0"; 52 53 src = fetchurl { 54 urls = [ 55 "https://curl.haxx.se/download/curl-${finalAttrs.version}.tar.xz" 56 "https://github.com/curl/curl/releases/download/curl-${builtins.replaceStrings [ "." ] [ "_" ] finalAttrs.version}/curl-${finalAttrs.version}.tar.xz" 57 ]; 58 + hash = "sha256-QquNueINgpCjtjPn+7POwV2zTfZf0QFe+KweRyN1Dus="; 59 }; 60 61 patches = [ ··· 112 (lib.enableFeature c-aresSupport "ares") 113 (lib.enableFeature ldapSupport "ldap") 114 (lib.enableFeature ldapSupport "ldaps") 115 + (lib.enableFeature websocketSupport "websockets") 116 # --with-ca-fallback is only supported for openssl and gnutls https://github.com/curl/curl/blame/curl-8_0_1/acinclude.m4#L1640 117 (lib.withFeature (opensslSupport || gnutlsSupport) "ca-fallback") 118 (lib.withFeature http3Support "nghttp3")
+2 -8
pkgs/tools/networking/inetutils/default.nix
··· 1 { stdenv 2 , lib 3 , fetchurl 4 - , fetchpatch 5 , ncurses 6 , perl 7 , help2man ··· 12 13 stdenv.mkDerivation rec { 14 pname = "inetutils"; 15 - version = "2.4"; 16 17 src = fetchurl { 18 url = "mirror://gnu/${pname}/${pname}-${version}.tar.xz"; 19 - sha256 = "sha256-F4nWsbGlff4qere1M+6fXf2cv1tZuxuzwmEu0I0PaLI="; 20 }; 21 22 outputs = ["out" "apparmor"]; ··· 24 patches = [ 25 # https://git.congatec.com/yocto/meta-openembedded/commit/3402bfac6b595c622e4590a8ff5eaaa854e2a2a3 26 ./inetutils-1_9-PATH_PROCNET_DEV.patch 27 - (fetchpatch { 28 - name = "CVE-2023-40303.patch"; 29 - url = "https://git.savannah.gnu.org/cgit/inetutils.git/patch/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6"; 30 - hash = "sha256-I5skN537owfpFpAZr4vDKPHuERI6+oq5/hFW2RQeUxI="; 31 - }) 32 ]; 33 34 strictDeps = true;
··· 1 { stdenv 2 , lib 3 , fetchurl 4 , ncurses 5 , perl 6 , help2man ··· 11 12 stdenv.mkDerivation rec { 13 pname = "inetutils"; 14 + version = "2.5"; 15 16 src = fetchurl { 17 url = "mirror://gnu/${pname}/${pname}-${version}.tar.xz"; 18 + hash = "sha256-h2l9YKMeELXLhqnwZR4ex77pgyDQSMBzlDGqw9V2T7Y="; 19 }; 20 21 outputs = ["out" "apparmor"]; ··· 23 patches = [ 24 # https://git.congatec.com/yocto/meta-openembedded/commit/3402bfac6b595c622e4590a8ff5eaaa854e2a2a3 25 ./inetutils-1_9-PATH_PROCNET_DEV.patch 26 ]; 27 28 strictDeps = true;
+9
pkgs/tools/networking/libreswan/default.nix
··· 1 { lib 2 , stdenv 3 , fetchurl 4 , nixosTests 5 , pkg-config 6 , systemd ··· 113 -e '/test ! -d $(NSSDIR)/,+3d' \ 114 -i configs/Makefile 115 ''; 116 117 makeFlags = [ 118 "PREFIX=$(out)"
··· 1 { lib 2 , stdenv 3 , fetchurl 4 + , fetchpatch 5 , nixosTests 6 , pkg-config 7 , systemd ··· 114 -e '/test ! -d $(NSSDIR)/,+3d' \ 115 -i configs/Makefile 116 ''; 117 + 118 + patches = [ 119 + (fetchpatch { 120 + name = "ignoring-return-value.patch"; 121 + url = "https://github.com/libreswan/libreswan/commit/ba5bad09f55959872022fa506d5ac06eafe3a314.diff"; 122 + hash = "sha256-xJ8rZWoRtJixamGY8sjOS+63Lw3RX7620HlRWYfvSxc="; 123 + }) 124 + ]; 125 126 makeFlags = [ 127 "PREFIX=$(out)"
+2 -2
pkgs/tools/networking/modemmanager/default.nix
··· 23 24 stdenv.mkDerivation rec { 25 pname = "modemmanager"; 26 - version = "1.20.6"; 27 28 src = fetchFromGitLab { 29 domain = "gitlab.freedesktop.org"; 30 owner = "mobile-broadband"; 31 repo = "ModemManager"; 32 rev = version; 33 - hash = "sha256-/A4WTsUQVeZDi5ei6qBvqoWYLKdRcZaYZU8/qWOPrvM="; 34 }; 35 36 patches = [
··· 23 24 stdenv.mkDerivation rec { 25 pname = "modemmanager"; 26 + version = "1.22.0"; 27 28 src = fetchFromGitLab { 29 domain = "gitlab.freedesktop.org"; 30 owner = "mobile-broadband"; 31 repo = "ModemManager"; 32 rev = version; 33 + hash = "sha256-/D9b2rCCUhpDCUfSNAWR65+3EyUywzFdH1R17eSKRDo="; 34 }; 35 36 patches = [
+1 -1
pkgs/tools/networking/tun2socks/default.nix
··· 17 vendorHash = "sha256-zeiOcn33PnyoseYb0wynkn7MfGp3rHEYBStY98C6aR8="; 18 19 ldflags = [ 20 - "-w" "-s" "-buildid=" 21 "-X github.com/xjasonlyu/tun2socks/v2/internal/version.Version=v${version}" 22 "-X github.com/xjasonlyu/tun2socks/v2/internal/version.GitCommit=v${version}" 23 ];
··· 17 vendorHash = "sha256-zeiOcn33PnyoseYb0wynkn7MfGp3rHEYBStY98C6aR8="; 18 19 ldflags = [ 20 + "-w" "-s" 21 "-X github.com/xjasonlyu/tun2socks/v2/internal/version.Version=v${version}" 22 "-X github.com/xjasonlyu/tun2socks/v2/internal/version.GitCommit=v${version}" 23 ];
+1 -1
pkgs/tools/networking/v2ray/default.nix
··· 19 # https://github.com/Mic92/nix-update/pull/95 20 vendorHash = "sha256-ZBvHu4BEmQi6PQwRHuVwx/6X4gBqlRR44OktKRBGcs4="; 21 22 - ldflags = [ "-s" "-w" "-buildid=" ]; 23 24 subPackages = [ "main" ]; 25
··· 19 # https://github.com/Mic92/nix-update/pull/95 20 vendorHash = "sha256-ZBvHu4BEmQi6PQwRHuVwx/6X4gBqlRR44OktKRBGcs4="; 21 22 + ldflags = [ "-s" "-w" ]; 23 24 subPackages = [ "main" ]; 25
+1 -1
pkgs/tools/networking/xray/default.nix
··· 26 27 doCheck = false; 28 29 - ldflags = [ "-s" "-w" "-buildid=" ]; 30 subPackages = [ "main" ]; 31 32 installPhase = ''
··· 26 27 doCheck = false; 28 29 + ldflags = [ "-s" "-w" ]; 30 subPackages = [ "main" ]; 31 32 installPhase = ''
+200
pkgs/tools/security/gnupg/24-revert-rfc4880bis-defaults.patch
···
··· 1 + From 1e4f1550996334d2a631a5d769e937d29ace47bb Mon Sep 17 00:00:00 2001 2 + From: Jakub Jelen <jjelen@redhat.com> 3 + Date: Thu, 9 Feb 2023 16:38:58 +0100 4 + Subject: [PATCH gnupg] Revert the introduction of the RFC4880bis draft into 5 + defaults 6 + 7 + This reverts commit 4583f4fe2 (gpg: Merge --rfc4880bis features into 8 + --gnupg, 2022-10-31). 9 + --- 10 + g10/gpg.c | 35 ++++++++++++++++++++++++++++++++--- 11 + g10/keygen.c | 30 ++++++++++++++++++------------ 12 + 2 files changed, 50 insertions(+), 15 deletions(-) 13 + 14 + diff --git a/g10/gpg.c b/g10/gpg.c 15 + index dcab0a11a..796888013 100644 16 + --- a/g10/gpg.c 17 + +++ b/g10/gpg.c 18 + @@ -247,6 +247,7 @@ enum cmd_and_opt_values 19 + oGnuPG, 20 + oRFC2440, 21 + oRFC4880, 22 + + oRFC4880bis, 23 + oOpenPGP, 24 + oPGP7, 25 + oPGP8, 26 + @@ -636,6 +637,7 @@ static gpgrt_opt_t opts[] = { 27 + ARGPARSE_s_n (oGnuPG, "no-pgp8", "@"), 28 + ARGPARSE_s_n (oRFC2440, "rfc2440", "@"), 29 + ARGPARSE_s_n (oRFC4880, "rfc4880", "@"), 30 + + ARGPARSE_s_n (oRFC4880bis, "rfc4880bis", "@"), 31 + ARGPARSE_s_n (oOpenPGP, "openpgp", N_("use strict OpenPGP behavior")), 32 + ARGPARSE_s_n (oPGP7, "pgp6", "@"), 33 + ARGPARSE_s_n (oPGP7, "pgp7", "@"), 34 + @@ -978,7 +980,6 @@ static gpgrt_opt_t opts[] = { 35 + ARGPARSE_s_n (oNoop, "no-allow-multiple-messages", "@"), 36 + ARGPARSE_s_s (oNoop, "aead-algo", "@"), 37 + ARGPARSE_s_s (oNoop, "personal-aead-preferences","@"), 38 + - ARGPARSE_s_n (oNoop, "rfc4880bis", "@"), 39 + ARGPARSE_s_n (oNoop, "override-compliance-check", "@"), 40 + 41 + 42 + @@ -2227,7 +2228,7 @@ static struct gnupg_compliance_option compliance_options[] = 43 + { 44 + { "gnupg", oGnuPG }, 45 + { "openpgp", oOpenPGP }, 46 + - { "rfc4880bis", oGnuPG }, 47 + + { "rfc4880bis", oRFC4880bis }, 48 + { "rfc4880", oRFC4880 }, 49 + { "rfc2440", oRFC2440 }, 50 + { "pgp6", oPGP7 }, 51 + @@ -2243,8 +2244,28 @@ static struct gnupg_compliance_option compliance_options[] = 52 + static void 53 + set_compliance_option (enum cmd_and_opt_values option) 54 + { 55 + + opt.flags.rfc4880bis = 0; /* Clear because it is initially set. */ 56 + + 57 + switch (option) 58 + { 59 + + case oRFC4880bis: 60 + + opt.flags.rfc4880bis = 1; 61 + + opt.compliance = CO_RFC4880; 62 + + opt.flags.dsa2 = 1; 63 + + opt.flags.require_cross_cert = 1; 64 + + opt.rfc2440_text = 0; 65 + + opt.allow_non_selfsigned_uid = 1; 66 + + opt.allow_freeform_uid = 1; 67 + + opt.escape_from = 1; 68 + + opt.not_dash_escaped = 0; 69 + + opt.def_cipher_algo = 0; 70 + + opt.def_digest_algo = 0; 71 + + opt.cert_digest_algo = 0; 72 + + opt.compress_algo = -1; 73 + + opt.s2k_mode = 3; /* iterated+salted */ 74 + + opt.s2k_digest_algo = DIGEST_ALGO_SHA256; 75 + + opt.s2k_cipher_algo = CIPHER_ALGO_AES256; 76 + + break; 77 + case oOpenPGP: 78 + case oRFC4880: 79 + /* This is effectively the same as RFC2440, but with 80 + @@ -2288,6 +2309,7 @@ set_compliance_option (enum cmd_and_opt_values option) 81 + case oPGP8: opt.compliance = CO_PGP8; break; 82 + case oGnuPG: 83 + opt.compliance = CO_GNUPG; 84 + + opt.flags.rfc4880bis = 1; 85 + break; 86 + 87 + case oDE_VS: 88 + @@ -2491,6 +2513,7 @@ main (int argc, char **argv) 89 + opt.emit_version = 0; 90 + opt.weak_digests = NULL; 91 + opt.compliance = CO_GNUPG; 92 + + opt.flags.rfc4880bis = 1; 93 + 94 + /* Check special options given on the command line. */ 95 + orig_argc = argc; 96 + @@ -3033,6 +3056,7 @@ main (int argc, char **argv) 97 + case oOpenPGP: 98 + case oRFC2440: 99 + case oRFC4880: 100 + + case oRFC4880bis: 101 + case oPGP7: 102 + case oPGP8: 103 + case oGnuPG: 104 + @@ -3862,6 +3886,11 @@ main (int argc, char **argv) 105 + if( may_coredump && !opt.quiet ) 106 + log_info(_("WARNING: program may create a core file!\n")); 107 + 108 + + if (!opt.flags.rfc4880bis) 109 + + { 110 + + opt.mimemode = 0; /* This will use text mode instead. */ 111 + + } 112 + + 113 + if (eyes_only) { 114 + if (opt.set_filename) 115 + log_info(_("WARNING: %s overrides %s\n"), 116 + @@ -4078,7 +4107,7 @@ main (int argc, char **argv) 117 + /* Check our chosen algorithms against the list of legal 118 + algorithms. */ 119 + 120 + - if(!GNUPG) 121 + + if(!GNUPG && !opt.flags.rfc4880bis) 122 + { 123 + const char *badalg=NULL; 124 + preftype_t badtype=PREFTYPE_NONE; 125 + diff --git a/g10/keygen.c b/g10/keygen.c 126 + index a2cfe3ccf..2a1dd1f81 100644 127 + --- a/g10/keygen.c 128 + +++ b/g10/keygen.c 129 + @@ -404,7 +404,7 @@ keygen_set_std_prefs (const char *string,int personal) 130 + strcat(dummy_string,"S7 "); 131 + strcat(dummy_string,"S2 "); /* 3DES */ 132 + 133 + - if (!openpgp_aead_test_algo (AEAD_ALGO_OCB)) 134 + + if (opt.flags.rfc4880bis && !openpgp_aead_test_algo (AEAD_ALGO_OCB)) 135 + strcat(dummy_string,"A2 "); 136 + 137 + if (personal) 138 + @@ -889,7 +889,7 @@ keygen_upd_std_prefs (PKT_signature *sig, void *opaque) 139 + /* Make sure that the MDC feature flag is set if needed. */ 140 + add_feature_mdc (sig,mdc_available); 141 + add_feature_aead (sig, aead_available); 142 + - add_feature_v5 (sig, 1); 143 + + add_feature_v5 (sig, opt.flags.rfc4880bis); 144 + add_keyserver_modify (sig,ks_modify); 145 + keygen_add_keyserver_url(sig,NULL); 146 + 147 + @@ -3382,7 +3382,10 @@ parse_key_parameter_part (ctrl_t ctrl, 148 + } 149 + } 150 + else if (!ascii_strcasecmp (s, "v5")) 151 + - keyversion = 5; 152 + + { 153 + + if (opt.flags.rfc4880bis) 154 + + keyversion = 5; 155 + + } 156 + else if (!ascii_strcasecmp (s, "v4")) 157 + keyversion = 4; 158 + else 159 + @@ -3641,7 +3644,7 @@ parse_key_parameter_part (ctrl_t ctrl, 160 + * ecdsa := Use algorithm ECDSA. 161 + * eddsa := Use algorithm EdDSA. 162 + * ecdh := Use algorithm ECDH. 163 + - * v5 := Create version 5 key 164 + + * v5 := Create version 5 key (requires option --rfc4880bis) 165 + * 166 + * There are several defaults and fallbacks depending on the 167 + * algorithm. PART can be used to select which part of STRING is 168 + @@ -4513,9 +4516,9 @@ read_parameter_file (ctrl_t ctrl, const char *fname ) 169 + } 170 + } 171 + 172 + - if ((keywords[i].key == pVERSION 173 + - || keywords[i].key == pSUBVERSION)) 174 + - ; /* Ignore version. */ 175 + + if (!opt.flags.rfc4880bis && (keywords[i].key == pVERSION 176 + + || keywords[i].key == pSUBVERSION)) 177 + + ; /* Ignore version unless --rfc4880bis is active. */ 178 + else 179 + { 180 + r = xmalloc_clear( sizeof *r + strlen( value ) ); 181 + @@ -4610,11 +4613,14 @@ quickgen_set_para (struct para_data_s *para, int for_subkey, 182 + para = r; 183 + } 184 + 185 + - r = xmalloc_clear (sizeof *r + 20); 186 + - r->key = for_subkey? pSUBVERSION : pVERSION; 187 + - snprintf (r->u.value, 20, "%d", version); 188 + - r->next = para; 189 + - para = r; 190 + + if (opt.flags.rfc4880bis) 191 + + { 192 + + r = xmalloc_clear (sizeof *r + 20); 193 + + r->key = for_subkey? pSUBVERSION : pVERSION; 194 + + snprintf (r->u.value, 20, "%d", version); 195 + + r->next = para; 196 + + para = r; 197 + + } 198 + 199 + if (keytime) 200 + {
+3 -2
pkgs/tools/security/gnupg/24.nix
··· 13 14 stdenv.mkDerivation rec { 15 pname = "gnupg"; 16 - version = "2.4.1"; 17 18 src = fetchurl { 19 url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2"; 20 - hash = "sha256-drceWutEO/2RDOnLyCgbYXyDQWh6+2e65FWHeXK1neg="; 21 }; 22 23 depsBuildBuild = [ buildPackages.stdenv.cc ]; ··· 33 ./tests-add-test-cases-for-import-without-uid.patch 34 ./accept-subkeys-with-a-good-revocation-but-no-self-sig.patch 35 ./24-allow-import-of-previously-known-keys-even-without-UI.patch 36 # Patch for DoS vuln from https://seclists.org/oss-sec/2022/q3/27 37 ./v3-0001-Disallow-compressed-signatures-and-certificates.patch 38 ];
··· 13 14 stdenv.mkDerivation rec { 15 pname = "gnupg"; 16 + version = "2.4.3"; 17 18 src = fetchurl { 19 url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2"; 20 + hash = "sha256-onGubXMvb02AwlitnuiN2clMj9wzw+RTKMTXwSa9IZ0="; 21 }; 22 23 depsBuildBuild = [ buildPackages.stdenv.cc ]; ··· 33 ./tests-add-test-cases-for-import-without-uid.patch 34 ./accept-subkeys-with-a-good-revocation-but-no-self-sig.patch 35 ./24-allow-import-of-previously-known-keys-even-without-UI.patch 36 + ./24-revert-rfc4880bis-defaults.patch 37 # Patch for DoS vuln from https://seclists.org/oss-sec/2022/q3/27 38 ./v3-0001-Disallow-compressed-signatures-and-certificates.patch 39 ];
-1
pkgs/tools/security/slsa-verifier/default.nix
··· 27 ldflags = [ 28 "-s" 29 "-w" 30 - "-buildid=" 31 "-X sigs.k8s.io/release-utils/version.gitVersion=${version}" 32 ]; 33
··· 27 ldflags = [ 28 "-s" 29 "-w" 30 "-X sigs.k8s.io/release-utils/version.gitVersion=${version}" 31 ]; 32
-4
pkgs/tools/security/step-ca/default.nix
··· 23 24 vendorHash = "sha256-AXMMpzXEhdKSGeVg/KK2NEgalxIXP6DUTcoxOQVqow4="; 25 26 - ldflags = [ 27 - "-buildid=" 28 - ]; 29 - 30 nativeBuildInputs = lib.optionals hsmSupport [ 31 pkg-config 32 ];
··· 23 24 vendorHash = "sha256-AXMMpzXEhdKSGeVg/KK2NEgalxIXP6DUTcoxOQVqow4="; 25 26 nativeBuildInputs = lib.optionals hsmSupport [ 27 pkg-config 28 ];
+17 -4
pkgs/tools/text/groff/site.tmac
··· 1 . 2 .if n \{\ 3 - . \" Character translations for non-keyboard 4 - . \" characters - to make them searchable 5 . if '\*[.T]'utf8' \{\ 6 . char \- \N'45' 7 . char - \N'45' 8 - . char ' \N'39' 9 - . char \' \N'39' 10 . \} 11 . 12 .ds doc-default-operating-system Nixpkgs 13 .ds doc-volume-operating-system Nixpkgs
··· 1 . 2 .if n \{\ 3 + . \" With groff 1.23.0 "[t]he 'utf8' output device now maps the input 4 + . \" characters '^' (caret, circumflex accent, or 'hat') and '~' (tilde) 5 + . \" to U+02C6 (modifier letter circumflex accent) and U+02DC (small tilde), 6 + . \" respectively, for consistency with groff's other output devices. 7 + . \" This change is expected to expose glyph usage errors in man pages. 8 + . \" See [http://git.savannah.gnu.org/cgit/groff.git/tree/PROBLEMS] for 9 + . \" a recipe that will conceal these errors" 10 + . \" -- https://lists.gnu.org/archive/html/groff/2023-07/msg00051.html 11 + . \" 12 + . \" Conceal glyph usage errors in man pages with the following 13 + . \" character translations for non-keyboard characters to make them searchable. 14 . if '\*[.T]'utf8' \{\ 15 . char \- \N'45' 16 . char - \N'45' 17 + . char \' \[aq] 18 + . char ' \[aq] 19 + . char ` \[ga] 20 + . char ^ \[ha] 21 + . char ~ \[ti] 22 . \} 23 + .\} 24 . 25 .ds doc-default-operating-system Nixpkgs 26 .ds doc-volume-operating-system Nixpkgs
+4 -4
pkgs/tools/video/rav1e/default.nix
··· 15 16 rustPlatform.buildRustPackage rec { 17 pname = "rav1e"; 18 - version = "0.6.6"; 19 20 src = fetchCrate { 21 inherit pname version; 22 - sha256 = "sha256-urYMT1sJUMBj1L/2Hi+hcYbWbi0ScSls0pm9gLj9H3o="; 23 }; 24 25 - cargoHash = "sha256-qQfEpynhlIEKU1Ptq/jM1Wdtn+BVCZT1lmou2S1GL4I="; 26 27 depsBuildBuild = [ pkg-config ]; 28 ··· 38 # Darwin uses `llvm-strip`, which results in link errors when using `-x` to strip the asm library 39 # and linking it with cctools ld64. 40 postPatch = lib.optionalString (stdenv.isDarwin && stdenv.isx86_64) '' 41 - substituteInPlace build.rs --replace 'cmd.arg("-x")' 'cmd.arg("-S")' 42 ''; 43 44 checkType = "debug";
··· 15 16 rustPlatform.buildRustPackage rec { 17 pname = "rav1e"; 18 + version = "0.7.1"; 19 20 src = fetchCrate { 21 inherit pname version; 22 + sha256 = "sha256-Db7qb7HBAy6lniIiN07iEzURmbfNtuhmgJRv7OUagUM="; 23 }; 24 25 + cargoHash = "sha256-VyQ6n2kIJ7OjK6Xlf0T0GNsBvgESRETzKZDZzAn8ZuY="; 26 27 depsBuildBuild = [ pkg-config ]; 28 ··· 38 # Darwin uses `llvm-strip`, which results in link errors when using `-x` to strip the asm library 39 # and linking it with cctools ld64. 40 postPatch = lib.optionalString (stdenv.isDarwin && stdenv.isx86_64) '' 41 + substituteInPlace build.rs --replace-fail '.arg("-x")' '.arg("-S")' 42 ''; 43 44 checkType = "debug";
+1 -14
pkgs/tools/virtualization/mkosi/default.nix
··· 30 let 31 # For systemd features used by mkosi, see 32 # https://github.com/systemd/mkosi/blob/19bb5e274d9a9c23891905c4bcbb8f68955a701d/action.yaml#L64-L72 33 - systemdForMkosi = (systemd.overrideAttrs (oldAttrs: { 34 - patches = oldAttrs.patches ++ [ 35 - # Enable setting a deterministic verity seed for systemd-repart. Remove when upgrading to systemd 255. 36 - (fetchpatch { 37 - url = "https://github.com/systemd/systemd/commit/81e04781106e3db24e9cf63c1d5fdd8215dc3f42.patch"; 38 - hash = "sha256-KO3poIsvdeepPmXWQXNaJJCPpmBb4sVmO+ur4om9f5k="; 39 - }) 40 - # repart: make sure rewinddir() is called before readdir() when performing rm -rf. Remove when upgrading to systemd 255. 41 - (fetchpatch { 42 - url = "https://github.com/systemd/systemd/commit/6bbb893b90e2dcb05fb310ba4608f9c9dc587845.patch"; 43 - hash = "sha256-A6cF2QAeYHGc0u0V1JMxIcV5shzf5x3Q6K+blZOWSn4="; 44 - }) 45 - ]; 46 - })).override { 47 withRepart = true; 48 withBootloader = true; 49 withSysusers = true;
··· 30 let 31 # For systemd features used by mkosi, see 32 # https://github.com/systemd/mkosi/blob/19bb5e274d9a9c23891905c4bcbb8f68955a701d/action.yaml#L64-L72 33 + systemdForMkosi = systemd.override { 34 withRepart = true; 35 withBootloader = true; 36 withSysusers = true;
+38 -28
pkgs/top-level/aliases.nix
··· 24 # to appear while listing all the packages available. 25 removeRecurseForDerivations = alias: with lib; 26 if alias.recurseForDerivations or false 27 - then removeAttrs alias ["recurseForDerivations"] 28 else alias; 29 30 # Disabling distribution prevents top-level aliases for non-recursed package ··· 41 else alias; 42 43 mapAliases = aliases: 44 - lib.mapAttrs (n: alias: 45 - removeDistribute 46 - (removeRecurseForDerivations 47 - (checkInPkgs n alias))) 48 aliases; 49 in 50 ··· 59 a4term = a4; # Added 2023-10-06 60 aether = throw "aether has been removed from nixpkgs; upstream unmaintained, security issues"; # Added 2023-10-03 61 airfield = throw "airfield has been removed due to being unmaintained"; # Added 2023-05-19 62 - alertmanager-bot = throw "alertmanager-bot is broken and has been archived by upstream" ; # Added 2023-07-28 63 alsa-project = throw "alsa-project was removed and its sub-attributes were promoted to top-level."; # Added 2023-11-12 64 alsaLib = alsa-lib; # Added 2021-06-09 65 alsaOss = alsa-oss; # Added 2021-06-10 ··· 102 bitwig-studio2 = throw "bitwig-studio2 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03 103 blender-with-packages = args: 104 lib.warn "blender-with-packages is deprecated in favor of blender.withPackages, e.g. `blender.withPackages(ps: [ ps.foobar ])`" 105 - (blender.withPackages (_: args.packages)).overrideAttrs (lib.optionalAttrs (args ? name) { pname = "blender-" + args.name; }); # Added 2023-10-30 106 bluezFull = throw "'bluezFull' has been renamed to/replaced by 'bluez'"; # Converted to throw 2023-09-10 107 bookletimposer = throw "bookletimposer has been removed from nixpkgs; upstream unmaintained and broke with pypdf3"; # Added 2024-01-01 108 boost168 = throw "boost168 has been deprecated in favor of the latest version"; # Added 2023-06-08 ··· 188 clang16Stdenv = lowPrio llvmPackages_16.stdenv; 189 clang17Stdenv = lowPrio llvmPackages_17.stdenv; 190 191 - clang-tools_6 = throw "clang-tools_6 has been removed from nixpkgs"; # Added 2024-01-08 192 - clang-tools_7 = throw "clang-tools_7 has been removed from nixpkgs"; # Added 2023-11-19 193 - clang_6 = throw "clang_6 has been removed from nixpkgs"; # Added 2024-01-08 194 - clang_7 = throw "clang_7 has been removed from nixpkgs"; # Added 2023-11-19 195 196 ### D ### 197 ··· 223 dotnet-sdk_3 = dotnetCorePackages.sdk_3_1; # Added 2020-01-19 224 dotnet-sdk_5 = dotnetCorePackages.sdk_5_0; # Added 2020-09-11 225 drgeo = throw "'drgeo' has been removed as it is outdated and unmaintained"; # Added 2023-10-15 226 - dtv-scan-tables_linuxtv = dtv-scan-tables; # Added 2023-03-03 227 - dtv-scan-tables_tvheadend = dtv-scan-tables; # Added 2023-03-03 228 dylibbundler = macdylibbundler; # Added 2021-04-24 229 230 ### E ### ··· 344 345 gnuradio-with-packages = gnuradio3_7.override { 346 extraPackages = lib.attrVals [ 347 - "osmosdr" "ais" "gsm" "nacl" "rds" "limesdr" 348 - ] gnuradio3_7Packages; 349 }; # Added 2020-10-16 350 351 gmock = gtest; # moved from top-level 2021-03-14 ··· 371 google-chrome-dev = throw "'google-chrome-dev' has been removed due to the lack of maintenance in nixpkgs. Consider using 'google-chrome' instead."; # Added 2023-10-18 372 google-gflags = throw "'google-gflags' has been renamed to/replaced by 'gflags'"; # Converted to throw 2023-09-10 373 go-thumbnailer = thud; # Added 2023-09-21 374 govendor = throw "'govendor' has been removed as it is no longer maintained upstream, please use Go modules instead"; # Added 2023-12-26 375 gometer = throw "gometer has been removed from nixpkgs because goLance stopped offering Linux support"; # Added 2023-02-10 376 ··· 471 kerberos = libkrb5; # moved from top-level 2021-03-14 472 kexectools = kexec-tools; # Added 2021-09-03 473 keysmith = libsForQt5.kdeGear.keysmith; # Added 2021-07-14 474 - kfctl = throw "kfctl is broken and has been archived by upstream" ; # Added 2023-08-21 475 kgx = gnome-console; # Added 2022-02-19 476 kibana7 = throw "Kibana 7.x has been removed from nixpkgs as it depends on an end of life Node.js version and received no maintenance in time."; # Added 2023-30-10 477 kibana = kibana7; ··· 518 librewolf-wayland = librewolf; # Added 2022-11-15 519 libseat = seatd; # Added 2021-06-24 520 libsigcxx12 = throw "'libsigcxx12' has been removed, please use newer versions"; # Added 2023-10-20 521 - libsForQt515 = libsForQt5; # Added 2022-11-24 522 libtensorflow-bin = libtensorflow; # Added 2022-09-25 523 libtorrentRasterbar = libtorrent-rasterbar; # Added 2020-12-20 524 libtorrentRasterbar-1_2_x = libtorrent-rasterbar-1_2_x; # Added 2020-12-20 ··· 705 neochat = libsForQt5.kdeGear.neochat; # added 2022-05-10 706 nitrokey-udev-rules = libnitrokey; # Added 2023-03-25 707 nix-direnv-flakes = nix-direnv; 708 - nix-repl = throw ( # Added 2018-08-26 709 "nix-repl has been removed because it's not maintained anymore, " + 710 "use `nix repl` instead. Also see https://github.com/NixOS/nixpkgs/pull/44903" 711 ); 712 nix-review = throw "'nix-review' has been renamed to/replaced by 'nixpkgs-review'"; # Converted to throw 2023-09-10 713 - nix-template-rpm = throw "'nix-template-rpm' has been removed as it is broken and unmaintained" ; # Added 2023-11-20 714 nixFlakes = nixVersions.stable; # Added 2021-05-21 715 nixStable = nixVersions.stable; # Added 2022-01-24 716 nixUnstable = nixVersions.unstable; # Added 2022-01-26 ··· 866 qlandkartegt = throw "'qlandkartegt' has been removed from nixpkgs, as it was broken and unmaintained"; # Added 2023-04-17 867 qscintilla = libsForQt5.qscintilla; # Added 2023-09-20 868 qscintilla-qt6 = qt6Packages.qscintilla; # Added 2023-09-20 869 - qt515 = qt5; # Added 2022-11-24 870 qt5ct = libsForQt5.qt5ct; # Added 2021-12-27 871 qt6ct = qt6Packages.qt6ct; # Added 2023-03-07 872 qtcurve = libsForQt5.qtcurve; # Added 2020-11-07 ··· 955 sgtpuzzles = throw "'sgtpuzzles' has been renamed to 'sgt-puzzles'"; # Added 2023-10-06 956 sgtpuzzles-mobile = throw "'sgtpuzzles-mobile' has been renamed to 'sgt-puzzles-mobile'"; # Added 2023-10-06 957 inherit (libsForQt5.mauiPackages) shelf; # added 2022-05-17 958 - shhgit = throw "shhgit is broken and is no longer maintained. See https://github.com/eth0izzle/shhgit#-shhgit-is-no-longer-maintained-" ; # Added 2023-08-08 959 shipyard = jumppad; # Added 2023-06-06 960 signumone-ks = throw "signumone-ks has been removed from nixpkgs because the developers stopped offering the binaries"; # Added 2023-08-17 961 simplenote = throw "'simplenote' has been removed because it is no longer maintained and insecure"; # Added 2023-10-09 ··· 1074 vamp = { vampSDK = vamp-plugin-sdk; }; # Added 2020-03-26 1075 vaapiIntel = intel-vaapi-driver; # Added 2023-05-31 1076 vaultwarden-vault = vaultwarden.webvault; # Added 2022-12-13 1077 - vdirsyncerStable = vdirsyncer; # Added 2020-11-08, see https://github.com/NixOS/nixpkgs/issues/103026#issuecomment-723428168 1078 ventoy-bin = ventoy; # Added 2023-04-12 1079 ventoy-bin-full = ventoy-full; # Added 2023-04-12 1080 ViennaRNA = viennarna; # Added 2023-08-23 ··· 1172 }); 1173 1174 /* If these are in the scope of all-packages.nix, they cause collisions 1175 - between mixed versions of qt. See: 1176 https://github.com/NixOS/nixpkgs/pull/101369 */ 1177 1178 inherit (plasma5Packages) ··· 1195 plasma-vault plasma-workspace plasma-workspace-wallpapers polkit-kde-agent 1196 powerdevil qqc2-breeze-style sddm-kcm skanlite skanpage spectacle 1197 systemsettings xdg-desktop-portal-kde yakuake zanshin 1198 - ; 1199 1200 - kalendar = merkuro; # Renamed in 23.08 1201 kfloppy = throw "kfloppy has been removed upstream in KDE Gear 23.08"; 1202 1203 inherit (plasma5Packages.thirdParty) ··· 1208 kwin-tiling 1209 plasma-applet-caffeine-plus 1210 plasma-applet-virtual-desktop-bar 1211 - ; 1212 1213 inherit (libsForQt5) 1214 sddm 1215 - ; 1216 1217 inherit (pidginPackages) 1218 pidgin-indicator ··· 1240 tdlib-purple 1241 pidgin-opensteamworks 1242 purple-facebook 1243 - ; 1244 1245 })
··· 24 # to appear while listing all the packages available. 25 removeRecurseForDerivations = alias: with lib; 26 if alias.recurseForDerivations or false 27 + then removeAttrs alias [ "recurseForDerivations" ] 28 else alias; 29 30 # Disabling distribution prevents top-level aliases for non-recursed package ··· 41 else alias; 42 43 mapAliases = aliases: 44 + lib.mapAttrs 45 + (n: alias: 46 + removeDistribute 47 + (removeRecurseForDerivations 48 + (checkInPkgs n alias))) 49 aliases; 50 in 51 ··· 60 a4term = a4; # Added 2023-10-06 61 aether = throw "aether has been removed from nixpkgs; upstream unmaintained, security issues"; # Added 2023-10-03 62 airfield = throw "airfield has been removed due to being unmaintained"; # Added 2023-05-19 63 + alertmanager-bot = throw "alertmanager-bot is broken and has been archived by upstream"; # Added 2023-07-28 64 alsa-project = throw "alsa-project was removed and its sub-attributes were promoted to top-level."; # Added 2023-11-12 65 alsaLib = alsa-lib; # Added 2021-06-09 66 alsaOss = alsa-oss; # Added 2021-06-10 ··· 103 bitwig-studio2 = throw "bitwig-studio2 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03 104 blender-with-packages = args: 105 lib.warn "blender-with-packages is deprecated in favor of blender.withPackages, e.g. `blender.withPackages(ps: [ ps.foobar ])`" 106 + (blender.withPackages (_: args.packages)).overrideAttrs 107 + (lib.optionalAttrs (args ? name) { pname = "blender-" + args.name; }); # Added 2023-10-30 108 bluezFull = throw "'bluezFull' has been renamed to/replaced by 'bluez'"; # Converted to throw 2023-09-10 109 bookletimposer = throw "bookletimposer has been removed from nixpkgs; upstream unmaintained and broke with pypdf3"; # Added 2024-01-01 110 boost168 = throw "boost168 has been deprecated in favor of the latest version"; # Added 2023-06-08 ··· 190 clang16Stdenv = lowPrio llvmPackages_16.stdenv; 191 clang17Stdenv = lowPrio llvmPackages_17.stdenv; 192 193 + clang-tools_6 = throw "clang-tools_6 has been removed from nixpkgs"; # Added 2024-01-08 194 + clang-tools_7 = throw "clang-tools_7 has been removed from nixpkgs"; # Added 2023-11-19 195 + clang_6 = throw "clang_6 has been removed from nixpkgs"; # Added 2024-01-08 196 + clang_7 = throw "clang_7 has been removed from nixpkgs"; # Added 2023-11-19 197 198 ### D ### 199 ··· 225 dotnet-sdk_3 = dotnetCorePackages.sdk_3_1; # Added 2020-01-19 226 dotnet-sdk_5 = dotnetCorePackages.sdk_5_0; # Added 2020-09-11 227 drgeo = throw "'drgeo' has been removed as it is outdated and unmaintained"; # Added 2023-10-15 228 + dtv-scan-tables_linuxtv = dtv-scan-tables; # Added 2023-03-03 229 + dtv-scan-tables_tvheadend = dtv-scan-tables; # Added 2023-03-03 230 dylibbundler = macdylibbundler; # Added 2021-04-24 231 232 ### E ### ··· 346 347 gnuradio-with-packages = gnuradio3_7.override { 348 extraPackages = lib.attrVals [ 349 + "osmosdr" 350 + "ais" 351 + "gsm" 352 + "nacl" 353 + "rds" 354 + "limesdr" 355 + ] 356 + gnuradio3_7Packages; 357 }; # Added 2020-10-16 358 359 gmock = gtest; # moved from top-level 2021-03-14 ··· 379 google-chrome-dev = throw "'google-chrome-dev' has been removed due to the lack of maintenance in nixpkgs. Consider using 'google-chrome' instead."; # Added 2023-10-18 380 google-gflags = throw "'google-gflags' has been renamed to/replaced by 'gflags'"; # Converted to throw 2023-09-10 381 go-thumbnailer = thud; # Added 2023-09-21 382 + gocode = throw "'gocode' has been removed as the upstream project was archived. 'gopls' is suggested as replacement"; # Added 2023-12-26 383 govendor = throw "'govendor' has been removed as it is no longer maintained upstream, please use Go modules instead"; # Added 2023-12-26 384 gometer = throw "gometer has been removed from nixpkgs because goLance stopped offering Linux support"; # Added 2023-02-10 385 ··· 480 kerberos = libkrb5; # moved from top-level 2021-03-14 481 kexectools = kexec-tools; # Added 2021-09-03 482 keysmith = libsForQt5.kdeGear.keysmith; # Added 2021-07-14 483 + kfctl = throw "kfctl is broken and has been archived by upstream"; # Added 2023-08-21 484 kgx = gnome-console; # Added 2022-02-19 485 kibana7 = throw "Kibana 7.x has been removed from nixpkgs as it depends on an end of life Node.js version and received no maintenance in time."; # Added 2023-30-10 486 kibana = kibana7; ··· 527 librewolf-wayland = librewolf; # Added 2022-11-15 528 libseat = seatd; # Added 2021-06-24 529 libsigcxx12 = throw "'libsigcxx12' has been removed, please use newer versions"; # Added 2023-10-20 530 + libsForQt515 = libsForQt5; # Added 2022-11-24 531 libtensorflow-bin = libtensorflow; # Added 2022-09-25 532 libtorrentRasterbar = libtorrent-rasterbar; # Added 2020-12-20 533 libtorrentRasterbar-1_2_x = libtorrent-rasterbar-1_2_x; # Added 2020-12-20 ··· 714 neochat = libsForQt5.kdeGear.neochat; # added 2022-05-10 715 nitrokey-udev-rules = libnitrokey; # Added 2023-03-25 716 nix-direnv-flakes = nix-direnv; 717 + nix-repl = throw ( 718 + # Added 2018-08-26 719 "nix-repl has been removed because it's not maintained anymore, " + 720 "use `nix repl` instead. Also see https://github.com/NixOS/nixpkgs/pull/44903" 721 ); 722 nix-review = throw "'nix-review' has been renamed to/replaced by 'nixpkgs-review'"; # Converted to throw 2023-09-10 723 + nix-template-rpm = throw "'nix-template-rpm' has been removed as it is broken and unmaintained"; # Added 2023-11-20 724 nixFlakes = nixVersions.stable; # Added 2021-05-21 725 nixStable = nixVersions.stable; # Added 2022-01-24 726 nixUnstable = nixVersions.unstable; # Added 2022-01-26 ··· 876 qlandkartegt = throw "'qlandkartegt' has been removed from nixpkgs, as it was broken and unmaintained"; # Added 2023-04-17 877 qscintilla = libsForQt5.qscintilla; # Added 2023-09-20 878 qscintilla-qt6 = qt6Packages.qscintilla; # Added 2023-09-20 879 + qt515 = qt5; # Added 2022-11-24 880 qt5ct = libsForQt5.qt5ct; # Added 2021-12-27 881 qt6ct = qt6Packages.qt6ct; # Added 2023-03-07 882 qtcurve = libsForQt5.qtcurve; # Added 2020-11-07 ··· 965 sgtpuzzles = throw "'sgtpuzzles' has been renamed to 'sgt-puzzles'"; # Added 2023-10-06 966 sgtpuzzles-mobile = throw "'sgtpuzzles-mobile' has been renamed to 'sgt-puzzles-mobile'"; # Added 2023-10-06 967 inherit (libsForQt5.mauiPackages) shelf; # added 2022-05-17 968 + shhgit = throw "shhgit is broken and is no longer maintained. See https://github.com/eth0izzle/shhgit#-shhgit-is-no-longer-maintained-"; # Added 2023-08-08 969 shipyard = jumppad; # Added 2023-06-06 970 signumone-ks = throw "signumone-ks has been removed from nixpkgs because the developers stopped offering the binaries"; # Added 2023-08-17 971 simplenote = throw "'simplenote' has been removed because it is no longer maintained and insecure"; # Added 2023-10-09 ··· 1084 vamp = { vampSDK = vamp-plugin-sdk; }; # Added 2020-03-26 1085 vaapiIntel = intel-vaapi-driver; # Added 2023-05-31 1086 vaultwarden-vault = vaultwarden.webvault; # Added 2022-12-13 1087 + vdirsyncerStable = vdirsyncer; # Added 2020-11-08, see https://github.com/NixOS/nixpkgs/issues/103026#issuecomment-723428168 1088 ventoy-bin = ventoy; # Added 2023-04-12 1089 ventoy-bin-full = ventoy-full; # Added 2023-04-12 1090 ViennaRNA = viennarna; # Added 2023-08-23 ··· 1182 }); 1183 1184 /* If these are in the scope of all-packages.nix, they cause collisions 1185 + between mixed versions of qt. See: 1186 https://github.com/NixOS/nixpkgs/pull/101369 */ 1187 1188 inherit (plasma5Packages) ··· 1205 plasma-vault plasma-workspace plasma-workspace-wallpapers polkit-kde-agent 1206 powerdevil qqc2-breeze-style sddm-kcm skanlite skanpage spectacle 1207 systemsettings xdg-desktop-portal-kde yakuake zanshin 1208 + ; 1209 1210 + kalendar = merkuro; # Renamed in 23.08 1211 kfloppy = throw "kfloppy has been removed upstream in KDE Gear 23.08"; 1212 1213 inherit (plasma5Packages.thirdParty) ··· 1218 kwin-tiling 1219 plasma-applet-caffeine-plus 1220 plasma-applet-virtual-desktop-bar 1221 + ; 1222 1223 inherit (libsForQt5) 1224 sddm 1225 + ; 1226 1227 inherit (pidginPackages) 1228 pidgin-indicator ··· 1250 tdlib-purple 1251 pidgin-opensteamworks 1252 purple-facebook 1253 + ; 1254 1255 })
+20 -11
pkgs/top-level/all-packages.nix
··· 184 autoreconfHook269 = autoreconfHook.override { 185 autoconf = autoconf269; 186 }; 187 188 autorestic = callPackage ../tools/backup/autorestic { }; 189 ··· 7336 gsaslSupport = true; 7337 rtmpSupport = true; 7338 pslSupport = true; 7339 }; 7340 7341 curlHTTP3 = curl.override { ··· 15820 default-gcc-version = 15821 if (with stdenv.targetPlatform; isVc4 || libc == "relibc") then 6 15822 else if stdenv.buildPlatform.isDarwin then 12 # unable to test 15823 - else if stdenv.buildPlatform.isAarch64 then 12 # unable to test 15824 else 13; 15825 gcc = pkgs.${"gcc${toString default-gcc-version}"}; 15826 gccFun = callPackage ../development/compilers/gcc; ··· 16673 buildLlvmTools = buildPackages.llvmPackages_11.tools; 16674 targetLlvmLibraries = targetPackages.llvmPackages_11.libraries or llvmPackages_11.libraries; 16675 targetLlvm = targetPackages.llvmPackages_11.llvm or llvmPackages_11.llvm; 16676 })); 16677 16678 llvmPackages_12 = recurseIntoAttrs (callPackage ../development/compilers/llvm/12 ({ ··· 16680 buildLlvmTools = buildPackages.llvmPackages_12.tools; 16681 targetLlvmLibraries = targetPackages.llvmPackages_12.libraries or llvmPackages_12.libraries; 16682 targetLlvm = targetPackages.llvmPackages_12.llvm or llvmPackages_12.llvm; 16683 })); 16684 16685 llvmPackages_13 = recurseIntoAttrs (callPackage ../development/compilers/llvm/13 ({ ··· 18475 18476 autobuild = callPackage ../development/tools/misc/autobuild { }; 18477 18478 - autoconf = autoconf271; 18479 - 18480 autoconf-archive = callPackage ../development/tools/misc/autoconf-archive { }; 18481 18482 autoconf213 = callPackage ../development/tools/misc/autoconf/2.13.nix { }; 18483 autoconf264 = callPackage ../development/tools/misc/autoconf/2.64.nix { }; 18484 autoconf269 = callPackage ../development/tools/misc/autoconf/2.69.nix { }; 18485 - autoconf271 = callPackage ../development/tools/misc/autoconf { }; 18486 18487 acr = callPackage ../development/tools/misc/acr { }; 18488 ··· 27664 27665 blktrace = callPackage ../os-specific/linux/blktrace { }; 27666 27667 - bluez5 = callPackage ../os-specific/linux/bluez { }; 27668 27669 - bluez5-experimental = callPackage ../os-specific/linux/bluez { 27670 - withExperimental = true; 27671 }; 27672 - 27673 - bluez = bluez5; 27674 27675 bolt = callPackage ../os-specific/linux/bolt { }; 27676 ··· 28364 28365 go-outline = callPackage ../development/tools/go-outline { }; 28366 28367 - gocode = callPackage ../development/tools/gocode { }; 28368 - 28369 gocode-gomod = callPackage ../development/tools/gocode-gomod { }; 28370 28371 goconst = callPackage ../development/tools/goconst { }; ··· 28734 withHomed = false; 28735 withHwdb = false; 28736 withImportd = false; 28737 withLibBPF = false; 28738 withLibidn2 = false; 28739 withLocaled = false; ··· 28757 withUserDb = false; 28758 withUkify = false; 28759 withBootloader = false; 28760 }; 28761 systemdLibs = systemdMinimal.override { 28762 pname = "systemd-minimal-libs"; ··· 34231 }; 34232 34233 mupdf = callPackage ../applications/misc/mupdf { }; 34234 mupdf_1_17 = callPackage ../applications/misc/mupdf/1.17 { }; 34235 34236 muso = callPackage ../applications/audio/muso {
··· 184 autoreconfHook269 = autoreconfHook.override { 185 autoconf = autoconf269; 186 }; 187 + autoreconfHook271 = autoreconfHook.override { 188 + autoconf = autoconf271; 189 + }; 190 191 autorestic = callPackage ../tools/backup/autorestic { }; 192 ··· 7339 gsaslSupport = true; 7340 rtmpSupport = true; 7341 pslSupport = true; 7342 + websocketSupport = true; 7343 }; 7344 7345 curlHTTP3 = curl.override { ··· 15824 default-gcc-version = 15825 if (with stdenv.targetPlatform; isVc4 || libc == "relibc") then 6 15826 else if stdenv.buildPlatform.isDarwin then 12 # unable to test 15827 else 13; 15828 gcc = pkgs.${"gcc${toString default-gcc-version}"}; 15829 gccFun = callPackage ../development/compilers/gcc; ··· 16676 buildLlvmTools = buildPackages.llvmPackages_11.tools; 16677 targetLlvmLibraries = targetPackages.llvmPackages_11.libraries or llvmPackages_11.libraries; 16678 targetLlvm = targetPackages.llvmPackages_11.llvm or llvmPackages_11.llvm; 16679 + stdenv = if stdenv.cc.cc.isGNU or false then gcc12Stdenv else stdenv; # does not build with gcc13 16680 })); 16681 16682 llvmPackages_12 = recurseIntoAttrs (callPackage ../development/compilers/llvm/12 ({ ··· 16684 buildLlvmTools = buildPackages.llvmPackages_12.tools; 16685 targetLlvmLibraries = targetPackages.llvmPackages_12.libraries or llvmPackages_12.libraries; 16686 targetLlvm = targetPackages.llvmPackages_12.llvm or llvmPackages_12.llvm; 16687 + stdenv = if stdenv.cc.cc.isGNU or false then gcc12Stdenv else stdenv; # .libcxxabi does not build with gcc13 16688 })); 16689 16690 llvmPackages_13 = recurseIntoAttrs (callPackage ../development/compilers/llvm/13 ({ ··· 18480 18481 autobuild = callPackage ../development/tools/misc/autobuild { }; 18482 18483 autoconf-archive = callPackage ../development/tools/misc/autoconf-archive { }; 18484 18485 + autoconf = callPackage ../development/tools/misc/autoconf { }; 18486 autoconf213 = callPackage ../development/tools/misc/autoconf/2.13.nix { }; 18487 autoconf264 = callPackage ../development/tools/misc/autoconf/2.64.nix { }; 18488 autoconf269 = callPackage ../development/tools/misc/autoconf/2.69.nix { }; 18489 + autoconf271 = callPackage ../development/tools/misc/autoconf/2.71.nix { }; 18490 18491 acr = callPackage ../development/tools/misc/acr { }; 18492 ··· 27668 27669 blktrace = callPackage ../os-specific/linux/blktrace { }; 27670 27671 + bluez5 = bluez; 27672 + bluez5-experimental = bluez-experimental; 27673 27674 + bluez-experimental = bluez.override { 27675 + enableExperimental = true; 27676 }; 27677 27678 bolt = callPackage ../os-specific/linux/bolt { }; 27679 ··· 28367 28368 go-outline = callPackage ../development/tools/go-outline { }; 28369 28370 gocode-gomod = callPackage ../development/tools/gocode-gomod { }; 28371 28372 goconst = callPackage ../development/tools/goconst { }; ··· 28735 withHomed = false; 28736 withHwdb = false; 28737 withImportd = false; 28738 + withIptables = false; 28739 withLibBPF = false; 28740 withLibidn2 = false; 28741 withLocaled = false; ··· 28759 withUserDb = false; 28760 withUkify = false; 28761 withBootloader = false; 28762 + withPasswordQuality = false; 28763 + withVmspawn = false; 28764 + withQrencode = false; 28765 }; 28766 systemdLibs = systemdMinimal.override { 28767 pname = "systemd-minimal-libs"; ··· 34236 }; 34237 34238 mupdf = callPackage ../applications/misc/mupdf { }; 34239 + mupdf-headless = mupdf.override { 34240 + enableX11 = false; 34241 + enableGL = false; 34242 + }; 34243 mupdf_1_17 = callPackage ../applications/misc/mupdf/1.17 { }; 34244 34245 muso = callPackage ../applications/audio/muso {
+2
pkgs/top-level/linux-kernels.nix
··· 458 459 facetimehd = callPackage ../os-specific/linux/facetimehd { }; 460 461 tuxedo-keyboard = if lib.versionAtLeast kernel.version "4.14" then callPackage ../os-specific/linux/tuxedo-keyboard { } else null; 462 463 jool = callPackage ../os-specific/linux/jool { };
··· 458 459 facetimehd = callPackage ../os-specific/linux/facetimehd { }; 460 461 + rust-out-of-tree-module = if lib.versionAtLeast kernel.version "6.7" then callPackage ../os-specific/linux/rust-out-of-tree-module { } else null; 462 + 463 tuxedo-keyboard = if lib.versionAtLeast kernel.version "4.14" then callPackage ../os-specific/linux/tuxedo-keyboard { } else null; 464 465 jool = callPackage ../os-specific/linux/jool { };
+1
pkgs/top-level/python-aliases.nix
··· 356 pyramid_multiauth = pyramid-multiauth; # added 2023-08-24 357 pyreadability = readability-lxml; # added 2022-05-24 358 pyres = throw "pyres has been removed, since it is abandoned and broken"; # added 2023-06-20 359 pyroute2-core = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16 360 pyroute2-ethtool = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16 361 pyroute2-ipdb = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16
··· 356 pyramid_multiauth = pyramid-multiauth; # added 2023-08-24 357 pyreadability = readability-lxml; # added 2022-05-24 358 pyres = throw "pyres has been removed, since it is abandoned and broken"; # added 2023-06-20 359 + pyRFC3339 = pyrfc3339; # added 2024-01-07 360 pyroute2-core = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16 361 pyroute2-ethtool = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16 362 pyroute2-ipdb = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16
+3 -3
pkgs/top-level/python-packages.nix
··· 2558 cython = callPackage ../development/python-modules/cython { }; 2559 2560 cython_3 = self.cython.overridePythonAttrs (old: rec { 2561 - version = "3.0.6"; 2562 src = old.src.override { 2563 inherit version; 2564 - hash = "sha256-OZ0YVnLGZ7Juq73KQgyYVkWDeYrzvEdnCooJ6fGd1mA="; 2565 }; 2566 patches = [ ]; 2567 }); ··· 11165 11166 pyrituals = callPackage ../development/python-modules/pyrituals { }; 11167 11168 - pyRFC3339 = callPackage ../development/python-modules/pyrfc3339 { }; 11169 11170 pyrmvtransport = callPackage ../development/python-modules/pyrmvtransport { }; 11171
··· 2558 cython = callPackage ../development/python-modules/cython { }; 2559 2560 cython_3 = self.cython.overridePythonAttrs (old: rec { 2561 + version = "3.0.7"; 2562 src = old.src.override { 2563 inherit version; 2564 + hash = "sha256-+ymazzpXhXPBkMhY1J4M+ddfS8ScPyTFpjgEmX7wkhM="; 2565 }; 2566 patches = [ ]; 2567 }); ··· 11165 11166 pyrituals = callPackage ../development/python-modules/pyrituals { }; 11167 11168 + pyrfc3339 = callPackage ../development/python-modules/pyrfc3339 { }; 11169 11170 pyrmvtransport = callPackage ../development/python-modules/pyrmvtransport { }; 11171
+2 -2
pkgs/top-level/unixtools.nix
··· 174 darwin = pkgs.darwin.basic_cmds; 175 }; 176 xxd = { 177 - linux = pkgs.vim; 178 - darwin = pkgs.vim; 179 }; 180 }; 181
··· 174 darwin = pkgs.darwin.basic_cmds; 175 }; 176 xxd = { 177 + linux = pkgs.vim.xxd; 178 + darwin = pkgs.vim.xxd; 179 }; 180 }; 181