Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 07fb9cae 392b3f3d

+171 -91
+2 -2
nixos/modules/services/hardware/kanata.nix
··· 86 mkService = name: keyboard: nameValuePair (mkName name) { 87 wantedBy = [ "multi-user.target" ]; 88 serviceConfig = { 89 ExecStart = '' 90 ${getExe cfg.package} \ 91 --cfg ${mkConfig name keyboard} \ ··· 123 ProtectKernelModules = true; 124 ProtectKernelTunables = true; 125 ProtectProc = "invisible"; 126 - RestrictAddressFamilies = 127 - if (keyboard.port == null) then "none" else [ "AF_INET" ]; 128 RestrictNamespaces = true; 129 RestrictRealtime = true; 130 SystemCallArchitectures = [ "native" ];
··· 86 mkService = name: keyboard: nameValuePair (mkName name) { 87 wantedBy = [ "multi-user.target" ]; 88 serviceConfig = { 89 + Type = "notify"; 90 ExecStart = '' 91 ${getExe cfg.package} \ 92 --cfg ${mkConfig name keyboard} \ ··· 124 ProtectKernelModules = true; 125 ProtectKernelTunables = true; 126 ProtectProc = "invisible"; 127 + RestrictAddressFamilies = [ "AF_UNIX" ] ++ optional (keyboard.port != null) "AF_INET"; 128 RestrictNamespaces = true; 129 RestrictRealtime = true; 130 SystemCallArchitectures = [ "native" ];
+36
pkgs/applications/misc/river-luatile/default.nix
···
··· 1 + { lib 2 + , rustPlatform 3 + , fetchFromGitHub 4 + , pkg-config 5 + , luajit 6 + }: 7 + 8 + rustPlatform.buildRustPackage rec { 9 + pname = "river-luatile"; 10 + version = "0.1.1"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "MaxVerevkin"; 14 + repo = "river-luatile"; 15 + rev = "v${version}"; 16 + hash = "sha256-eZgoFbat7X/jh5udlNyIuTheBUCHpaVRbsojYLATO18="; 17 + }; 18 + 19 + cargoHash = "sha256-Vqyt5bL1lVhy/Wxd+zF7Wugvb7dW1N9Kq2TTFSaodnE="; 20 + 21 + nativeBuildInputs = [ 22 + pkg-config 23 + ]; 24 + 25 + buildInputs = [ 26 + luajit 27 + ]; 28 + 29 + meta = with lib; { 30 + description = "Write your own river layout generator in lua"; 31 + homepage = "https://github.com/MaxVerevkin/river-luatile"; 32 + license = licenses.gpl3Only; 33 + platforms = platforms.linux; 34 + maintainers = with maintainers; [ pinpox ]; 35 + }; 36 + }
+55 -19
pkgs/applications/misc/visidata/default.nix
··· 2 , lib 3 , buildPythonApplication 4 , fetchFromGitHub 5 - , python-dateutil 6 - , pandas 7 - , requests 8 , lxml 9 , openpyxl 10 - , xlrd 11 - , h5py 12 - , odfpy 13 , psycopg2 14 , pyshp 15 - , fonttools 16 , pyyaml 17 - , pdfminer-six 18 - , vobject 19 , tabulate 20 , wcwidth 21 , zstandard 22 - , setuptools 23 - , importlib-metadata 24 , git 25 , withPcap ? true, dpkt, dnslib 26 , withXclip ? stdenv.isLinux, xclip ··· 29 }: 30 buildPythonApplication rec { 31 pname = "visidata"; 32 - version = "2.10.2"; 33 34 src = fetchFromGitHub { 35 owner = "saulpw"; 36 repo = "visidata"; 37 rev = "v${version}"; 38 - hash = "sha256-OKCrlUWHgbaLZJPVvs9lnw4cD27pRoO7F9oel1NzT6A="; 39 }; 40 41 propagatedBuildInputs = [ ··· 47 lxml 48 openpyxl 49 xlrd 50 h5py 51 psycopg2 52 pyshp 53 #mapbox-vector-tile 54 - #pypng 55 fonttools 56 #sas7bdat 57 #xport ··· 66 wcwidth 67 zstandard 68 odfpy 69 setuptools 70 importlib-metadata 71 ] ++ lib.optionals withPcap [ dpkt dnslib ] ··· 81 checkPhase = '' 82 runHook preCheck 83 # disable some tests which require access to the network 84 - rm tests/load-http.vd # http 85 - rm tests/graph-cursor-nosave.vd # http 86 - rm tests/messenger-nosave.vd # dns 87 88 # tests use git to compare outputs to references 89 git init -b "test-reference" 90 - git config user.name "nobody"; git config user.email "no@where" 91 - git add .; git commit -m "test reference" 92 93 substituteInPlace dev/test.sh --replace "bin/vd" "$out/bin/vd" 94 bash dev/test.sh
··· 2 , lib 3 , buildPythonApplication 4 , fetchFromGitHub 5 + # python requirements 6 + , beautifulsoup4 7 + , boto3 8 + , faker 9 + , fonttools 10 + , h5py 11 + , importlib-metadata 12 , lxml 13 + , matplotlib 14 + , numpy 15 + , odfpy 16 , openpyxl 17 + , pandas 18 + , pdfminer-six 19 + , praw 20 + , psutil 21 , psycopg2 22 + , pyarrow 23 , pyshp 24 + , pypng 25 + , python-dateutil 26 , pyyaml 27 + , requests 28 + , seaborn 29 + , setuptools 30 + , sh 31 , tabulate 32 + , urllib3 33 + , vobject 34 , wcwidth 35 + , xlrd 36 + , xlwt 37 , zstandard 38 + , zulip 39 + # other 40 , git 41 , withPcap ? true, dpkt, dnslib 42 , withXclip ? stdenv.isLinux, xclip ··· 45 }: 46 buildPythonApplication rec { 47 pname = "visidata"; 48 + version = "2.11"; 49 50 src = fetchFromGitHub { 51 owner = "saulpw"; 52 repo = "visidata"; 53 rev = "v${version}"; 54 + hash = "sha256-G/9paJFJsRfIxMJ2hbuVS7pxCfSUCK69DNV2DHi60qA="; 55 }; 56 57 propagatedBuildInputs = [ ··· 63 lxml 64 openpyxl 65 xlrd 66 + xlwt 67 h5py 68 psycopg2 69 + boto3 70 pyshp 71 #mapbox-vector-tile 72 + pypng 73 fonttools 74 #sas7bdat 75 #xport ··· 84 wcwidth 85 zstandard 86 odfpy 87 + urllib3 88 + pyarrow 89 + seaborn 90 + matplotlib 91 + sh 92 + psutil 93 + numpy 94 + 95 + #requests_cache 96 + beautifulsoup4 97 + 98 + faker 99 + praw 100 + zulip 101 + #pyairtable 102 + 103 setuptools 104 importlib-metadata 105 ] ++ lib.optionals withPcap [ dpkt dnslib ] ··· 115 checkPhase = '' 116 runHook preCheck 117 # disable some tests which require access to the network 118 + rm -f tests/load-http.vd # http 119 + rm -f tests/graph-cursor-nosave.vd # http 120 + rm -f tests/messenger-nosave.vd # dns 121 122 # tests use git to compare outputs to references 123 git init -b "test-reference" 124 + git config user.name "nobody" 125 + git config user.email "no@where" 126 + git add . 127 + git commit -m "test reference" 128 129 substituteInPlace dev/test.sh --replace "bin/vd" "$out/bin/vd" 130 bash dev/test.sh
+1 -1
pkgs/applications/networking/ids/suricata/default.nix
··· 121 122 postConfigure = '' 123 # Avoid unintended clousure growth. 124 - sed -i 's|/nix/store/\(.\{8\}\)[^-]*-|/nix/store/\1...-|g' ./src/build-info.h 125 ''; 126 127 hardeningDisable = [ "stackprotector" ];
··· 121 122 postConfigure = '' 123 # Avoid unintended clousure growth. 124 + sed -i 's|${builtins.storeDir}/\(.\{8\}\)[^-]*-|${builtins.storeDir}/\1...-|g' ./src/build-info.h 125 ''; 126 127 hardeningDisable = [ "stackprotector" ];
+2 -2
pkgs/applications/networking/instant-messengers/signalbackup-tools/default.nix
··· 1 - { lib, stdenv, llvmPackages_14, fetchFromGitHub, openssl, sqlite }: 2 3 - (if stdenv.isDarwin then llvmPackages_14.stdenv else stdenv).mkDerivation rec { 4 pname = "signalbackup-tools"; 5 version = "20230316"; 6
··· 1 + { lib, stdenv, darwin, fetchFromGitHub, openssl, sqlite }: 2 3 + (if stdenv.isDarwin then darwin.apple_sdk_11_0.clang14Stdenv else stdenv).mkDerivation rec { 4 pname = "signalbackup-tools"; 5 version = "20230316"; 6
+2 -2
pkgs/applications/networking/mailreaders/evolution/evolution/wrapper.nix
··· 23 fixSymlink () { 24 local link=$1 25 local target=$(readlink $link); 26 - local newtarget=$(sed "s@/nix/store/[^/]*/@$out/@" <<< "$target") 27 if [[ $target != $newtarget ]] && [[ -d $newtarget ]]; then 28 echo fixing link to point to $newtarget instead of $target 29 rm $link ··· 35 fixSymlink $out/lib/systemd/user 36 for i in $out/share/dbus-1/services/*.service $out/lib/systemd/user/*.service; do 37 echo fixing service file $i to point to $out 38 - sed -i "s@/nix/store/[^/]*/@$out/@" $i 39 done 40 ''; 41 }
··· 23 fixSymlink () { 24 local link=$1 25 local target=$(readlink $link); 26 + local newtarget=$(sed "s@${builtins.storeDir}/[^/]*/@$out/@" <<< "$target") 27 if [[ $target != $newtarget ]] && [[ -d $newtarget ]]; then 28 echo fixing link to point to $newtarget instead of $target 29 rm $link ··· 35 fixSymlink $out/lib/systemd/user 36 for i in $out/share/dbus-1/services/*.service $out/lib/systemd/user/*.service; do 37 echo fixing service file $i to point to $out 38 + sed -i "s@${builtins.storeDir}/[^/]*/@$out/@" $i 39 done 40 ''; 41 }
+1 -1
pkgs/applications/science/math/giac/default.nix
··· 111 # notably texlive, and we don't want texlive to become a runtime 112 # dependency 113 for file in $(find $out -name Makefile) ; do 114 - sed -i "s@/nix/store/[^/]*/bin/@@" "$file" ; 115 done; 116 117 # reference cycle
··· 111 # notably texlive, and we don't want texlive to become a runtime 112 # dependency 113 for file in $(find $out -name Makefile) ; do 114 + sed -i "s@${builtins.storeDir}/[^/]*/bin/@@" "$file" ; 115 done; 116 117 # reference cycle
+1 -1
pkgs/build-support/dotnet/build-dotnet-module/default.nix
··· 176 # Note that toString is necessary here as it results in the path at 177 # eval time (i.e. to the file in your local Nixpkgs checkout) rather 178 # than the Nix store path of the path after it's been imported. 179 - if lib.isPath nugetDeps && !lib.hasPrefix "/nix/store/" (toString nugetDeps) 180 then toString nugetDeps 181 else ''$(mktemp -t "${pname}-deps-XXXXXX.nix")''; 182 in
··· 176 # Note that toString is necessary here as it results in the path at 177 # eval time (i.e. to the file in your local Nixpkgs checkout) rather 178 # than the Nix store path of the path after it's been imported. 179 + if lib.isPath nugetDeps && !lib.hasPrefix "${builtins.storeDir}/" (toString nugetDeps) 180 then toString nugetDeps 181 else ''$(mktemp -t "${pname}-deps-XXXXXX.nix")''; 182 in
+1 -1
pkgs/build-support/fetchdocker/default.nix
··· 3 stripScheme = 4 builtins.replaceStrings [ "https://" "http://" ] [ "" "" ]; 5 stripNixStore = 6 - s: lib.removePrefix "/nix/store/" s; 7 in 8 { name 9 , registry ? "https://registry-1.docker.io/v2/"
··· 3 stripScheme = 4 builtins.replaceStrings [ "https://" "http://" ] [ "" "" ]; 5 stripNixStore = 6 + s: lib.removePrefix "${builtins.storeDir}/" s; 7 in 8 { name 9 , registry ? "https://registry-1.docker.io/v2/"
+1 -1
pkgs/build-support/release/nix-build.nix
··· 140 (lib.optional doCoverityAnalysis args.cov-build) ++ 141 (lib.optional doCoverityAnalysis args.xz); 142 143 - lcovFilter = ["/nix/store/*"] ++ lcovFilter; 144 145 inherit lcovExtraTraceFiles; 146
··· 140 (lib.optional doCoverityAnalysis args.cov-build) ++ 141 (lib.optional doCoverityAnalysis args.xz); 142 143 + lcovFilter = ["${builtins.storeDir}/*"] ++ lcovFilter; 144 145 inherit lcovExtraTraceFiles; 146
+2 -2
pkgs/development/python-modules/identify/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "identify"; 12 - version = "2.5.21"; 13 format = "setuptools"; 14 15 disabled = pythonOlder "3.7"; ··· 18 owner = "pre-commit"; 19 repo = pname; 20 rev = "v${version}"; 21 - hash = "sha256-4e25m4RIeWKDXxbhIrfKqKgTxSqtDgwyShoRIbxGN0c="; 22 }; 23 24 nativeCheckInputs = [
··· 9 10 buildPythonPackage rec { 11 pname = "identify"; 12 + version = "2.5.22"; 13 format = "setuptools"; 14 15 disabled = pythonOlder "3.7"; ··· 18 owner = "pre-commit"; 19 repo = pname; 20 rev = "v${version}"; 21 + hash = "sha256-SSbphjcfgexVveXp2BfAiGzehb2tSBcsMEse5uSh9Xo="; 22 }; 23 24 nativeCheckInputs = [
+2 -2
pkgs/development/python-modules/jc/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "jc"; 13 - version = "1.23.0"; 14 disabled = pythonOlder "3.6"; 15 16 src = fetchFromGitHub { 17 owner = "kellyjonbrazil"; 18 repo = pname; 19 rev = "refs/tags/v${version}"; 20 - hash = "sha256-0ZKdySzRHHtDWvSrQ0qJTggu48TyCBVrtEZZkM8HqNQ="; 21 }; 22 23 propagatedBuildInputs = [ ruamel-yaml xmltodict pygments ];
··· 10 11 buildPythonPackage rec { 12 pname = "jc"; 13 + version = "1.23.1"; 14 disabled = pythonOlder "3.6"; 15 16 src = fetchFromGitHub { 17 owner = "kellyjonbrazil"; 18 repo = pname; 19 rev = "refs/tags/v${version}"; 20 + hash = "sha256-3AH/NKYMACNuS0I2RsyU+L5Vksdv9H/q3aV1US64rk0="; 21 }; 22 23 propagatedBuildInputs = [ ruamel-yaml xmltodict pygments ];
+2 -2
pkgs/development/python-modules/mailchecker/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "mailchecker"; 9 - version = "5.0.7"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - hash = "sha256-u5htHCI10mn6AQDlAShMpbyI4PcqiRgpRvsy5Q3km+0="; 17 }; 18 19 # Module has no tests
··· 6 7 buildPythonPackage rec { 8 pname = "mailchecker"; 9 + version = "5.0.8"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + hash = "sha256-rqayN1W+dqHSdRH7NFKtD07r2OztQq5FBhMaJEI3iwY="; 17 }; 18 19 # Module has no tests
+2 -2
pkgs/development/python-modules/scmrepo/default.nix
··· 16 17 buildPythonPackage rec { 18 pname = "scmrepo"; 19 - version = "0.1.16"; 20 format = "pyproject"; 21 22 disabled = pythonOlder "3.7"; ··· 25 owner = "iterative"; 26 repo = pname; 27 rev = "refs/tags/${version}"; 28 - hash = "sha256-d8CwvxWdFhKXzv6mzWh+WIH6VSBsQOpdyc5UIwrh7kg="; 29 }; 30 31 postPatch = ''
··· 16 17 buildPythonPackage rec { 18 pname = "scmrepo"; 19 + version = "0.1.17"; 20 format = "pyproject"; 21 22 disabled = pythonOlder "3.7"; ··· 25 owner = "iterative"; 26 repo = pname; 27 rev = "refs/tags/${version}"; 28 + hash = "sha256-hY46bowYJFmGfEmynTtGgXXkF9D5AcqApO7I/BIl/Lw="; 29 }; 30 31 postPatch = ''
+2 -2
pkgs/development/python-modules/yalexs-ble/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "yalexs-ble"; 16 - version = "2.1.1"; 17 format = "pyproject"; 18 19 disabled = pythonOlder "3.9"; ··· 22 owner = "bdraco"; 23 repo = pname; 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-tYdm6XrjltQtN9m23GB9WDWLbXb4pMNiLQWpxxeqsLY="; 26 }; 27 28 nativeBuildInputs = [
··· 13 14 buildPythonPackage rec { 15 pname = "yalexs-ble"; 16 + version = "2.1.4"; 17 format = "pyproject"; 18 19 disabled = pythonOlder "3.9"; ··· 22 owner = "bdraco"; 23 repo = pname; 24 rev = "refs/tags/v${version}"; 25 + hash = "sha256-FvZ0U8aZNnGehDMt3+LWLYKU/CSPpifWE7STZkA+0iA="; 26 }; 27 28 nativeBuildInputs = [
+11 -4
pkgs/development/tools/analysis/cppcheck/default.nix
··· 8 , docbook_xsl 9 , docbook_xml_dtd_45 10 , which 11 }: 12 13 stdenv.mkDerivation rec { ··· 21 hash = "sha256-wr2O9EqDvHaMQwnjFLLtP1XxfUwFa/P6gGqYNNPVyaA="; 22 }; 23 24 buildInputs = [ pcre (python3.withPackages (ps: [ps.pygments])) ]; 25 - nativeBuildInputs = [ installShellFiles libxslt docbook_xsl docbook_xml_dtd_45 which ]; 26 27 makeFlags = [ "PREFIX=$(out)" "MATCHCOMPILER=yes" "FILESDIR=$(out)/share/cppcheck" "HAVE_RULES=yes" ]; 28 ··· 30 31 enableParallelBuilding = true; 32 33 postBuild = '' 34 make DB2MAN=${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl man 35 ''; 36 - 37 - # test/testcondition.cpp:4949(TestCondition::alwaysTrueContainer): Assertion failed. 38 - doCheck = !(stdenv.isLinux && stdenv.isAarch64); 39 40 postInstall = '' 41 installManPage cppcheck.1 42 ''; 43 44 doInstallCheck = true; 45 installCheckPhase = ''
··· 8 , docbook_xsl 9 , docbook_xml_dtd_45 10 , which 11 + , pkg-config 12 }: 13 14 stdenv.mkDerivation rec { ··· 22 hash = "sha256-wr2O9EqDvHaMQwnjFLLtP1XxfUwFa/P6gGqYNNPVyaA="; 23 }; 24 25 + strictDeps = true; 26 + nativeBuildInputs = [ pkg-config installShellFiles libxslt docbook_xsl docbook_xml_dtd_45 which python3 ]; 27 buildInputs = [ pcre (python3.withPackages (ps: [ps.pygments])) ]; 28 29 makeFlags = [ "PREFIX=$(out)" "MATCHCOMPILER=yes" "FILESDIR=$(out)/share/cppcheck" "HAVE_RULES=yes" ]; 30 ··· 32 33 enableParallelBuilding = true; 34 35 + postPatch = '' 36 + substituteInPlace Makefile \ 37 + --replace 'PCRE_CONFIG = $(shell which pcre-config)' 'PCRE_CONFIG = $(PKG_CONFIG) libpcre' 38 + ''; 39 + 40 postBuild = '' 41 make DB2MAN=${docbook_xsl}/xml/xsl/docbook/manpages/docbook.xsl man 42 ''; 43 44 postInstall = '' 45 installManPage cppcheck.1 46 ''; 47 + 48 + # test/testcondition.cpp:4949(TestCondition::alwaysTrueContainer): Assertion failed. 49 + doCheck = !(stdenv.isLinux && stdenv.isAarch64); 50 51 doInstallCheck = true; 52 installCheckPhase = ''
+2 -2
pkgs/development/tools/esbuild/default.nix
··· 2 3 buildGoModule rec { 4 pname = "esbuild"; 5 - version = "0.17.12"; 6 7 src = fetchFromGitHub { 8 owner = "evanw"; 9 repo = "esbuild"; 10 rev = "v${version}"; 11 - hash = "sha256-75qDQWAp6cmuXtq90oIIQCj5IKUoQxNARxhFo2Sm5mk="; 12 }; 13 14 vendorHash = "sha256-+BfxCyg0KkDQpHt/wycy/8CTG6YBA/VJvJFhhzUnSiQ=";
··· 2 3 buildGoModule rec { 4 pname = "esbuild"; 5 + version = "0.17.13"; 6 7 src = fetchFromGitHub { 8 owner = "evanw"; 9 repo = "esbuild"; 10 rev = "v${version}"; 11 + hash = "sha256-b9hepd8rF96lU/986Kgc0aSulUylecu73cuxM6Kuu24="; 12 }; 13 14 vendorHash = "sha256-+BfxCyg0KkDQpHt/wycy/8CTG6YBA/VJvJFhhzUnSiQ=";
+3 -3
pkgs/development/tools/ginkgo/default.nix
··· 2 3 buildGoModule rec { 4 pname = "ginkgo"; 5 - version = "2.9.1"; 6 7 src = fetchFromGitHub { 8 owner = "onsi"; 9 repo = "ginkgo"; 10 rev = "v${version}"; 11 - sha256 = "sha256-ew0O+xuRsIrjxJxmdYegbYjcXeEmpL00fJS43jyGIEg="; 12 }; 13 - vendorHash = "sha256-nz32DPm0Sg13ScAeXUYagXvxhpRm+L+rvvY0gE1L584="; 14 15 # integration tests expect more file changes 16 # types tests are missing CodeLocation
··· 2 3 buildGoModule rec { 4 pname = "ginkgo"; 5 + version = "2.9.2"; 6 7 src = fetchFromGitHub { 8 owner = "onsi"; 9 repo = "ginkgo"; 10 rev = "v${version}"; 11 + sha256 = "sha256-lRJCRdt/LIFG6MmCkzlvp77CxM4Md7+eyyiw32Xz9rw="; 12 }; 13 + vendorHash = "sha256-1+uB/UuwrZw17eSRLwcER67z/Qxg2H04vbBdk2FKYf0="; 14 15 # integration tests expect more file changes 16 # types tests are missing CodeLocation
+1 -1
pkgs/development/tools/godot/3/default.nix
··· 102 homepage = "https://godotengine.org"; 103 description = "Free and Open Source 2D and 3D game engine"; 104 license = licenses.mit; 105 - platforms = [ "i686-linux" "x86_64-linux" ]; 106 maintainers = with maintainers; [ twey ]; 107 }; 108 }
··· 102 homepage = "https://godotengine.org"; 103 description = "Free and Open Source 2D and 3D game engine"; 104 license = licenses.mit; 105 + platforms = [ "i686-linux" "x86_64-linux" "aarch64-linux" ]; 106 maintainers = with maintainers; [ twey ]; 107 }; 108 }
+1 -1
pkgs/development/tools/godot/4/default.nix
··· 125 homepage = "https://godotengine.org"; 126 description = "Free and Open Source 2D and 3D game engine"; 127 license = licenses.mit; 128 - platforms = [ "i686-linux" "x86_64-linux" ]; 129 maintainers = with maintainers; [ twey shiryel ]; 130 }; 131 }
··· 125 homepage = "https://godotengine.org"; 126 description = "Free and Open Source 2D and 3D game engine"; 127 license = licenses.mit; 128 + platforms = [ "i686-linux" "x86_64-linux" "aarch64-linux" ]; 129 maintainers = with maintainers; [ twey shiryel ]; 130 }; 131 }
+1 -1
pkgs/games/cataclysm-dda/wrapper.nix
··· 34 cp "$1" "''${1}.bk" 35 unlink "$1" 36 mv "''${1}.bk" "$1" 37 - sed -i "$1" -e "s,/nix/store/.\+\(/bin/cataclysm-tiles\),$out\1," 38 } 39 for script in "$out/share/applications/cataclysm-dda.desktop" \ 40 "$out/Applications/Cataclysm.app/Contents/MacOS/Cataclysm.sh"
··· 34 cp "$1" "''${1}.bk" 35 unlink "$1" 36 mv "''${1}.bk" "$1" 37 + sed -i "$1" -e "s,${builtins.storeDir}/.\+\(/bin/cataclysm-tiles\),$out\1," 38 } 39 for script in "$out/share/applications/cataclysm-dda.desktop" \ 40 "$out/Applications/Cataclysm.app/Contents/MacOS/Cataclysm.sh"
+1 -1
pkgs/os-specific/linux/sysdig/default.nix
··· 115 + lib.optionalString (kernel != null) '' 116 make install_driver 117 kernel_dev=${kernel.dev} 118 - kernel_dev=''${kernel_dev#/nix/store/} 119 kernel_dev=''${kernel_dev%%-linux*dev*} 120 if test -f "$out/lib/modules/${kernel.modDirVersion}/extra/scap.ko"; then 121 sed -i "s#$kernel_dev#................................#g" $out/lib/modules/${kernel.modDirVersion}/extra/scap.ko
··· 115 + lib.optionalString (kernel != null) '' 116 make install_driver 117 kernel_dev=${kernel.dev} 118 + kernel_dev=''${kernel_dev#${builtins.storeDir}/} 119 kernel_dev=''${kernel_dev%%-linux*dev*} 120 if test -f "$out/lib/modules/${kernel.modDirVersion}/extra/scap.ko"; then 121 sed -i "s#$kernel_dev#................................#g" $out/lib/modules/${kernel.modDirVersion}/extra/scap.ko
+2 -2
pkgs/os-specific/linux/systemd/default.nix
··· 312 if dl.pkg == null then '' 313 # remove the dependency on the library by replacing it with an invalid path 314 for file in $(grep -lr '"${dl.name}"' src); do 315 - echo "patching dlopen(\"${dl.name}\", …) in $file to an invalid store path ("/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-not-implemented/${dl.name}")…" 316 - substituteInPlace "$file" --replace '"${dl.name}"' '"/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-not-implemented/${dl.name}"' 317 done 318 '' else '' 319 # ensure that the library we provide actually exists
··· 312 if dl.pkg == null then '' 313 # remove the dependency on the library by replacing it with an invalid path 314 for file in $(grep -lr '"${dl.name}"' src); do 315 + echo "patching dlopen(\"${dl.name}\", …) in $file to an invalid store path ("${builtins.storeDir}/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-not-implemented/${dl.name}")…" 316 + substituteInPlace "$file" --replace '"${dl.name}"' '"${builtins.storeDir}/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-not-implemented/${dl.name}"' 317 done 318 '' else '' 319 # ensure that the library we provide actually exists
+2 -2
pkgs/servers/dns/pdns-recursor/default.nix
··· 5 6 stdenv.mkDerivation rec { 7 pname = "pdns-recursor"; 8 - version = "4.8.2"; 9 10 src = fetchurl { 11 url = "https://downloads.powerdns.com/releases/pdns-recursor-${version}.tar.bz2"; 12 - sha256 = "sha256-Q4LT6E8TQBaFdyd53+3my8gVfs9nY/p/2x3TPuP3msc="; 13 }; 14 15 nativeBuildInputs = [ pkg-config ];
··· 5 6 stdenv.mkDerivation rec { 7 pname = "pdns-recursor"; 8 + version = "4.8.3"; 9 10 src = fetchurl { 11 url = "https://downloads.powerdns.com/releases/pdns-recursor-${version}.tar.bz2"; 12 + sha256 = "sha256-N7kaVFjFRBH0444tEmPs9B51HkPF/WboExANmXjwJQU="; 13 }; 14 15 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/servers/tailscale/default.nix
··· 2 3 buildGoModule rec { 4 pname = "tailscale"; 5 - version = "1.38.1"; 6 7 src = fetchFromGitHub { 8 owner = "tailscale"; 9 repo = "tailscale"; 10 rev = "v${version}"; 11 - hash = "sha256-2VTYZhC/U32fzEJCxkCB35IqQBALKXQA23SvhY57lSU="; 12 }; 13 vendorHash = "sha256-LIvaxSo+4LuHUk8DIZ27IaRQwaDnjW6Jwm5AEc/V95A="; 14
··· 2 3 buildGoModule rec { 4 pname = "tailscale"; 5 + version = "1.38.2"; 6 7 src = fetchFromGitHub { 8 owner = "tailscale"; 9 repo = "tailscale"; 10 rev = "v${version}"; 11 + hash = "sha256-5WNP1wVaKKTauny/dANODMCiQmyzOcWRd83RUInoCuk="; 12 }; 13 vendorHash = "sha256-LIvaxSo+4LuHUk8DIZ27IaRQwaDnjW6Jwm5AEc/V95A="; 14
+3 -3
pkgs/servers/x11/xorg/default.nix
··· 1564 # THIS IS A GENERATED FILE. DO NOT EDIT! 1565 mkfontscale = callPackage ({ stdenv, pkg-config, fetchurl, libfontenc, freetype, xorgproto, zlib }: stdenv.mkDerivation { 1566 pname = "mkfontscale"; 1567 - version = "1.2.1"; 1568 builder = ./builder.sh; 1569 src = fetchurl { 1570 - url = "mirror://xorg/individual/app/mkfontscale-1.2.1.tar.bz2"; 1571 - sha256 = "1ixsnsm2mn0zy9ksdid0lj6irnhvasfik9mz8bbrs5sajzmra16a"; 1572 }; 1573 hardeningDisable = [ "bindnow" "relro" ]; 1574 strictDeps = true;
··· 1564 # THIS IS A GENERATED FILE. DO NOT EDIT! 1565 mkfontscale = callPackage ({ stdenv, pkg-config, fetchurl, libfontenc, freetype, xorgproto, zlib }: stdenv.mkDerivation { 1566 pname = "mkfontscale"; 1567 + version = "1.2.2"; 1568 builder = ./builder.sh; 1569 src = fetchurl { 1570 + url = "mirror://xorg/individual/app/mkfontscale-1.2.2.tar.xz"; 1571 + sha256 = "1i6mw97r2s1rb6spjj8fbdsgw6197smaqq2haqgnwhz73xdzpqwa"; 1572 }; 1573 hardeningDisable = [ "bindnow" "relro" ]; 1574 strictDeps = true;
+1 -1
pkgs/servers/x11/xorg/tarballs.list
··· 15 mirror://xorg/individual/app/iceauth-1.0.8.tar.bz2 16 mirror://xorg/individual/app/ico-1.0.5.tar.bz2 17 mirror://xorg/individual/app/listres-1.0.4.tar.bz2 18 - mirror://xorg/individual/app/mkfontscale-1.2.1.tar.bz2 19 mirror://xorg/individual/app/oclock-1.0.4.tar.bz2 20 mirror://xorg/individual/app/sessreg-1.1.2.tar.bz2 21 mirror://xorg/individual/app/setxkbmap-1.3.2.tar.bz2
··· 15 mirror://xorg/individual/app/iceauth-1.0.8.tar.bz2 16 mirror://xorg/individual/app/ico-1.0.5.tar.bz2 17 mirror://xorg/individual/app/listres-1.0.4.tar.bz2 18 + mirror://xorg/individual/app/mkfontscale-1.2.2.tar.xz 19 mirror://xorg/individual/app/oclock-1.0.4.tar.bz2 20 mirror://xorg/individual/app/sessreg-1.1.2.tar.bz2 21 mirror://xorg/individual/app/setxkbmap-1.3.2.tar.bz2
+2 -2
pkgs/tools/admin/qovery-cli/default.nix
··· 8 9 buildGoModule rec { 10 pname = "qovery-cli"; 11 - version = "0.52.2"; 12 13 src = fetchFromGitHub { 14 owner = "Qovery"; 15 repo = pname; 16 rev = "v${version}"; 17 - hash = "sha256-vZBNoDh/QnrTQrDubocA3FL7Cn5M1n/w+hE99GF9QC4="; 18 }; 19 20 vendorHash = "sha256-V7yPXSN+3H8NkD384MkvKbymNQ/O2Q9HoMO4M8mzVto=";
··· 8 9 buildGoModule rec { 10 pname = "qovery-cli"; 11 + version = "0.53.1"; 12 13 src = fetchFromGitHub { 14 owner = "Qovery"; 15 repo = pname; 16 rev = "v${version}"; 17 + hash = "sha256-vxCDb4qiq7/19wvtWQRCzGxUz+FvWyeKSQIpsiUtwGs="; 18 }; 19 20 vendorHash = "sha256-V7yPXSN+3H8NkD384MkvKbymNQ/O2Q9HoMO4M8mzVto=";
+7 -1
pkgs/tools/misc/cowsay/default.nix
··· 1 - { lib, stdenv, perl, fetchFromGitHub, fetchpatch, nix-update-script, testers, cowsay }: 2 3 stdenv.mkDerivation rec { 4 pname = "cowsay"; ··· 22 }) 23 ]; 24 25 buildInputs = [ perl ]; 26 27 makeFlags = [ 28 "prefix=${placeholder "out"}"
··· 1 + { lib, stdenv, perl, fetchFromGitHub, fetchpatch, makeWrapper, nix-update-script, testers, cowsay }: 2 3 stdenv.mkDerivation rec { 4 pname = "cowsay"; ··· 22 }) 23 ]; 24 25 + nativeBuildInputs = [ makeWrapper ]; 26 buildInputs = [ perl ]; 27 + 28 + postInstall = '' 29 + wrapProgram $out/bin/cowsay \ 30 + --suffix COWPATH : $out/share/cowsay/cows 31 + ''; 32 33 makeFlags = [ 34 "prefix=${placeholder "out"}"
+2 -2
pkgs/tools/security/exploitdb/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "exploitdb"; 9 - version = "2023-03-23"; 10 11 src = fetchFromGitLab { 12 owner = "exploit-database"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-g8dijq9GsMZdkVX/dFEdCPyUX2L5gDOEAqQTckW6HZk="; 16 }; 17 18 nativeBuildInputs = [
··· 6 7 stdenv.mkDerivation rec { 8 pname = "exploitdb"; 9 + version = "2023-03-25"; 10 11 src = fetchFromGitLab { 12 owner = "exploit-database"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 + hash = "sha256-pmhjSZMnTJn0MDKsCk799DrHBDqvUw8M9wxBx65W9pQ="; 16 }; 17 18 nativeBuildInputs = [
+3 -3
pkgs/tools/security/sbctl/default.nix
··· 8 9 buildGoModule rec { 10 pname = "sbctl"; 11 - version = "0.10"; 12 13 src = fetchFromGitHub { 14 owner = "Foxboron"; 15 repo = pname; 16 rev = version; 17 - hash = "sha256-rjqfWOJRG+9GbNNeRafkNx7Khm/vtGeMlfKkz0qFXJY="; 18 }; 19 20 - vendorSha256 = "sha256-3wT/pWKIdEpkLUpOmpKhLA9AyO36LqZBAwamzOUGhFY="; 21 22 ldflags = [ "-s" "-w" "-X github.com/foxboron/sbctl.DatabasePath=${databasePath}" ]; 23
··· 8 9 buildGoModule rec { 10 pname = "sbctl"; 11 + version = "0.11"; 12 13 src = fetchFromGitHub { 14 owner = "Foxboron"; 15 repo = pname; 16 rev = version; 17 + hash = "sha256-kApPb8X1JCP1XfyVFcoCDd+yrytTKSkNWRHKDA3mGaQ="; 18 }; 19 20 + vendorHash = "sha256-WbPYTETTOzqWH+q6fzyDgm0wMScbLWlksLxkDjopF4E="; 21 22 ldflags = [ "-s" "-w" "-X github.com/foxboron/sbctl.DatabasePath=${databasePath}" ]; 23
+2 -2
pkgs/tools/security/yara/default.nix
··· 15 16 stdenv.mkDerivation rec { 17 pname = "yara"; 18 - version = "4.2.3"; 19 20 src = fetchFromGitHub { 21 owner = "VirusTotal"; 22 repo = pname; 23 rev = "v${version}"; 24 - hash = "sha256-Ol2btm1A8JdvYrjD0hPtc17A4L9wgr4l30C8VrImVoE="; 25 }; 26 27 nativeBuildInputs = [
··· 15 16 stdenv.mkDerivation rec { 17 pname = "yara"; 18 + version = "4.3.0"; 19 20 src = fetchFromGitHub { 21 owner = "VirusTotal"; 22 repo = pname; 23 rev = "v${version}"; 24 + hash = "sha256-xjGlK0jUDpkDXnI0odErtF+Xcx0I/orD0v5EZw8mhvs="; 25 }; 26 27 nativeBuildInputs = [
+1
pkgs/tools/security/yaralyzer/default.nix
··· 16 }; 17 18 pythonRelaxDeps = [ 19 "rich" 20 ]; 21
··· 16 }; 17 18 pythonRelaxDeps = [ 19 + "python-dotenv" 20 "rich" 21 ]; 22
+7 -11
pkgs/tools/system/kanata/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "kanata"; 10 - version = "1.2.0"; 11 12 src = fetchFromGitHub { 13 owner = "jtroo"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-mQSbsJ+3mKoDMg0ewwR7UvXUq+5WA9aTPKWCaTz8nDE="; 17 }; 18 19 - cargoHash = "sha256-Pu96OGfnXNaIse/IcwFJWxGMlKOVhZ6DtvgXJkHh+Ao="; 20 - 21 - cargoPatches = [ 22 - (fetchpatch { 23 - name = "serialize-cfg-parsing-tests-for-1.2.0.patch"; 24 - url = "https://github.com/jtroo/kanata/commit/9ef1e80fbcb40402262e08bd9196d000f73f686d.patch"; 25 - hash = "sha256-/FhyaYx4usDjGoVfRktf9dtwjY4oXdMQKqxLz00/NPY="; 26 - }) 27 - ]; 28 29 buildFeatures = lib.optional withCmd "cmd"; 30 31 meta = with lib; { 32 description = "A tool to improve keyboard comfort and usability with advanced customization";
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "kanata"; 10 + version = "1.3.0"; 11 12 src = fetchFromGitHub { 13 owner = "jtroo"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-gHkcOn37MNpcP6ra1Eur9O4/trPGmAOAGVU1NwiuQGY="; 17 }; 18 19 + cargoHash = "sha256-C2d7QdgWd9RTQtXLD4mO0txpzo/SbemJx9YYu62QbqA="; 20 21 buildFeatures = lib.optional withCmd "cmd"; 22 + 23 + postInstall = '' 24 + install -Dm 444 assets/kanata-icon.svg $out/share/icons/hicolor/scalable/apps/kanata.svg 25 + ''; 26 27 meta = with lib; { 28 description = "A tool to improve keyboard comfort and usability with advanced customization";
+5 -7
pkgs/top-level/all-packages.nix
··· 5574 zig = zig_0_9; 5575 }; 5576 5577 rmapi = callPackage ../applications/misc/remarkable/rmapi { }; 5578 5579 rmate-sh = callPackage ../tools/misc/rmate-sh { }; ··· 7900 7901 gocryptfs = callPackage ../tools/filesystems/gocryptfs { }; 7902 7903 - godot_4 = callPackage ../development/tools/godot/4 { 7904 - scons = sconsPackages.scons_4_1_0; 7905 - }; 7906 7907 - godot = callPackage ../development/tools/godot/3 { 7908 - scons = sconsPackages.scons_4_1_0; 7909 - }; 7910 7911 godot-export-templates = callPackage ../development/tools/godot/3/export-templates.nix { }; 7912 ··· 12077 12078 sigil = libsForQt5.callPackage ../applications/editors/sigil { }; 12079 12080 - signalbackup-tools = darwin.apple_sdk_11_0.callPackage ../applications/networking/instant-messengers/signalbackup-tools { }; 12081 12082 signald = callPackage ../applications/networking/instant-messengers/signald { }; 12083
··· 5574 zig = zig_0_9; 5575 }; 5576 5577 + river-luatile = callPackage ../applications/misc/river-luatile{ }; 5578 + 5579 rmapi = callPackage ../applications/misc/remarkable/rmapi { }; 5580 5581 rmate-sh = callPackage ../tools/misc/rmate-sh { }; ··· 7902 7903 gocryptfs = callPackage ../tools/filesystems/gocryptfs { }; 7904 7905 + godot_4 = callPackage ../development/tools/godot/4 { }; 7906 7907 + godot = callPackage ../development/tools/godot/3 { }; 7908 7909 godot-export-templates = callPackage ../development/tools/godot/3/export-templates.nix { }; 7910 ··· 12075 12076 sigil = libsForQt5.callPackage ../applications/editors/sigil { }; 12077 12078 + signalbackup-tools = callPackage ../applications/networking/instant-messengers/signalbackup-tools { }; 12079 12080 signald = callPackage ../applications/networking/instant-messengers/signald { }; 12081