lol

Merge staging-next into staging

authored by

nixpkgs-ci[bot] and committed by
GitHub
0ac23e27 7b5fe9fb

+664 -401
+1 -1
ci/default.nix
··· 49 49 50 50 programs.keep-sorted.enable = true; 51 51 52 - # This uses nixfmt-rfc-style underneath, 52 + # This uses nixfmt underneath, 53 53 # the default formatter for Nix code. 54 54 # See https://github.com/NixOS/nixfmt 55 55 programs.nixfmt.enable = true;
+1
doc/release-notes/rl-2511.section.md
··· 8 8 this release sets the default march level to `la64v1.0`, covering the desktop and server processors of 3X5000 9 9 and newer series. However, embedded chips without LSX (Loongson SIMD eXtension), such as 2K0300 SoC, are not 10 10 supported. `pkgsCross.loongarch64-linux-embedded` can be used to build software and systems for these platforms. 11 + - The official Nix formatter `nixfmt` is now stable and available as `pkgs.nixfmt`, deprecating the temporary `pkgs.nixfmt-rfc-style` attribute. The classic `nixfmt` will stay available for some more time as `pkgs.nixfmt-classic`. 11 12 12 13 ## Backward Incompatibilities {#sec-nixpkgs-release-25.11-incompatibilities} 13 14
+1 -1
doc/stdenv/passthru.chapter.md
··· 53 53 54 54 These tend to entail support from the derivation or the `passthru` attribute in question. 55 55 Common examples of this type are `passthru.optional-dependencies`, `passthru.withPlugins`, and `passthru.withPackages`. 56 - All of those allow associating the package with a set of components built for that specific package, such as when building Python runtime environments using (`python.withPackages`)[#python.withpackages-function]. 56 + All of those allow associating the package with a set of components built for that specific package, such as when building Python runtime environments using [`python.withPackages`](#python.withpackages-function). 57 57 58 58 Attributes that apply only to particular [build helpers](#part-builders) or [language ecosystems](#chap-language-support) are documented there. 59 59
+2 -2
maintainers/scripts/auto-rebase/test/default.nix
··· 9 9 stdenvNoCC 10 10 gitMinimal 11 11 treefmt 12 - nixfmt-rfc-style 12 + nixfmt 13 13 ; 14 14 in 15 15 ··· 27 27 nativeBuildInputs = [ 28 28 gitMinimal 29 29 treefmt 30 - nixfmt-rfc-style 30 + nixfmt 31 31 ]; 32 32 patchPhase = '' 33 33 patchShebangs .
+1 -1
maintainers/scripts/haskell/regenerate-hackage-packages.sh
··· 1 1 #! /usr/bin/env nix-shell 2 - #! nix-shell -i bash -p coreutils haskellPackages.cabal2nix-unstable git nixfmt-rfc-style -I nixpkgs=. 2 + #! nix-shell -i bash -p coreutils haskellPackages.cabal2nix-unstable git -I nixpkgs=. 3 3 4 4 set -euo pipefail 5 5
+1 -1
maintainers/scripts/haskell/update-cabal2nix-unstable.sh
··· 1 1 #! /usr/bin/env nix-shell 2 - #! nix-shell -i bash -p coreutils curl jq gnused haskellPackages.cabal2nix-unstable nixfmt-rfc-style -I nixpkgs=. 2 + #! nix-shell -i bash -p coreutils curl jq gnused haskellPackages.cabal2nix-unstable -I nixpkgs=. 3 3 4 4 # Updates cabal2nix-unstable to the latest master of the nixos/cabal2nix repository. 5 5 # See regenerate-hackage-packages.sh for details on the purpose of this script.
+6 -1
maintainers/scripts/update.py
··· 7 7 import json 8 8 import os 9 9 import re 10 + import shlex 10 11 import subprocess 11 12 import sys 12 13 import tempfile ··· 235 236 f"UPDATE_NIX_PNAME={package['pname']}", 236 237 f"UPDATE_NIX_OLD_VERSION={package['oldVersion']}", 237 238 f"UPDATE_NIX_ATTR_PATH={package['attrPath']}", 238 - *update_script_command, 239 + # Run all update scripts in the Nixpkgs development shell to get access to formatters and co. 240 + "nix-shell", 241 + nixpkgs_root + "/shell.nix", 242 + "--run", 243 + " ".join([ shlex.quote(s) for s in update_script_command ]), 239 244 stdout=asyncio.subprocess.PIPE, 240 245 stderr=asyncio.subprocess.PIPE, 241 246 cwd=worktree,
+51
nixos/doc/manual/development/writing-nixos-tests.section.md
··· 340 340 list-id: test-options-list 341 341 source: @NIXOS_TEST_OPTIONS_JSON@ 342 342 ``` 343 + 344 + ## Accessing VMs in the sandbox with SSH {#sec-test-sandbox-breakpoint} 345 + 346 + As explained in [](#sec-nixos-test-ssh-access), it's possible to configure an 347 + SSH backdoor based on AF_VSOCK. This can be used to SSH into a VM of a running 348 + build in a sandbox. 349 + 350 + This can be done when something in the test fails, e.g. 351 + 352 + ```nix 353 + { 354 + nodes.machine = {}; 355 + 356 + sshBackdoor.enable = true; 357 + enableDebugHook = true; 358 + 359 + testScript = '' 360 + start_all() 361 + machine.succeed("false") # this will fail 362 + ''; 363 + } 364 + ``` 365 + 366 + For the AF_VSOCK feature to work, `/dev/vhost-vsock` is needed in the sandbox 367 + which can be done with e.g. 368 + 369 + ``` 370 + nix-build -A nixosTests.foo --option sandbox-paths /dev/vhost-vsock 371 + ``` 372 + 373 + This will halt the test execution on a test-failure and print instructions 374 + on how to enter the sandbox shell of the VM test. Inside, one can log into 375 + e.g. `machine` with 376 + 377 + ``` 378 + ssh -F ./ssh_config vsock/3 379 + ``` 380 + 381 + As described in [](#sec-nixos-test-ssh-access), the numbers for vsock start at 382 + `3` instead of `1`. So the first VM in the network (sorted alphabetically) can 383 + be accessed with `vsock/3`. 384 + 385 + Alternatively, it's possible to explicitly set a breakpoint with 386 + `debug.breakpoint()`. This also has the benefit, that one can step through 387 + `testScript` with `pdb` like this: 388 + 389 + ``` 390 + $ sudo /nix/store/eeeee-attach <id> 391 + bash# telnet 127.0.0.1 4444 392 + pdb$ … 393 + ```
+6
nixos/doc/manual/redirects.json
··· 1902 1902 "test-opt-sshBackdoor.vsockOffset": [ 1903 1903 "index.html#test-opt-sshBackdoor.vsockOffset" 1904 1904 ], 1905 + "test-opt-enableDebugHook": [ 1906 + "index.html#test-opt-enableDebugHook" 1907 + ], 1905 1908 "test-opt-defaults": [ 1906 1909 "index.html#test-opt-defaults" 1907 1910 ], ··· 2009 2012 ], 2010 2013 "sec-nixos-test-testing-hardware-features": [ 2011 2014 "index.html#sec-nixos-test-testing-hardware-features" 2015 + ], 2016 + "sec-test-sandbox-breakpoint": [ 2017 + "index.html#sec-test-sandbox-breakpoint" 2012 2018 ], 2013 2019 "chap-developing-the-test-driver": [ 2014 2020 "index.html#chap-developing-the-test-driver"
+2
nixos/lib/test-driver/default.nix
··· 14 14 extraPythonPackages ? (_: [ ]), 15 15 nixosTests, 16 16 }: 17 + 17 18 python3Packages.buildPythonApplication { 18 19 pname = "nixos-test-driver"; 19 20 version = "1.1"; ··· 32 33 junit-xml 33 34 ptpython 34 35 ipython 36 + remote-pdb 35 37 ] 36 38 ++ extraPythonPackages python3Packages; 37 39
+10
nixos/lib/test-driver/src/test_driver/__init__.py
··· 5 5 6 6 import ptpython.ipython 7 7 8 + from test_driver.debug import Debug, DebugAbstract, DebugNop 8 9 from test_driver.driver import Driver 9 10 from test_driver.logger import ( 10 11 CompositeLogger, ··· 64 65 "--interactive", 65 66 help="drop into a python repl and run the tests interactively", 66 67 action=argparse.BooleanOptionalAction, 68 + ) 69 + arg_parser.add_argument( 70 + "--debug-hook-attach", 71 + help="Enable interactive debugging breakpoints for sandboxed runs", 67 72 ) 68 73 arg_parser.add_argument( 69 74 "--start-scripts", ··· 129 134 if not args.keep_vm_state: 130 135 logger.info("Machine state will be reset. To keep it, pass --keep-vm-state") 131 136 137 + debugger: DebugAbstract = DebugNop() 138 + if args.debug_hook_attach is not None: 139 + debugger = Debug(logger, args.debug_hook_attach) 140 + 132 141 with Driver( 133 142 args.start_scripts, 134 143 args.vlans, ··· 137 146 logger, 138 147 args.keep_vm_state, 139 148 args.global_timeout, 149 + debug=debugger, 140 150 ) as driver: 141 151 if args.interactive: 142 152 history_dir = os.getcwd()
+53
nixos/lib/test-driver/src/test_driver/debug.py
··· 1 + import logging 2 + import os 3 + import random 4 + import shutil 5 + import subprocess 6 + import sys 7 + from abc import ABC, abstractmethod 8 + 9 + from remote_pdb import RemotePdb # type:ignore 10 + 11 + from test_driver.logger import AbstractLogger 12 + 13 + 14 + class DebugAbstract(ABC): 15 + @abstractmethod 16 + def breakpoint(self, host: str = "127.0.0.1", port: int = 4444) -> None: 17 + pass 18 + 19 + 20 + class DebugNop(DebugAbstract): 21 + def __init__(self) -> None: 22 + pass 23 + 24 + def breakpoint(self, host: str = "127.0.0.1", port: int = 4444) -> None: 25 + pass 26 + 27 + 28 + class Debug(DebugAbstract): 29 + def __init__(self, logger: AbstractLogger, attach_command: str) -> None: 30 + self.breakpoint_on_failure = False 31 + self.logger = logger 32 + self.attach = attach_command 33 + 34 + def breakpoint(self, host: str = "127.0.0.1", port: int = 4444) -> None: 35 + """ 36 + Call this function to stop execution and put the process on sleep while 37 + at the same time have the test driver provide a debug shell on TCP port 38 + `port`. This is meant to be used for sandboxed tests that have the test 39 + driver feature `enableDebugHook` enabled. 40 + """ 41 + pattern = str(random.randrange(999999, 9999999)) 42 + self.logger.log_test_error( 43 + f"Breakpoint reached, run 'sudo {self.attach} {pattern}'" 44 + ) 45 + os.environ["bashInteractive"] = shutil.which("bash") # type:ignore 46 + if os.fork() == 0: 47 + subprocess.run(["sleep", pattern]) 48 + else: 49 + # RemotePdb writes log messages to both stderr AND the logger, 50 + # which is the same here. Hence, disabling the remote_pdb logger 51 + # to avoid duplicate messages in the build log. 52 + logging.root.manager.loggerDict["remote_pdb"].disabled = True # type:ignore 53 + RemotePdb(host=host, port=port).set_trace(sys._getframe().f_back)
+11
nixos/lib/test-driver/src/test_driver/driver.py
··· 13 13 14 14 from colorama import Style 15 15 16 + from test_driver.debug import DebugAbstract, DebugNop 16 17 from test_driver.errors import MachineError, RequestedAssertionFailed 17 18 from test_driver.logger import AbstractLogger 18 19 from test_driver.machine import Machine, NixStartScript, retry ··· 67 68 global_timeout: int 68 69 race_timer: threading.Timer 69 70 logger: AbstractLogger 71 + debug: DebugAbstract 70 72 71 73 def __init__( 72 74 self, ··· 77 79 logger: AbstractLogger, 78 80 keep_vm_state: bool = False, 79 81 global_timeout: int = 24 * 60 * 60 * 7, 82 + debug: DebugAbstract = DebugNop(), 80 83 ): 81 84 self.tests = tests 82 85 self.out_dir = out_dir 83 86 self.global_timeout = global_timeout 84 87 self.race_timer = threading.Timer(global_timeout, self.terminate_test) 85 88 self.logger = logger 89 + self.debug = debug 86 90 87 91 tmp_dir = get_tmp_dir() 88 92 ··· 159 163 polling_condition=self.polling_condition, 160 164 Machine=Machine, # for typing 161 165 t=AssertionTester(), 166 + debug=self.debug, 162 167 ) 163 168 machine_symbols = {pythonize_name(m.name): m for m in self.machines} 164 169 # If there's exactly one machine, make it available under the name ··· 224 229 for line in f"{exc_prefix}: {exc}".splitlines(): 225 230 self.logger.log_test_error(line) 226 231 232 + self.debug.breakpoint() 233 + 227 234 sys.exit(1) 235 + 236 + except Exception: 237 + self.debug.breakpoint() 238 + raise 228 239 229 240 def run_tests(self) -> None: 230 241 """Run the test script (for non-interactive test runs)"""
+2
nixos/lib/test-script-prepend.py
··· 1 1 # This file contains type hints that can be prepended to Nix test scripts so they can be type 2 2 # checked. 3 3 4 + from test_driver.debug import DebugAbstract 4 5 from test_driver.driver import Driver 5 6 from test_driver.vlan import VLan 6 7 from test_driver.machine import Machine ··· 52 53 serial_stdout_off: Callable[[], None] 53 54 serial_stdout_on: Callable[[], None] 54 55 polling_condition: PollingConditionProtocol 56 + debug: DebugAbstract 55 57 t: TestCase
+2 -1
nixos/lib/testing/nodes.nix
··· 84 84 options = { 85 85 sshBackdoor = { 86 86 enable = mkOption { 87 - default = false; 87 + default = config.enableDebugHook; 88 + defaultText = lib.literalExpression "config.enableDebugHook"; 88 89 type = types.bool; 89 90 description = "Whether to turn on the VSOCK-based access to all VMs. This provides an unauthenticated access intended for debugging."; 90 91 };
+32 -7
nixos/lib/testing/run.nix
··· 7 7 }: 8 8 let 9 9 inherit (lib) types mkOption; 10 + inherit (hostPkgs.stdenv.hostPlatform) isDarwin isLinux; 10 11 11 12 # TODO (lib): Also use lib equivalent in nodes.nix 12 13 /** ··· 26 27 */ 27 28 f: 28 29 lib.mkOverride (opt.highestPrio - 1) (f opt.value); 29 - 30 30 in 31 31 { 32 32 options = { ··· 42 42 ''; 43 43 }; 44 44 45 + enableDebugHook = lib.mkEnableOption "" // { 46 + description = '' 47 + Halt test execution after any test fail and provide the possibility to 48 + hook into the sandbox to connect with either the test driver via 49 + `telnet localhost 4444` or with the VMs via SSH and vsocks (see also 50 + `sshBackdoor.enable`). 51 + ''; 52 + }; 53 + 45 54 rawTestDerivation = mkOption { 46 55 type = types.package; 47 56 description = '' ··· 74 83 rawTestDerivation = hostPkgs.stdenv.mkDerivation config.rawTestDerivationArg; 75 84 rawTestDerivationArg = 76 85 finalAttrs: 77 - assert lib.assertMsg (!config.sshBackdoor.enable) 78 - "The SSH backdoor is currently not supported for non-interactive testing! Please make sure to only set `interactive.sshBackdoor.enable = true;`!"; 86 + assert lib.assertMsg ( 87 + config.sshBackdoor.enable -> isLinux 88 + ) "The SSH backdoor is not supported for macOS host systems!"; 89 + 90 + assert lib.assertMsg ( 91 + config.enableDebugHook -> isLinux 92 + ) "The debugging hook is not supported for macOS host systems!"; 79 93 { 80 94 name = "vm-test-run-${config.name}"; 81 95 82 96 requiredSystemFeatures = 83 - [ "nixos-test" ] 84 - ++ lib.optionals hostPkgs.stdenv.hostPlatform.isLinux [ "kvm" ] 85 - ++ lib.optionals hostPkgs.stdenv.hostPlatform.isDarwin [ "apple-virt" ]; 97 + [ "nixos-test" ] ++ lib.optional isLinux "kvm" ++ lib.optional isDarwin "apple-virt"; 98 + 99 + nativeBuildInputs = lib.optionals config.enableDebugHook [ 100 + hostPkgs.openssh 101 + hostPkgs.inetutils 102 + ]; 86 103 87 104 buildCommand = '' 88 105 mkdir -p $out ··· 90 107 # effectively mute the XMLLogger 91 108 export LOGFILE=/dev/null 92 109 93 - ${config.driver}/bin/nixos-test-driver -o $out 110 + ${lib.optionalString config.enableDebugHook '' 111 + ln -sf \ 112 + ${hostPkgs.systemd}/lib/systemd/ssh_config.d/20-systemd-ssh-proxy.conf \ 113 + ssh_config 114 + ''} 115 + 116 + ${config.driver}/bin/nixos-test-driver \ 117 + -o $out \ 118 + ${lib.optionalString config.enableDebugHook "--debug-hook=${hostPkgs.breakpointHook.attach}"} 94 119 ''; 95 120 96 121 passthru = config.passthru;
+1 -1
nixos/modules/services/hardware/nvidia-container-toolkit/cdi-generate.nix
··· 39 39 --device-name-strategy ${device-name-strategy} \ 40 40 --ldconfig-path ${lib.getExe' glibc "ldconfig"} \ 41 41 --library-search-path ${lib.getLib nvidia-driver}/lib \ 42 - --nvidia-cdi-hook-path ${lib.getExe' nvidia-container-toolkit.tools "nvidia-cdi-hook"} \ 42 + --nvidia-cdi-hook-path ${lib.getOutput "tools" nvidia-container-toolkit}/bin/nvidia-cdi-hook \ 43 43 ${lib.escapeShellArgs extraArgs} 44 44 } 45 45
+1 -1
nixos/modules/services/web-apps/ocis.md
··· 104 104 [`services.ocis.environmentFile`][mod-envFile] for 105 105 sensitive values. 106 106 107 - Configuration in (`services.ocis.environment`)[mod-env] overrides those from 107 + Configuration in [`services.ocis.environment`][mod-env] overrides those from 108 108 [`services.ocis.environmentFile`][mod-envFile] and will have highest 109 109 precedence 110 110
+11
nixos/modules/system/boot/systemd/repart.nix
··· 85 85 ''; 86 86 default = true; 87 87 }; 88 + 89 + extraArgs = lib.mkOption { 90 + description = '' 91 + Extra command-line arguments to pass to systemd-repart. 92 + 93 + See {manpage}`systemd-repart(8)` for all available options. 94 + ''; 95 + type = lib.types.listOf lib.types.str; 96 + default = [ ]; 97 + }; 88 98 }; 89 99 90 100 systemd.repart = { ··· 177 187 --dry-run=no \ 178 188 --empty=${initrdCfg.empty} \ 179 189 --discard=${lib.boolToString initrdCfg.discard} \ 190 + ${utils.escapeSystemdExecArgs initrdCfg.extraArgs} \ 180 191 ${lib.optionalString (initrdCfg.device != null) initrdCfg.device} 181 192 '' 182 193 ];
+7 -3
nixos/tests/nvidia-container-toolkit.nix
··· 85 85 ''; 86 86 meta.mainProgram = "nvidia-ctk"; 87 87 }; 88 + suppressNvidiaDriverAssertion = true; 88 89 }; 89 90 in 90 91 { ··· 100 101 { 101 102 environment.systemPackages = with pkgs; [ jq ]; 102 103 virtualisation.diskSize = lib.mkDefault 10240; 103 - virtualisation.containers.enable = lib.mkDefault true; 104 + virtualisation.containers = { 105 + containersConf.settings.engine.cdi_spec_dirs = [ "/var/run/cdi" ]; 106 + enable = lib.mkDefault true; 107 + }; 104 108 hardware = { 105 109 inherit nvidia-container-toolkit; 106 110 nvidia = { ··· 113 117 nodes = { 114 118 no-gpus = { 115 119 virtualisation.containers.enable = false; 116 - hardware.graphics.enable = false; 117 120 }; 121 + 118 122 one-gpu = 119 123 { pkgs, ... }: 120 124 { ··· 142 146 one_gpu.wait_for_unit("nvidia-container-toolkit-cdi-generator.service") 143 147 one_gpu.succeed("cat /var/run/cdi/nvidia-container-toolkit.json | jq") 144 148 one_gpu.succeed("podman load < ${testContainerImage}") 145 - print(one_gpu.succeed("podman run --pull=never --device=nvidia.com/gpu=all -v /run/opengl-driver:/run/opengl-driver:ro cdi-test:latest")) 149 + one_gpu.succeed("podman run --pull=never --device=nvidia.com/gpu=all -v /run/opengl-driver:/run/opengl-driver:ro cdi-test:latest") 146 150 147 151 # Issue: https://github.com/NixOS/nixpkgs/issues/319201 148 152 with subtest("The generated CDI spec skips specified non-existant paths in the host"):
+3 -1
nixos/tests/qownnotes.nix
··· 54 54 machine.send_key("ret") 55 55 machine.wait_for_text("Nextcloud") 56 56 machine.send_key("ret") 57 - machine.wait_for_text("App metric") 57 + 58 + # OCR can't detect "App metric" anymore, so we will wait for another text 59 + machine.wait_for_text("Open network settings") 58 60 machine.send_key("ret") 59 61 60 62 # Doesn't work for non-root
+95 -23
nixos/tests/systemd-repart.nix
··· 9 9 10 10 let 11 11 # A testScript fragment that prepares a disk with some empty, unpartitioned 12 - # space. and uses it to boot the test with. Takes a single argument `machine` 13 - # from which the diskImage is extracted. 14 - useDiskImage = machine: '' 15 - import os 16 - import shutil 17 - import subprocess 18 - import tempfile 12 + # space. and uses it to boot the test with. 13 + # Takes two arguments, `machine` from which the diskImage is extracted, 14 + # as well an optional `sizeDiff` (defaulting to +32M), describing how should 15 + # be resized. 16 + useDiskImage = 17 + { 18 + machine, 19 + sizeDiff ? "+32M", 20 + }: 21 + '' 22 + import os 23 + import shutil 24 + import subprocess 25 + import tempfile 19 26 20 - tmp_disk_image = tempfile.NamedTemporaryFile() 27 + tmp_disk_image = tempfile.NamedTemporaryFile() 21 28 22 - shutil.copyfile("${machine.system.build.diskImage}/nixos.img", tmp_disk_image.name) 29 + shutil.copyfile("${machine.system.build.diskImage}/nixos.img", tmp_disk_image.name) 23 30 24 - subprocess.run([ 25 - "${machine.virtualisation.qemu.package}/bin/qemu-img", 26 - "resize", 27 - "-f", 28 - "raw", 29 - tmp_disk_image.name, 30 - "+32M", 31 - ]) 31 + subprocess.run([ 32 + "${machine.virtualisation.qemu.package}/bin/qemu-img", 33 + "resize", 34 + "-f", 35 + "raw", 36 + tmp_disk_image.name, 37 + "${sizeDiff}", 38 + ]) 32 39 33 - # Set NIX_DISK_IMAGE so that the qemu script finds the right disk image. 34 - os.environ['NIX_DISK_IMAGE'] = tmp_disk_image.name 35 - ''; 40 + # Set NIX_DISK_IMAGE so that the qemu script finds the right disk image. 41 + os.environ['NIX_DISK_IMAGE'] = tmp_disk_image.name 42 + ''; 36 43 37 44 common = 38 45 { ··· 98 105 testScript = 99 106 { nodes, ... }: 100 107 '' 101 - ${useDiskImage nodes.machine} 108 + ${useDiskImage { inherit (nodes) machine; }} 102 109 103 110 machine.start() 104 111 machine.wait_for_unit("multi-user.target") ··· 108 115 ''; 109 116 }; 110 117 118 + encrypt-tpm2 = makeTest { 119 + name = "systemd-repart-encrypt-tpm2"; 120 + meta.maintainers = with maintainers; [ flokli ]; 121 + 122 + nodes.machine = 123 + { 124 + config, 125 + pkgs, 126 + lib, 127 + ... 128 + }: 129 + { 130 + imports = [ common ]; 131 + 132 + boot.initrd.systemd.enable = true; 133 + 134 + boot.initrd.availableKernelModules = [ "dm_crypt" ]; 135 + boot.initrd.luks.devices = lib.mkVMOverride { 136 + created-crypt = { 137 + device = "/dev/disk/by-partlabel/created-crypt"; 138 + crypttabExtraOpts = [ "tpm2-device=auto" ]; 139 + }; 140 + }; 141 + boot.initrd.systemd.repart.enable = true; 142 + boot.initrd.systemd.repart.extraArgs = [ 143 + "--tpm2-pcrs=7" 144 + ]; 145 + systemd.repart.partitions = { 146 + "10-root" = { 147 + Type = "linux-generic"; 148 + }; 149 + "10-crypt" = { 150 + Type = "var"; 151 + Label = "created-crypt"; 152 + Format = "ext4"; 153 + Encrypt = "tpm2"; 154 + }; 155 + }; 156 + virtualisation.tpm.enable = true; 157 + virtualisation.fileSystems = { 158 + "/var" = { 159 + device = "/dev/mapper/created-crypt"; 160 + fsType = "ext4"; 161 + }; 162 + }; 163 + }; 164 + 165 + testScript = 166 + { nodes, ... }: 167 + '' 168 + ${useDiskImage { 169 + inherit (nodes) machine; 170 + sizeDiff = "+100M"; 171 + }} 172 + 173 + machine.start() 174 + machine.wait_for_unit("multi-user.target") 175 + 176 + systemd_repart_logs = machine.succeed("journalctl --boot --unit systemd-repart.service") 177 + assert "Encrypting future partition 2" in systemd_repart_logs 178 + 179 + assert "/dev/mapper/created-crypt" in machine.succeed("mount") 180 + ''; 181 + }; 182 + 111 183 after-initrd = makeTest { 112 184 name = "systemd-repart-after-initrd"; 113 185 meta.maintainers = with maintainers; [ nikstur ]; ··· 128 200 testScript = 129 201 { nodes, ... }: 130 202 '' 131 - ${useDiskImage nodes.machine} 203 + ${useDiskImage { inherit (nodes) machine; }} 132 204 133 205 machine.start() 134 206 machine.wait_for_unit("multi-user.target") ··· 196 268 testScript = 197 269 { nodes, ... }: 198 270 '' 199 - ${useDiskImage nodes.machine} 271 + ${useDiskImage { inherit (nodes) machine; }} 200 272 201 273 machine.start() 202 274 machine.wait_for_unit("multi-user.target")
+2 -1
pkgs/README.md
··· 940 940 You can run `nix-shell maintainers/scripts/update.nix` in the root of Nixpkgs repository for information on how to use it. 941 941 `update.nix` offers several modes for selecting packages to update, and it will execute update scripts for all matched packages that have an `updateScript` attribute. 942 942 943 - Each update script will be passed the following environment variables: 943 + Update scripts will be run inside the [Nixpkgs development shell](../shell.nix), providing access to some useful tools for CI. 944 + Furthermore each update script will be passed the following environment variables: 944 945 945 946 - [`UPDATE_NIX_NAME`] – content of the `name` attribute of the updated package 946 947 - [`UPDATE_NIX_PNAME`] – content of the `pname` attribute of the updated package
+1 -1
pkgs/applications/editors/emacs/elisp-packages/emacs2nix.nix
··· 13 13 14 14 packages = [ 15 15 pkgs.bash 16 - pkgs.nixfmt-rfc-style 16 + pkgs.nixfmt 17 17 ]; 18 18 19 19 EMACS2NIX = src;
+8 -8
pkgs/applications/networking/cluster/k3s/1_32/images-versions.json
··· 1 1 { 2 2 "airgap-images-amd64": { 3 - "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.5%2Bk3s1/k3s-airgap-images-amd64.tar.zst", 4 - "sha256": "ac1f278f1b006851d95cd3236e9b909264872e9f6b5ffcf90d28198c6f2e913c" 3 + "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.6%2Bk3s1/k3s-airgap-images-amd64.tar.zst", 4 + "sha256": "11350d97016e084bff9d0410e3abfb0ed5dd5920378565584e88996b0a6e2da4" 5 5 }, 6 6 "airgap-images-arm": { 7 - "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.5%2Bk3s1/k3s-airgap-images-arm.tar.zst", 8 - "sha256": "c87b652cc8469019668ba5481e00b0d253e7d582e6139cb3a086b01682329f5e" 7 + "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.6%2Bk3s1/k3s-airgap-images-arm.tar.zst", 8 + "sha256": "1aa4286b30b5418df7b94782b70bcf79644da6c2d77bc5ab643da9c69e0290ac" 9 9 }, 10 10 "airgap-images-arm64": { 11 - "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.5%2Bk3s1/k3s-airgap-images-arm64.tar.zst", 12 - "sha256": "c7ebe524d0d596ff9b45695770cbd76f8fd672236c563da947ca5cb2d0a64aad" 11 + "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.6%2Bk3s1/k3s-airgap-images-arm64.tar.zst", 12 + "sha256": "cff2d5270b5702b5813f662af7e1f0a741ea3a1052cc81629de6eee1d5a767bd" 13 13 }, 14 14 "images-list": { 15 - "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.5%2Bk3s1/k3s-images.txt", 16 - "sha256": "aa8e10337aef453cb17e6408dbaec9eb2da409ca6ba1f8bc7332fcef97fdaf3a" 15 + "url": "https://github.com/k3s-io/k3s/releases/download/v1.32.6%2Bk3s1/k3s-images.txt", 16 + "sha256": "637ccb5f5a8f4a7d13991cb3060f05b8c7c46e7351e0edae351f9ad23bb51631" 17 17 } 18 18 }
+6 -6
pkgs/applications/networking/cluster/k3s/1_32/versions.nix
··· 1 1 { 2 - k3sVersion = "1.32.5+k3s1"; 3 - k3sCommit = "8e8f2a4726fdb4ca628eb62b2a526b64d0e6a763"; 4 - k3sRepoSha256 = "02qsw00f0k0kv93xws96np3fj3rdynnhjhk41a58kic1mnbgm8ss"; 5 - k3sVendorHash = "sha256-BZs3tgUtcLw1mqaAyOCwg6bhmeQbUGCE9wsbPSG61t4="; 2 + k3sVersion = "1.32.6+k3s1"; 3 + k3sCommit = "eb603acd1530edcaf79a4a8ed3da54e9e03d9967"; 4 + k3sRepoSha256 = "05py458rdrys1hkw8rg62c98lnwjij5zby8n2zkl1kbfqy12adln"; 5 + k3sVendorHash = "sha256-K8vlX8rucbAOCxHbgrWHsMBWiRc/98IJVCYS8UD+ZsI="; 6 6 chartVersions = import ./chart-versions.nix; 7 7 imagesVersions = builtins.fromJSON (builtins.readFile ./images-versions.json); 8 8 k3sRootVersion = "0.14.1"; 9 9 k3sRootSha256 = "0svbi42agqxqh5q2ri7xmaw2a2c70s7q5y587ls0qkflw5vx4sl7"; 10 - k3sCNIVersion = "1.6.0-k3s1"; 11 - k3sCNISha256 = "0g7zczvwba5xqawk37b0v96xysdwanyf1grxn3l3lhxsgjjsmkd7"; 10 + k3sCNIVersion = "1.7.1-k3s1"; 11 + k3sCNISha256 = "0k1qfmsi5bqgwd5ap8ndimw09hsxn0cqf4m5ad5a4mgl6akw6dqz"; 12 12 containerdVersion = "2.0.5-k3s1.32"; 13 13 containerdSha256 = "1la7ygx5caqfqk025wyrxmhjb0xbpkzwnxv52338p33g68sb3yb0"; 14 14 criCtlVersion = "1.31.0-k3s2";
+2 -2
pkgs/applications/window-managers/hyprwm/hyprland-plugins/hy3.nix
··· 8 8 }: 9 9 mkHyprlandPlugin hyprland rec { 10 10 pluginName = "hy3"; 11 - version = "hl0.49.0"; 11 + version = "hl0.50.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "outfoxxed"; 15 15 repo = "hy3"; 16 16 tag = version; 17 - hash = "sha256-dYxkdbg6yj8HhuBkCmklMQVR17N7P32R8ir7b7oNxm4="; 17 + hash = "sha256-1BTJSqkj+lkIry27HuqA5UB7uRqAUvGT7LAUDQhKjU0="; 18 18 }; 19 19 20 20 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/build-support/dotnet/add-nuget-deps/default.nix
··· 5 5 lib, 6 6 replaceVarsWith, 7 7 nuget-to-nix, 8 - nixfmt-rfc-style, 8 + nixfmt, 9 9 nuget-to-json, 10 10 cacert, 11 11 fetchNupkg, ··· 90 90 replacements = { 91 91 binPath = lib.makeBinPath [ 92 92 nuget-to-nix 93 - nixfmt-rfc-style 93 + nixfmt 94 94 nuget-to-json 95 95 ]; 96 96 };
+1 -1
pkgs/build-support/vm/default.nix
··· 909 909 nativeBuildInputs = [ 910 910 buildPackages.perl 911 911 buildPackages.dpkg 912 - buildPackages.nixfmt-rfc-style 912 + buildPackages.nixfmt 913 913 ]; 914 914 } 915 915 ''
+3 -3
pkgs/by-name/an/antimatter-dimensions/package.nix
··· 19 19 in 20 20 buildNpmPackage rec { 21 21 pname = "antimatter-dimensions"; 22 - version = "0-unstable-2025-05-08"; 22 + version = "0-unstable-2025-07-15"; 23 23 src = fetchFromGitHub { 24 24 owner = "IvarK"; 25 25 repo = "AntimatterDimensionsSourceCode"; 26 - rev = "7b29fa1c0771b93a8bf8198ca04886167ecffc0b"; 27 - hash = "sha256-z7dVToxu8qWCPajf0vKprXF4zSBCRDquBgjf55ZPgyE="; 26 + rev = "01d29026a9d4a85193b563ab0a44b2b3cf02ad6e"; 27 + hash = "sha256-w66JgLo4SX0b63LjRd1XKDs7O/TpFFJYSbE+dOW1Unw="; 28 28 }; 29 29 nativeBuildInputs = [ 30 30 copyDesktopItems
+4 -4
pkgs/by-name/an/anubis/package.nix
··· 13 13 14 14 buildGoModule (finalAttrs: { 15 15 pname = "anubis"; 16 - version = "1.20.0"; 16 + version = "1.21.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "TecharoHQ"; 20 20 repo = "anubis"; 21 21 tag = "v${finalAttrs.version}"; 22 - hash = "sha256-pdfe2D9KAg/vesTgOi+b5ZVkUkuWhmZC/xYXiiYzlPs="; 22 + hash = "sha256-FKX8E32unAKK8e/Nlrj24FU1amc7AJw28hzmZDbIcIc="; 23 23 }; 24 24 25 - vendorHash = "sha256-cOl+eVnj6aMKIJCjCM0aacp4/Jg5BhZqFwum+u9tOKE="; 25 + vendorHash = "sha256-cWkC3Bqut5h3hHh5tPIPeHMnkwoqKMnG1x40uCtUIwI="; 26 26 27 27 nativeBuildInputs = [ 28 28 esbuild ··· 34 34 pname = "anubis-xess"; 35 35 inherit (finalAttrs) version src; 36 36 37 - npmDepsHash = "sha256-kBnexaBAMgA7QdKevW3mmlSn+QEbkTW//hYVTRFLQeQ="; 37 + npmDepsHash = "sha256-jvYmAbbMRy8fK2Y0YC0UJGhNRLzk1kjzGvRbqhWFzS4="; 38 38 39 39 buildPhase = '' 40 40 runHook preBuild
+1 -1
pkgs/by-name/ba/bash-language-server/package.nix
··· 56 56 find node_modules server/node_modules -xtype l -delete 57 57 58 58 # remove non-deterministic files 59 - rm node_modules/{.modules.yaml,.pnpm-workspace-state.json} 59 + rm node_modules/.modules.yaml 60 60 ''; 61 61 62 62 installPhase = ''
+2 -2
pkgs/by-name/bi/bitrise/package.nix
··· 6 6 }: 7 7 buildGoModule rec { 8 8 pname = "bitrise"; 9 - version = "2.31.3"; 9 + version = "2.32.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "bitrise-io"; 13 13 repo = "bitrise"; 14 14 rev = "v${version}"; 15 - hash = "sha256-uy2B2tjtg6/ufMWy9sPoheSw2hxIsl2gUdAKVfixpoM="; 15 + hash = "sha256-Qcq96ZA95Tvs/i3MDpTsc2ZY3xSLpf10o3KpWXoJmQo="; 16 16 }; 17 17 18 18 # many tests rely on writable $HOME/.bitrise and require network access
+3 -3
pkgs/by-name/bo/bootc/package.nix
··· 13 13 14 14 rustPlatform.buildRustPackage rec { 15 15 pname = "bootc"; 16 - version = "1.4.0"; 16 + version = "1.5.0"; 17 17 useFetchCargoVendor = true; 18 - cargoHash = "sha256-7Fn68bcm8ZyR5eALCMIdcXcZ595EnWFHKdnqI5vMso4="; 18 + cargoHash = "sha256-3/Ngq6ZHPoE9BMychv+Jg0LhtJrY8GPrFYu7lRvX1+k="; 19 19 doInstallCheck = true; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "bootc-dev"; 23 23 repo = "bootc"; 24 24 rev = "v${version}"; 25 - hash = "sha256-FuU3rQtKpK+ScQ10GivisSJseY2GOFJ/y2HRKIiU0G8="; 25 + hash = "sha256-1u4pBiySYzudFVf4bayQ7FbXf4EjA4v1+AOX9E+tjyA="; 26 26 }; 27 27 28 28 nativeBuildInputs = [ pkg-config ];
+1 -1
pkgs/by-name/br/bruijn/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p coreutils cabal2nix curl jq nixfmt-rfc-style 2 + #!nix-shell -i bash -p coreutils cabal2nix curl jq 3 3 4 4 set -euo pipefail 5 5
+15 -16
pkgs/by-name/co/connman-gtk/package.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 fetchpatch, 6 - autoconf, 7 - automake, 8 - intltool, 6 + meson, 7 + ninja, 9 8 pkg-config, 9 + python3, 10 10 gtk3, 11 11 connman, 12 12 openconnect, 13 13 wrapGAppsHook3, 14 14 }: 15 15 16 - stdenv.mkDerivation rec { 16 + stdenv.mkDerivation { 17 17 pname = "connman-gtk"; 18 - version = "1.1.1"; 18 + version = "1.1.1-unstable-2018-06-26"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "jgke"; 22 22 repo = "connman-gtk"; 23 - rev = "v${version}"; 24 - hash = "sha256-2bfoGXzy4wXRALLXEEa7vPWbsBNUhE31nn7dDkuHYCY="; 23 + rev = "b72c6ab3bb19c07325c8e659902b046daa23c506"; 24 + hash = "sha256-6lX6FYERDgLj9G6nwnP35kF5x8dpRJqfJB/quZFtFzM="; 25 25 }; 26 26 27 + postPatch = '' 28 + patchShebangs --build data/meson_post_install.py 29 + ''; 30 + 27 31 nativeBuildInputs = [ 28 - autoconf 29 - automake 30 - intltool 32 + meson 33 + ninja 31 34 pkg-config 35 + python3 32 36 wrapGAppsHook3 33 37 ]; 34 38 ··· 45 49 }) 46 50 ]; 47 51 48 - preConfigure = '' 49 - # m4/intltool.m4 is an invalid symbolic link 50 - rm m4/intltool.m4 51 - ln -s ${intltool}/share/aclocal/intltool.m4 m4/ 52 - ./autogen.sh 53 - ''; 52 + env.MESON_INSTALL_PREFIX = placeholder "out"; 54 53 55 54 meta = with lib; { 56 55 description = "GTK GUI for Connman";
+1 -1
pkgs/by-name/cr/creek/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p bash common-updater-scripts gnused nixfmt-rfc-style 2 + #!nix-shell -i bash -p bash common-updater-scripts gnused 3 3 4 4 latest_tag=$(list-git-tags --url=https://github.com/nmeum/creek | sed 's/^v//' | tail -n 1) 5 5
+5 -5
pkgs/by-name/db/dbgate/package.nix
··· 8 8 9 9 let 10 10 pname = "dbgate"; 11 - version = "6.4.2"; 11 + version = "6.5.6"; 12 12 src = 13 13 fetchurl 14 14 { 15 15 aarch64-linux = { 16 16 url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-linux_arm64.AppImage"; 17 - hash = "sha256-GDQCixckbMlEvp77uAdsTtK8CUT02mUpxluLapO0D78="; 17 + hash = "sha256-S0xlC0ht6G+RDrsMaMD4nk/vKdLvtvAtUaMaFowT/Gw="; 18 18 }; 19 19 x86_64-linux = { 20 20 url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-linux_x86_64.AppImage"; 21 - hash = "sha256-5rMkW9VY1NgeGgG37QyMI78I4G90yuWhkP60o2ClAM8="; 21 + hash = "sha256-JBE/t/IwFe02LrK4Ci+2KEtAXlH1zr5WcTmQir6yvNc="; 22 22 }; 23 23 x86_64-darwin = { 24 24 url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-mac_x64.dmg"; 25 - hash = "sha256-AEYGGT/LIursXtrwVglWvMxYFA9YCqx7q7KXO0q6FZI="; 25 + hash = "sha256-EkySGJCHAR/YCS/I6j2LZHA6/L0P8VX2WDPScj58mSg="; 26 26 }; 27 27 aarch64-darwin = { 28 28 url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-mac_universal.dmg"; 29 - hash = "sha256-yWDcIXrD85qr+zx5sbtci1Yw/C6gUjW7NNjfu/sClas="; 29 + hash = "sha256-isOrajXB+O9y3fiSulhjoSSt/7lgu4xPMXBhUcfgK2Y="; 30 30 }; 31 31 } 32 32 .${stdenv.hostPlatform.system} or (throw "dbgate: ${stdenv.hostPlatform.system} is unsupported.");
+10 -6
pkgs/by-name/de/devenv/package.nix
··· 8 8 cachix, 9 9 nixVersions, 10 10 openssl, 11 + dbus, 11 12 pkg-config, 12 13 glibcLocalesUtf8, 13 14 devenv, # required to run version test ··· 18 19 (nixVersions.git.overrideSource (fetchFromGitHub { 19 20 owner = "cachix"; 20 21 repo = "nix"; 21 - rev = "afa41b08df4f67b8d77a8034b037ac28c71c77df"; 22 - hash = "sha256-IDB/oh/P63ZTdhgSkey2LZHzeNhCdoKk+4j7AaPe1SE="; 22 + rev = "031c3cf42d2e9391eee373507d8c12e0f9606779"; 23 + hash = "sha256-dOi/M6yNeuJlj88exI+7k154z+hAhFcuB8tZktiW7rg="; 23 24 })).overrideAttrs 24 25 (old: { 25 26 version = "2.30-devenv"; ··· 29 30 __intentionallyOverridingVersion = true; 30 31 }); 31 32 32 - version = "1.7"; 33 + version = "1.8"; 33 34 in 34 35 rustPlatform.buildRustPackage { 35 36 pname = "devenv"; ··· 39 40 owner = "cachix"; 40 41 repo = "devenv"; 41 42 tag = "v${version}"; 42 - hash = "sha256-LzMVgB8izls/22g69KvWPbuQ8C7PRT9PobbvdV3/raI="; 43 + hash = "sha256-Cg4DxHCZiXiSlbwveJpyCFzWIblWi467I2/pmsAWiAw="; 43 44 }; 44 45 45 46 useFetchCargoVendor = true; 46 - cargoHash = "sha256-k/UrnRTI+Z09kdN7PYNOg9+GnumqOdm36F31CKZCGMU="; 47 + cargoHash = "sha256-uUI0O60x8AVG85MJYzEbNdsO818yFu4w66WuozboWso="; 47 48 48 49 buildAndTestSubdir = "devenv"; 49 50 ··· 53 54 pkg-config 54 55 ]; 55 56 56 - buildInputs = [ openssl ]; 57 + buildInputs = [ 58 + openssl 59 + dbus 60 + ]; 57 61 58 62 postInstall = 59 63 let
+1 -1
pkgs/by-name/dp/dprint/plugins/update-plugins.py
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i python -p nix nixfmt-rfc-style 'python3.withPackages (pp: [ pp.requests ])' 2 + #!nix-shell -i python -p nix 'python3.withPackages (pp: [ pp.requests ])' 3 3 4 4 import json 5 5 import os
+1 -1
pkgs/by-name/ej/ejabberd/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -I nixpkgs=./. -i bash -p curl jq common-updater-scripts "rebar3WithPlugins {globalPlugins = [beamPackages.rebar3-nix];}" erlang autoconf automake nixfmt-rfc-style 2 + #!nix-shell -I nixpkgs=./. -i bash -p curl jq common-updater-scripts "rebar3WithPlugins {globalPlugins = [beamPackages.rebar3-nix];}" erlang autoconf automake 3 3 #shellcheck shell=bash 4 4 5 5 set -eu -o pipefail
+2 -2
pkgs/by-name/el/elm-land/package.nix
··· 7 7 writeShellScript, 8 8 nix-update, 9 9 elm2nix, 10 - nixfmt-rfc-style, 10 + nixfmt, 11 11 }: 12 12 13 13 buildNpmPackage rec { ··· 53 53 cp "$(nix-build -A "$UPDATE_NIX_ATTR_PATH".src)/projects/cli/src/codegen/elm.json" elm.json 54 54 trap 'rm -rf elm.json registry.dat &> /dev/null' EXIT 55 55 ${lib.getExe elm2nix} convert > pkgs/by-name/el/elm-land/elm-srcs.nix 56 - ${lib.getExe nixfmt-rfc-style} pkgs/by-name/el/elm-land/elm-srcs.nix 56 + ${lib.getExe nixfmt} pkgs/by-name/el/elm-land/elm-srcs.nix 57 57 ${lib.getExe elm2nix} snapshot 58 58 cp registry.dat pkgs/by-name/el/elm-land/registry.dat 59 59 '';
+3 -3
pkgs/by-name/fi/firebase-tools/package.nix
··· 10 10 11 11 buildNpmPackage rec { 12 12 pname = "firebase-tools"; 13 - version = "14.9.0"; 13 + version = "14.11.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "firebase"; 17 17 repo = "firebase-tools"; 18 18 tag = "v${version}"; 19 - hash = "sha256-LUPG0FiwOvC+4ZXkrGGHnayusg06QvIw96Jg0ug+UBQ="; 19 + hash = "sha256-yOwIasMJ0kUGUwj1HN2oPIgu/U0PYT+UmoH8LLUh9EQ="; 20 20 }; 21 21 22 - npmDepsHash = "sha256-g6tcBNzCr5lOR874qAGPAuG8WBManHYY40GKqsrBEJM="; 22 + npmDepsHash = "sha256-eLhlk/9RmyJg9fpFmQ53IE6m2TN46N801n85yeEDG2M="; 23 23 24 24 postPatch = '' 25 25 ln -s npm-shrinkwrap.json package-lock.json
+1 -1
pkgs/by-name/fl/flow-control/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p bash common-updater-scripts gnused nixfmt-rfc-style 2 + #!nix-shell -i bash -p bash common-updater-scripts gnused 3 3 4 4 latest_tag=$(list-git-tags --url=https://github.com/neurocyte/flow | sed 's/^v//' | tail -n 1) 5 5
+2 -2
pkgs/by-name/gh/gh/package.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "gh"; 13 - version = "2.75.1"; 13 + version = "2.76.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "cli"; 17 17 repo = "cli"; 18 18 tag = "v${version}"; 19 - hash = "sha256-NZcU7ai/Tvg8j65w7qA5FY21R8M8az9tjDTu8YBhV4w="; 19 + hash = "sha256-69vSmV+CKRQOuUxsiBBlZBSRqwEtJil4oAse+RSuSVM="; 20 20 }; 21 21 22 22 vendorHash = "sha256-go5hB6vjZZrTa3PMHWpv+J0yNewijXkRD8iGL6O2GgM=";
+1 -1
pkgs/by-name/gr/gren/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p cabal2nix curl jq nixfmt-rfc-style 2 + #!nix-shell -i bash -p cabal2nix curl jq 3 3 4 4 set -euo pipefail 5 5
+3 -3
pkgs/by-name/gu/gurobi/package.nix
··· 16 16 in 17 17 stdenv.mkDerivation rec { 18 18 pname = "gurobi"; 19 - version = "12.0.2"; 19 + version = "12.0.3"; 20 20 21 21 src = fetchurl { 22 22 url = "https://packages.gurobi.com/${lib.versions.majorMinor version}/gurobi${version}_${platform}.tar.gz"; 23 23 hash = 24 24 { 25 - aarch64-linux = "sha256-vlhF3OIMCVyS9Y31RS4eVhs4wQ4CUDGQZlNkf98Uji0="; 26 - x86_64-linux = "sha256-DMSmk41YzGoonHdX2xLsioU9RTBLn4kQy4v6HgVa08U="; 25 + aarch64-linux = "sha256-NrHyudaioPE34qulwQNe3RFk4KnjFTGmLRj8B9jGRu4="; 26 + x86_64-linux = "sha256-Ib2ruq+Dzi2kKk8T7N56H9F7buxNdMl7rYoFGIfRECE="; 27 27 } 28 28 .${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 29 29 };
+3 -3
pkgs/by-name/in/incus-ui-canonical/package.nix
··· 20 20 in 21 21 stdenv.mkDerivation rec { 22 22 pname = "incus-ui-canonical"; 23 - version = "0.17.1.0"; 23 + version = "0.18.0"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "zabbly"; 27 27 repo = "incus-ui-canonical"; 28 28 # only use tags prefixed by incus- they are the tested fork versions 29 29 tag = "incus-${version}"; 30 - hash = "sha256-dAYcput4qGLQT6G10O52UUrQ7HN9kXQFgZlm5QN4xI0="; 30 + hash = "sha256-dN/O3UmQfWZ85XQUGXFTF7dhXGW0CLoQ5+16AIDSAzc="; 31 31 }; 32 32 33 33 offlineCache = fetchYarnDeps { 34 34 yarnLock = "${src}/yarn.lock"; 35 - hash = "sha256-or/lPf6pamFVJnSWU9CLTss9s6amMNd9A7H8CAFJ6RU="; 35 + hash = "sha256-eiK6dyvRbttxC7rESgpYRsYkkrzLZq4RWOiUf7fsAk8="; 36 36 }; 37 37 38 38 patchPhase = ''
+3 -3
pkgs/by-name/la/lasuite-meet-frontend/package.nix
··· 7 7 8 8 buildNpmPackage rec { 9 9 pname = "lasuite-meet-frontend"; 10 - version = "0.1.29"; 10 + version = "0.1.30"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "suitenumerique"; 14 14 repo = "meet"; 15 15 tag = "v${version}"; 16 - hash = "sha256-dvAPKNsj8ZnH0eLofbkE09hXL1g8YdViX8sQ/9+4L7k="; 16 + hash = "sha256-Ow2xi3twW6FeG88Ya5AeRNk6MIY5JGqd7e1qukKTfQs="; 17 17 }; 18 18 19 19 sourceRoot = "source/src/frontend"; ··· 21 21 npmDeps = fetchNpmDeps { 22 22 inherit version src; 23 23 sourceRoot = "source/src/frontend"; 24 - hash = "sha256-ZEPzSHcp3HZ8mSoFZDUKlTi+gJ2syauJPtSFEfJnJtg="; 24 + hash = "sha256-Id4taAuW/tu9YhbGxjNegdSqyNmUFRQOLF3glkFw0Vc="; 25 25 }; 26 26 27 27 buildPhase = ''
+2 -2
pkgs/by-name/la/lasuite-meet/package.nix
··· 13 13 14 14 python.pkgs.buildPythonApplication rec { 15 15 pname = "lasuite-meet"; 16 - version = "0.1.29"; 16 + version = "0.1.30"; 17 17 pyproject = true; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "suitenumerique"; 21 21 repo = "meet"; 22 22 tag = "v${version}"; 23 - hash = "sha256-dvAPKNsj8ZnH0eLofbkE09hXL1g8YdViX8sQ/9+4L7k="; 23 + hash = "sha256-Ow2xi3twW6FeG88Ya5AeRNk6MIY5JGqd7e1qukKTfQs="; 24 24 }; 25 25 26 26 sourceRoot = "source/src/backend";
+32
pkgs/by-name/le/lexbor/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + }: 7 + 8 + stdenv.mkDerivation (finalAttrs: { 9 + pname = "lexbor"; 10 + version = "2.4.0"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "lexbor"; 14 + repo = "lexbor"; 15 + tag = "v${finalAttrs.version}"; 16 + hash = "sha256-wsm+2L2ar+3LGyBXl39Vp9l1l5JONWvO0QbI87TDfWM="; 17 + }; 18 + 19 + nativeBuildInputs = [ 20 + cmake 21 + ]; 22 + 23 + meta = { 24 + description = "Lexbor is development of an open source HTML Renderer library"; 25 + homepage = "https://github.com/lexbor/lexbor"; 26 + changelog = "https://github.com/lexbor/lexbor/blob/${finalAttrs.src.tag}/CHANGELOG.md"; 27 + license = lib.licenses.asl20; 28 + maintainers = with lib.maintainers; [ drupol ]; 29 + mainProgram = "lexbor"; 30 + platforms = lib.platforms.all; 31 + }; 32 + })
+3 -3
pkgs/by-name/li/libphonenumber/package.nix
··· 14 14 15 15 stdenv.mkDerivation (finalAttrs: { 16 16 pname = "libphonenumber"; 17 - version = "9.0.8"; 17 + version = "9.0.9"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "google"; 21 21 repo = "libphonenumber"; 22 - rev = "v${finalAttrs.version}"; 23 - hash = "sha256-PLQgZdf2As5dwoM/L8SCBCysXUrw56/cn2NDf4jM1ac="; 22 + tag = "v${finalAttrs.version}"; 23 + hash = "sha256-gkmAdiqXaaTzWMaByOKooCI7WnKZCbWi1LYG5AijDhs="; 24 24 }; 25 25 26 26 patches = [
+2 -2
pkgs/by-name/li/livekit-libwebrtc/gclient2nix.nix
··· 8 8 nix-prefetch-git, 9 9 nix, 10 10 coreutils, 11 - nixfmt-rfc-style, 11 + nixfmt, 12 12 makeWrapper, 13 13 }: 14 14 # Based on https://github.com/milahu/gclient2nix ··· 19 19 nix-prefetch-git 20 20 nix 21 21 coreutils 22 - nixfmt-rfc-style 22 + nixfmt 23 23 ]; 24 24 in 25 25 buildPythonPackage {
+3 -3
pkgs/by-name/me/memogram/package.nix
··· 6 6 }: 7 7 buildGoModule (finalAttrs: { 8 8 pname = "memogram"; 9 - version = "0.2.6"; 9 + version = "0.3.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "usememos"; 13 13 repo = "telegram-integration"; 14 14 tag = "v${finalAttrs.version}"; 15 - hash = "sha256-vpDwa5MvNyJUNCdeNK7PhXBoEHtKKsyFdbMsNRBLqW4="; 15 + hash = "sha256-yQmdUphgGr/db2FJ5tghUhjWt7QGs0mCAI/NrBNRABk="; 16 16 }; 17 17 18 - vendorHash = "sha256-F8JllhYMvBWEeHa4boFbTHLFTa0s+Tarqtf4NfVqK7s="; 18 + vendorHash = "sha256-8tQ5MQ0XcBIx74EFAXxXInADFd4BnlTazeIFNXNN/Ww="; 19 19 20 20 subPackages = [ "bin/memogram" ]; 21 21
+3 -3
pkgs/by-name/me/mergiraf/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage (finalAttrs: { 13 13 pname = "mergiraf"; 14 - version = "0.11.0"; 14 + version = "0.12.1"; 15 15 16 16 src = fetchFromGitea { 17 17 domain = "codeberg.org"; 18 18 owner = "mergiraf"; 19 19 repo = "mergiraf"; 20 20 tag = "v${finalAttrs.version}"; 21 - hash = "sha256-nzWRMCIeZ1RmZO4v5UqX1JrbN1UjBHkl/bYaERCzfew="; 21 + hash = "sha256-09C5A9ToH3zzUlUcLDd/5wOOkWs4jmjaqI9HpzGebUU="; 22 22 }; 23 23 24 24 useFetchCargoVendor = true; 25 - cargoHash = "sha256-9OjcEmed9nLM/fp6Qk/Gh9hTVnn5cqCxTUpAJUkI4/M="; 25 + cargoHash = "sha256-TFGFHK35pary9nGG3XB474Bv2B8YW2X06NvInBLmcIA="; 26 26 27 27 nativeCheckInputs = [ git ]; 28 28
+1 -1
pkgs/by-name/ms/msgraph-cli/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p curl gnused nixfmt-rfc-style common-updater-scripts 2 + #!nix-shell -i bash -p curl gnused common-updater-scripts 3 3 set -eEuo pipefail 4 4 [ -z "${DEBUG:-}" ] || set -x 5 5 cd "${BASH_SOURCE[0]%/*}"
+1 -1
pkgs/by-name/mu/music-assistant/update-providers.py
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -I nixpkgs=./. -i python3 -p "music-assistant.python.withPackages (ps: music-assistant.dependencies ++ (with ps; [ jinja2 packaging ]))" -p pyright ruff isort nixfmt-rfc-style 2 + #!nix-shell -I nixpkgs=./. -i python3 -p "music-assistant.python.withPackages (ps: music-assistant.dependencies ++ (with ps; [ jinja2 packaging ]))" -p pyright ruff isort 3 3 import asyncio 4 4 import json 5 5 import os.path
+2 -2
pkgs/by-name/my/mympd/package.nix
··· 18 18 19 19 stdenv.mkDerivation (finalAttrs: { 20 20 pname = "mympd"; 21 - version = "22.0.1"; 21 + version = "22.0.2"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "jcorporation"; 25 25 repo = "myMPD"; 26 26 rev = "v${finalAttrs.version}"; 27 - sha256 = "sha256-JAxmmcbkEZGiMzxVMeWlLnnU/iaVmXEcFESuMAaeXf0="; 27 + sha256 = "sha256-wvv4EeV0hLrQ9BhWAyoMnR8tjU67OwahcR+xo10lWE8="; 28 28 }; 29 29 30 30 nativeBuildInputs = [
+3 -3
pkgs/by-name/na/nauty/package.nix
··· 5 5 }: 6 6 stdenv.mkDerivation rec { 7 7 pname = "nauty"; 8 - version = "2.8.9"; 8 + version = "2.9.0"; 9 9 10 10 src = fetchurl { 11 11 url = "https://pallini.di.uniroma1.it/nauty${ 12 12 builtins.replaceStrings [ "." ] [ "_" ] version 13 13 }.tar.gz"; 14 - sha256 = "sha256-yXq0K/SHlqhqWYvOPpJpBHyisywU/CPgcgiiRP5SxO4="; 14 + sha256 = "sha256-eziDTHzv4X0l4F7vHvOIL6nNGTP1grnrnedHdBGVYFM="; 15 15 }; 16 16 17 17 outputs = [ ··· 19 19 "dev" 20 20 ]; 21 21 22 - # HACK: starting from 2.8.9, the makefile tries to copy .libs/*.a files unconditionally 22 + # HACK: starting from 2.9.0, the makefile tries to copy .libs/*.a files unconditionally 23 23 dontDisableStatic = true; 24 24 25 25 configureFlags = [
+2 -2
pkgs/by-name/ni/nil/package.nix
··· 3 3 rustPlatform, 4 4 fetchFromGitHub, 5 5 nix, 6 - nixfmt-rfc-style, 6 + nixfmt, 7 7 nix-update-script, 8 8 }: 9 9 ··· 25 25 26 26 env = { 27 27 CFG_RELEASE = version; 28 - CFG_DEFAULT_FORMATTER = lib.getExe nixfmt-rfc-style; 28 + CFG_DEFAULT_FORMATTER = lib.getExe nixfmt; 29 29 }; 30 30 31 31 # might be related to https://github.com/NixOS/nix/issues/5884
-1
pkgs/by-name/ni/nixfmt-rfc-style/date.txt
··· 1 - 2025-04-04
+3 -3
pkgs/by-name/ni/nixfmt-rfc-style/generated-package.nix pkgs/by-name/ni/nixfmt/generated-package.nix
··· 23 23 }: 24 24 mkDerivation { 25 25 pname = "nixfmt"; 26 - version = "0.6.0"; 26 + version = "1.0.0"; 27 27 src = fetchzip { 28 - url = "https://github.com/nixos/nixfmt/archive/65af4b69133d19f534d97746c97c2d5b464f43b4.tar.gz"; 29 - sha256 = "0l0w3janvss1n1j7qkcml97zndm2jm2gbrzzs9d8l0ixnrw0cd5r"; 28 + url = "https://github.com/nixos/nixfmt/archive/v1.0.0.tar.gz"; 29 + sha256 = "0iy2p893b2b5y4mvhy0d62675a7nd8fc6jm9mr32v9h2baj9ii3p"; 30 30 }; 31 31 isLibrary = true; 32 32 isExecutable = true;
-36
pkgs/by-name/ni/nixfmt-rfc-style/package.nix
··· 1 - { 2 - haskell, 3 - haskellPackages, 4 - lib, 5 - runCommand, 6 - nixfmt-rfc-style, 7 - }: 8 - let 9 - inherit (haskell.lib.compose) overrideCabal justStaticExecutables; 10 - 11 - overrides = rec { 12 - version = "unstable-${lib.fileContents ./date.txt}"; 13 - 14 - passthru.updateScript = ./update.sh; 15 - 16 - teams = [ lib.teams.formatter ]; 17 - 18 - preBuild = '' 19 - echo -n 'nixpkgs-${version}' > .version 20 - ''; 21 - 22 - # These tests can be run with the following command. 23 - # 24 - # $ nix-build -A nixfmt-rfc-style.tests 25 - passthru.tests = 26 - runCommand "nixfmt-rfc-style-tests" { nativeBuildInputs = [ nixfmt-rfc-style ]; } 27 - '' 28 - nixfmt --version > $out 29 - ''; 30 - }; 31 - raw-pkg = haskellPackages.callPackage ./generated-package.nix { }; 32 - in 33 - lib.pipe raw-pkg [ 34 - (overrideCabal overrides) 35 - justStaticExecutables 36 - ]
-33
pkgs/by-name/ni/nixfmt-rfc-style/update.sh
··· 1 - #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p cabal2nix curl jq 3 - # 4 - # This script will update the nixfmt-rfc-style derivation to the latest version using 5 - # cabal2nix. 6 - 7 - set -eo pipefail 8 - 9 - # This is the directory of this update.sh script. 10 - script_dir="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )" 11 - 12 - derivation_file="${script_dir}/generated-package.nix" 13 - date_file="${script_dir}/date.txt" 14 - 15 - # This is the latest version of nixfmt-rfc-style branch on GitHub. 16 - new_version=$(curl --silent https://api.github.com/repos/nixos/nixfmt/git/refs/heads/master | jq '.object.sha' --raw-output) 17 - new_date=$(curl --silent https://api.github.com/repos/nixos/nixfmt/git/commits/"$new_version" | jq '.committer.date' --raw-output) 18 - 19 - echo "Updating nixfmt-rfc-style to version $new_date." 20 - echo "Running cabal2nix and outputting to ${derivation_file}..." 21 - 22 - cat > "$derivation_file" << EOF 23 - # This file has been autogenerate with cabal2nix. 24 - # Update via ./update.sh 25 - EOF 26 - 27 - cabal2nix --jailbreak \ 28 - "https://github.com/nixos/nixfmt/archive/${new_version}.tar.gz" \ 29 - >> "$derivation_file" 30 - 31 - date --date="$new_date" -I > "$date_file" 32 - 33 - echo "Finished."
+2 -2
pkgs/by-name/ni/nixfmt-tree/package.nix
··· 2 2 lib, 3 3 runCommand, 4 4 treefmt, 5 - nixfmt-rfc-style, 5 + nixfmt, 6 6 nixfmt-tree, 7 7 git, 8 8 writableTmpDirAsHomeHook, 9 9 10 10 settings ? { }, 11 11 runtimeInputs ? [ ], 12 - nixfmtPackage ? nixfmt-rfc-style, 12 + nixfmtPackage ? nixfmt, 13 13 14 14 # NOTE: `runtimePackages` is deprecated. Use `nixfmtPackage` and/or `runtimeInputs`. 15 15 runtimePackages ? [ nixfmtPackage ],
+28
pkgs/by-name/ni/nixfmt/package.nix
··· 1 + { 2 + haskell, 3 + haskellPackages, 4 + lib, 5 + runCommand, 6 + nixfmt, 7 + }: 8 + let 9 + inherit (haskell.lib.compose) overrideCabal justStaticExecutables; 10 + 11 + overrides = { 12 + passthru.updateScript = ./update.sh; 13 + 14 + teams = [ lib.teams.formatter ]; 15 + 16 + # These tests can be run with the following command. 17 + # 18 + # $ nix-build -A nixfmt.tests 19 + passthru.tests = runCommand "nixfmt-tests" { nativeBuildInputs = [ nixfmt ]; } '' 20 + nixfmt --version > $out 21 + ''; 22 + }; 23 + raw-pkg = haskellPackages.callPackage ./generated-package.nix { }; 24 + in 25 + lib.pipe raw-pkg [ 26 + (overrideCabal overrides) 27 + justStaticExecutables 28 + ]
+27
pkgs/by-name/ni/nixfmt/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p cabal2nix curl jq 3 + # 4 + # This script will update the nixfmt derivation to the latest version using 5 + # cabal2nix. 6 + 7 + set -eo pipefail 8 + 9 + # This is the directory of this update.sh script. 10 + script_dir="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )" 11 + derivation_file="${script_dir}/generated-package.nix" 12 + 13 + release_tag=$(curl --silent https://api.github.com/repos/NixOS/nixfmt/releases/latest | jq '.tag_name' --raw-output) 14 + 15 + echo "Updating nixfmt to version $release_tag." 16 + echo "Running cabal2nix and outputting to ${derivation_file}..." 17 + 18 + cat > "$derivation_file" << EOF 19 + # This file has been autogenerate with cabal2nix. 20 + # Update via ./update.sh 21 + EOF 22 + 23 + cabal2nix --jailbreak \ 24 + "https://github.com/nixos/nixfmt/archive/${release_tag}.tar.gz" \ 25 + >> "$derivation_file" 26 + 27 + echo "Finished."
+1 -1
pkgs/by-name/oa/oama/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p haskell.packages.ghc910.cabal2nix nix-prefetch-git curl jq nixfmt-rfc-style 2 + #!nix-shell -i bash -p haskell.packages.ghc910.cabal2nix nix-prefetch-git curl jq 3 3 4 4 set -euo pipefail 5 5
+4 -2
pkgs/by-name/pr/prometheus-cpp/package.nix
··· 27 27 pkg-config 28 28 ]; 29 29 buildInputs = [ 30 - curl 31 30 gbenchmark 32 31 gtest 32 + ]; 33 + propagatedBuildInputs = [ 34 + civetweb 35 + curl 33 36 zlib 34 37 ]; 35 - propagatedBuildInputs = [ civetweb ]; 36 38 strictDeps = true; 37 39 38 40 cmakeFlags = [
+2 -2
pkgs/by-name/qo/qownnotes/package.nix
··· 18 18 stdenv.mkDerivation (finalAttrs: { 19 19 pname = "qownnotes"; 20 20 appname = "QOwnNotes"; 21 - version = "25.6.5"; 21 + version = "25.7.7"; 22 22 23 23 src = fetchurl { 24 24 url = "https://github.com/pbek/QOwnNotes/releases/download/v${finalAttrs.version}/qownnotes-${finalAttrs.version}.tar.xz"; 25 - hash = "sha256-P53v7Zcx6TtCRyFUTea9tpYTFx6DpXL5R60uH8qcbXk="; 25 + hash = "sha256-9ldUIT3pQlkO2YhQ3cF9H6Soe8IU4AGEGNRWg0LA1MQ="; 26 26 }; 27 27 28 28 nativeBuildInputs =
+1 -1
pkgs/by-name/ri/river-bedload/update-build-zig-zon.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p bash jq nixfmt-rfc-style zon2nix 2 + #!nix-shell -i bash -p bash jq zon2nix 3 3 4 4 commit=$(nix-instantiate --eval -A river-bedload.src.rev | jq --raw-output) 5 5
+1 -1
pkgs/by-name/ri/river/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p bash common-updater-scripts gnused nixfmt-rfc-style zon2nix 2 + #!nix-shell -i bash -p bash common-updater-scripts gnused zon2nix 3 3 4 4 latest_tag=$(list-git-tags --url=https://codeberg.org/river/river | sed 's/^v//' | sort --version-sort | tail --lines=1) 5 5
+33
pkgs/by-name/se/secretspec/package.nix
··· 1 + { 2 + lib, 3 + rustPlatform, 4 + fetchCrate, 5 + pkg-config, 6 + dbus, 7 + nix-update-script, 8 + }: 9 + 10 + rustPlatform.buildRustPackage (finalAttrs: { 11 + pname = "secretspec"; 12 + version = "0.2.0"; 13 + 14 + src = fetchCrate { 15 + inherit (finalAttrs) pname version; 16 + hash = "sha256-6a3BerjcLn86XCakyYlMm4FUUQTc7iq/hCvZEbHnp4g="; 17 + }; 18 + 19 + cargoHash = "sha256-4sKja7dED1RuiRYA2BNqvvYlJhPFiM8IzAgQVeSa9Oc="; 20 + 21 + nativeBuildInputs = [ pkg-config ]; 22 + buildInputs = [ dbus ]; 23 + 24 + passthru.updateScript = nix-update-script { }; 25 + 26 + meta = { 27 + description = "Declarative secrets, every environment, any provider"; 28 + homepage = "https://secretspec.dev"; 29 + license = with lib.licenses; [ asl20 ]; 30 + maintainers = with lib.maintainers; [ domenkozar ]; 31 + mainProgram = "secretspec"; 32 + }; 33 + })
+5 -5
pkgs/by-name/si/signal-desktop/package.nix
··· 52 52 ''; 53 53 }); 54 54 55 - version = "7.61.0"; 55 + version = "7.62.0"; 56 56 57 57 src = fetchFromGitHub { 58 58 owner = "signalapp"; 59 59 repo = "Signal-Desktop"; 60 60 tag = "v${version}"; 61 - hash = "sha256-foMzSKm2BROZ8ATCdYx/0sl+4tQfhgoPA4AWSHEKL0Y="; 61 + hash = "sha256-79Mh5jx7cSr8AVL/oqjuTWQ+DHmyXL19rKlbyNMySt0="; 62 62 }; 63 63 64 64 sticker-creator = stdenv.mkDerivation (finalAttrs: { ··· 122 122 fetcherVersion = 1; 123 123 hash = 124 124 if withAppleEmojis then 125 - "sha256-ry7s9fbKx4e1LR8DlI2LIJY9GQrxmU7JQt+3apJGw/M=" 125 + "sha256-r+MktwnhmZOUc1NMumrfkTpmUUHUXKB10XKSkxg3GYU=" 126 126 else 127 - "sha256-AkrfugpNvk4KgesRLQbso8p5b96Dg174R9/xuP4JtJg="; 127 + "sha256-raCVDqhtTTsdIn1vjbKW+ULrBefD8+kgJkKHls90KNs="; 128 128 }; 129 129 130 130 env = { 131 131 ELECTRON_SKIP_BINARY_DOWNLOAD = "1"; 132 132 SIGNAL_ENV = "production"; 133 - SOURCE_DATE_EPOCH = 1752109090; 133 + SOURCE_DATE_EPOCH = 1752702364; 134 134 }; 135 135 136 136 preBuild = ''
+2 -2
pkgs/by-name/si/signal-desktop/signal-sqlcipher.nix
··· 11 11 }: 12 12 stdenv.mkDerivation (finalAttrs: { 13 13 pname = "node-sqlcipher"; 14 - version = "2.0.3"; 14 + version = "2.1.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "signalapp"; 18 18 repo = "node-sqlcipher"; 19 19 tag = "v${finalAttrs.version}"; 20 - hash = "sha256-H5/+XcXnINRL5BWItWx6YaPP46+k1xTbyfDqHPCRDXk="; 20 + hash = "sha256-JYdc3H8PhDLkJH5ApfReq0e7HgKoJaK01JGuzoqftyc="; 21 21 }; 22 22 23 23 pnpmDeps = pnpm.fetchDeps {
+22 -8
pkgs/by-name/sp/sparrow/package.nix
··· 29 29 30 30 openjdk = jdk23.override { enableJavaFX = true; }; 31 31 32 + sparrowArch = 33 + { 34 + x86_64-linux = "x86_64"; 35 + aarch64-linux = "aarch64"; 36 + } 37 + ."${stdenvNoCC.hostPlatform.system}"; 38 + 39 + # nixpkgs-update: no auto update 32 40 src = fetchurl { 33 - url = "https://github.com/sparrowwallet/${pname}/releases/download/${version}/sparrowwallet-${version}-x86_64.tar.gz"; 34 - hash = "sha256-MsERgfJGpxRkQm4Ww30Tc95kThjlgI+nO4bq2zNGdeU="; 41 + url = "https://github.com/sparrowwallet/${pname}/releases/download/${version}/sparrowwallet-${version}-${sparrowArch}.tar.gz"; 42 + hash = 43 + { 44 + x86_64-linux = "sha256-MsERgfJGpxRkQm4Ww30Tc95kThjlgI+nO4bq2zNGdeU="; 45 + aarch64-linux = "sha256-31x4Ck/+Fa6CvBb6o9ncVH99Zeh0DUVv/hqVN31ysHk="; 46 + } 47 + ."${stdenvNoCC.hostPlatform.system}"; 35 48 36 49 # nativeBuildInputs, downloadToTemp, and postFetch are used to verify the signed upstream package. 37 50 # The signature is not a self-contained file. Instead the SHA256 of the package is added to a manifest file. ··· 49 62 mkdir -m 700 -p $GNUPGHOME 50 63 ln -s ${manifest} ./manifest.txt 51 64 ln -s ${manifestSignature} ./manifest.txt.asc 52 - ln -s $downloadedFile ./sparrowwallet-${version}-x86_64.tar.gz 65 + ln -s $downloadedFile ./sparrowwallet-${version}-${sparrowArch}.tar.gz 53 66 gpg --import ${publicKey} 54 67 gpg --verify manifest.txt.asc manifest.txt 55 68 sha256sum -c --ignore-missing manifest.txt ··· 165 178 166 179 rm -fR com.sparrowwallet.merged.module/com/sun/jna/freebsd-x86-64 167 180 rm -fR com.sparrowwallet.merged.module/com/sun/jna/freebsd-x86 168 - rm -fR com.sparrowwallet.merged.module/com/sun/jna/linux-aarch64 169 181 rm -fR com.sparrowwallet.merged.module/com/sun/jna/linux-arm 170 182 rm -fR com.sparrowwallet.merged.module/com/sun/jna/linux-armel 171 183 rm -fR com.sparrowwallet.merged.module/com/sun/jna/linux-mips64el ··· 184 196 rm -fR com.github.sarxos.webcam.capture/com/github/sarxos/webcam/ds/buildin/lib/linux_x86 185 197 rm -fR openpnp.capture.java/darwin-aarch64 186 198 rm -fR openpnp.capture.java/darwin-x86-64 187 - rm -fR openpnp.capture.java/linux-aarch64 188 199 rm -fR openpnp.capture.java/win32-x86-64 189 200 rm -fR com.nativelibs4java.bridj/org/bridj/lib/linux_arm32_armel 190 201 rm -fR com.nativelibs4java.bridj/org/bridj/lib/linux_armel ··· 192 203 rm -fR com.nativelibs4java.bridj/org/bridj/lib/linux_x86 193 204 rm -fR com.nativelibs4java.bridj/org/bridj/lib/sunos_x64 194 205 rm -fR com.nativelibs4java.bridj/org/bridj/lib/sunos_x86 195 - rm -fR com.sparrowwallet.merged.module/linux-aarch64 196 206 rm -fR com.sparrowwallet.merged.module/linux-arm 197 207 rm -fR com.sparrowwallet.merged.module/linux-x86 208 + rm -fR com.fazecast.jSerialComm/FreeBSD 198 209 rm -fR com.fazecast.jSerialComm/OpenBSD 199 210 rm -fR com.fazecast.jSerialComm/Android 200 211 rm -fR com.fazecast.jSerialComm/Solaris ··· 206 217 # Replace the embedded Tor binary (which is in a Tar archive) 207 218 # with one from Nixpkgs. 208 219 gzip -c ${torWrapper} > tor.gz 209 - cp tor.gz modules/io.matthewnelson.kmp.tor.resource.exec.tor/io/matthewnelson/kmp/tor/resource/exec/tor/native/linux-libc/x86_64/tor.gz 220 + cp tor.gz modules/io.matthewnelson.kmp.tor.resource.exec.tor/io/matthewnelson/kmp/tor/resource/exec/tor/native/linux-libc/${sparrowArch}/tor.gz 210 221 ''; 211 222 212 223 installPhase = '' ··· 294 305 msgilligan 295 306 _1000101 296 307 ]; 297 - platforms = [ "x86_64-linux" ]; 308 + platforms = [ 309 + "x86_64-linux" 310 + "aarch64-linux" 311 + ]; 298 312 mainProgram = "sparrow-desktop"; 299 313 }; 300 314 }
+3 -3
pkgs/by-name/st/stylelint/package.nix
··· 5 5 }: 6 6 buildNpmPackage rec { 7 7 pname = "stylelint"; 8 - version = "16.21.1"; 8 + version = "16.22.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "stylelint"; 12 12 repo = "stylelint"; 13 13 tag = version; 14 - hash = "sha256-obRxkExrLFLt02L1w9FBHrHgN8n+lRsPuSUra66j8hE="; 14 + hash = "sha256-rl+TFRzMRliOKbTJylmflmEZHDplDPtKEVkXlXJG3a4="; 15 15 }; 16 16 17 - npmDepsHash = "sha256-t83R9OQnSY7OVEU+TQWQMotsey/XtXIo7NLG9vyiUng="; 17 + npmDepsHash = "sha256-3Lfhwv1xwv2JAoZ3DDppUQVFHp9TOMibsGVSIR4xRkA="; 18 18 19 19 dontNpmBuild = true; 20 20
+3 -3
pkgs/by-name/su/super-productivity/package.nix
··· 14 14 15 15 buildNpmPackage rec { 16 16 pname = "super-productivity"; 17 - version = "14.0.5"; 17 + version = "14.1.0"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "johannesjo"; 21 21 repo = "super-productivity"; 22 22 tag = "v${version}"; 23 - hash = "sha256-VoE86uBl6DM6aXz7MLYekEzfixVSLjLL3yYgc2vBhp0="; 23 + hash = "sha256-wZQhSQBJPyJPAMZU927Xq9bOxAohSaEg+ylk7DoTJJE="; 24 24 25 25 postFetch = '' 26 26 find $out -name package-lock.json -exec ${lib.getExe npm-lockfile-fix} -r {} \; ··· 63 63 dontInstall = true; 64 64 65 65 outputHashMode = "recursive"; 66 - hash = "sha256-Jj7ulTjC19Q9PmOeVui/FAyfpsSviGLHiiz8gwsLXAg="; 66 + hash = "sha256-SmA2qTi7tXxUcAlFOI61AW8pimB7YEYe749h5hjtLN8="; 67 67 } 68 68 ); 69 69
+3 -3
pkgs/by-name/su/supersonic/package.nix
··· 20 20 21 21 buildGoModule rec { 22 22 pname = "supersonic" + lib.optionalString waylandSupport "-wayland"; 23 - version = "0.16.0"; 23 + version = "0.17.0"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "dweymouth"; 27 27 repo = "supersonic"; 28 28 rev = "v${version}"; 29 - hash = "sha256-KC5olxn1+H/Y7HCOvsNPitcGgUgh+Ye2Te1yFffr7cs="; 29 + hash = "sha256-+MgDCI/wz5yfdpSy0Gh85ZWUAuL2wijixYskx/jH7Vw="; 30 30 }; 31 31 32 - vendorHash = "sha256-uHOeeCtnwZfJ3fHTPL/MtvQZeOQ8NEgMnpiXAPjY6YE="; 32 + vendorHash = "sha256-v6tPGjeJhRdSJpVPQAERRM7cpXO7Ut7kLF3EdNcDFgM="; 33 33 34 34 nativeBuildInputs = 35 35 [
+2 -2
pkgs/by-name/tr/treefmt/tests.nix
··· 3 3 runCommand, 4 4 testers, 5 5 treefmt, 6 - nixfmt-rfc-style, 6 + nixfmt, 7 7 }: 8 8 let 9 9 inherit (treefmt) buildConfig withConfig; ··· 29 29 30 30 nixfmtExamplePackage = withConfig { 31 31 settings = nixfmtExampleConfig; 32 - runtimeInputs = [ nixfmt-rfc-style ]; 32 + runtimeInputs = [ nixfmt ]; 33 33 }; 34 34 in 35 35 {
+1 -1
pkgs/by-name/wa/waylock/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p bash common-updater-scripts gnused nixfmt-rfc-style zon2nix 2 + #!nix-shell -i bash -p bash common-updater-scripts gnused zon2nix 3 3 4 4 latest_tag=$(list-git-tags --url=https://codeberg.org/ifreund/waylock | sed 's/^v//' | tail -n 1) 5 5
+9 -9
pkgs/by-name/wi/windsurf/info.json
··· 1 1 { 2 2 "aarch64-darwin": { 3 - "version": "1.10.8", 3 + "version": "1.11.0", 4 4 "vscodeVersion": "1.99.3", 5 - "url": "https://windsurf-stable.codeiumdata.com/darwin-arm64/stable/5c07715b357a8ba4ff6b5f208ba6c883a4539416/Windsurf-darwin-arm64-1.10.8.zip", 6 - "sha256": "2aa0fda69b442577a4f0b85d2b4437efc9d49be9d7a07a1f15ab8df5b5face5a" 5 + "url": "https://windsurf-stable.codeiumdata.com/darwin-arm64/stable/7ebe3c84f46e15cc83584023b53a4988df13f475/Windsurf-darwin-arm64-1.11.0.zip", 6 + "sha256": "eb0f139db3eb30b93e53afb37ec3d52c9881e39fc100287c25c66452dcefa0c8" 7 7 }, 8 8 "x86_64-darwin": { 9 - "version": "1.10.8", 9 + "version": "1.11.0", 10 10 "vscodeVersion": "1.99.3", 11 - "url": "https://windsurf-stable.codeiumdata.com/darwin-x64/stable/5c07715b357a8ba4ff6b5f208ba6c883a4539416/Windsurf-darwin-x64-1.10.8.zip", 12 - "sha256": "8564a492699a6225474b82aa1f95d0e400c82d311841afdfaeba2d445be9caf9" 11 + "url": "https://windsurf-stable.codeiumdata.com/darwin-x64/stable/7ebe3c84f46e15cc83584023b53a4988df13f475/Windsurf-darwin-x64-1.11.0.zip", 12 + "sha256": "f020a9e23115043070ac6e4a15614d58967b65c5dc6a09918869ed20e37cddf3" 13 13 }, 14 14 "x86_64-linux": { 15 - "version": "1.10.8", 15 + "version": "1.11.0", 16 16 "vscodeVersion": "1.99.3", 17 - "url": "https://windsurf-stable.codeiumdata.com/linux-x64/stable/5c07715b357a8ba4ff6b5f208ba6c883a4539416/Windsurf-linux-x64-1.10.8.tar.gz", 18 - "sha256": "c68432a5a903a7c18b4a446c24f8dc0728311242ff7c6a5a9b34d15713685063" 17 + "url": "https://windsurf-stable.codeiumdata.com/linux-x64/stable/7ebe3c84f46e15cc83584023b53a4988df13f475/Windsurf-linux-x64-1.11.0.tar.gz", 18 + "sha256": "ff1b9a168c0d60be0f6a97ee9d22d443d5bb3384df69182ea485b7403f4f9d02" 19 19 } 20 20 }
+2 -2
pkgs/by-name/yo/yosys/package.nix
··· 85 85 in 86 86 stdenv.mkDerivation (finalAttrs: { 87 87 pname = "yosys"; 88 - version = "0.54"; 88 + version = "0.55"; 89 89 90 90 src = fetchFromGitHub { 91 91 owner = "YosysHQ"; 92 92 repo = "yosys"; 93 93 tag = "v${finalAttrs.version}"; 94 - hash = "sha256-yEAZvdBc+923a0OTtaCpTbrl33kcmvgwFlL5VEssHkQ="; 94 + hash = "sha256-GddNbAtH5SPm7KTa5kCm/vGq4xOczx+jCnOSQl55gUI="; 95 95 fetchSubmodules = true; 96 96 leaveDotGit = true; 97 97 postFetch = ''
-75
pkgs/by-name/ze/zeek/broker/0001-Fix-include-path-in-exported-CMake-targets.patch
··· 1 - From 889ee4dd9e778511e2fb850e6467f55a331cded9 Mon Sep 17 00:00:00 2001 2 - From: Tobias Mayer <tobim@fastmail.fm> 3 - Date: Sun, 13 Nov 2022 19:06:00 +0100 4 - Subject: [PATCH] Fix include path in exported CMake targets 5 - 6 - --- 7 - CMakeLists.txt | 23 ++++++++++++++--------- 8 - 1 file changed, 14 insertions(+), 9 deletions(-) 9 - 10 - diff --git a/CMakeLists.txt b/CMakeLists.txt 11 - index e22b77aa..77a15314 100644 12 - --- a/CMakeLists.txt 13 - +++ b/CMakeLists.txt 14 - @@ -209,7 +209,6 @@ if (CAF_ROOT) 15 - else() 16 - find_package(CAF REQUIRED COMPONENTS openssl test io core net) 17 - endif() 18 - - list(APPEND LINK_LIBS CAF::core CAF::io CAF::net) 19 - set(BROKER_USE_EXTERNAL_CAF ON) 20 - else () 21 - message(STATUS "Using bundled CAF") 22 - @@ -243,22 +242,18 @@ endif () 23 - 24 - # Make sure there are no old header versions on disk. 25 - install( 26 - - CODE "MESSAGE(STATUS \"Removing: ${CMAKE_INSTALL_PREFIX}/include/broker\")" 27 - - CODE "file(REMOVE_RECURSE \"${CMAKE_INSTALL_PREFIX}/include/broker\")") 28 - + CODE "MESSAGE(STATUS \"Removing: ${CMAKE_FULL_INSTALL_INCLUDEDIR}/broker\")" 29 - + CODE "file(REMOVE_RECURSE \"${CMAKE_FULL_INSTALL_INCLUDEDIR}/broker\")") 30 - 31 - # Install all headers except the files from broker/internal. 32 - install(DIRECTORY include/broker 33 - - DESTINATION include 34 - + DESTINATION "${CMAKE_INSTALL_INCLUDEDIR}" 35 - FILES_MATCHING PATTERN "*.hh" 36 - PATTERN "include/broker/internal" EXCLUDE) 37 - 38 - -include_directories(BEFORE ${CMAKE_CURRENT_SOURCE_DIR}/include) 39 - - 40 - -include_directories(${CMAKE_CURRENT_BINARY_DIR}/include) 41 - - 42 - configure_file(${CMAKE_CURRENT_SOURCE_DIR}/src/config.hh.in 43 - ${CMAKE_CURRENT_BINARY_DIR}/include/broker/config.hh) 44 - -install(FILES ${CMAKE_CURRENT_BINARY_DIR}/include/broker/config.hh DESTINATION include/broker) 45 - +install(FILES ${CMAKE_CURRENT_BINARY_DIR}/include/broker/config.hh DESTINATION "${CMAKE_INSTALL_INCLUDEDIR}/broker") 46 - 47 - if (NOT BROKER_EXTERNAL_SQLITE_TARGET) 48 - include_directories(BEFORE ${CMAKE_CURRENT_SOURCE_DIR}/3rdparty) 49 - @@ -360,6 +355,11 @@ if (ENABLE_SHARED) 50 - OUTPUT_NAME broker) 51 - target_link_libraries(broker PUBLIC ${LINK_LIBS}) 52 - target_link_libraries(broker PRIVATE CAF::core CAF::io CAF::net) 53 - + target_include_directories( 54 - + broker PUBLIC 55 - + $<BUILD_INTERFACE:${CMAKE_CURRENT_BINARY_DIR}/include> 56 - + $<BUILD_INTERFACE:${CMAKE_CURRENT_SOURCE_DIR}/include> 57 - + $<INSTALL_INTERFACE:${CMAKE_INSTALL_INCLUDEDIR}>) 58 - install(TARGETS broker 59 - EXPORT BrokerTargets 60 - DESTINATION ${CMAKE_INSTALL_LIBDIR}) 61 - @@ -373,6 +373,11 @@ if (ENABLE_STATIC) 62 - endif() 63 - target_link_libraries(broker_static PUBLIC ${LINK_LIBS}) 64 - target_link_libraries(broker_static PRIVATE CAF::core CAF::io CAF::net) 65 - + target_include_directories( 66 - + broker_static PUBLIC 67 - + $<BUILD_INTERFACE:${CMAKE_CURRENT_BINARY_DIR}/include> 68 - + $<BUILD_INTERFACE:${CMAKE_CURRENT_SOURCE_DIR}/include> 69 - + $<INSTALL_INTERFACE:${CMAKE_INSTALL_INCLUDEDIR}>) 70 - install(TARGETS broker_static 71 - EXPORT BrokerTargets 72 - DESTINATION ${CMAKE_INSTALL_LIBDIR}) 73 - -- 74 - 2.38.1 75 -
+15 -18
pkgs/by-name/ze/zeek/broker/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 cmake, 6 + prometheus-cpp, 6 7 python3, 7 8 caf, 8 9 openssl, 9 10 }: 10 11 let 11 - inherit (stdenv.hostPlatform) isStatic; 12 - 13 12 src-cmake = fetchFromGitHub { 14 13 owner = "zeek"; 15 14 repo = "cmake"; 16 - rev = "1be78cc8a889d95db047f473a0f48e0baee49f33"; 17 - hash = "sha256-zcXWP8CHx0RSDGpRTrYD99lHlqSbvaliXrtFowPfhBk="; 15 + rev = "fd0696f9077933660f7da5f81978e86b3e967647"; 16 + hash = "sha256-21wZVwoOB05l/WX/VrVbSx+lFKFQ9MHWjQQD4weavFs="; 18 17 }; 19 18 src-3rdparty = fetchFromGitHub { 20 19 owner = "zeek"; 21 20 repo = "zeek-3rdparty"; 22 - rev = "eb87829547270eab13c223e6de58b25bc9a0282e"; 23 - hash = "sha256-AVaKcRjF5ZiSR8aPSLBzSTeWVwGWW/aSyQJcN0Yhza0="; 21 + rev = "a6cc3c7603bb535cf3bec7442140e7126e0577a8"; 22 + hash = "sha256-yzhuTam9zOQ3MP7fk+ACN5P5tHtHXWbyQP73DwISIv8="; 24 23 }; 25 24 caf' = caf.overrideAttrs (old: { 26 - version = "unstable-2024-01-07-zeek"; 25 + version = "unstable-2024-09-14-zeek"; 27 26 src = fetchFromGitHub { 28 27 owner = "zeek"; 29 28 repo = "actor-framework"; 30 - rev = "e3048cdd13e085c97870a55eb1f9de04e25320f3"; 31 - hash = "sha256-uisoYXiZbFQa/TfWGRrCJ23MX4bg8Ds86ffC8sZSRNQ="; 29 + rev = "10afbbc5ee40263b258b7cf3f0e5abb436f79e89"; 30 + hash = "sha256-R22eKAFNP2VVA4eL6ycN6aHM0NgDHVll9aFNmOQ/pDc="; 32 31 }; 33 32 cmakeFlags = old.cmakeFlags ++ [ 34 33 "-DCAF_ENABLE_TESTING=OFF" ··· 36 35 doCheck = false; 37 36 }); 38 37 in 39 - stdenv.mkDerivation rec { 38 + stdenv.mkDerivation { 40 39 pname = "zeek-broker"; 41 - version = "6.2.0"; 40 + version = "2.6.0-unstable-2025-04-23"; 42 41 outputs = [ 43 42 "out" 44 43 "py" ··· 49 48 src = fetchFromGitHub { 50 49 owner = "zeek"; 51 50 repo = "broker"; 52 - rev = "v${version}"; 53 - hash = "sha256-SG5TzozKvYc7qcEPJgiEtsxgzdZbbJt90lmuUbCPyv0="; 51 + rev = "5b6cbb8c2d9124aa1fb0bea5799433138dc64cf9"; 52 + hash = "sha256-L6Z+ltX3tJEwZ05zEftrJlOhwbhs06MY9cEJDM2kcck="; 54 53 }; 55 54 postUnpack = '' 56 55 rmdir $sourceRoot/cmake $sourceRoot/3rdparty ··· 62 61 touch $sourceRoot/bindings/python/3rdparty/pybind11/CMakeLists.txt 63 62 ''; 64 63 65 - patches = [ 66 - ./0001-Fix-include-path-in-exported-CMake-targets.patch 67 - ]; 68 - 69 64 postPatch = lib.optionalString stdenv.hostPlatform.isDarwin '' 70 65 substituteInPlace bindings/python/CMakeLists.txt --replace " -u -r" "" 71 66 ''; ··· 76 71 ]; 77 72 buildInputs = [ 78 73 openssl 74 + prometheus-cpp 79 75 python3.pkgs.pybind11 80 76 ]; 81 77 propagatedBuildInputs = [ caf' ]; 82 78 83 79 cmakeFlags = [ 84 80 "-DCAF_ROOT=${caf'}" 85 - "-DENABLE_STATIC_ONLY:BOOL=${if isStatic then "ON" else "OFF"}" 81 + "-DENABLE_STATIC_ONLY:BOOL=${if stdenv.hostPlatform.isStatic then "ON" else "OFF"}" 86 82 "-DPY_MOD_INSTALL_DIR=${placeholder "py"}/${python3.sitePackages}/" 83 + "-Dprometheus-cpp_ROOT=${lib.getDev prometheus-cpp}" 87 84 ]; 88 85 89 86 meta = with lib; {
+5 -2
pkgs/by-name/ze/zeek/fix-installation.patch
··· 28 28 index 1ebe7c2..1435509 100644 29 29 --- a/auxil/zeekctl/CMakeLists.txt 30 30 +++ b/auxil/zeekctl/CMakeLists.txt 31 - @@ -9,7 +9,7 @@ file(STRINGS "${CMAKE_CURRENT_SOURCE_DIR}/VERSION" VERSION LIMIT_COUNT 1) 31 + @@ -9,7 +9,7 @@ 32 32 set(PREFIX "${CMAKE_INSTALL_PREFIX}") 33 33 set(LIBDIR "${CMAKE_INSTALL_FULL_LIBDIR}") 34 34 set(ZEEKSCRIPTDIR "${ZEEK_SCRIPT_INSTALL_PATH}") ··· 37 37 38 38 ######################################################################## 39 39 ## Dependency Configuration 40 - @@ -186,38 +186,9 @@ else () 40 + @@ -186,41 +186,9 @@ 41 41 set(LOGS ${VAR}/logs) 42 42 endif () 43 43 ··· 56 56 - DIRECTORY_PERMISSIONS ${perms}) 57 57 - install(DIRECTORY DESTINATION ${SPOOL}/brokerstore 58 58 - DIRECTORY_PERMISSIONS ${perms}) 59 + - install(DIRECTORY DESTINATION ${SPOOL}/extract_files 60 + - DIRECTORY_PERMISSIONS ${perms}) 59 61 - install(DIRECTORY DESTINATION ${LOGS} 60 62 - DIRECTORY_PERMISSIONS ${perms}) 61 63 - set(EMPTY_WORLD_DIRS ··· 65 67 - install(DIRECTORY DESTINATION ${SPOOL}) 66 68 - install(DIRECTORY DESTINATION ${SPOOL}/tmp) 67 69 - install(DIRECTORY DESTINATION ${SPOOL}/brokerstore) 70 + - install(DIRECTORY DESTINATION ${SPOOL}/extract_files) 68 71 - install(DIRECTORY DESTINATION ${LOGS}) 69 72 -endif () 70 73 -
+7 -6
pkgs/by-name/ze/zeek/package.nix
··· 28 28 p.semantic-version 29 29 ]); 30 30 in 31 - stdenv.mkDerivation rec { 31 + stdenv.mkDerivation (finalAttrs: { 32 32 pname = "zeek"; 33 - version = "6.2.1"; 33 + version = "7.2.1"; 34 34 35 35 src = fetchurl { 36 - url = "https://download.zeek.org/zeek-${version}.tar.gz"; 37 - hash = "sha256-ZOOlK9mfZVrfxvgFREgqcRcSs18EMpADD8Y4Ev391Bw="; 36 + url = "https://download.zeek.org/zeek-${finalAttrs.version}.tar.gz"; 37 + hash = "sha256-nbq25TGq/HubTfAysxuVHU34xp3AkJp8yBHB20FlUC0="; 38 38 }; 39 39 40 40 strictDeps = true; ··· 110 110 meta = { 111 111 description = "Network analysis framework much different from a typical IDS"; 112 112 homepage = "https://www.zeek.org"; 113 - changelog = "https://github.com/zeek/zeek/blob/v${version}/CHANGES"; 113 + changelog = "https://github.com/zeek/zeek/blob/v${finalAttrs.version}/CHANGES"; 114 114 license = lib.licenses.bsd3; 115 + mainProgram = "zeek"; 115 116 maintainers = with lib.maintainers; [ 116 117 pSub 117 118 tobim 118 119 ]; 119 120 platforms = lib.platforms.unix; 120 121 }; 121 - } 122 + })
+1 -1
pkgs/development/beam-modules/elvis-erlang/default.nix
··· 29 29 30 30 passthru.updateScript = writeScript "update.sh" '' 31 31 #!/usr/bin/env nix-shell 32 - #!nix-shell -i bash -p bash common-updater-scripts git nix-prefetch-git gnutar gzip "rebar3WithPlugins {globalPlugins = [beamPackages.rebar3-nix];}" nixfmt-rfc-style 32 + #!nix-shell -i bash -p bash common-updater-scripts git nix-prefetch-git gnutar gzip "rebar3WithPlugins {globalPlugins = [beamPackages.rebar3-nix];}" 33 33 34 34 set -euo pipefail 35 35
+1 -1
pkgs/development/beam-modules/erlang-ls/default.nix
··· 74 74 75 75 passthru.updateScript = writeScript "update.sh" '' 76 76 #!/usr/bin/env nix-shell 77 - #! nix-shell -i bash -p common-updater-scripts coreutils git gnused gnutar gzip nixfmt-rfc-style "rebar3WithPlugins { globalPlugins = [ beamPackages.rebar3-nix ]; }" 77 + #! nix-shell -i bash -p common-updater-scripts coreutils git gnused gnutar gzip "rebar3WithPlugins { globalPlugins = [ beamPackages.rebar3-nix ]; }" 78 78 79 79 set -ox errexit 80 80 latest=$(list-git-tags | sed -n '/[\d\.]\+/p' | sort -V | tail -1)
+1 -1
pkgs/development/compilers/dotnet/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -I nixpkgs=./. -i bash -p curl jq nix gnused nixfmt-rfc-style 2 + #!nix-shell -I nixpkgs=./. -i bash -p curl jq nix gnused 3 3 # shellcheck shell=bash 4 4 5 5 set -Eeuo pipefail
+2 -2
pkgs/development/interpreters/erlang/26.nix
··· 1 1 { mkDerivation }: 2 2 3 3 mkDerivation { 4 - version = "26.2.5.13"; 5 - sha256 = "sha256-imgI9qgAi17wN/QHVC3JKrmOArq3i2k+xMg8yBK2VrQ="; 4 + version = "26.2.5.14"; 5 + sha256 = "sha256-/m76FtCJvIjNuvM96XV3ngFMgKF8C5uCH89YQklJKpo="; 6 6 }
+2 -2
pkgs/development/interpreters/erlang/27.nix
··· 1 1 { mkDerivation }: 2 2 3 3 mkDerivation { 4 - version = "27.3.4.1"; 5 - sha256 = "sha256-L9VgcdO1TyLNm+vke90w6Xuq/T3uKzmU4d0uYEfyQlc="; 4 + version = "27.3.4.2"; 5 + sha256 = "sha256-wbaRSTwTrNADbShNHoWorWyD+2ul6NZbRs6isP3g+OI="; 6 6 }
+2 -2
pkgs/development/interpreters/erlang/28.nix
··· 1 1 { mkDerivation }: 2 2 3 3 mkDerivation { 4 - version = "28.0.1"; 5 - sha256 = "sha256-eWDDreijr7RRmr6sVNuGpQ0qmynN4FTsiBXB8DOWKr4="; 4 + version = "28.0.2"; 5 + sha256 = "sha256-4+Jv7MUX4KAwasNyU7AiV9+Qd9NginYXTN0fDteTFEM="; 6 6 }
+5
pkgs/development/libraries/libgpod/default.nix
··· 47 47 substituteInPlace configure.ac --replace 'libplist >= 1.0' 'libplist-2.0 >= 2.2' 48 48 ''; 49 49 50 + preAutoreconf = '' 51 + gettextize --force --copy 52 + intltoolize --force --copy 53 + ''; 54 + 50 55 configureFlags = [ 51 56 "--without-hal" 52 57 "--enable-udev"
+7 -7
pkgs/development/python-modules/gurobipy/default.nix
··· 18 18 }; 19 19 platform = platforms.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}"); 20 20 hashes = rec { 21 - cp312-aarch64-darwin = "sha256-i/0ygF6PxOotAlO1vq7yx2NXAxbyah9PLIbLqg6zqNc="; 22 - cp312-aarch64-linux = "sha256-WvK9RiY4T/xwDCmvDh3WnK/m9tvW78045eMoc6RvPRI="; 21 + cp312-aarch64-darwin = "sha256-Ag8jJ39jDgeerBFDheq9G9n7SsIvh5btW6bZFc5PFBs="; 22 + cp312-aarch64-linux = "sha256-crv1RLwFBgu5OQm3lxWs5MD0FhmPdiKphcq7no6Zqhw="; 23 23 cp312-x86_64-darwin = cp312-aarch64-darwin; 24 - cp312-x86_64-linux = "sha256-ER0yOTo5o+Ld1erRdScx04izxoW3NVDGsMqaRdlUw2Q="; 25 - cp313-aarch64-darwin = "sha256-V5HcmwKfBrMY1U4N+gf1yWiMJ+XHH3pUvNqv20wJBek="; 26 - cp313-aarch64-linux = "sha256-s8rr72p8a6I1WYcqtz3NgEDHFW74DN4LWRGLvf0k53k="; 24 + cp312-x86_64-linux = "sha256-s/lxyvJw9nG2/89bk3s8BDClJksPAVKdyGgdYcIh8hU="; 25 + cp313-aarch64-darwin = "sha256-qFUuR2c8tvH9NR7fj8rYawL4Msv7V9kO8h4Dl+ltE44="; 26 + cp313-aarch64-linux = "sha256-vgXAdBQcihJsiq7MxBeVqwkaZm6rs5yh/5inS96B5mM="; 27 27 cp313-x86_64-darwin = cp313-aarch64-darwin; 28 - cp313-x86_64-linux = "sha256-JAqrYPz7/lhvRW1uy8yOyjtapf/nF+agjEHIKWQCYTc="; 28 + cp313-x86_64-linux = "sha256-eaMzdm4n/veQLO7vvPAnmhyjk6J6cupi+OMBshqhfVk="; 29 29 }; 30 30 hash = 31 31 hashes."${pyShortVersion}-${stdenv.system}" ··· 33 33 in 34 34 buildPythonPackage rec { 35 35 pname = "gurobipy"; 36 - version = "12.0.2"; 36 + version = "12.0.3"; 37 37 inherit format; 38 38 39 39 src = fetchPypi {
+2 -2
pkgs/development/python-modules/litellm/default.nix
··· 46 46 47 47 buildPythonPackage rec { 48 48 pname = "litellm"; 49 - version = "1.74.0"; 49 + version = "1.74.3"; 50 50 pyproject = true; 51 51 52 52 disabled = pythonOlder "3.8"; ··· 55 55 owner = "BerriAI"; 56 56 repo = "litellm"; 57 57 tag = "v${version}-stable"; 58 - hash = "sha256-qjr08HHEELIwdL3IZ+GWJWGvIySTTX1nv46tYNBP53Y="; 58 + hash = "sha256-wxj9zkaUo5SKbPd2KqEq5r9qPk2ipHr19bIX13/hnGY="; 59 59 }; 60 60 61 61 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/vector/default.nix
··· 24 24 25 25 buildPythonPackage rec { 26 26 pname = "vector"; 27 - version = "1.6.2"; 27 + version = "1.6.3"; 28 28 pyproject = true; 29 29 30 30 src = fetchFromGitHub { 31 31 owner = "scikit-hep"; 32 32 repo = "vector"; 33 33 tag = "v${version}"; 34 - hash = "sha256-IMr3+YveR/FDQ2MbgbWr1KJFrdH9B+KOFVNGJjz6Zdk="; 34 + hash = "sha256-KwxQ2sA8cdHmTRbh23H5iTexMlWK2MxdA8XWpXscpfU="; 35 35 }; 36 36 37 37 build-system = [
+2 -2
pkgs/development/ruby-modules/bundler-update-script/default.nix
··· 7 7 coreutils, 8 8 git, 9 9 nix, 10 - nixfmt-rfc-style, 10 + nixfmt, 11 11 }: 12 12 13 13 attrPath: ··· 22 22 coreutils 23 23 git 24 24 nix 25 - nixfmt-rfc-style 25 + nixfmt 26 26 ] 27 27 } 28 28 set -o errexit
+2 -2
pkgs/development/tools/build-managers/rebar3/default.nix
··· 12 12 git, 13 13 gnused, 14 14 nix, 15 - nixfmt-rfc-style, 15 + nixfmt, 16 16 rebar3-nix, 17 17 }: 18 18 ··· 95 95 git 96 96 gnused 97 97 nix 98 - nixfmt-rfc-style 98 + nixfmt 99 99 (rebar3WithPlugins { globalPlugins = [ rebar3-nix ]; }) 100 100 ] 101 101 }
+1 -1
pkgs/servers/home-assistant/update-component-packages.py
··· 1 1 #! /usr/bin/env nix-shell 2 - #! nix-shell -i python3 -p "python3.withPackages (ps: with ps; [ packaging rich ])" -p pyright ruff isort nixfmt-rfc-style 2 + #! nix-shell -i python3 -p "python3.withPackages (ps: with ps; [ packaging rich ])" -p pyright ruff isort 3 3 # 4 4 # This script downloads Home Assistant's source tarball. 5 5 # Inside the homeassistant/components directory, each integration has an associated manifest.json,
+2 -2
pkgs/servers/mobilizon/default.nix
··· 8 8 git, 9 9 cmake, 10 10 nixosTests, 11 - nixfmt-rfc-style, 11 + nixfmt, 12 12 mobilizon-frontend, 13 13 ... 14 14 }: ··· 145 145 set -eou pipefail 146 146 147 147 ${lib.getExe mix2nix} '${src}/mix.lock' > pkgs/servers/mobilizon/mix.nix 148 - ${lib.getExe nixfmt-rfc-style} pkgs/servers/mobilizon/mix.nix 148 + ${lib.getExe nixfmt} pkgs/servers/mobilizon/mix.nix 149 149 ''; 150 150 elixirPackage = beamPackages.elixir; 151 151 };
+2 -2
pkgs/tools/typesetting/tex/texlive/default.nix
··· 43 43 makeFontsConf, 44 44 useFixedHashes ? true, 45 45 recurseIntoAttrs, 46 - nixfmt-rfc-style, 46 + nixfmt, 47 47 }: 48 48 let 49 49 stdenv = gcc12Stdenv; ··· 151 151 tl2nix = ./tl2nix.sed; 152 152 } 153 153 '' 154 - xzcat "$tlpdbxz" | sed -rn -f "$tl2nix" | uniq | ${lib.getExe nixfmt-rfc-style} > "$out" 154 + xzcat "$tlpdbxz" | sed -rn -f "$tl2nix" | uniq | ${lib.getExe nixfmt} > "$out" 155 155 ''; 156 156 157 157 # map: name -> fixed-output hash
+7 -1
pkgs/top-level/aliases.nix
··· 1412 1412 nixStable = nixVersions.stable; # Added 2022-01-24 1413 1413 nixUnstable = throw "nixUnstable has been removed. For bleeding edge (Nix master, roughly weekly updated) use nixVersions.git, otherwise use nixVersions.latest."; # Converted to throw 2024-04-22 1414 1414 nix_2_3 = nixVersions.nix_2_3; 1415 - nixfmt = lib.warnOnInstantiate "nixfmt was renamed to nixfmt-classic. The nixfmt attribute may be used for the new RFC 166-style formatter in the future, which is currently available as nixfmt-rfc-style" nixfmt-classic; # Added 2024-03-31 1415 + nixfmt-rfc-style = 1416 + if lib.oldestSupportedReleaseIsAtLeast 2511 then 1417 + lib.warnOnInstantiate 1418 + "nixfmt-rfc-style is now the same as pkgs.nixfmt which should be used instead." 1419 + nixfmt # Added 2025-07-14 1420 + else 1421 + nixfmt; 1416 1422 1417 1423 # When the nixops_unstable alias is removed, nixops_unstable_minimal can be renamed to nixops_unstable. 1418 1424
+1 -1
pkgs/top-level/release-haskell.nix
··· 346 346 nix-script 347 347 nix-tree 348 348 nixfmt-classic 349 - nixfmt-rfc-style 349 + nixfmt 350 350 nota 351 351 nvfetcher 352 352 oama