Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
112ac51b eadaaa7d

+305 -229
+7
maintainers/maintainer-list.nix
··· 14055 fingerprint = "D2A2 F0A1 E7A8 5E6F B711 DEE5 63A4 4817 A52E AB7B"; 14056 }]; 14057 }; 14058 TheBrainScrambler = { 14059 email = "esthromeris@riseup.net"; 14060 github = "TheBrainScrambler";
··· 14055 fingerprint = "D2A2 F0A1 E7A8 5E6F B711 DEE5 63A4 4817 A52E AB7B"; 14056 }]; 14057 }; 14058 + the-argus = { 14059 + email = "i.mcfarlane2002@gmail.com"; 14060 + github = "the-argus"; 14061 + name = "Ian McFarlane"; 14062 + githubId = 70479099; 14063 + matrix = "@eyes1238:matrix.org"; 14064 + }; 14065 TheBrainScrambler = { 14066 email = "esthromeris@riseup.net"; 14067 github = "TheBrainScrambler";
+2 -2
pkgs/applications/audio/pyradio/default.nix
··· 6 7 python3Packages.buildPythonApplication rec { 8 pname = "pyradio"; 9 - version = "0.8.9.32"; 10 11 src = fetchFromGitHub { 12 owner = "coderholic"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-1lczH8xTZV1XVVByLAGXJbjXd20JUJALIJJ3s9+orxM="; 16 }; 17 18 nativeBuildInputs = [
··· 6 7 python3Packages.buildPythonApplication rec { 8 pname = "pyradio"; 9 + version = "0.8.9.36"; 10 11 src = fetchFromGitHub { 12 owner = "coderholic"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 + hash = "sha256-xEFjyVly1VyDz9ALtVwxxrEs856joP+pe/mappyKrPU="; 16 }; 17 18 nativeBuildInputs = [
+2 -2
pkgs/applications/editors/leafpad/default.nix
··· 1 { lib, stdenv, fetchurl, intltool, pkg-config, gtk2 }: 2 3 stdenv.mkDerivation rec { 4 - version = "0.8.18.1"; 5 pname = "leafpad"; 6 src = fetchurl { 7 url = "https://download.savannah.gnu.org/releases/leafpad/${pname}-${version}.tar.gz"; 8 - sha256 = "0b0az2wvqgvam7w0ns1j8xp2llslm1rx6h7zcsy06a7j0yp257cm"; 9 }; 10 11 nativeBuildInputs = [ pkg-config intltool ];
··· 1 { lib, stdenv, fetchurl, intltool, pkg-config, gtk2 }: 2 3 stdenv.mkDerivation rec { 4 + version = "0.8.19"; 5 pname = "leafpad"; 6 src = fetchurl { 7 url = "https://download.savannah.gnu.org/releases/leafpad/${pname}-${version}.tar.gz"; 8 + sha256 = "sha256-B9P3EvTb0KMyUf0d7hTiGv3J+SCQ/HaMEasKxVatvpc="; 9 }; 10 11 nativeBuildInputs = [ pkg-config intltool ];
+2 -2
pkgs/applications/editors/sigil/default.nix
··· 5 6 mkDerivation rec { 7 pname = "sigil"; 8 - version = "1.9.10"; 9 10 src = fetchFromGitHub { 11 repo = "Sigil"; 12 owner = "Sigil-Ebook"; 13 rev = version; 14 - sha256 = "sha256-FWUrhTTV1TCoBhitopQc469I7SRy4UDKdRLifVKhCCg="; 15 }; 16 17 pythonPath = with python3Packages; [ lxml ];
··· 5 6 mkDerivation rec { 7 pname = "sigil"; 8 + version = "1.9.20"; 9 10 src = fetchFromGitHub { 11 repo = "Sigil"; 12 owner = "Sigil-Ebook"; 13 rev = version; 14 + sha256 = "sha256-rpJ+HBYmGuhxnZbJn59mc+IokBc5834X2uyriIGnsqA="; 15 }; 16 17 pythonPath = with python3Packages; [ lxml ];
+2 -2
pkgs/applications/misc/batsignal/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "batsignal"; 5 - version = "1.6.2"; 6 7 src = fetchFromGitHub { 8 owner = "electrickite"; 9 repo = "batsignal"; 10 rev = version; 11 - sha256 = "sha256-3T0vpyAw21u2+csqaz3Yf10G8IQRDyjReedIo+I4fvw="; 12 }; 13 14 buildInputs = [ libnotify glib ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "batsignal"; 5 + version = "1.6.4"; 6 7 src = fetchFromGitHub { 8 owner = "electrickite"; 9 repo = "batsignal"; 10 rev = version; 11 + sha256 = "sha256-Z5j5tSIF3AZiZjkFFtyyi3hMqWMXtf6ont2CQ/FSEjk="; 12 }; 13 14 buildInputs = [ libnotify glib ];
+3 -3
pkgs/applications/networking/circumflex/default.nix
··· 2 3 buildGoModule rec { 4 pname = "circumflex"; 5 - version = "2.6"; 6 7 src = fetchFromGitHub { 8 owner = "bensadeh"; 9 repo = "circumflex"; 10 rev = version; 11 - hash = "sha256-pcY2PXiOazKAi8mAAbmftXDae01fcUw/u9JPOHQVclI="; 12 }; 13 14 - vendorHash = "sha256-rF1Hu4Pf9AF2MTx4GAPmzSn0M38uTxPS1bsAkO23SdI="; 15 16 nativeBuildInputs = [ makeWrapper ]; 17
··· 2 3 buildGoModule rec { 4 pname = "circumflex"; 5 + version = "2.8"; 6 7 src = fetchFromGitHub { 8 owner = "bensadeh"; 9 repo = "circumflex"; 10 rev = version; 11 + hash = "sha256-knN+T/dmIwHLqT3MJBjQhGlSeAu0lE2ZOv6tLqkcwS0="; 12 }; 13 14 + vendorHash = "sha256-Xwek2xlvdGO6C/T0a96RGuMcX7jCbvntEYBf10tvmAo="; 15 16 nativeBuildInputs = [ makeWrapper ]; 17
+3 -3
pkgs/applications/networking/cluster/kuttl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "kuttl"; 5 - version = "0.14.0"; 6 cli = "kubectl-kuttl"; 7 8 src = fetchFromGitHub { 9 owner = "kudobuilder"; 10 repo = "kuttl"; 11 rev = "v${version}"; 12 - sha256 = "sha256-xQS7qCUTM3X4SpUZfxKHb08poJ2W52R7+TNe4BFL5sY="; 13 }; 14 15 - vendorSha256 = "sha256-u8Ezk78CrAhSeeMVXj09/Hiegtx+ZNKlr/Fg0O7+iOY="; 16 17 subPackages = [ "cmd/kubectl-kuttl" ]; 18
··· 2 3 buildGoModule rec { 4 pname = "kuttl"; 5 + version = "0.15.0"; 6 cli = "kubectl-kuttl"; 7 8 src = fetchFromGitHub { 9 owner = "kudobuilder"; 10 repo = "kuttl"; 11 rev = "v${version}"; 12 + sha256 = "sha256-u+j1ulM6B238qXvLMJZwLqglr9CGk81MsnBYiNiZVJQ="; 13 }; 14 15 + vendorHash = "sha256-taJAQPa0EA0Ph9OpCs7jzLqBV61kVstZrWyNEYc/GBk="; 16 17 subPackages = [ "cmd/kubectl-kuttl" ]; 18
+2 -2
pkgs/applications/networking/sync/backintime/common.nix
··· 7 apps = lib.makeBinPath [ openssh python' cron rsync sshfs-fuse encfs ]; 8 in stdenv.mkDerivation rec { 9 pname = "backintime-common"; 10 - version = "1.3.2"; 11 12 src = fetchFromGitHub { 13 owner = "bit-team"; 14 repo = "backintime"; 15 rev = "v${version}"; 16 - sha256 = "sha256-7iTQZ7SiESsKK8F8BpLrRNkj8JhHo64kliaOvMvYGvw="; 17 }; 18 19 nativeBuildInputs = [ makeWrapper gettext ];
··· 7 apps = lib.makeBinPath [ openssh python' cron rsync sshfs-fuse encfs ]; 8 in stdenv.mkDerivation rec { 9 pname = "backintime-common"; 10 + version = "1.3.3"; 11 12 src = fetchFromGitHub { 13 owner = "bit-team"; 14 repo = "backintime"; 15 rev = "v${version}"; 16 + sha256 = "sha256-cKmzq155/dCl5wZA2SE3XjfCocHxTh4Wa2IdfzSfQHg="; 17 }; 18 19 nativeBuildInputs = [ makeWrapper gettext ];
+2 -2
pkgs/applications/science/astronomy/siril/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "siril"; 9 - version = "1.0.5"; 10 11 src = fetchFromGitLab { 12 owner = "free-astro"; 13 repo = pname; 14 rev = version; 15 - sha256 = "sha256-1NPMTHPbYKPmaG+xRyKFU4/4Iio2ptn+HOvnsg4hoFE="; 16 }; 17 18 nativeBuildInputs = [
··· 6 7 stdenv.mkDerivation rec { 8 pname = "siril"; 9 + version = "1.0.6"; 10 11 src = fetchFromGitLab { 12 owner = "free-astro"; 13 repo = pname; 14 rev = version; 15 + sha256 = "sha256-KFCA3fUMVFHmh1BdKed5/dkq0EeYcmoWec97WX9ZHUc="; 16 }; 17 18 nativeBuildInputs = [
+2 -2
pkgs/applications/science/logic/fast-downward/default.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "fast-downward"; 12 - version = "22.06.1"; 13 14 src = fetchFromGitHub { 15 owner = "aibasel"; 16 repo = "downward"; 17 rev = "release-${version}"; 18 - sha256 = "sha256-SBksyZoLR1MtyJUbGigGIbT72qVpN+nznU/bmJGYRz8="; 19 }; 20 21 nativeBuildInputs = [ cmake python3.pkgs.wrapPython ];
··· 9 10 stdenv.mkDerivation rec { 11 pname = "fast-downward"; 12 + version = "22.12.0"; 13 14 src = fetchFromGitHub { 15 owner = "aibasel"; 16 repo = "downward"; 17 rev = "release-${version}"; 18 + sha256 = "sha256-GwZ5BGzLRMgWNBaA7M2D2p9OxvdyWqm+sTwxGpcI/qY="; 19 }; 20 21 nativeBuildInputs = [ cmake python3.pkgs.wrapPython ];
+30 -10
pkgs/applications/search/recoll/default.nix
··· 35 36 mkDerivation rec { 37 pname = "recoll"; 38 - version = "1.33.2"; 39 40 src = fetchurl { 41 url = "https://www.lesbonscomptes.com/${pname}/${pname}-${version}.tar.gz"; 42 - sha256 = "sha256-ql4VHiblIn8uihUbF1htPnpvjw0qMxdzW8HLGlUrZW0="; 43 }; 44 45 - configureFlags = [ "--enable-recollq" "--disable-webkit" "--without-systemd" ] 46 - ++ lib.optionals (!withGui) [ "--disable-qtgui" "--disable-x11mon" ] 47 - ++ (if stdenv.isLinux then [ "--with-inotify" ] else [ "--without-inotify" ]); 48 49 NIX_CFLAGS_COMPILE = [ "-DNIXPKGS" ]; 50 ··· 54 ]; 55 56 nativeBuildInputs = [ 57 - file pkg-config python3Packages.setuptools which 58 ]; 59 60 buildInputs = [ 61 - bison chmlib python3Packages.python xapian zlib 62 - ] ++ lib.optional withGui qtbase 63 - ++ lib.optional stdenv.isDarwin libiconv; 64 65 # the filters search through ${PATH} using a sh proc 'checkcmds' for the 66 # filtering utils. Short circuit this by replacing the filtering command with ··· 108 members, email attachments. 109 ''; 110 homepage = "https://www.lesbonscomptes.com/recoll/"; 111 - license = licenses.gpl2; 112 platforms = platforms.unix; 113 maintainers = with maintainers; [ jcumming ]; 114 };
··· 35 36 mkDerivation rec { 37 pname = "recoll"; 38 + version = "1.33.4"; 39 40 src = fetchurl { 41 url = "https://www.lesbonscomptes.com/${pname}/${pname}-${version}.tar.gz"; 42 + sha256 = "sha256-ffD49sGYWYEWAFPRtpyDU/CYFvkrEDL21Ddq3QsXCvc="; 43 }; 44 45 + configureFlags = [ 46 + "--enable-recollq" 47 + "--disable-webkit" 48 + "--without-systemd" 49 + ] ++ lib.optionals (!withGui) [ 50 + "--disable-qtgui" 51 + "--disable-x11mon" 52 + ] ++ (if stdenv.isLinux then [ 53 + "--with-inotify" 54 + ] else [ 55 + "--without-inotify" 56 + ]); 57 58 NIX_CFLAGS_COMPILE = [ "-DNIXPKGS" ]; 59 ··· 63 ]; 64 65 nativeBuildInputs = [ 66 + file 67 + pkg-config 68 + python3Packages.setuptools 69 + which 70 ]; 71 72 buildInputs = [ 73 + bison 74 + chmlib 75 + python3Packages.python 76 + xapian 77 + zlib 78 + ] ++ lib.optional withGui [ 79 + qtbase 80 + ] ++ lib.optional stdenv.isDarwin [ 81 + libiconv 82 + ]; 83 84 # the filters search through ${PATH} using a sh proc 'checkcmds' for the 85 # filtering utils. Short circuit this by replacing the filtering command with ··· 127 members, email attachments. 128 ''; 129 homepage = "https://www.lesbonscomptes.com/recoll/"; 130 + changelog = "https://www.lesbonscomptes.com/recoll/pages/release-${version}.html"; 131 + license = licenses.gpl2Plus; 132 platforms = platforms.unix; 133 maintainers = with maintainers; [ jcumming ]; 134 };
+2 -2
pkgs/applications/terminal-emulators/hyper/default.nix
··· 15 in 16 stdenv.mkDerivation rec { 17 pname = "hyper"; 18 - version = "3.3.0"; 19 20 src = fetchurl { 21 url = "https://github.com/vercel/hyper/releases/download/v${version}/hyper_${version}_amd64.deb"; 22 - sha256 = "sha256-VJAFa4I5nHuS/aXhiiXztUh2MjCq5zdwCtK0oSsOrGQ="; 23 }; 24 25 nativeBuildInputs = [ dpkg ];
··· 15 in 16 stdenv.mkDerivation rec { 17 pname = "hyper"; 18 + version = "3.4.1"; 19 20 src = fetchurl { 21 url = "https://github.com/vercel/hyper/releases/download/v${version}/hyper_${version}_amd64.deb"; 22 + sha256 = "sha256-jEzZ6MWFaNXBS8CAzfn/ufMPpWcua9HhBFzetWMlH1Y="; 23 }; 24 25 nativeBuildInputs = [ dpkg ];
+3 -3
pkgs/applications/version-management/forgejo/default.nix
··· 14 15 buildGoPackage rec { 16 pname = "forgejo"; 17 - version = "1.18.2-0"; 18 19 src = fetchurl { 20 name = "${pname}-src-${version}.tar.gz"; 21 # see https://codeberg.org/forgejo/forgejo/releases 22 - url = "https://codeberg.org/attachments/5d59ec04-9f29-4b32-a1ef-bec5c3132e26"; 23 - hash = "sha256-RLShwdx8geyFr1Jk5qDVbsEt2hCjdrwX0lNHea7P+pk="; 24 }; 25 26 outputs = [ "out" "data" ];
··· 14 15 buildGoPackage rec { 16 pname = "forgejo"; 17 + version = "1.18.2-1"; 18 19 src = fetchurl { 20 name = "${pname}-src-${version}.tar.gz"; 21 # see https://codeberg.org/forgejo/forgejo/releases 22 + url = "https://codeberg.org/attachments/44ff6fcb-1515-4bba-85bf-3d3795ced2f7"; 23 + hash = "sha256-XSh17AwPtC+Y24lgjjXJzT/uBHg+0hWZ2RZ/eNF4mCY="; 24 }; 25 26 outputs = [ "out" "data" ];
+2 -2
pkgs/applications/version-management/git-machete/default.nix
··· 12 13 buildPythonApplication rec { 14 pname = "git-machete"; 15 - version = "3.14.2"; 16 17 src = fetchFromGitHub { 18 owner = "virtuslab"; 19 repo = pname; 20 rev = "v${version}"; 21 - hash = "sha256-uIVt7pneJq7l/kMSa7VqhcQgXhHCrpBGEqE7QZaDyQQ="; 22 }; 23 24 nativeBuildInputs = [ installShellFiles ];
··· 12 13 buildPythonApplication rec { 14 pname = "git-machete"; 15 + version = "3.14.3"; 16 17 src = fetchFromGitHub { 18 owner = "virtuslab"; 19 repo = pname; 20 rev = "v${version}"; 21 + hash = "sha256-VOny8r00JYUT4Z7LukvWTH9ZTn86vn2Dc1YhPmtdE5s="; 22 }; 23 24 nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/applications/video/jftui/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "jftui"; 11 - version = "0.6.1"; 12 13 src = fetchFromGitHub { 14 owner = "Aanok"; 15 repo = pname; 16 rev = "v${version}"; 17 - sha256 = "sha256-TkSnNZBnmDSMsxTFQx1OcFDLQBUqxIrFXQeeslXKqA0="; 18 }; 19 20 nativeBuildInputs = [
··· 8 9 stdenv.mkDerivation rec { 10 pname = "jftui"; 11 + version = "0.6.2"; 12 13 src = fetchFromGitHub { 14 owner = "Aanok"; 15 repo = pname; 16 rev = "v${version}"; 17 + sha256 = "sha256-4j0ypzszNWjHbb4RkMIoqvgz624zoKCKiIpidQUPIF4="; 18 }; 19 20 nativeBuildInputs = [
+2 -2
pkgs/applications/video/tartube/default.nix
··· 15 16 python3Packages.buildPythonApplication rec { 17 pname = "tartube"; 18 - version = "2.4.093"; 19 20 src = fetchFromGitHub { 21 owner = "axcore"; 22 repo = "tartube"; 23 rev = "refs/tags/v${version}"; 24 - sha256 = "sha256-l8jB+3vY9jOlCaLDHAvDm1Ko7viHbnRBIMEXLb/k2z0="; 25 }; 26 27 nativeBuildInputs = [
··· 15 16 python3Packages.buildPythonApplication rec { 17 pname = "tartube"; 18 + version = "2.4.221"; 19 20 src = fetchFromGitHub { 21 owner = "axcore"; 22 repo = "tartube"; 23 rev = "refs/tags/v${version}"; 24 + sha256 = "sha256-A5p4olnXak22410DOKIPpZ6MQGR5aS2ARWO+083bSuQ="; 25 }; 26 27 nativeBuildInputs = [
+2 -2
pkgs/applications/virtualization/ecs-agent/default.nix
··· 2 3 buildGoModule rec { 4 pname = "amazon-ecs-agent"; 5 - version = "1.66.2"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "aws"; 10 repo = pname; 11 - hash = "sha256-mZzDvD+40YiC8cBpLlYd7K1p5UBYpso9OMCDijopuik="; 12 }; 13 14 vendorHash = null;
··· 2 3 buildGoModule rec { 4 pname = "amazon-ecs-agent"; 5 + version = "1.67.2"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "aws"; 10 repo = pname; 11 + hash = "sha256-iSL5ogS8BLcxge3eo+kCqtsGmj7P1wbi+/84nA9fO2Q="; 12 }; 13 14 vendorHash = null;
+15 -5
pkgs/applications/virtualization/lima/default.nix
··· 1 { lib 2 , buildGoModule 3 , fetchFromGitHub 4 , installShellFiles 5 , qemu 6 , makeWrapper 7 }: 8 9 buildGoModule rec { 10 pname = "lima"; 11 - version = "0.13.0"; 12 13 src = fetchFromGitHub { 14 owner = "lima-vm"; 15 repo = pname; 16 rev = "v${version}"; 17 - sha256 = "sha256-alE7fUVxJRkLMtdia5ruHxh9nlWIubM0J6iIrmpreRM="; 18 }; 19 20 - vendorSha256 = "sha256-Kb2R8USWOWRFMjQO3tjdl5UHOzzb2B3ld+5vO2gF3KY="; 21 22 - nativeBuildInputs = [ makeWrapper installShellFiles ]; 23 24 # clean fails with read only vendor dir 25 postPatch = '' 26 - substituteInPlace Makefile --replace 'binaries: clean' 'binaries:' 27 ''; 28 29 buildPhase = '' 30 runHook preBuild
··· 1 { lib 2 + , stdenv 3 , buildGoModule 4 , fetchFromGitHub 5 , installShellFiles 6 , qemu 7 + , xcbuild 8 + , sigtool 9 , makeWrapper 10 }: 11 12 buildGoModule rec { 13 pname = "lima"; 14 + version = "0.14.2"; 15 16 src = fetchFromGitHub { 17 owner = "lima-vm"; 18 repo = pname; 19 rev = "v${version}"; 20 + sha256 = "sha256-g4FvkjBviI1m8zlc+GK/09dIqVkTQ2MqqK1Wkyu4qBc="; 21 }; 22 23 + vendorSha256 = "sha256-l53MTxLY/uid+0U/eY96l0aBWKImST1gN2BARilh2K0="; 24 25 + nativeBuildInputs = [ makeWrapper installShellFiles ] 26 + ++ lib.optionals stdenv.isDarwin [ xcbuild.xcrun sigtool ]; 27 28 # clean fails with read only vendor dir 29 postPatch = '' 30 + substituteInPlace Makefile \ 31 + --replace 'binaries: clean' 'binaries:' \ 32 + --replace 'codesign --entitlements vz.entitlements -s -' 'codesign --force --entitlements vz.entitlements -s -' 33 ''; 34 + 35 + # It attaches entitlements with codesign and strip removes those, 36 + # voiding the entitlements and making it non-operational. 37 + dontStrip = stdenv.isDarwin; 38 39 buildPhase = '' 40 runHook preBuild
+2 -2
pkgs/data/fonts/last-resort/default.nix
··· 1 { lib, fetchurl }: 2 3 let 4 - version = "14.000"; 5 in fetchurl { 6 name = "last-resort-${version}"; 7 ··· 13 ''; 14 15 recursiveHash = true; 16 - sha256 = "sha256-rb69V4oExSFx4GpedpyVvGuS6o+MxmxTCSZhoe9kUhI="; 17 18 meta = with lib; { 19 description = "Fallback font of last resort";
··· 1 { lib, fetchurl }: 2 3 let 4 + version = "15.000"; 5 in fetchurl { 6 name = "last-resort-${version}"; 7 ··· 13 ''; 14 15 recursiveHash = true; 16 + sha256 = "sha256-mkRIA6Hajl5e9j/qb3WSKaIaHmekjl5wGUSszWMfmjw="; 17 18 meta = with lib; { 19 description = "Fallback font of last resort";
+47
pkgs/data/icons/rose-pine/default.nix
···
··· 1 + { stdenvNoCC 2 + , lib 3 + , fetchFromGitHub 4 + , gtk3 5 + }: 6 + 7 + stdenvNoCC.mkDerivation rec { 8 + pname = "rose-pine-icon-theme"; 9 + version = "unstable-2022-09-01"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "rose-pine"; 13 + repo = "gtk"; 14 + rev = "7a4c40989fd42fd8d4a797f460c79fc4a085c304"; 15 + sha256 = "0q74wjyrsjyym770i3sqs071bvanwmm727xzv50wk6kzvpyqgi67"; 16 + }; 17 + 18 + nativeBuildInputs = [ 19 + gtk3 20 + ]; 21 + 22 + # avoid the makefile which is only for the theme maintainers 23 + dontBuild = true; 24 + 25 + installPhase = '' 26 + runHook preInstall 27 + 28 + mkdir -p $out/share/icons 29 + mv icons/rose-pine-icons $out/share/icons/rose-pine 30 + mv icons/rose-pine-dawn-icons $out/share/icons/rose-pine-dawn 31 + mv icons/rose-pine-moon-icons $out/share/icons/rose-pine-moon 32 + 33 + for theme in $out/share/icons/*; do 34 + gtk-update-icon-cache $theme 35 + done 36 + 37 + runHook postInstall 38 + ''; 39 + 40 + meta = with lib; { 41 + description = "Rosé Pine icon theme for GTK"; 42 + homepage = "https://github.com/rose-pine/gtk"; 43 + license = licenses.gpl3Only; 44 + platforms = platforms.linux; 45 + maintainers = with maintainers; [romildo the-argus]; 46 + }; 47 + }
+16 -9
pkgs/data/themes/rose-pine-gtk/default.nix
··· 1 - { stdenv 2 - , fetchFromGitHub 3 , lib 4 , gnome-themes-extra 5 , gtk-engine-murrine 6 , gtk_engines 7 }: 8 9 - stdenv.mkDerivation rec { 10 pname = "rose-pine-gtk-theme"; 11 - version = "unstable-2021-02-22"; 12 13 src = fetchFromGitHub { 14 owner = "rose-pine"; 15 repo = "gtk"; 16 - rev = "9cd2dd449f911973ec549231a57a070d256da9fd"; 17 - sha256 = "0lqx8dmv754ix3xbg7h440x964n0bg4lb06vbzvsydnbx79h7lvy"; 18 }; 19 20 buildInputs = [ ··· 26 gtk-engine-murrine # murrine engine for Gtk2 27 ]; 28 29 installPhase = '' 30 runHook preInstall 31 mkdir -p $out/share/themes 32 - cp -a Rose-Pine $out/share/themes 33 - rm $out/share/themes/*/LICENSE 34 runHook postInstall 35 ''; 36 ··· 39 homepage = "https://github.com/rose-pine/gtk"; 40 license = licenses.gpl3Only; 41 platforms = platforms.linux; 42 - maintainers = [ maintainers.romildo ]; 43 }; 44 }
··· 1 + { stdenvNoCC 2 , lib 3 + , fetchFromGitHub 4 , gnome-themes-extra 5 , gtk-engine-murrine 6 , gtk_engines 7 }: 8 9 + stdenvNoCC.mkDerivation rec { 10 pname = "rose-pine-gtk-theme"; 11 + version = "unstable-2022-09-01"; 12 13 src = fetchFromGitHub { 14 owner = "rose-pine"; 15 repo = "gtk"; 16 + rev = "7a4c40989fd42fd8d4a797f460c79fc4a085c304"; 17 + sha256 = "0q74wjyrsjyym770i3sqs071bvanwmm727xzv50wk6kzvpyqgi67"; 18 }; 19 20 buildInputs = [ ··· 26 gtk-engine-murrine # murrine engine for Gtk2 27 ]; 28 29 + # avoid the makefile which is only for theme maintainers 30 + dontBuild = true; 31 + 32 installPhase = '' 33 runHook preInstall 34 + 35 mkdir -p $out/share/themes 36 + mv gtk3/rose-pine-gtk $out/share/themes/rose-pine 37 + mv gtk3/rose-pine-moon-gtk $out/share/themes/rose-pine-moon 38 + mv gtk3/rose-pine-dawn-gtk $out/share/themes/rose-pine-dawn 39 + mv gnome_shell/moon/gnome-shell $out/share/themes/rose-pine-moon 40 + 41 runHook postInstall 42 ''; 43 ··· 46 homepage = "https://github.com/rose-pine/gtk"; 47 license = licenses.gpl3Only; 48 platforms = platforms.linux; 49 + maintainers = with maintainers; [romildo the-argus]; 50 }; 51 }
+3 -3
pkgs/development/libraries/dyncall/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "dyncall"; 5 - version = "1.3"; 6 7 src = fetchurl { 8 url = "https://www.dyncall.org/r${version}/dyncall-${version}.tar.gz"; 9 - # https://www.dyncall.org/r1.3/SHA256 10 - sha256 = "sha256-q/Ys/DHr1/IWWNqhNwp3gcxRQxYrwIaDhKwH3vnj05A="; 11 }; 12 13 # XXX: broken tests, failures masked, lets avoid crashing a bunch for now :)
··· 2 3 stdenv.mkDerivation rec { 4 pname = "dyncall"; 5 + version = "1.4"; 6 7 src = fetchurl { 8 url = "https://www.dyncall.org/r${version}/dyncall-${version}.tar.gz"; 9 + # https://www.dyncall.org/r1.4/SHA256 10 + sha256 = "sha256-FEN9u+87bckkg/ZQfq+CWrl5ZKie7K6Ms0emvsnDKq4="; 11 }; 12 13 # XXX: broken tests, failures masked, lets avoid crashing a bunch for now :)
+15 -1
pkgs/development/libraries/libpcap/default.nix
··· 1 - { lib, stdenv, fetchurl, flex, bison, bluez, pkg-config, withBluez ? false }: 2 3 with lib; 4 ··· 11 sha256 = "sha256-7ShfSsyvBTRPkJdXV7Pb/ncrpB0cQBwmSLf6RbcRvdQ="; 12 }; 13 14 nativeBuildInputs = [ flex bison ] 15 ++ optionals withBluez [ bluez.dev pkg-config ]; 16 ··· 20 "--with-pcap=${if stdenv.isLinux then "linux" else "bpf"}" 21 ] ++ optionals stdenv.isDarwin [ 22 "--disable-universal" 23 ] ++ optionals (stdenv.hostPlatform == stdenv.buildPlatform) 24 [ "ac_cv_linux_vers=2" ]; 25
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , flex 5 + , bison 6 + , bluez 7 + , libxcrypt 8 + , pkg-config 9 + , withBluez ? false 10 + , withRemote ? false 11 + }: 12 13 with lib; 14 ··· 21 sha256 = "sha256-7ShfSsyvBTRPkJdXV7Pb/ncrpB0cQBwmSLf6RbcRvdQ="; 22 }; 23 24 + buildInputs = optionals withRemote [ libxcrypt ]; 25 + 26 nativeBuildInputs = [ flex bison ] 27 ++ optionals withBluez [ bluez.dev pkg-config ]; 28 ··· 32 "--with-pcap=${if stdenv.isLinux then "linux" else "bpf"}" 33 ] ++ optionals stdenv.isDarwin [ 34 "--disable-universal" 35 + ] ++ optionals withRemote [ 36 + "--enable-remote" 37 ] ++ optionals (stdenv.hostPlatform == stdenv.buildPlatform) 38 [ "ac_cv_linux_vers=2" ]; 39
+2 -2
pkgs/development/libraries/openwsman/default.nix
··· 3 4 stdenv.mkDerivation rec { 5 pname = "openwsman"; 6 - version = "2.7.1"; 7 8 src = fetchFromGitHub { 9 owner = "Openwsman"; 10 repo = "openwsman"; 11 rev = "v${version}"; 12 - sha256 = "sha256-/fSVzpGPObMkJIu7j6eR6A7Gtf2jttoPhcSayBvn3IU="; 13 }; 14 15 nativeBuildInputs = [ cmake pkg-config ];
··· 3 4 stdenv.mkDerivation rec { 5 pname = "openwsman"; 6 + version = "2.7.2"; 7 8 src = fetchFromGitHub { 9 owner = "Openwsman"; 10 repo = "openwsman"; 11 rev = "v${version}"; 12 + sha256 = "sha256-CH2pqWs64Dznim3IljmsthKEQfACVlaAKQ/07MgryHo="; 13 }; 14 15 nativeBuildInputs = [ cmake pkg-config ];
+2 -2
pkgs/development/python-modules/pyopengl-accelerate/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "pyopengl-accelerate"; 9 - version = "3.1.5"; 10 disabled = pythonAtLeast "3.10"; # fails to compile 11 12 src = fetchPypi { 13 pname = "PyOpenGL-accelerate"; 14 inherit version; 15 - sha256 = "01iggy5jwxv7lxnj51zbmlbhag9wcb7dvrbwgi97i90n0a5m3r8j"; 16 }; 17 18 meta = {
··· 6 7 buildPythonPackage rec { 8 pname = "pyopengl-accelerate"; 9 + version = "3.1.6"; 10 disabled = pythonAtLeast "3.10"; # fails to compile 11 12 src = fetchPypi { 13 pname = "PyOpenGL-accelerate"; 14 inherit version; 15 + sha256 = "sha256-rYowAlbsolIoJh3hb3QeUaMPNPHhsc9oNZ9cYtvNzcM="; 16 }; 17 18 meta = {
+2 -2
pkgs/development/python-modules/python-vipaccess/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "python-vipaccess"; 12 - version = "0.14"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - sha256 = "d5013d306e5891ecfe523c9ef52d074fe8b6ca29ee259c0deeb8a83ae9884ce0"; 17 }; 18 19 propagatedBuildInputs = [
··· 9 10 buildPythonPackage rec { 11 pname = "python-vipaccess"; 12 + version = "0.14.1"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + sha256 = "sha256-vBFCRXwZ91C48GuOet2Obbo7gM02M2c9+7rhp0l6w54="; 17 }; 18 19 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/yattag/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "yattag"; 5 - version = "1.14.0"; 6 7 src = fetchPypi { 8 inherit pname version; 9 - sha256 = "5731a31cb7452c0c6930dd1a284e0170b39eee959851a2aceb8d6af4134a5fa8"; 10 }; 11 12 meta = with lib; {
··· 2 3 buildPythonPackage rec { 4 pname = "yattag"; 5 + version = "1.15.0"; 6 7 src = fetchPypi { 8 inherit pname version; 9 + sha256 = "sha256-ap/z/TMKYCh4BOpzcKhBZrYk6/S3rZ7XiLfFd3m2UmM="; 10 }; 11 12 meta = with lib; {
+2 -2
pkgs/development/tools/analysis/pmd/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "pmd"; 5 - version = "6.49.0"; 6 7 src = fetchurl { 8 url = "https://github.com/pmd/pmd/releases/download/pmd_releases/${version}/pmd-bin-${version}.zip"; 9 - hash = "sha256-dEKfQIdWkx6XAKnEBHaVI0l729Xj2RnjoHl59t0Kal0="; 10 }; 11 12 nativeBuildInputs = [ unzip makeWrapper ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "pmd"; 5 + version = "6.53.0"; 6 7 src = fetchurl { 8 url = "https://github.com/pmd/pmd/releases/download/pmd_releases/${version}/pmd-bin-${version}.zip"; 9 + hash = "sha256-pHEGBIvC4XAuzWZpws7ldRGabfKhAqZnaahqVdNpUJE="; 10 }; 11 12 nativeBuildInputs = [ unzip makeWrapper ];
+3 -3
pkgs/development/tools/godot/4/default.nix
··· 52 in 53 stdenv.mkDerivation rec { 54 pname = "godot"; 55 - version = "4.0-beta10"; 56 57 src = fetchFromGitHub { 58 owner = "godotengine"; 59 repo = "godot"; 60 - rev = "d0398f62f08ce0cfba80990b21c6af4181f93fe9"; 61 - sha256 = "sha256-h4DpK7YC7/qMc6GAD2nvNVmrlGjKT5d7OK+1NcuZCMg="; 62 }; 63 64 nativeBuildInputs = [
··· 52 in 53 stdenv.mkDerivation rec { 54 pname = "godot"; 55 + version = "4.0-beta14"; 56 57 src = fetchFromGitHub { 58 owner = "godotengine"; 59 repo = "godot"; 60 + rev = "28a24639c3c6a95b5b9828f5f02bf0dc2f5ce54b"; 61 + sha256 = "sha256-qAotCc2YUg8FMK+JFHi5B4OL/cAtvWO/pYRRz8RcNUY="; 62 }; 63 64 nativeBuildInputs = [
+2 -2
pkgs/development/tools/micronaut/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "micronaut"; 5 - version = "3.7.4"; 6 7 src = fetchzip { 8 url = "https://github.com/micronaut-projects/micronaut-starter/releases/download/v${version}/micronaut-cli-${version}.zip"; 9 - sha256 = "sha256-VUavNwj5MCMZFV9WASF3olOdZb4JNBYbcQdgUfvPS8k="; 10 }; 11 12 nativeBuildInputs = [ makeWrapper installShellFiles ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "micronaut"; 5 + version = "3.8.1"; 6 7 src = fetchzip { 8 url = "https://github.com/micronaut-projects/micronaut-starter/releases/download/v${version}/micronaut-cli-${version}.zip"; 9 + sha256 = "sha256-DBWPKy17pYU5VWEOxnaP2AKoiskNCBbt9QqO6xxf7eI="; 10 }; 11 12 nativeBuildInputs = [ makeWrapper installShellFiles ];
+2 -2
pkgs/development/tools/neil/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "neil"; 11 - version = "0.1.45"; 12 13 src = fetchFromGitHub { 14 owner = "babashka"; 15 repo = "neil"; 16 rev = "v${version}"; 17 - sha256 = "sha256-QEeJWR4aBx1DsXjlTanhDSQn91I9JzEitU+Az+wTVFY="; 18 }; 19 20 nativeBuildInputs = [ makeWrapper ];
··· 8 9 stdenv.mkDerivation rec { 10 pname = "neil"; 11 + version = "0.1.47"; 12 13 src = fetchFromGitHub { 14 owner = "babashka"; 15 repo = "neil"; 16 rev = "v${version}"; 17 + sha256 = "sha256-fsFIBT1voh6QcGRoGYx10JoKqZuV3xcA+eOo03DYz1s="; 18 }; 19 20 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/development/tools/oh-my-posh/default.nix
··· 6 7 buildGoModule rec { 8 pname = "oh-my-posh"; 9 - version = "13.1.2"; 10 11 src = fetchFromGitHub { 12 owner = "jandedobbeleer"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-/of1jeyHdVyXJ5O8aAN/InaJ5CtCPVFUTk96Q9n5Gr4="; 16 }; 17 18 vendorHash = "sha256-WiH4qu8DODEhAkxUm6VDcBwFyQO7kNjaiaWPDHCHj9E=";
··· 6 7 buildGoModule rec { 8 pname = "oh-my-posh"; 9 + version = "13.3.1"; 10 11 src = fetchFromGitHub { 12 owner = "jandedobbeleer"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 + hash = "sha256-ssZbeb1UczWEjeRY1WJBQPnbG/p6XcUSWVHLdreGJkk="; 16 }; 17 18 vendorHash = "sha256-WiH4qu8DODEhAkxUm6VDcBwFyQO7kNjaiaWPDHCHj9E=";
+3 -3
pkgs/development/tools/relic/default.nix
··· 2 3 buildGoModule rec { 4 pname = "relic"; 5 - version = "7.5.3"; 6 7 src = fetchFromGitHub { 8 owner = "sassoftware"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-urueDWvHhDsIiLIAatAforBM//UEJz8wUHEVyhwV7JY="; 12 }; 13 14 - vendorSha256 = "sha256-wlylASK2RES0nbf6UZHJBrYQaz9jrq5j7/KF1wYOqE0="; 15 16 meta = with lib; { 17 homepage = "https://github.com/sassoftware/relic";
··· 2 3 buildGoModule rec { 4 pname = "relic"; 5 + version = "7.5.4"; 6 7 src = fetchFromGitHub { 8 owner = "sassoftware"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-rm52XrN0554copqIllfaNC9EIZ+6rxVeZWTWR2y9X14="; 12 }; 13 14 + vendorHash = "sha256-389ki4hsx7l2gHSiOHledo/ZP+I3NAkk1K8anq2kfEE="; 15 16 meta = with lib; { 17 homepage = "https://github.com/sassoftware/relic";
+31 -32
pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch
··· 10 ) 11 endif 12 diff --git a/data/meson.build b/data/meson.build 13 - index 3a77a7bfc..747bd1988 100644 14 --- a/data/meson.build 15 +++ b/data/meson.build 16 @@ -26,7 +26,7 @@ endif ··· 20 - install_dir: join_paths(sysconfdir, 'fwupd') 21 + install_dir: join_paths(sysconfdir_install, 'fwupd') 22 ) 23 - plugin_quirks += join_paths(meson.current_source_dir(), 'power.quirk') 24 - plugin_quirks += join_paths(meson.current_source_dir(), 'cfi.quirk') 25 diff --git a/data/pki/meson.build b/data/pki/meson.build 26 index 3649fecea..c3462744b 100644 27 --- a/data/pki/meson.build ··· 57 ) 58 endif 59 diff --git a/data/remotes.d/meson.build b/data/remotes.d/meson.build 60 - index 1d1698a7e..5469d00a6 100644 61 --- a/data/remotes.d/meson.build 62 +++ b/data/remotes.d/meson.build 63 - @@ -2,7 +2,7 @@ if build_standalone and get_option('lvfs') != 'false' 64 - install_data([ 65 - 'lvfs-testing.conf', 66 - ], 67 - - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d') 68 - + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d') 69 - ) 70 - con3 = configuration_data() 71 - if get_option('lvfs') == 'disabled' 72 - @@ -15,7 +15,7 @@ if build_standalone and get_option('lvfs') != 'false' 73 output: 'lvfs.conf', 74 configuration: con3, 75 install: true, 76 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 77 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 78 ) 79 i18n.merge_file( 80 input: 'lvfs.metainfo.xml', 81 - @@ -49,12 +49,12 @@ configure_file( 82 output: 'vendor.conf', 83 configuration: con2, 84 install: true, ··· 94 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 95 ) 96 diff --git a/meson.build b/meson.build 97 - index e7980e965..2c66e2dc4 100644 98 --- a/meson.build 99 +++ b/meson.build 100 - @@ -195,6 +195,12 @@ endif 101 mandir = join_paths(prefix, get_option('mandir')) 102 localedir = join_paths(prefix, get_option('localedir')) 103 ··· 111 gio = dependency('gio-2.0', version: '>= 2.45.8') 112 giounix = dependency('gio-unix-2.0', version: '>= 2.45.8', required: false) 113 diff --git a/meson_options.txt b/meson_options.txt 114 - index 6cf92e72e..2e8568292 100644 115 --- a/meson_options.txt 116 +++ b/meson_options.txt 117 @@ -1,3 +1,4 @@ ··· 120 option('consolekit', type : 'feature', description : 'ConsoleKit support', deprecated: {'true': 'enabled', 'false': 'disabled'}) 121 option('static_analysis', type : 'boolean', value : false, description : 'enable GCC static analysis support') 122 diff --git a/plugins/dell-esrt/meson.build b/plugins/dell-esrt/meson.build 123 - index 67bd3b9d9..ad04a91b6 100644 124 --- a/plugins/dell-esrt/meson.build 125 +++ b/plugins/dell-esrt/meson.build 126 - @@ -38,6 +38,6 @@ configure_file( 127 output: 'dell-esrt.conf', 128 configuration: con2, 129 install: true, ··· 132 ) 133 endif 134 diff --git a/plugins/msr/meson.build b/plugins/msr/meson.build 135 - index d626c3ad3..5a2f847d5 100644 136 --- a/plugins/msr/meson.build 137 +++ b/plugins/msr/meson.build 138 @@ -10,7 +10,7 @@ install_data(['fwupd-msr.conf'], ··· 142 - install_dir: join_paths(sysconfdir, 'fwupd') 143 + install_dir: join_paths(sysconfdir_install, 'fwupd') 144 ) 145 - shared_module('fu_plugin_msr', 146 - fu_hash, 147 diff --git a/plugins/redfish/meson.build b/plugins/redfish/meson.build 148 - index 95606e478..e5355e520 100644 149 --- a/plugins/redfish/meson.build 150 +++ b/plugins/redfish/meson.build 151 - @@ -43,7 +43,7 @@ shared_module('fu_plugin_redfish', 152 - ) 153 154 install_data(['redfish.conf'], 155 - install_dir: join_paths(sysconfdir, 'fwupd'), 156 + install_dir: join_paths(sysconfdir_install, 'fwupd'), 157 ) 158 159 - if get_option('tests') 160 diff --git a/plugins/thunderbolt/meson.build b/plugins/thunderbolt/meson.build 161 - index 5f8ffbf90..9ba323e75 100644 162 --- a/plugins/thunderbolt/meson.build 163 +++ b/plugins/thunderbolt/meson.build 164 - @@ -32,7 +32,7 @@ fu_plugin_thunderbolt = shared_module('fu_plugin_thunderbolt', 165 - ) 166 167 install_data(['thunderbolt.conf'], 168 - install_dir: join_paths(sysconfdir, 'fwupd') ··· 171 # we use functions from 2.52 in the tests 172 if get_option('tests') and run_sanitize_unsafe_tests and umockdev.found() and gio.version().version_compare('>= 2.52') 173 diff --git a/plugins/uefi-capsule/meson.build b/plugins/uefi-capsule/meson.build 174 - index ef38dc03e..78ff65e1d 100644 175 --- a/plugins/uefi-capsule/meson.build 176 +++ b/plugins/uefi-capsule/meson.build 177 @@ -20,7 +20,7 @@ if host_machine.system() == 'linux' ··· 183 ) 184 elif host_machine.system() == 'freebsd' 185 backend_srcs += 'fu-uefi-backend-freebsd.c' 186 - @@ -110,7 +110,7 @@ if get_option('compat_cli') and get_option('man') 187 endif 188 189 install_data(['uefi_capsule.conf'],
··· 10 ) 11 endif 12 diff --git a/data/meson.build b/data/meson.build 13 + index 865b20e26..ff1c2657b 100644 14 --- a/data/meson.build 15 +++ b/data/meson.build 16 @@ -26,7 +26,7 @@ endif ··· 20 - install_dir: join_paths(sysconfdir, 'fwupd') 21 + install_dir: join_paths(sysconfdir_install, 'fwupd') 22 ) 23 + plugin_quirks += files([ 24 + 'power.quirk', 25 diff --git a/data/pki/meson.build b/data/pki/meson.build 26 index 3649fecea..c3462744b 100644 27 --- a/data/pki/meson.build ··· 57 ) 58 endif 59 diff --git a/data/remotes.d/meson.build b/data/remotes.d/meson.build 60 + index c20a1a05e..87b1fa930 100644 61 --- a/data/remotes.d/meson.build 62 +++ b/data/remotes.d/meson.build 63 + @@ -15,14 +15,14 @@ if build_standalone and get_option('lvfs') != 'false' 64 output: 'lvfs.conf', 65 configuration: con3, 66 install: true, 67 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 68 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 69 ) 70 + configure_file( 71 + input: 'lvfs-testing.conf', 72 + output: 'lvfs-testing.conf', 73 + configuration: con3, 74 + install: true, 75 + - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 76 + + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 77 + ) 78 i18n.merge_file( 79 input: 'lvfs.metainfo.xml', 80 + @@ -54,12 +54,12 @@ configure_file( 81 output: 'vendor.conf', 82 configuration: con2, 83 install: true, ··· 93 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 94 ) 95 diff --git a/meson.build b/meson.build 96 + index d3e08af43..30011f548 100644 97 --- a/meson.build 98 +++ b/meson.build 99 + @@ -193,6 +193,12 @@ endif 100 mandir = join_paths(prefix, get_option('mandir')) 101 localedir = join_paths(prefix, get_option('localedir')) 102 ··· 110 gio = dependency('gio-2.0', version: '>= 2.45.8') 111 giounix = dependency('gio-unix-2.0', version: '>= 2.45.8', required: false) 112 diff --git a/meson_options.txt b/meson_options.txt 113 + index 204690640..6fc7e8437 100644 114 --- a/meson_options.txt 115 +++ b/meson_options.txt 116 @@ -1,3 +1,4 @@ ··· 119 option('consolekit', type : 'feature', description : 'ConsoleKit support', deprecated: {'true': 'enabled', 'false': 'disabled'}) 120 option('static_analysis', type : 'boolean', value : false, description : 'enable GCC static analysis support') 121 diff --git a/plugins/dell-esrt/meson.build b/plugins/dell-esrt/meson.build 122 + index 88c039f85..62a7691f3 100644 123 --- a/plugins/dell-esrt/meson.build 124 +++ b/plugins/dell-esrt/meson.build 125 + @@ -27,6 +27,6 @@ configure_file( 126 output: 'dell-esrt.conf', 127 configuration: con2, 128 install: true, ··· 131 ) 132 endif 133 diff --git a/plugins/msr/meson.build b/plugins/msr/meson.build 134 + index 23ec5ec82..b03826fc0 100644 135 --- a/plugins/msr/meson.build 136 +++ b/plugins/msr/meson.build 137 @@ -10,7 +10,7 @@ install_data(['fwupd-msr.conf'], ··· 141 - install_dir: join_paths(sysconfdir, 'fwupd') 142 + install_dir: join_paths(sysconfdir_install, 'fwupd') 143 ) 144 + plugin_builtins += static_library('fu_plugin_msr', 145 + sources: [ 146 diff --git a/plugins/redfish/meson.build b/plugins/redfish/meson.build 147 + index 1e35b6ce9..33ca1447f 100644 148 --- a/plugins/redfish/meson.build 149 +++ b/plugins/redfish/meson.build 150 + @@ -35,7 +35,7 @@ plugin_builtin_redfish = static_library('fu_plugin_redfish', 151 + plugin_builtins += plugin_builtin_redfish 152 153 install_data(['redfish.conf'], 154 - install_dir: join_paths(sysconfdir, 'fwupd'), 155 + install_dir: join_paths(sysconfdir_install, 'fwupd'), 156 + install_mode: 'rw-r-----', 157 ) 158 159 diff --git a/plugins/thunderbolt/meson.build b/plugins/thunderbolt/meson.build 160 + index 71d930e62..399fb5781 100644 161 --- a/plugins/thunderbolt/meson.build 162 +++ b/plugins/thunderbolt/meson.build 163 + @@ -19,7 +19,7 @@ plugin_builtin_thunderbolt = static_library('fu_plugin_thunderbolt', 164 + plugin_builtins += plugin_builtin_thunderbolt 165 166 install_data(['thunderbolt.conf'], 167 - install_dir: join_paths(sysconfdir, 'fwupd') ··· 170 # we use functions from 2.52 in the tests 171 if get_option('tests') and run_sanitize_unsafe_tests and umockdev.found() and gio.version().version_compare('>= 2.52') 172 diff --git a/plugins/uefi-capsule/meson.build b/plugins/uefi-capsule/meson.build 173 + index b4b038313..9c5407c3f 100644 174 --- a/plugins/uefi-capsule/meson.build 175 +++ b/plugins/uefi-capsule/meson.build 176 @@ -20,7 +20,7 @@ if host_machine.system() == 'linux' ··· 182 ) 183 elif host_machine.system() == 'freebsd' 184 backend_srcs += 'fu-uefi-backend-freebsd.c' 185 + @@ -87,7 +87,7 @@ if get_option('compat_cli') and get_option('man') 186 endif 187 188 install_data(['uefi_capsule.conf'],
+23 -20
pkgs/os-specific/linux/firmware/fwupd/default.nix
··· 15 , gusb 16 , sqlite 17 , libarchive 18 , curl 19 , libjcat 20 , elfutils ··· 30 , protobufc 31 , python3 32 , wrapGAppsNoGuiHook 33 , json-glib 34 , bash-completion 35 , shared-mime-info ··· 85 86 test-firmware = 87 let 88 - version = "unstable-2021-11-02"; 89 src = fetchFromGitHub { 90 name = "fwupd-test-firmware-${version}"; 91 owner = "fwupd"; 92 repo = "fwupd-test-firmware"; 93 - rev = "aaa2f9fd68a40684c256dd85b86093cba38ffd9d"; 94 - sha256 = "Slk7CNfkmvmOh3WtIBkPs3NYT96co6i8PwqcbpeVFgA="; 95 passthru = { 96 inherit src version; # For update script 97 updateScript = unstableGitUpdater { ··· 114 115 self = stdenv.mkDerivation rec { 116 pname = "fwupd"; 117 - version = "1.8.4"; 118 119 # libfwupd goes to lib 120 # daemon, plug-ins and libfwupdplugin go to out ··· 123 124 src = fetchurl { 125 url = "https://people.freedesktop.org/~hughsient/releases/fwupd-${version}.tar.xz"; 126 - sha256 = "sha256-rfoHQ0zcKexBxA/vRg6Nlwlj/gx+hJ3sfzkyrbFh+IY="; 127 }; 128 129 patches = [ ··· 147 ]; 148 149 nativeBuildInputs = [ 150 meson 151 ninja 152 gi-docgen ··· 187 libmbim 188 libcbor 189 libqmi 190 - xz # for liblzma. 191 ] ++ lib.optionals haveDell [ 192 libsmbios 193 ] ++ lib.optionals haveFlashrom [ ··· 210 "-Dsysconfdir_install=${placeholder "out"}/etc" 211 "-Defi_os_dir=nixos" 212 "-Dplugin_modem_manager=enabled" 213 - # Requires Meson 0.63 214 - "-Dgresource_quirks=disabled" 215 216 # We do not want to place the daemon into lib (cyclic reference) 217 "--libexecdir=${placeholder "out"}/libexec" 218 - # Our builder only adds $lib/lib to rpath but some things link 219 - # against libfwupdplugin which is in $out/lib. 220 - "-Dc_link_args=-Wl,-rpath,${placeholder "out"}/lib" 221 ] ++ lib.optionals (!haveDell) [ 222 "-Dplugin_dell=disabled" 223 "-Dplugin_synaptics_mst=disabled" ··· 232 # TODO: wrapGAppsHook wraps efi capsule even though it is not ELF 233 dontWrapGApps = true; 234 235 - # /etc/os-release not available in sandbox 236 - # doCheck = true; 237 238 # Environment variables 239 ··· 254 postPatch = '' 255 patchShebangs \ 256 contrib/generate-version-script.py \ 257 - meson_post_install.sh \ 258 po/test-deps 259 260 - # This checks a version of a dependency of gi-docgen but gi-docgen is self-contained in Nixpkgs. 261 - echo "Clearing docs/test-deps.py" 262 - test -f docs/test-deps.py 263 - echo > docs/test-deps.py 264 - 265 substituteInPlace data/installed-tests/fwupdmgr-p2p.sh \ 266 --replace "gdbus" ${glib.bin}/bin/gdbus 267 ''; 268 269 preBuild = '' ··· 273 274 preCheck = '' 275 addToSearchPath XDG_DATA_DIRS "${shared-mime-info}/share" 276 ''; 277 278 preInstall = '' ··· 349 defaultDisabledPlugins = [ 350 "test" 351 "test_ble" 352 - "invalid" 353 ]; 354 355 # For updating.
··· 15 , gusb 16 , sqlite 17 , libarchive 18 + , libredirect 19 , curl 20 , libjcat 21 , elfutils ··· 31 , protobufc 32 , python3 33 , wrapGAppsNoGuiHook 34 + , ensureNewerSourcesForZipFilesHook 35 , json-glib 36 , bash-completion 37 , shared-mime-info ··· 87 88 test-firmware = 89 let 90 + version = "unstable-2022-04-02"; 91 src = fetchFromGitHub { 92 name = "fwupd-test-firmware-${version}"; 93 owner = "fwupd"; 94 repo = "fwupd-test-firmware"; 95 + rev = "39954e434d63e20e85870dd1074818f48a0c08b7"; 96 + hash = "sha256-d4qG3fKyxkfN91AplRYqARFz+aRr+R37BpE450bPxi0="; 97 passthru = { 98 inherit src version; # For update script 99 updateScript = unstableGitUpdater { ··· 116 117 self = stdenv.mkDerivation rec { 118 pname = "fwupd"; 119 + version = "1.8.9"; 120 121 # libfwupd goes to lib 122 # daemon, plug-ins and libfwupdplugin go to out ··· 125 126 src = fetchurl { 127 url = "https://people.freedesktop.org/~hughsient/releases/fwupd-${version}.tar.xz"; 128 + hash = "sha256-cZp5GsS6WYiuuT7EJ3i9ZdM8sHXQwJO1wE5eFoK+Uoo="; 129 }; 130 131 patches = [ ··· 149 ]; 150 151 nativeBuildInputs = [ 152 + # required for firmware zipping 153 + ensureNewerSourcesForZipFilesHook 154 meson 155 ninja 156 gi-docgen ··· 191 libmbim 192 libcbor 193 libqmi 194 + xz # for liblzma 195 ] ++ lib.optionals haveDell [ 196 libsmbios 197 ] ++ lib.optionals haveFlashrom [ ··· 214 "-Dsysconfdir_install=${placeholder "out"}/etc" 215 "-Defi_os_dir=nixos" 216 "-Dplugin_modem_manager=enabled" 217 218 # We do not want to place the daemon into lib (cyclic reference) 219 "--libexecdir=${placeholder "out"}/libexec" 220 ] ++ lib.optionals (!haveDell) [ 221 "-Dplugin_dell=disabled" 222 "-Dplugin_synaptics_mst=disabled" ··· 231 # TODO: wrapGAppsHook wraps efi capsule even though it is not ELF 232 dontWrapGApps = true; 233 234 + doCheck = true; 235 236 # Environment variables 237 ··· 252 postPatch = '' 253 patchShebangs \ 254 contrib/generate-version-script.py \ 255 po/test-deps 256 257 substituteInPlace data/installed-tests/fwupdmgr-p2p.sh \ 258 --replace "gdbus" ${glib.bin}/bin/gdbus 259 + 260 + # tests fail with: Failed to load SMBIOS: neither SMBIOS or DT found 261 + sed -i 's/test(.*)//' plugins/lenovo-thinklmi/meson.build 262 + sed -i 's/test(.*)//' plugins/mtd/meson.build 263 + # fails on amd cpu 264 + sed -i 's/test(.*)//' libfwupdplugin/meson.build 265 + # in nixos test tries to chmod 0777 $out/share/installed-tests/fwupd/tests/redfish.conf 266 + sed -i "s/get_option('tests')/false/" plugins/redfish/meson.build 267 ''; 268 269 preBuild = '' ··· 273 274 preCheck = '' 275 addToSearchPath XDG_DATA_DIRS "${shared-mime-info}/share" 276 + 277 + echo "12345678901234567890123456789012" > machine-id 278 + export NIX_REDIRECTS=/etc/machine-id=$(realpath machine-id) \ 279 + LD_PRELOAD=${libredirect}/lib/libredirect.so 280 ''; 281 282 preInstall = '' ··· 353 defaultDisabledPlugins = [ 354 "test" 355 "test_ble" 356 ]; 357 358 # For updating.
+3 -3
pkgs/os-specific/linux/firmware/fwupd/efi-app-path.patch
··· 1 diff --git a/meson.build b/meson.build 2 - index b91dd037..01d70a61 100644 3 --- a/meson.build 4 +++ b/meson.build 5 - @@ -413,7 +413,7 @@ if build_standalone and efiboot.found() and efivar.found() 6 conf.set('HAVE_EFI_TIME_T', '1') 7 endif 8 9 - efi_app_location = join_paths(libexecdir, 'fwupd', 'efi') 10 - + efi_app_location = join_paths(dependency('fwupd-efi').get_pkgconfig_variable('prefix'), 'libexec', 'fwupd', 'efi') 11 conf.set_quoted('EFI_APP_LOCATION', efi_app_location) 12 13 if host_cpu == 'x86'
··· 1 diff --git a/meson.build b/meson.build 2 + index 7ac8c937a..5a23d0c80 100644 3 --- a/meson.build 4 +++ b/meson.build 5 + @@ -419,7 +419,7 @@ if build_standalone and efiboot.found() and efivar.found() 6 conf.set('HAVE_EFI_TIME_T', '1') 7 endif 8 9 - efi_app_location = join_paths(libexecdir, 'fwupd', 'efi') 10 + + efi_app_location = join_paths(dependency('fwupd-efi').get_variable(pkgconfig: 'prefix'), 'libexec', 'fwupd', 'efi') 11 conf.set_quoted('EFI_APP_LOCATION', efi_app_location) 12 13 if host_cpu == 'x86'
+7 -30
pkgs/os-specific/linux/firmware/fwupd/install-fwupdplugin-to-out.patch
··· 1 - diff --git a/libfwupdplugin/meson.build b/libfwupdplugin/meson.build 2 - index 1afa28e1..3da81d30 100644 3 - --- a/libfwupdplugin/meson.build 4 - +++ b/libfwupdplugin/meson.build 5 - @@ -220,7 +220,8 @@ fwupdplugin = library( 6 - ], 7 - link_args: cc.get_supported_link_arguments([vflag]), 8 - link_depends: fwupdplugin_mapfile, 9 - - install: true 10 - + install: true, 11 - + install_dir: bindir / '..' / 'lib', 12 - ) 13 - 14 - fwupdplugin_pkgg = import('pkgconfig') 15 - @@ -280,7 +281,8 @@ if introspection.allowed() 16 - girtargets, 17 - fwupd_gir[0], 18 - ], 19 - - install: true 20 - + install: true, 21 - + install_dir_typelib: bindir / '..' / 'lib' / 'girepository-1.0', 22 - ) 23 - 24 - # Verify the map file is correct -- note we can't actually use the generated 25 diff --git a/meson.build b/meson.build 26 - index b91dd037..f97b4c26 100644 27 --- a/meson.build 28 +++ b/meson.build 29 - @@ -504,7 +504,7 @@ if build_standalone 30 if host_machine.system() == 'windows' 31 - plugin_dir = 'fwupd-plugins-@0@'.format(libfwupdplugin_lt_current) 32 else 33 - - plugin_dir = join_paths(libdir, 'fwupd-plugins-@0@'.format(libfwupdplugin_lt_current)) 34 - + plugin_dir = join_paths(bindir, '..', 'lib', 'fwupd-plugins-@0@'.format(libfwupdplugin_lt_current)) 35 endif 36 - conf.set_quoted('FWUPD_PLUGINDIR', plugin_dir) 37 endif
··· 1 diff --git a/meson.build b/meson.build 2 + index 9ae278b66..7cddf1a0d 100644 3 --- a/meson.build 4 +++ b/meson.build 5 + @@ -507,7 +507,7 @@ if build_standalone 6 if host_machine.system() == 'windows' 7 + libdir_pkg = 'fwupd-@0@'.format(fwupd_version) 8 else 9 + - libdir_pkg = join_paths(libdir, 'fwupd-@0@'.format(fwupd_version)) 10 + + libdir_pkg = join_paths(prefix, 'lib', 'fwupd-@0@'.format(fwupd_version)) 11 endif 12 + conf.set_quoted('FWUPD_LIBDIR_PKG', libdir_pkg) 13 endif 14 +
+8 -21
pkgs/os-specific/linux/firmware/fwupd/installed-tests-path.patch
··· 1 diff --git a/data/installed-tests/meson.build b/data/installed-tests/meson.build 2 - index b8ec916f..38209b36 100644 3 --- a/data/installed-tests/meson.build 4 +++ b/data/installed-tests/meson.build 5 @@ -83,5 +83,5 @@ configure_file( 6 - output : 'fwupd-tests.conf', 7 - configuration : con2, 8 install: true, 9 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 10 + install_dir: join_paths(get_option('installed_test_prefix'), 'etc', 'fwupd', 'remotes.d'), 11 ) 12 diff --git a/meson.build b/meson.build 13 - index b91dd037..d7e20b18 100644 14 --- a/meson.build 15 +++ b/meson.build 16 - @@ -188,8 +188,8 @@ else 17 datadir = join_paths(prefix, get_option('datadir')) 18 sysconfdir = join_paths(prefix, get_option('sysconfdir')) 19 localstatedir = join_paths(prefix, get_option('localstatedir')) ··· 24 daemon_dir = join_paths(libexecdir, 'fwupd') 25 endif 26 mandir = join_paths(prefix, get_option('mandir')) 27 - @@ -492,6 +492,7 @@ gnome = import('gnome') 28 i18n = import('i18n') 29 30 conf.set_quoted('FWUPD_PREFIX', prefix) ··· 33 conf.set_quoted('FWUPD_LIBDIR', libdir) 34 conf.set_quoted('FWUPD_LIBEXECDIR', libexecdir) 35 diff --git a/meson_options.txt b/meson_options.txt 36 - index d00038db..be1c45b4 100644 37 --- a/meson_options.txt 38 +++ b/meson_options.txt 39 - @@ -56,6 +56,7 @@ option('systemd', type : 'feature', description : 'systemd support', deprecated: 40 option('systemd_unit_user', type : 'string', description : 'User account to use for fwupd-refresh.service (empty for DynamicUser)') 41 option('systemd_root_prefix', type: 'string', value: '', description: 'Directory to base systemd’s installation directories on') 42 option('elogind', type : 'feature', description : 'elogind support', deprecated: {'true': 'enabled', 'false': 'disabled'}) ··· 44 option('tests', type : 'boolean', value : true, description : 'enable tests') 45 option('soup_session_compat', type : 'boolean', value : true, description : 'enable SoupSession runtime compatibility support') 46 option('curl', type : 'feature', description : 'libcurl support', deprecated: {'true': 'enabled', 'false': 'disabled'}) 47 - diff --git a/plugins/redfish/fu-self-test.c b/plugins/redfish/fu-self-test.c 48 - index 4d19e560..91cfaa61 100644 49 - --- a/plugins/redfish/fu-self-test.c 50 - +++ b/plugins/redfish/fu-self-test.c 51 - @@ -27,7 +27,7 @@ fu_test_is_installed_test(void) 52 - const gchar *builddir = g_getenv("G_TEST_BUILDDIR"); 53 - if (builddir == NULL) 54 - return FALSE; 55 - - return g_str_has_prefix(builddir, FWUPD_PREFIX); 56 - + return g_str_has_prefix(builddir, FWUPD_INSTALLED_TEST_PREFIX); 57 - } 58 - 59 - static void
··· 1 diff --git a/data/installed-tests/meson.build b/data/installed-tests/meson.build 2 + index be3d5c6d9..14d45dcaf 100644 3 --- a/data/installed-tests/meson.build 4 +++ b/data/installed-tests/meson.build 5 @@ -83,5 +83,5 @@ configure_file( 6 + output: 'fwupd-tests.conf', 7 + configuration: con2, 8 install: true, 9 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 10 + install_dir: join_paths(get_option('installed_test_prefix'), 'etc', 'fwupd', 'remotes.d'), 11 ) 12 diff --git a/meson.build b/meson.build 13 + index 30011f548..7ac8c937a 100644 14 --- a/meson.build 15 +++ b/meson.build 16 + @@ -186,8 +186,8 @@ else 17 datadir = join_paths(prefix, get_option('datadir')) 18 sysconfdir = join_paths(prefix, get_option('sysconfdir')) 19 localstatedir = join_paths(prefix, get_option('localstatedir')) ··· 24 daemon_dir = join_paths(libexecdir, 'fwupd') 25 endif 26 mandir = join_paths(prefix, get_option('mandir')) 27 + @@ -498,6 +498,7 @@ gnome = import('gnome') 28 i18n = import('i18n') 29 30 conf.set_quoted('FWUPD_PREFIX', prefix) ··· 33 conf.set_quoted('FWUPD_LIBDIR', libdir) 34 conf.set_quoted('FWUPD_LIBEXECDIR', libexecdir) 35 diff --git a/meson_options.txt b/meson_options.txt 36 + index 6fc7e8437..29832fd08 100644 37 --- a/meson_options.txt 38 +++ b/meson_options.txt 39 + @@ -57,6 +57,7 @@ option('systemd', type : 'feature', description : 'systemd support', deprecated: 40 option('systemd_unit_user', type : 'string', description : 'User account to use for fwupd-refresh.service (empty for DynamicUser)') 41 option('systemd_root_prefix', type: 'string', value: '', description: 'Directory to base systemd’s installation directories on') 42 option('elogind', type : 'feature', description : 'elogind support', deprecated: {'true': 'enabled', 'false': 'disabled'}) ··· 44 option('tests', type : 'boolean', value : true, description : 'enable tests') 45 option('soup_session_compat', type : 'boolean', value : true, description : 'enable SoupSession runtime compatibility support') 46 option('curl', type : 'feature', description : 'libcurl support', deprecated: {'true': 'enabled', 'false': 'disabled'})
+2 -2
pkgs/os-specific/linux/sssd/default.nix
··· 13 in 14 stdenv.mkDerivation rec { 15 pname = "sssd"; 16 - version = "2.8.1"; 17 18 src = fetchFromGitHub { 19 owner = "SSSD"; 20 repo = pname; 21 rev = version; 22 - sha256 = "sha256-TbeofUQAQNM/Nxzgl8GP2+Y4iR7bVXm4dQaPkYMSdqc="; 23 }; 24 25 postPatch = ''
··· 13 in 14 stdenv.mkDerivation rec { 15 pname = "sssd"; 16 + version = "2.8.2"; 17 18 src = fetchFromGitHub { 19 owner = "SSSD"; 20 repo = pname; 21 rev = version; 22 + sha256 = "sha256-nEMfwOvWd3FRk+1RS1NPT+LcfWi4lDLCGYqH7KuPw7o="; 23 }; 24 25 postPatch = ''
+2 -2
pkgs/servers/jellyfin/default.nix
··· 14 15 buildDotnetModule rec { 16 pname = "jellyfin"; 17 - version = "10.8.8"; # ensure that jellyfin-web has matching version 18 19 src = fetchFromGitHub { 20 owner = "jellyfin"; 21 repo = "jellyfin"; 22 rev = "v${version}"; 23 - sha256 = "3+JwcHZGENX9PgHdtRmzffi6p2p68Ngs3WOiEwAY8zU="; 24 }; 25 26 patches = [
··· 14 15 buildDotnetModule rec { 16 pname = "jellyfin"; 17 + version = "10.8.9"; # ensure that jellyfin-web has matching version 18 19 src = fetchFromGitHub { 20 owner = "jellyfin"; 21 repo = "jellyfin"; 22 rev = "v${version}"; 23 + sha256 = "kvtC9qtVuewR9W6sq963/tNgZbWSpygpBqcXnHuvX0Q="; 24 }; 25 26 patches = [
+4 -2
pkgs/servers/jellyfin/disable-warnings.patch
··· 1 diff --git a/jellyfin.ruleset b/jellyfin.ruleset 2 - index 5ac5f4923..88621857b 100644 3 --- a/jellyfin.ruleset 4 +++ b/jellyfin.ruleset 5 - @@ -54,6 +54,31 @@ 6 <Rule Id="SA1602" Action="None" /> 7 <!-- disable warning SA1633: The file header is missing or not located at the top of the file --> 8 <Rule Id="SA1633" Action="None" /> ··· 31 + <Rule Id="SA1208" Action="None" /> 32 + <!-- disable warning SA1208: The property's documentation summary text should begin with: 'Gets a value indicating whether' --> 33 + <Rule Id="SA1623" Action="None" /> 34 </Rules> 35 36 <Rules AnalyzerId="Microsoft.CodeAnalysis.NetAnalyzers" RuleNamespace="Microsoft.Design">
··· 1 diff --git a/jellyfin.ruleset b/jellyfin.ruleset 2 + index 1c834de82..bf70fef1e 100644 3 --- a/jellyfin.ruleset 4 +++ b/jellyfin.ruleset 5 + @@ -54,6 +54,33 @@ 6 <Rule Id="SA1602" Action="None" /> 7 <!-- disable warning SA1633: The file header is missing or not located at the top of the file --> 8 <Rule Id="SA1633" Action="None" /> ··· 31 + <Rule Id="SA1208" Action="None" /> 32 + <!-- disable warning SA1208: The property's documentation summary text should begin with: 'Gets a value indicating whether' --> 33 + <Rule Id="SA1623" Action="None" /> 34 + + <!-- disable warning SA1625: Element documentation should not be copied and pasted --> 35 + + <Rule Id="SA1625" Action="None" /> 36 </Rules> 37 38 <Rules AnalyzerId="Microsoft.CodeAnalysis.NetAnalyzers" RuleNamespace="Microsoft.Design">
+2 -2
pkgs/servers/jellyfin/node-deps.nix
··· 11817 args = { 11818 name = "jellyfin-web"; 11819 packageName = "jellyfin-web"; 11820 - version = "10.8.8"; 11821 - src = ../../../../../../../nix/store/bbsfbkaiq91gnf5ffcyh4gl8r9mqlyc4-source; 11822 dependencies = [ 11823 sources."@ampproject/remapping-2.1.2" 11824 (sources."@apideck/better-ajv-errors-0.3.3" // {
··· 11817 args = { 11818 name = "jellyfin-web"; 11819 packageName = "jellyfin-web"; 11820 + version = "10.8.9"; 11821 + src = ../../../../../../../nix/store/yvn7h8hrydjxiw23fhqj5ya6yilj0d57-source; 11822 dependencies = [ 11823 sources."@ampproject/remapping-2.1.2" 11824 (sources."@apideck/better-ajv-errors-0.3.3" // {
+2 -2
pkgs/servers/jellyfin/web.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "jellyfin-web"; 10 - version = "10.8.8"; 11 12 src = fetchFromGitHub { 13 owner = "jellyfin"; 14 repo = "jellyfin-web"; 15 rev = "v${version}"; 16 - sha256 = "pIoMpNxRtIvs6bhFEoSlFU8aHZ2CBbHnZaA/FVAkGOI="; 17 }; 18 19 nativeBuildInputs = [
··· 7 8 stdenv.mkDerivation rec { 9 pname = "jellyfin-web"; 10 + version = "10.8.9"; 11 12 src = fetchFromGitHub { 13 owner = "jellyfin"; 14 repo = "jellyfin-web"; 15 rev = "v${version}"; 16 + sha256 = "hHZ8HVf8fidd5VPs06kB3/BHBHFxoV3fVObBesqfRJo="; 17 }; 18 19 nativeBuildInputs = [
+2 -2
pkgs/servers/mail/mailman/mailman-hyperkitty.nix
··· 6 with python3.pkgs; 7 buildPythonPackage rec { 8 pname = "mailman-hyperkitty"; 9 - version = "1.2.0"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.9"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - sha256 = "sha256-EQBx1KX3z/Wv3QAHOi+s/ihLOjpiupIQBYyE6IPbJto="; 17 }; 18 19 propagatedBuildInputs = [
··· 6 with python3.pkgs; 7 buildPythonPackage rec { 8 pname = "mailman-hyperkitty"; 9 + version = "1.2.1"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.9"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + sha256 = "sha256-+Nad+8bMtYKJbUCpppRXqhB1zdbvvFXTTHlwJLQLzDg="; 17 }; 18 19 propagatedBuildInputs = [
+2 -2
pkgs/servers/web-apps/moodle/default.nix
··· 1 { lib, stdenv, fetchurl, writeText, plugins ? [ ], nixosTests }: 2 3 let 4 - version = "4.0.5"; 5 6 versionParts = lib.take 2 (lib.splitVersion version); 7 # 4.2 -> 402, 3.11 -> 311 ··· 15 16 src = fetchurl { 17 url = "https://download.moodle.org/stable${stableVersion}/${pname}-${version}.tgz"; 18 - sha256 = "sha256-m4LyAg/C/ZV3nBD4gNFNjwI6glg7ZAH2nSGg0mU2DsI="; 19 }; 20 21 phpConfig = writeText "config.php" ''
··· 1 { lib, stdenv, fetchurl, writeText, plugins ? [ ], nixosTests }: 2 3 let 4 + version = "4.1.1"; 5 6 versionParts = lib.take 2 (lib.splitVersion version); 7 # 4.2 -> 402, 3.11 -> 311 ··· 15 16 src = fetchurl { 17 url = "https://download.moodle.org/stable${stableVersion}/${pname}-${version}.tgz"; 18 + sha256 = "sha256-w6N/jFYieL+yJXlDr1/9AATChSqiatx+aJl0XSOSL0s="; 19 }; 20 21 phpConfig = writeText "config.php" ''
+2 -2
pkgs/shells/zsh/pure-prompt/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "pure-prompt"; 7 - version = "1.20.4"; 8 9 src = fetchFromGitHub { 10 owner = "sindresorhus"; 11 repo = "pure"; 12 rev = "v${version}"; 13 - sha256 = "sha256-e1D+9EejlVZxOyErg6eRgawth5gAhv6KpgjhK06ErZc="; 14 }; 15 16 strictDeps = true;
··· 4 5 stdenv.mkDerivation rec { 6 pname = "pure-prompt"; 7 + version = "1.21.0"; 8 9 src = fetchFromGitHub { 10 owner = "sindresorhus"; 11 repo = "pure"; 12 rev = "v${version}"; 13 + sha256 = "sha256-YfasTKCABvMtncrfoWR1Su9QxzCqPED18/BTXaJHttg="; 14 }; 15 16 strictDeps = true;
+3 -3
pkgs/tools/filesystems/httm/default.nix
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "httm"; 9 - version = "0.19.2"; 10 11 src = fetchFromGitHub { 12 owner = "kimono-koans"; 13 repo = pname; 14 rev = version; 15 - sha256 = "sha256-0diHZFD4+glTdGWWJk/5amr0mDsvKV5OibKGQNtitIk="; 16 }; 17 18 - cargoSha256 = "sha256-Rg1wmDLmkDC25meZIe94WZ3Wp8a93VAqRJXjmaE6k18="; 19 20 nativeBuildInputs = [ installShellFiles ]; 21
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "httm"; 9 + version = "0.19.3"; 10 11 src = fetchFromGitHub { 12 owner = "kimono-koans"; 13 repo = pname; 14 rev = version; 15 + sha256 = "sha256-TDA1T36iY3xRFX0mBYazKeyzoDD7RPWRxQfUF7Rv5vA="; 16 }; 17 18 + cargoHash = "sha256-rBZ9cYk5Gzs8hy8fRgO8I0zaBncl8CwQoX5I0qzHBYE="; 19 20 nativeBuildInputs = [ installShellFiles ]; 21
+2 -2
pkgs/tools/filesystems/squashfs-tools-ng/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "squashfs-tools-ng"; 7 - version = "1.1.4"; 8 9 src = fetchurl { 10 url = "https://infraroot.at/pub/squashfs/squashfs-tools-ng-${version}.tar.xz"; 11 - sha256 = "06pnr3ilywqxch942l8xdg7k053xrqjkkziivx9h89bvy5j7hgvg"; 12 }; 13 14 nativeBuildInputs = [ doxygen graphviz pkg-config perl ];
··· 4 5 stdenv.mkDerivation rec { 6 pname = "squashfs-tools-ng"; 7 + version = "1.2.0"; 8 9 src = fetchurl { 10 url = "https://infraroot.at/pub/squashfs/squashfs-tools-ng-${version}.tar.xz"; 11 + sha256 = "sha256-1zYHYJXVhJdWQKeM0VVM4VzL3r3XPXebfR7IAEgyt+c="; 12 }; 13 14 nativeBuildInputs = [ doxygen graphviz pkg-config perl ];
+2 -2
pkgs/tools/games/er-patcher/default.nix
··· 6 7 stdenvNoCC.mkDerivation rec { 8 pname = "er-patcher"; 9 - version = "1.06-2"; 10 11 src = fetchFromGitHub { 12 owner = "gurrgur"; 13 repo = "er-patcher"; 14 rev = "v${version}"; 15 - sha256 = "sha256-rFIuswn55FNVmBoDfIpG2cKxybNDaTwOeIUFFoncGF0="; 16 }; 17 18 buildInputs = [
··· 6 7 stdenvNoCC.mkDerivation rec { 8 pname = "er-patcher"; 9 + version = "1.06-3"; 10 11 src = fetchFromGitHub { 12 owner = "gurrgur"; 13 repo = "er-patcher"; 14 rev = "v${version}"; 15 + sha256 = "sha256-w/5cXxY4ua5Xo1BSz3MYRV+SdvVGFAx53KMIORS1uWE="; 16 }; 17 18 buildInputs = [
+2 -2
pkgs/tools/misc/vttest/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "vttest"; 5 - version = "20221111"; 6 7 src = fetchurl { 8 urls = [ 9 "https://invisible-mirror.net/archives/${pname}/${pname}-${version}.tgz" 10 "ftp://ftp.invisible-island.net/${pname}/${pname}-${version}.tgz" 11 ]; 12 - sha256 = "sha256-asC/ZqWAc3gP3rdGMRT1HYCxzJ6O8djHNjBT/Nwxgac="; 13 }; 14 15 meta = with lib; {
··· 2 3 stdenv.mkDerivation rec { 4 pname = "vttest"; 5 + version = "20221229"; 6 7 src = fetchurl { 8 urls = [ 9 "https://invisible-mirror.net/archives/${pname}/${pname}-${version}.tgz" 10 "ftp://ftp.invisible-island.net/${pname}/${pname}-${version}.tgz" 11 ]; 12 + sha256 = "sha256-a2oQmsrwVpz3Zg0g3NFTuD4yjpuT2uTnO5hbvMaxi/g="; 13 }; 14 15 meta = with lib; {
+3 -3
pkgs/tools/misc/wakatime/default.nix
··· 2 3 buildGoModule rec { 4 pname = "wakatime"; 5 - version = "1.60.1"; 6 7 src = fetchFromGitHub { 8 owner = "wakatime"; 9 repo = "wakatime-cli"; 10 rev = "v${version}"; 11 - sha256 = "sha256-HOSNNeLtqyLahjG8AzhpfOb9Nmtd0XpI+AA03mlUBCQ="; 12 }; 13 14 - vendorSha256 = "sha256-ANRcgeZYtcWGbK8c9KE8joo97d8LKvKA8/A+/rrjOoM="; 15 16 meta = with lib; { 17 inherit (src.meta) homepage;
··· 2 3 buildGoModule rec { 4 pname = "wakatime"; 5 + version = "1.61.0"; 6 7 src = fetchFromGitHub { 8 owner = "wakatime"; 9 repo = "wakatime-cli"; 10 rev = "v${version}"; 11 + sha256 = "sha256-pd6kK1591dLEau9oKdd+A2y8rRerFQ+z2yY+/BsNUAI="; 12 }; 13 14 + vendorHash = "sha256-R+VqIw8fztBH2WTf5vjqtMfASNnOTjA3DEndXYyyMi4="; 15 16 meta = with lib; { 17 inherit (src.meta) homepage;
+3 -3
pkgs/tools/networking/frp/default.nix
··· 2 3 buildGoModule rec { 4 pname = "frp"; 5 - version = "0.45.0"; 6 7 src = fetchFromGitHub { 8 owner = "fatedier"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-ybcc1k0XSX+ZiG7Z1Bwai1RCypZfrHqhi3uJNhJYILo="; 12 }; 13 14 - vendorSha256 = "sha256-ZwBSptOsFcxz+xBpjrsvnLvky8kSN4uFx1fXcdDwAmk="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "frp"; 5 + version = "0.46.1"; 6 7 src = fetchFromGitHub { 8 owner = "fatedier"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-/itziNmIDIuj3sKpB+SEiiwvJqdH5nmTkpFdMSY5L0g="; 12 }; 13 14 + vendorHash = "sha256-dU9rhYgYgP1qTPR3ykUgyg+B1bBVJwizWooyCpdpnm0="; 15 16 doCheck = false; 17
+2 -2
pkgs/tools/networking/i2pd/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "i2pd"; 11 - version = "2.44.0"; 12 13 src = fetchFromGitHub { 14 owner = "PurpleI2P"; 15 repo = pname; 16 rev = version; 17 - sha256 = "sha256-9LnT0613z2I9bA0FhcTgINBnXG17ulz6flA13B1Vijs="; 18 }; 19 20 buildInputs = [ boost zlib openssl ]
··· 8 9 stdenv.mkDerivation rec { 10 pname = "i2pd"; 11 + version = "2.45.1"; 12 13 src = fetchFromGitHub { 14 owner = "PurpleI2P"; 15 repo = pname; 16 rev = version; 17 + sha256 = "sha256-gyHnLoELjL/IQbtgH2W25xw30l+9akH7jgQfjp4y5sg="; 18 }; 19 20 buildInputs = [ boost zlib openssl ]
+2 -2
pkgs/tools/networking/swagger-codegen3/default.nix
··· 1 { lib, stdenv, fetchurl, jre, makeWrapper }: 2 3 stdenv.mkDerivation rec { 4 - version = "3.0.35"; 5 pname = "swagger-codegen"; 6 7 jarfilename = "${pname}-cli-${version}.jar"; ··· 12 13 src = fetchurl { 14 url = "mirror://maven/io/swagger/codegen/v3/${pname}-cli/${version}/${jarfilename}"; 15 - sha256 = "sha256-GTqB2wyDguzxrVgnkGiQGgkDVt+caaoyRvUdpeItPcA="; 16 }; 17 18 dontUnpack = true;
··· 1 { lib, stdenv, fetchurl, jre, makeWrapper }: 2 3 stdenv.mkDerivation rec { 4 + version = "3.0.36"; 5 pname = "swagger-codegen"; 6 7 jarfilename = "${pname}-cli-${version}.jar"; ··· 12 13 src = fetchurl { 14 url = "mirror://maven/io/swagger/codegen/v3/${pname}-cli/${version}/${jarfilename}"; 15 + sha256 = "sha256-nJsjGTtTM9ZjsqZCKKZFrLPZ4jIp1F0Spi6RzeuCzak="; 16 }; 17 18 dontUnpack = true;
+2 -2
pkgs/tools/networking/tcpreplay/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tcpreplay"; 5 - version = "4.4.2"; 6 7 src = fetchurl { 8 url = "https://github.com/appneta/tcpreplay/releases/download/v${version}/tcpreplay-${version}.tar.gz"; 9 - sha256 = "sha256-Wycs2Dtn1iiKI06hX4ns2TtPrdpl7dxE57X8svOVthU="; 10 }; 11 12 buildInputs = [ libpcap ]
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tcpreplay"; 5 + version = "4.4.3"; 6 7 src = fetchurl { 8 url = "https://github.com/appneta/tcpreplay/releases/download/v${version}/tcpreplay-${version}.tar.gz"; 9 + sha256 = "sha256-IWMxaS4QwS1/JXlF53eSjXm9CREX8+T/tbMS6yygv3w="; 10 }; 11 12 buildInputs = [ libpcap ]
+4 -1
pkgs/top-level/all-packages.nix
··· 27446 roapi-http = callPackage ../servers/roapi/http.nix { }; 27447 27448 rose-pine-gtk-theme = callPackage ../data/themes/rose-pine-gtk { }; 27449 27450 route159 = callPackage ../data/fonts/route159 { }; 27451 ··· 37294 37295 colima = callPackage ../applications/virtualization/colima { }; 37296 37297 - lima = callPackage ../applications/virtualization/lima { }; 37298 37299 logtop = callPackage ../tools/misc/logtop { }; 37300
··· 27446 roapi-http = callPackage ../servers/roapi/http.nix { }; 27447 27448 rose-pine-gtk-theme = callPackage ../data/themes/rose-pine-gtk { }; 27449 + rose-pine-icon-theme = callPackage ../data/icons/rose-pine { }; 27450 27451 route159 = callPackage ../data/fonts/route159 { }; 27452 ··· 37295 37296 colima = callPackage ../applications/virtualization/colima { }; 37297 37298 + lima = callPackage ../applications/virtualization/lima { 37299 + inherit (darwin) sigtool; 37300 + }; 37301 37302 logtop = callPackage ../tools/misc/logtop { }; 37303