Merge branch 'master' into staging-next

+706 -286
+1
doc/builders/fetchers.chapter.md
··· 71 72 - `relative`: Similar to using `git-diff`'s `--relative` flag, only keep changes inside the specified directory, making paths relative to it. 73 - `stripLen`: Remove the first `stripLen` components of pathnames in the patch. 74 - `extraPrefix`: Prefix pathnames by this string. 75 - `excludes`: Exclude files matching these patterns (applies after the above arguments). 76 - `includes`: Include only files matching these patterns (applies after the above arguments).
··· 71 72 - `relative`: Similar to using `git-diff`'s `--relative` flag, only keep changes inside the specified directory, making paths relative to it. 73 - `stripLen`: Remove the first `stripLen` components of pathnames in the patch. 74 + - `decode`: Pipe the downloaded data through this command before processing it as a patch. 75 - `extraPrefix`: Prefix pathnames by this string. 76 - `excludes`: Exclude files matching these patterns (applies after the above arguments). 77 - `includes`: Include only files matching these patterns (applies after the above arguments).
+16
nixos/modules/services/hardware/fwupd.nix
··· 18 fwupd = cfg.daemonSettings; 19 }; 20 }; 21 }; 22 23 originalEtc = ··· 136 default = {}; 137 description = lib.mdDoc '' 138 Configurations for the fwupd daemon. 139 ''; 140 }; 141 };
··· 18 fwupd = cfg.daemonSettings; 19 }; 20 }; 21 + 22 + "fwupd/uefi_capsule.conf" = { 23 + source = format.generate "uefi_capsule.conf" { 24 + uefi_capsule = cfg.uefiCapsuleSettings; 25 + }; 26 + }; 27 }; 28 29 originalEtc = ··· 142 default = {}; 143 description = lib.mdDoc '' 144 Configurations for the fwupd daemon. 145 + ''; 146 + }; 147 + 148 + uefiCapsuleSettings = mkOption { 149 + type = types.submodule { 150 + freeformType = format.type.nestedTypes.elemType; 151 + }; 152 + default = {}; 153 + description = lib.mdDoc '' 154 + UEFI capsule configurations for the fwupd daemon. 155 ''; 156 }; 157 };
+8 -9
nixos/modules/system/boot/loader/systemd-boot/systemd-boot-builder.py
··· 85 return efi_file_path 86 87 88 - def describe_generation(generation_dir: str) -> str: 89 try: 90 - with open("%s/nixos-version" % generation_dir) as f: 91 nixos_version = f.read() 92 except IOError: 93 nixos_version = "Unknown" 94 95 - kernel_dir = os.path.dirname(os.path.realpath("%s/kernel" % generation_dir)) 96 module_dir = glob.glob("%s/lib/modules/*" % kernel_dir)[0] 97 kernel_version = os.path.basename(module_dir) 98 99 - build_time = int(os.path.getctime(generation_dir)) 100 build_date = datetime.datetime.fromtimestamp(build_time).strftime('%F') 101 102 description = "@distroName@ {}, Linux Kernel {}, Built on {}".format( ··· 131 "or renamed a file in `boot.initrd.secrets`", file=sys.stderr) 132 entry_file = "@efiSysMountPoint@/loader/entries/%s" % ( 133 generation_conf_filename(profile, generation, specialisation)) 134 - generation_dir = os.readlink(system_dir(profile, generation, specialisation)) 135 tmp_path = "%s.tmp" % (entry_file) 136 - kernel_params = "init=%s/init " % generation_dir 137 138 - with open("%s/kernel-params" % (generation_dir)) as params_file: 139 kernel_params = kernel_params + params_file.read() 140 with open(tmp_path, 'w') as f: 141 f.write(BOOT_ENTRY.format(title=title, ··· 143 kernel=kernel, 144 initrd=initrd, 145 kernel_params=kernel_params, 146 - description=describe_generation(generation_dir))) 147 if machine_id is not None: 148 f.write("machine-id %s\n" % machine_id) 149 os.rename(tmp_path, entry_file) ··· 296 remove_old_entries(gens) 297 for gen in gens: 298 try: 299 - is_default = os.readlink(system_dir(*gen)) == args.default_config 300 write_entry(*gen, machine_id, current=is_default) 301 for specialisation in get_specialisations(*gen): 302 write_entry(*specialisation, machine_id, current=is_default)
··· 85 return efi_file_path 86 87 88 + def describe_generation(profile: Optional[str], generation: int, specialisation: Optional[str]) -> str: 89 try: 90 + with open(profile_path(profile, generation, specialisation, "nixos-version")) as f: 91 nixos_version = f.read() 92 except IOError: 93 nixos_version = "Unknown" 94 95 + kernel_dir = os.path.dirname(profile_path(profile, generation, specialisation, "kernel")) 96 module_dir = glob.glob("%s/lib/modules/*" % kernel_dir)[0] 97 kernel_version = os.path.basename(module_dir) 98 99 + build_time = int(os.path.getctime(system_dir(profile, generation, specialisation))) 100 build_date = datetime.datetime.fromtimestamp(build_time).strftime('%F') 101 102 description = "@distroName@ {}, Linux Kernel {}, Built on {}".format( ··· 131 "or renamed a file in `boot.initrd.secrets`", file=sys.stderr) 132 entry_file = "@efiSysMountPoint@/loader/entries/%s" % ( 133 generation_conf_filename(profile, generation, specialisation)) 134 tmp_path = "%s.tmp" % (entry_file) 135 + kernel_params = "init=%s " % profile_path(profile, generation, specialisation, "init") 136 137 + with open(profile_path(profile, generation, specialisation, "kernel-params")) as params_file: 138 kernel_params = kernel_params + params_file.read() 139 with open(tmp_path, 'w') as f: 140 f.write(BOOT_ENTRY.format(title=title, ··· 142 kernel=kernel, 143 initrd=initrd, 144 kernel_params=kernel_params, 145 + description=describe_generation(profile, generation, specialisation))) 146 if machine_id is not None: 147 f.write("machine-id %s\n" % machine_id) 148 os.rename(tmp_path, entry_file) ··· 295 remove_old_entries(gens) 296 for gen in gens: 297 try: 298 + is_default = os.path.dirname(profile_path(*gen, "init")) == args.default_config 299 write_entry(*gen, machine_id, current=is_default) 300 for specialisation in get_specialisations(*gen): 301 write_entry(*specialisation, machine_id, current=is_default)
+115 -5
nixos/tests/kea.nix
··· 1 import ./make-test-python.nix ({ pkgs, lib, ...}: { 2 meta.maintainers = with lib.maintainers; [ hexa ]; 3 ··· 8 virtualisation.vlans = [ 1 ]; 9 10 networking = { 11 - useNetworkd = true; 12 useDHCP = false; 13 firewall.allowedUDPPorts = [ 67 ]; 14 }; 15 16 systemd.network = { 17 networks = { 18 "01-eth1" = { 19 name = "eth1"; 20 networkConfig = { 21 - Address = "10.0.0.1/30"; 22 }; 23 }; 24 }; ··· 45 }; 46 47 subnet4 = [ { 48 - subnet = "10.0.0.0/30"; 49 pools = [ { 50 - pool = "10.0.0.2 - 10.0.0.2"; 51 } ]; 52 } ]; 53 }; 54 }; 55 }; 56 57 client = { config, pkgs, ... }: { 58 virtualisation.vlans = [ 1 ]; 59 systemd.services.systemd-networkd.environment.SYSTEMD_LOG_LEVEL = "debug"; ··· 70 router.wait_for_unit("kea-dhcp4-server.service") 71 client.wait_for_unit("systemd-networkd-wait-online.service") 72 client.wait_until_succeeds("ping -c 5 10.0.0.1") 73 - router.wait_until_succeeds("ping -c 5 10.0.0.2") 74 ''; 75 })
··· 1 + # This test verifies DHCPv4 interaction between a client and a router. 2 + # For successful DHCP allocations a dynamic update request is sent 3 + # towards a nameserver to allocate a name in the lan.nixos.test zone. 4 + # We then verify whether client and router can ping each other, and 5 + # that the nameserver can resolve the clients fqdn to the correct IP 6 + # address. 7 + 8 import ./make-test-python.nix ({ pkgs, lib, ...}: { 9 meta.maintainers = with lib.maintainers; [ hexa ]; 10 ··· 15 virtualisation.vlans = [ 1 ]; 16 17 networking = { 18 useDHCP = false; 19 firewall.allowedUDPPorts = [ 67 ]; 20 }; 21 22 systemd.network = { 23 + enable = true; 24 networks = { 25 "01-eth1" = { 26 name = "eth1"; 27 networkConfig = { 28 + Address = "10.0.0.1/29"; 29 }; 30 }; 31 }; ··· 52 }; 53 54 subnet4 = [ { 55 + subnet = "10.0.0.0/29"; 56 pools = [ { 57 + pool = "10.0.0.3 - 10.0.0.3"; 58 } ]; 59 } ]; 60 + 61 + # Enable communication between dhcp4 and a local dhcp-ddns 62 + # instance. 63 + # https://kea.readthedocs.io/en/kea-2.2.0/arm/dhcp4-srv.html#ddns-for-dhcpv4 64 + dhcp-ddns = { 65 + enable-updates = true; 66 + }; 67 + 68 + ddns-send-updates = true; 69 + ddns-qualifying-suffix = "lan.nixos.test."; 70 + }; 71 + }; 72 + 73 + services.kea.dhcp-ddns = { 74 + enable = true; 75 + settings = { 76 + forward-ddns = { 77 + # Configure updates of a forward zone named `lan.nixos.test` 78 + # hosted at the nameserver at 10.0.0.2 79 + # https://kea.readthedocs.io/en/kea-2.2.0/arm/ddns.html#adding-forward-dns-servers 80 + ddns-domains = [ { 81 + name = "lan.nixos.test."; 82 + # Use a TSIG key in production! 83 + key-name = ""; 84 + dns-servers = [ { 85 + ip-address = "10.0.0.2"; 86 + port = 53; 87 + } ]; 88 + } ]; 89 + }; 90 }; 91 }; 92 }; 93 94 + nameserver = { config, pkgs, ... }: { 95 + virtualisation.vlans = [ 1 ]; 96 + 97 + networking = { 98 + useDHCP = false; 99 + firewall.allowedUDPPorts = [ 53 ]; 100 + }; 101 + 102 + systemd.network = { 103 + enable = true; 104 + networks = { 105 + "01-eth1" = { 106 + name = "eth1"; 107 + networkConfig = { 108 + Address = "10.0.0.2/29"; 109 + }; 110 + }; 111 + }; 112 + }; 113 + 114 + services.resolved.enable = false; 115 + 116 + # Set up an authoritative nameserver, serving the `lan.nixos.test` 117 + # zone and configure an ACL that allows dynamic updates from 118 + # the router's ip address. 119 + # This ACL is likely insufficient for production usage. Please 120 + # use TSIG keys. 121 + services.knot = let 122 + zone = pkgs.writeTextDir "lan.nixos.test.zone" '' 123 + @ SOA ns.nixos.test nox.nixos.test 0 86400 7200 3600000 172800 124 + @ NS nameserver 125 + nameserver A 10.0.0.3 126 + router A 10.0.0.1 127 + ''; 128 + zonesDir = pkgs.buildEnv { 129 + name = "knot-zones"; 130 + paths = [ zone ]; 131 + }; 132 + in { 133 + enable = true; 134 + extraArgs = [ 135 + "-v" 136 + ]; 137 + extraConfig = '' 138 + server: 139 + listen: 0.0.0.0@53 140 + 141 + log: 142 + - target: syslog 143 + any: debug 144 + 145 + acl: 146 + - id: dhcp_ddns 147 + address: 10.0.0.1 148 + action: update 149 + 150 + template: 151 + - id: default 152 + storage: ${zonesDir} 153 + zonefile-sync: -1 154 + zonefile-load: difference-no-serial 155 + journal-content: all 156 + 157 + zone: 158 + - domain: lan.nixos.test 159 + file: lan.nixos.test.zone 160 + acl: [dhcp_ddns] 161 + ''; 162 + }; 163 + 164 + }; 165 + 166 client = { config, pkgs, ... }: { 167 virtualisation.vlans = [ 1 ]; 168 systemd.services.systemd-networkd.environment.SYSTEMD_LOG_LEVEL = "debug"; ··· 179 router.wait_for_unit("kea-dhcp4-server.service") 180 client.wait_for_unit("systemd-networkd-wait-online.service") 181 client.wait_until_succeeds("ping -c 5 10.0.0.1") 182 + router.wait_until_succeeds("ping -c 5 10.0.0.3") 183 + nameserver.wait_until_succeeds("kdig +short client.lan.nixos.test @10.0.0.2 | grep -q 10.0.0.3") 184 ''; 185 })
+19 -29
nixos/tests/knot.nix
··· 31 # DO NOT USE pkgs.writeText IN PRODUCTION. This put secrets in the nix store! 32 tsigFile = pkgs.writeText "tsig.conf" '' 33 key: 34 - - id: slave_key 35 algorithm: hmac-sha256 36 secret: zOYgOgnzx3TGe5J5I/0kxd7gTcxXhLYMEq3Ek3fY37s= 37 ''; ··· 43 44 45 nodes = { 46 - master = { lib, ... }: { 47 imports = [ common ]; 48 49 # trigger sched_setaffinity syscall ··· 64 server: 65 listen: 0.0.0.0@53 66 listen: ::@53 67 - 68 - acl: 69 - - id: slave_acl 70 - address: 192.168.0.2 71 - key: slave_key 72 - action: transfer 73 74 remote: 75 - - id: slave 76 address: 192.168.0.2@53 77 78 template: 79 - id: default 80 storage: ${knotZonesEnv} 81 - notify: [slave] 82 - acl: [slave_acl] 83 dnssec-signing: on 84 # Input-only zone files 85 # https://www.knot-dns.cz/docs/2.8/html/operation.html#example-3 ··· 105 ''; 106 }; 107 108 - slave = { lib, ... }: { 109 imports = [ common ]; 110 networking.interfaces.eth1 = { 111 ipv4.addresses = lib.mkForce [ ··· 122 server: 123 listen: 0.0.0.0@53 124 listen: ::@53 125 - 126 - acl: 127 - - id: notify_from_master 128 - address: 192.168.0.1 129 - action: notify 130 131 remote: 132 - - id: master 133 address: 192.168.0.1@53 134 - key: slave_key 135 136 template: 137 - id: default 138 - master: master 139 - acl: [notify_from_master] 140 # zonefileless setup 141 # https://www.knot-dns.cz/docs/2.8/html/operation.html#example-2 142 zonefile-sync: -1 ··· 174 }; 175 176 testScript = { nodes, ... }: let 177 - master4 = (lib.head nodes.master.config.networking.interfaces.eth1.ipv4.addresses).address; 178 - master6 = (lib.head nodes.master.config.networking.interfaces.eth1.ipv6.addresses).address; 179 180 - slave4 = (lib.head nodes.slave.config.networking.interfaces.eth1.ipv4.addresses).address; 181 - slave6 = (lib.head nodes.slave.config.networking.interfaces.eth1.ipv6.addresses).address; 182 in '' 183 import re 184 185 start_all() 186 187 client.wait_for_unit("network.target") 188 - master.wait_for_unit("knot.service") 189 - slave.wait_for_unit("knot.service") 190 191 192 def test(host, query_type, query, pattern): ··· 195 assert re.search(pattern, out), f'Did not match "{pattern}"' 196 197 198 - for host in ("${master4}", "${master6}", "${slave4}", "${slave6}"): 199 with subtest(f"Interrogate {host}"): 200 test(host, "SOA", "example.com", r"start of authority.*noc\.example\.com\.") 201 test(host, "A", "example.com", r"has no [^ ]+ record") ··· 211 test(host, "RRSIG", "www.example.com", r"RR set signature is") 212 test(host, "DNSKEY", "example.com", r"DNSSEC key is") 213 214 - master.log(master.succeed("systemd-analyze security knot.service | grep -v '✓'")) 215 ''; 216 })
··· 31 # DO NOT USE pkgs.writeText IN PRODUCTION. This put secrets in the nix store! 32 tsigFile = pkgs.writeText "tsig.conf" '' 33 key: 34 + - id: xfr_key 35 algorithm: hmac-sha256 36 secret: zOYgOgnzx3TGe5J5I/0kxd7gTcxXhLYMEq3Ek3fY37s= 37 ''; ··· 43 44 45 nodes = { 46 + primary = { lib, ... }: { 47 imports = [ common ]; 48 49 # trigger sched_setaffinity syscall ··· 64 server: 65 listen: 0.0.0.0@53 66 listen: ::@53 67 + automatic-acl: true 68 69 remote: 70 + - id: secondary 71 address: 192.168.0.2@53 72 + key: xfr_key 73 74 template: 75 - id: default 76 storage: ${knotZonesEnv} 77 + notify: [secondary] 78 dnssec-signing: on 79 # Input-only zone files 80 # https://www.knot-dns.cz/docs/2.8/html/operation.html#example-3 ··· 100 ''; 101 }; 102 103 + secondary = { lib, ... }: { 104 imports = [ common ]; 105 networking.interfaces.eth1 = { 106 ipv4.addresses = lib.mkForce [ ··· 117 server: 118 listen: 0.0.0.0@53 119 listen: ::@53 120 + automatic-acl: true 121 122 remote: 123 + - id: primary 124 address: 192.168.0.1@53 125 + key: xfr_key 126 127 template: 128 - id: default 129 + master: primary 130 # zonefileless setup 131 # https://www.knot-dns.cz/docs/2.8/html/operation.html#example-2 132 zonefile-sync: -1 ··· 164 }; 165 166 testScript = { nodes, ... }: let 167 + primary4 = (lib.head nodes.primary.config.networking.interfaces.eth1.ipv4.addresses).address; 168 + primary6 = (lib.head nodes.primary.config.networking.interfaces.eth1.ipv6.addresses).address; 169 170 + secondary4 = (lib.head nodes.secondary.config.networking.interfaces.eth1.ipv4.addresses).address; 171 + secondary6 = (lib.head nodes.secondary.config.networking.interfaces.eth1.ipv6.addresses).address; 172 in '' 173 import re 174 175 start_all() 176 177 client.wait_for_unit("network.target") 178 + primary.wait_for_unit("knot.service") 179 + secondary.wait_for_unit("knot.service") 180 181 182 def test(host, query_type, query, pattern): ··· 185 assert re.search(pattern, out), f'Did not match "{pattern}"' 186 187 188 + for host in ("${primary4}", "${primary6}", "${secondary4}", "${secondary6}"): 189 with subtest(f"Interrogate {host}"): 190 test(host, "SOA", "example.com", r"start of authority.*noc\.example\.com\.") 191 test(host, "A", "example.com", r"has no [^ ]+ record") ··· 201 test(host, "RRSIG", "www.example.com", r"RR set signature is") 202 test(host, "DNSKEY", "example.com", r"DNSSEC key is") 203 204 + primary.log(primary.succeed("systemd-analyze security knot.service | grep -v '✓'")) 205 ''; 206 })
+3 -3
pkgs/applications/audio/go-musicfox/default.nix
··· 10 # gcc only supports objc on darwin 11 buildGoModule.override { stdenv = clangStdenv; } rec { 12 pname = "go-musicfox"; 13 - version = "3.7.2"; 14 15 src = fetchFromGitHub { 16 owner = "anhoder"; 17 repo = pname; 18 rev = "v${version}"; 19 - hash = "sha256-Wc9HFvBSLQA7jT+LJj+tyHzRbszhR2XD1/3C+SdrAGA="; 20 }; 21 22 deleteVendor = true; ··· 45 homepage = "https://github.com/anhoder/go-musicfox"; 46 license = licenses.mit; 47 mainProgram = "musicfox"; 48 - maintainers = with maintainers; [ zendo ]; 49 }; 50 }
··· 10 # gcc only supports objc on darwin 11 buildGoModule.override { stdenv = clangStdenv; } rec { 12 pname = "go-musicfox"; 13 + version = "3.7.3"; 14 15 src = fetchFromGitHub { 16 owner = "anhoder"; 17 repo = pname; 18 rev = "v${version}"; 19 + hash = "sha256-aM7IJGRRY2V2Rovj042ctg5254EUw1bTuoRCp9Za1FY="; 20 }; 21 22 deleteVendor = true; ··· 45 homepage = "https://github.com/anhoder/go-musicfox"; 46 license = licenses.mit; 47 mainProgram = "musicfox"; 48 + maintainers = with maintainers; [ zendo Ruixi-rebirth ]; 49 }; 50 }
+3 -3
pkgs/applications/audio/mixxx/default.nix
··· 52 53 mkDerivation rec { 54 pname = "mixxx"; 55 - version = "2.3.3"; 56 57 src = fetchFromGitHub { 58 owner = "mixxxdj"; 59 repo = "mixxx"; 60 rev = version; 61 - sha256 = "sha256-NRtrEobdJMFgDXrEeb2t1zeVN8pQP7+pda2DSU/yNX8="; 62 }; 63 64 nativeBuildInputs = [ cmake pkg-config ]; ··· 116 117 # mixxx installs udev rules to DATADIR instead of SYSCONFDIR 118 # let's disable this and install udev rules manually via postInstall 119 - # see https://github.com/mixxxdj/mixxx/blob/2.3.3/CMakeLists.txt#L1381-L1392 120 cmakeFlags = [ 121 "-DINSTALL_USER_UDEV_RULES=OFF" 122 ];
··· 52 53 mkDerivation rec { 54 pname = "mixxx"; 55 + version = "2.3.4"; 56 57 src = fetchFromGitHub { 58 owner = "mixxxdj"; 59 repo = "mixxx"; 60 rev = version; 61 + sha256 = "sha256-1hOMU/Mdk1vT0GQipn/WX2fm9ddN0mPIq7kf2i2w3xQ="; 62 }; 63 64 nativeBuildInputs = [ cmake pkg-config ]; ··· 116 117 # mixxx installs udev rules to DATADIR instead of SYSCONFDIR 118 # let's disable this and install udev rules manually via postInstall 119 + # see https://github.com/mixxxdj/mixxx/blob/2.3.4/CMakeLists.txt#L1381-L1392 120 cmakeFlags = [ 121 "-DINSTALL_USER_UDEV_RULES=OFF" 122 ];
+2 -2
pkgs/applications/audio/mympd/default.nix
··· 16 17 stdenv.mkDerivation rec { 18 pname = "mympd"; 19 - version = "10.2.4"; 20 21 src = fetchFromGitHub { 22 owner = "jcorporation"; 23 repo = "myMPD"; 24 rev = "v${version}"; 25 - sha256 = "sha256-12hCIAwrLQkwiU9t9nNPBdIiHfMidfErSWOA0FPfhBQ="; 26 }; 27 28 nativeBuildInputs = [
··· 16 17 stdenv.mkDerivation rec { 18 pname = "mympd"; 19 + version = "10.2.5"; 20 21 src = fetchFromGitHub { 22 owner = "jcorporation"; 23 repo = "myMPD"; 24 rev = "v${version}"; 25 + sha256 = "sha256-ZxGMvbm9GKhhfCNZdeIYUh2FF4c3vXtvRdu24u3Zrtg="; 26 }; 27 28 nativeBuildInputs = [
+4 -5
pkgs/applications/audio/qmmp/default.nix
··· 5 # input plugins 6 , libmad, taglib, libvorbis, libogg, flac, libmpcdec, libmodplug, libsndfile 7 , libcdio, cdparanoia, libcddb, faad2, ffmpeg, wildmidi, libbs2b, game-music-emu 8 # output plugins 9 - , alsa-lib, libpulseaudio, pipewire 10 # effect plugins 11 , libsamplerate 12 }: 13 14 # Additional plugins that can be added: 15 - # wavpack (https://www.wavpack.com/) 16 - # Ogg Opus support 17 - # JACK audio support 18 # ProjectM visualization plugin 19 20 # To make MIDI work we must tell Qmmp what instrument configuration to use (and ··· 45 # input plugins 46 libmad taglib libvorbis libogg flac libmpcdec libmodplug libsndfile 47 libcdio cdparanoia libcddb faad2 ffmpeg wildmidi libbs2b game-music-emu 48 # output plugins 49 - alsa-lib libpulseaudio pipewire 50 # effect plugins 51 libsamplerate 52 ];
··· 5 # input plugins 6 , libmad, taglib, libvorbis, libogg, flac, libmpcdec, libmodplug, libsndfile 7 , libcdio, cdparanoia, libcddb, faad2, ffmpeg, wildmidi, libbs2b, game-music-emu 8 + , libarchive, opusfile, soxr, wavpack 9 # output plugins 10 + , alsa-lib, libpulseaudio, pipewire, libjack2 11 # effect plugins 12 , libsamplerate 13 }: 14 15 # Additional plugins that can be added: 16 # ProjectM visualization plugin 17 18 # To make MIDI work we must tell Qmmp what instrument configuration to use (and ··· 43 # input plugins 44 libmad taglib libvorbis libogg flac libmpcdec libmodplug libsndfile 45 libcdio cdparanoia libcddb faad2 ffmpeg wildmidi libbs2b game-music-emu 46 + libarchive opusfile soxr wavpack 47 # output plugins 48 + alsa-lib libpulseaudio pipewire libjack2 49 # effect plugins 50 libsamplerate 51 ];
+2 -2
pkgs/applications/audio/tageditor/default.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "tageditor"; 20 - version = "3.7.7"; 21 22 src = fetchFromGitHub { 23 owner = "martchus"; 24 repo = pname; 25 rev = "v${version}"; 26 - hash = "sha256-CjbV/Uwpe+x7LBDUDY+NRonUt549MrjGnlJ2olIrKQ4="; 27 }; 28 29 nativeBuildInputs = [
··· 17 18 stdenv.mkDerivation rec { 19 pname = "tageditor"; 20 + version = "3.7.8"; 21 22 src = fetchFromGitHub { 23 owner = "martchus"; 24 repo = pname; 25 rev = "v${version}"; 26 + hash = "sha256-/34KS6nxpIsKEklSRpO+AmGAdpJhapoGe24DCCodU38="; 27 }; 28 29 nativeBuildInputs = [
+2 -2
pkgs/applications/editors/cudatext/default.nix
··· 38 in 39 stdenv.mkDerivation rec { 40 pname = "cudatext"; 41 - version = "1.186.2"; 42 43 src = fetchFromGitHub { 44 owner = "Alexey-T"; 45 repo = "CudaText"; 46 rev = version; 47 - hash = "sha256-qpxYzman93e+u0BHxdhBUyfnZOR4hjQpTuNikGDNQCA="; 48 }; 49 50 postPatch = ''
··· 38 in 39 stdenv.mkDerivation rec { 40 pname = "cudatext"; 41 + version = "1.187.0"; 42 43 src = fetchFromGitHub { 44 owner = "Alexey-T"; 45 repo = "CudaText"; 46 rev = version; 47 + hash = "sha256-Ri/VTJF59GCJdhbMWRAYaQifj7FjVYSACywpq8gHKXg="; 48 }; 49 50 postPatch = ''
+6 -6
pkgs/applications/editors/cudatext/deps.json
··· 11 }, 12 "ATFlatControls": { 13 "owner": "Alexey-T", 14 - "rev": "2023.02.05", 15 - "hash": "sha256-ZOnIhUnFd+7mBEz6YIhUOQkhBbCNeTFD0tfUILuC1x4=" 16 }, 17 "ATSynEdit": { 18 "owner": "Alexey-T", 19 - "rev": "2023.03.02", 20 - "hash": "sha256-rZzcWED8c68wtejUho71kbPtLyDyOlXpS/eg8Ti0r2A=" 21 }, 22 "ATSynEdit_Cmp": { 23 "owner": "Alexey-T", 24 - "rev": "2022.10.18", 25 - "hash": "sha256-yaS1XF0v5rkfKj9aksSc4XimKh5wpL7yLt4ElcIKAIE=" 26 }, 27 "EControl": { 28 "owner": "Alexey-T",
··· 11 }, 12 "ATFlatControls": { 13 "owner": "Alexey-T", 14 + "rev": "2023.03.10", 15 + "hash": "sha256-RHNWJN+P3w67UupeikHn6GrWZCOSoGCrP7BYG7myx+A=" 16 }, 17 "ATSynEdit": { 18 "owner": "Alexey-T", 19 + "rev": "2023.03.10", 20 + "hash": "sha256-NdLg/cQNy5SaC/zPb3bLplUe6FiO7ePi1++WDIvQziI=" 21 }, 22 "ATSynEdit_Cmp": { 23 "owner": "Alexey-T", 24 + "rev": "2023.03.10", 25 + "hash": "sha256-KfzTO0GMFkWRFxbRSdKAh4sr7cx7A2snj/UO1nsvacI=" 26 }, 27 "EControl": { 28 "owner": "Alexey-T",
+2 -12
pkgs/applications/emulators/box64/default.nix
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 - , fetchpatch 5 , gitUpdater 6 , cmake 7 , python3 ··· 16 17 stdenv.mkDerivation rec { 18 pname = "box64"; 19 - version = "0.2.0"; 20 21 src = fetchFromGitHub { 22 owner = "ptitSeb"; 23 repo = pname; 24 rev = "v${version}"; 25 - hash = "sha256-eMp2eSWMRJQvLRQKUirBua6Kt7ZtyebfUnKIlibkNFU="; 26 }; 27 - 28 - patches = [ 29 - # Fix mmx & cppThreads tests on x86_64 30 - # Remove when version > 0.2.0 31 - (fetchpatch { 32 - url = "https://github.com/ptitSeb/box64/commit/3819aecf078fcf47b2bc73713531361406a51895.patch"; 33 - hash = "sha256-11hy5Ol5FSE/kNJmXAIwNLbapldhlZGKtOLIoL6pYrg="; 34 - }) 35 - ]; 36 37 nativeBuildInputs = [ 38 cmake
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 , gitUpdater 5 , cmake 6 , python3 ··· 15 16 stdenv.mkDerivation rec { 17 pname = "box64"; 18 + version = "0.2.2"; 19 20 src = fetchFromGitHub { 21 owner = "ptitSeb"; 22 repo = pname; 23 rev = "v${version}"; 24 + hash = "sha256-aIvL0H0k0/lz2lCLxB17RxNm0cxVozYthy0z85/FuUE="; 25 }; 26 27 nativeBuildInputs = [ 28 cmake
+2 -2
pkgs/applications/misc/dunst/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "dunst"; 11 - version = "1.9.0"; 12 13 src = fetchFromGitHub { 14 owner = "dunst-project"; 15 repo = "dunst"; 16 rev = "v${version}"; 17 - sha256 = "sha256-fRPhu+kpwLPvdzIpXSjXFzQTfv4xewOMv/1ZqLJw3dk="; 18 }; 19 20 nativeBuildInputs = [ perl pkg-config which systemd makeWrapper ];
··· 8 9 stdenv.mkDerivation rec { 10 pname = "dunst"; 11 + version = "1.9.1"; 12 13 src = fetchFromGitHub { 14 owner = "dunst-project"; 15 repo = "dunst"; 16 rev = "v${version}"; 17 + sha256 = "sha256-oCeC/rbI/sydcQ7Rv9feEzw2Gcl7mUde4OOv50dyUSg="; 18 }; 19 20 nativeBuildInputs = [ perl pkg-config which systemd makeWrapper ];
+2 -2
pkgs/applications/misc/gallery-dl/default.nix
··· 2 3 buildPythonApplication rec { 4 pname = "gallery-dl"; 5 - version = "1.24.5"; 6 format = "setuptools"; 7 8 src = fetchPypi { 9 inherit version; 10 pname = "gallery_dl"; 11 - sha256 = "sha256-P71JiGI9PpWMAlgk5TwQa/h3AUEZSEZ6/MahY+IIy9M="; 12 }; 13 14 propagatedBuildInputs = [
··· 2 3 buildPythonApplication rec { 4 pname = "gallery-dl"; 5 + version = "1.25.0"; 6 format = "setuptools"; 7 8 src = fetchPypi { 9 inherit version; 10 pname = "gallery_dl"; 11 + sha256 = "sha256-WxmH6uAMnbmXZWOkLh4B6rR6RV2xfSVBZ7v47AwlwRY="; 12 }; 13 14 propagatedBuildInputs = [
+2 -2
pkgs/applications/misc/pe-bear/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "pe-bear"; 11 - version = "0.6.5"; 12 13 src = fetchFromGitHub { 14 owner = "hasherezade"; 15 repo = "pe-bear"; 16 rev = "v${version}"; 17 - sha256 = "sha256-qFEfrXX2Rpmo4eF1Z/dKBN/NxMovK3mDfQPxYp85eB8="; 18 fetchSubmodules = true; 19 }; 20
··· 8 9 stdenv.mkDerivation rec { 10 pname = "pe-bear"; 11 + version = "0.6.5.2"; 12 13 src = fetchFromGitHub { 14 owner = "hasherezade"; 15 repo = "pe-bear"; 16 rev = "v${version}"; 17 + sha256 = "sha256-00OebZZUUwQ1yruTKEUj+bNEKY/CuzdLEbejnnagPnY="; 18 fetchSubmodules = true; 19 }; 20
+3 -3
pkgs/applications/networking/cluster/karmor/default.nix
··· 2 3 buildGoModule rec { 4 pname = "karmor"; 5 - version = "0.11.7"; 6 7 src = fetchFromGitHub { 8 owner = "kubearmor"; 9 repo = "kubearmor-client"; 10 rev = "v${version}"; 11 - hash = "sha256-sXiv+aCYuN6GJB+6/G4Z1Oe/fB3OO+jhSvCAFUaiD3g="; 12 }; 13 14 - vendorHash = "sha256-9yCT9GspX2Tl6dISF8qvDF/Tm2mfwuDH+DrouFmxpj8="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
··· 2 3 buildGoModule rec { 4 pname = "karmor"; 5 + version = "0.12.4"; 6 7 src = fetchFromGitHub { 8 owner = "kubearmor"; 9 repo = "kubearmor-client"; 10 rev = "v${version}"; 11 + hash = "sha256-mz4RWKq3HNpxNl7i8wE1q2PoICUQrzTUSmyZII3GhS4="; 12 }; 13 14 + vendorHash = "sha256-Nxi6sNR7bDmeTcrg7Zx7UIqLvzNY6HK5qSSdfM2snj0="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
+3 -3
pkgs/applications/networking/cluster/kluctl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "kluctl"; 5 - version = "2.19.2"; 6 7 src = fetchFromGitHub { 8 owner = "kluctl"; 9 repo = "kluctl"; 10 rev = "v${version}"; 11 - hash = "sha256-7+hXjYaCqInhP3O8IS8IwkUTGhnmcIWRR1qqvA6UQoc="; 12 }; 13 14 - vendorHash = "sha256-xBUrY8v4yHtWGaaRXHxQRGdZHzMGoJX2hFLL+0Vb1QY="; 15 16 ldflags = [ "-s" "-w" "-X main.version=v${version}" ]; 17
··· 2 3 buildGoModule rec { 4 pname = "kluctl"; 5 + version = "2.19.3"; 6 7 src = fetchFromGitHub { 8 owner = "kluctl"; 9 repo = "kluctl"; 10 rev = "v${version}"; 11 + hash = "sha256-yp471eWrwnJiCAVwqnZzq1rN1Mt4d42ymVvsUtTyOsc="; 12 }; 13 14 + vendorHash = "sha256-Ws0Qaw2hk8alOF/K5Wd0ZcMGr6Q3JiQIo/kHOXiGvmg="; 15 16 ldflags = [ "-s" "-w" "-X main.version=v${version}" ]; 17
+3 -3
pkgs/applications/networking/cluster/velero/default.nix
··· 2 3 buildGoModule rec { 4 pname = "velero"; 5 - version = "1.10.1"; 6 7 8 src = fetchFromGitHub { 9 owner = "vmware-tanzu"; 10 repo = "velero"; 11 rev = "v${version}"; 12 - sha256 = "sha256-jN45chUeoGJGJWD6Rj6duNE36/QCzPqci8V3h1OHtw4="; 13 }; 14 15 ldflags = [ ··· 20 "-X github.com/vmware-tanzu/velero/pkg/buildinfo.GitSHA=none" 21 ]; 22 23 - vendorHash = "sha256-mvVwf4w/65L+F6aiTNf2jmJtaT1EpWCQJ6r9NHUUUqQ="; 24 25 excludedPackages = [ "issue-template-gen" "release-tools" "v1" "velero-restic-restore-helper" ]; 26
··· 2 3 buildGoModule rec { 4 pname = "velero"; 5 + version = "1.10.2"; 6 7 8 src = fetchFromGitHub { 9 owner = "vmware-tanzu"; 10 repo = "velero"; 11 rev = "v${version}"; 12 + sha256 = "sha256-VrzDCRZR2Sh4yk0451016zTPKzV19MSgXXeg8tXWd8o="; 13 }; 14 15 ldflags = [ ··· 20 "-X github.com/vmware-tanzu/velero/pkg/buildinfo.GitSHA=none" 21 ]; 22 23 + vendorHash = "sha256-zpJ2X4+Yo5BSmlnB2f5Af36jXu8oc5saRfPupstQWC4="; 24 25 excludedPackages = [ "issue-template-gen" "release-tools" "v1" "velero-restic-restore-helper" ]; 26
+2 -2
pkgs/applications/networking/instant-messengers/jami/default.nix
··· 64 in 65 stdenv.mkDerivation rec { 66 pname = "jami"; 67 - version = "20230206.0"; 68 69 src = fetchFromGitLab { 70 domain = "git.jami.net"; 71 owner = "savoirfairelinux"; 72 repo = "jami-client-qt"; 73 rev = "stable/${version}"; 74 - hash = "sha256-MQ28UJUvgJoPk65neUgMrG+SxOcfnUl803urEFQ7468="; 75 fetchSubmodules = true; 76 }; 77
··· 64 in 65 stdenv.mkDerivation rec { 66 pname = "jami"; 67 + version = "20230306.0"; 68 69 src = fetchFromGitLab { 70 domain = "git.jami.net"; 71 owner = "savoirfairelinux"; 72 repo = "jami-client-qt"; 73 rev = "stable/${version}"; 74 + hash = "sha256-OQo5raXl2OIAF/iLMCNT32b4xRZ/jCN0EkgH9rJXbFE="; 75 fetchSubmodules = true; 76 }; 77
+6 -10
pkgs/applications/networking/p2p/fragments/default.nix
··· 13 , ninja 14 , openssl 15 , pkg-config 16 - , python3 17 , rustPlatform 18 , sqlite 19 , transmission ··· 31 }); 32 in stdenv.mkDerivation rec { 33 pname = "fragments"; 34 - version = "2.0.2"; 35 36 src = fetchFromGitLab { 37 domain = "gitlab.gnome.org"; 38 owner = "World"; 39 repo = "Fragments"; 40 rev = version; 41 - sha256 = "sha256-CMa1yka0kOxMhxSuazlJxTk4fzxuuwKYLBpEMwHbBUE="; 42 }; 43 44 - postPatch = '' 45 - patchShebangs build-aux/meson/postinstall.py 46 - ''; 47 - 48 cargoDeps = rustPlatform.fetchCargoTarball { 49 - inherit src; 50 name = "${pname}-${version}"; 51 - hash = "sha256-/rFZcbpITYkpSCEZp9XH253u90RGmuVLEBGIRNBgI/o="; 52 }; 53 54 nativeBuildInputs = [ ··· 58 meson 59 ninja 60 pkg-config 61 - python3 62 wrapGAppsHook4 63 ] ++ (with rustPlatform; [ 64 cargoSetupHook
··· 13 , ninja 14 , openssl 15 , pkg-config 16 , rustPlatform 17 , sqlite 18 , transmission ··· 30 }); 31 in stdenv.mkDerivation rec { 32 pname = "fragments"; 33 + version = "2.1"; 34 35 src = fetchFromGitLab { 36 domain = "gitlab.gnome.org"; 37 owner = "World"; 38 repo = "Fragments"; 39 rev = version; 40 + sha256 = "sha256-/KtUcj41s9WeHzIgGWhYQv6oD/Df7WOnJAPuS6yGLHk="; 41 }; 42 43 + # https://github.com/gtk-rs/gtk4-rs/issues/1201 44 + patches = [ ./gtk4-rs.patch ]; 45 cargoDeps = rustPlatform.fetchCargoTarball { 46 + inherit src patches; 47 name = "${pname}-${version}"; 48 + hash = "sha256-bhQHXx7kZFL+qb+k0gN1NZZ6LYjBUHuNqU528f0QAg0="; 49 }; 50 51 nativeBuildInputs = [ ··· 55 meson 56 ninja 57 pkg-config 58 wrapGAppsHook4 59 ] ++ (with rustPlatform; [ 60 cargoSetupHook
+28
pkgs/applications/networking/p2p/fragments/gtk4-rs.patch
···
··· 1 + diff --git a/Cargo.lock b/Cargo.lock 2 + index c0dfa2a..2decf88 100644 3 + --- a/Cargo.lock 4 + +++ b/Cargo.lock 5 + @@ -1158,9 +1158,9 @@ checksum = "da5bf7748fd4cd0b2490df8debcc911809dbcbee4ece9531b96c29a9c729de5a" 6 + 7 + [[package]] 8 + name = "gtk4" 9 + -version = "0.4.8" 10 + +version = "0.4.9" 11 + source = "registry+https://github.com/rust-lang/crates.io-index" 12 + -checksum = "c64f0c2a3d80e899dc3febddad5bac193ffcf74a0fd7e31037f30dd34d6f7396" 13 + +checksum = "4e8ae5aef2793bc3551b5e5e3fa062a5de54bb1eccf10dfa4effe9e4384fbbbc" 14 + dependencies = [ 15 + "bitflags", 16 + "cairo-rs", 17 + @@ -1181,9 +1181,9 @@ dependencies = [ 18 + 19 + [[package]] 20 + name = "gtk4-macros" 21 + -version = "0.4.8" 22 + +version = "0.4.9" 23 + source = "registry+https://github.com/rust-lang/crates.io-index" 24 + -checksum = "fafbcc920af4eb677d7d164853e7040b9de5a22379c596f570190c675d45f7a7" 25 + +checksum = "d9a4a8077b3a392dd7d637924529e1213d2e0c8e4d531177bc3355e86c257a54" 26 + dependencies = [ 27 + "anyhow", 28 + "proc-macro-crate 1.2.1",
+2 -2
pkgs/applications/science/biology/diamond/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "diamond"; 5 - version = "2.1.4"; 6 7 src = fetchFromGitHub { 8 owner = "bbuchfink"; 9 repo = "diamond"; 10 rev = "v${version}"; 11 - sha256 = "sha256-Og1cxEMJ24cncNDD2dXwy58OZ/nJmGdqrMRr5Y6YmHo="; 12 }; 13 14
··· 2 3 stdenv.mkDerivation rec { 4 pname = "diamond"; 5 + version = "2.1.5"; 6 7 src = fetchFromGitHub { 8 owner = "bbuchfink"; 9 repo = "diamond"; 10 rev = "v${version}"; 11 + sha256 = "sha256-ud11GNuDL1HDNaAzkNB/ebuPJR4wgWYy49zBr93BtSo="; 12 }; 13 14
+3 -3
pkgs/applications/virtualization/nixpacks/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "nixpacks"; 5 - version = "1.4.1"; 6 7 src = fetchFromGitHub { 8 owner = "railwayapp"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-zxgNHzKXekZnk0OsHw30u4L9U2mIT/MryZuAQ2EBEYg="; 12 }; 13 14 - cargoHash = "sha256-tsGyrU/5yp5PJ2d5HUoaw/jhGgYyDt6qBK+DvC79kmY="; 15 16 # skip test due FHS dependency 17 doCheck = false;
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "nixpacks"; 5 + version = "1.5.0"; 6 7 src = fetchFromGitHub { 8 owner = "railwayapp"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-1IJboAy0GYgkysY84+wHHOulA/aiux7pgCtxfr0CFV8="; 12 }; 13 14 + cargoHash = "sha256-kAou5pPOwbOZ9n8+fQJ4+Hh9x7wrY898R5XTuUEvF2o="; 15 16 # skip test due FHS dependency 17 doCheck = false;
+2 -1
pkgs/applications/window-managers/weston/default.nix
··· 6 , pipewire ? null, pango ? null, libunwind ? null, freerdp ? null, vaapi ? null 7 , libva ? null, libwebp ? null, xwayland ? null 8 # beware of null defaults, as the parameters *are* supplied by callPackage by default 9 }: 10 11 stdenv.mkDerivation rec { ··· 32 "-Dremoting=false" # TODO 33 "-Dpipewire=${lib.boolToString (pipewire != null)}" 34 "-Dimage-webp=${lib.boolToString (libwebp != null)}" 35 - "-Ddemo-clients=false" 36 "-Dsimple-clients=" 37 "-Dtest-junit-xml=false" 38 # TODO:
··· 6 , pipewire ? null, pango ? null, libunwind ? null, freerdp ? null, vaapi ? null 7 , libva ? null, libwebp ? null, xwayland ? null 8 # beware of null defaults, as the parameters *are* supplied by callPackage by default 9 + , buildDemo ? false 10 }: 11 12 stdenv.mkDerivation rec { ··· 33 "-Dremoting=false" # TODO 34 "-Dpipewire=${lib.boolToString (pipewire != null)}" 35 "-Dimage-webp=${lib.boolToString (libwebp != null)}" 36 + (lib.mesonBool "demo-clients" buildDemo) 37 "-Dsimple-clients=" 38 "-Dtest-junit-xml=false" 39 # TODO:
+14 -1
pkgs/build-support/fetchpatch/default.nix
··· 8 9 { relative ? null 10 , stripLen ? 0 11 , extraPrefix ? null 12 , excludes ? [] 13 , includes ? [] ··· 35 echo "error: Fetched patch file '$out' is empty!" 1>&2 36 exit 1 37 fi 38 39 "${patchutils}/bin/lsdiff" \ 40 ${lib.optionalString (relative != null) "-p1 -i ${lib.escapeShellArg relative}/'*'"} \ ··· 76 mv "$tmpfile" "$out" 77 '' + postFetch; 78 } // builtins.removeAttrs args [ 79 - "relative" "stripLen" "extraPrefix" "excludes" "includes" "revert" "postFetch" 80 ])
··· 8 9 { relative ? null 10 , stripLen ? 0 11 + , decode ? "cat" # custom command to decode patch e.g. base64 -d 12 , extraPrefix ? null 13 , excludes ? [] 14 , includes ? [] ··· 36 echo "error: Fetched patch file '$out' is empty!" 1>&2 37 exit 1 38 fi 39 + 40 + set +e 41 + ${decode} < "$out" > "$tmpfile" 42 + if [ $? -ne 0 ] || [ ! -s "$tmpfile" ]; then 43 + echo 'Failed to decode patch with command "'${lib.escapeShellArg decode}'"' >&2 44 + echo 'Fetched file was (limited to 128 bytes):' >&2 45 + od -A x -t x1z -v -N 128 "$out" >&2 46 + exit 1 47 + fi 48 + set -e 49 + mv "$tmpfile" "$out" 50 51 "${patchutils}/bin/lsdiff" \ 52 ${lib.optionalString (relative != null) "-p1 -i ${lib.escapeShellArg relative}/'*'"} \ ··· 88 mv "$tmpfile" "$out" 89 '' + postFetch; 90 } // builtins.removeAttrs args [ 91 + "relative" "stripLen" "decode" "extraPrefix" "excludes" "includes" "revert" 92 + "postFetch" 93 ])
+7
pkgs/build-support/fetchpatch/tests.nix
··· 25 revert = true; 26 sha256 = if isFetchpatch2 then "sha256-+UKmEbr2rIAweCav/hR/7d4ZrYV84ht/domTrHtm8sM=" else "sha256-+UKmEbr2rIAweCav/hR/7d4ZrYV84ht/domTrHtm8sM="; 27 }; 28 }
··· 25 revert = true; 26 sha256 = if isFetchpatch2 then "sha256-+UKmEbr2rIAweCav/hR/7d4ZrYV84ht/domTrHtm8sM=" else "sha256-+UKmEbr2rIAweCav/hR/7d4ZrYV84ht/domTrHtm8sM="; 27 }; 28 + 29 + decode = testers.invalidateFetcherByDrvHash fetchpatch { 30 + name = "gcc.patch"; 31 + url = "https://chromium.googlesource.com/aosp/platform/external/libchrome/+/f37ae3b1a873d74182a2ac31d96742ead9c1f523^!?format=TEXT"; 32 + decode = "base64 -d"; 33 + sha256 = if isFetchpatch2 then "sha256-oMvPlmzE51ArI+EvFxONXkqmNee39106/O1ikG0Bdso=" else "sha256-SJHk8XrutqAyoIdORlhCpBCN626P+uzed7mjKz5eQYY="; 34 + }; 35 }
+2 -2
pkgs/data/misc/v2ray-domain-list-community/default.nix
··· 3 let 4 generator = pkgsBuildBuild.buildGoModule rec { 5 pname = "v2ray-domain-list-community"; 6 - version = "20230227064844"; 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "domain-list-community"; 10 rev = version; 11 - hash = "sha256-popSTy1BXKUhWtYePlERVqui+wiltyTaYk7071z08i8="; 12 }; 13 vendorHash = "sha256-wqOpZ5MSWN3L+rVKdA2E/Zbwqb/KHwMKoGlSIPBKgv0="; 14 meta = with lib; {
··· 3 let 4 generator = pkgsBuildBuild.buildGoModule rec { 5 pname = "v2ray-domain-list-community"; 6 + version = "20230311145412"; 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "domain-list-community"; 10 rev = version; 11 + hash = "sha256-dHXfj1f/wnv7W8e1jTclt7qaag5OzP4zCZflN8p0v3M="; 12 }; 13 vendorHash = "sha256-wqOpZ5MSWN3L+rVKdA2E/Zbwqb/KHwMKoGlSIPBKgv0="; 14 meta = with lib; {
+2 -2
pkgs/development/interpreters/luau/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "luau"; 5 - version = "0.563"; 6 7 src = fetchFromGitHub { 8 owner = "Roblox"; 9 repo = "luau"; 10 rev = version; 11 - hash = "sha256-aGduwwguzIg3kFspIa/5nDFAC836J3B10Pg63psuWto="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "luau"; 5 + version = "0.567"; 6 7 src = fetchFromGitHub { 8 owner = "Roblox"; 9 repo = "luau"; 10 rev = version; 11 + hash = "sha256-x1P9/TZUU/XITH1/8NtPXzM46fwk0VxHNphlWqzhoog="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/interpreters/python/default.nix
··· 197 major = "3"; 198 minor = "12"; 199 patch = "0"; 200 - suffix = "a5"; 201 }; 202 - hash = "sha256-1m73o0L+OjVvnO47uXrcHl+0hA9rbP994P991JX4Mjs="; 203 inherit (darwin) configd; 204 inherit passthruFun; 205 };
··· 197 major = "3"; 198 minor = "12"; 199 patch = "0"; 200 + suffix = "a6"; 201 }; 202 + hash = "sha256-KYRAJSxLa04SDgFMFdcp6vird5MA3Mph1CLFN+ToXso="; 203 inherit (darwin) configd; 204 inherit passthruFun; 205 };
+3 -3
pkgs/development/interpreters/ruby/default.nix
··· 3 , zlib, gdbm, ncurses, readline, groff, libyaml, libffi, jemalloc, autoreconfHook, bison 4 , autoconf, libiconv, libobjc, libunwind, Foundation 5 , buildEnv, bundler, bundix 6 - , makeWrapper, buildRubyGem, defaultGemConfig, removeReferencesTo 7 , openssl, openssl_1_1 8 } @ args: 9 ··· 47 , autoreconfHook, bison, autoconf 48 , buildEnv, bundler, bundix 49 , libiconv, libobjc, libunwind, Foundation 50 - , makeWrapper, buildRubyGem, defaultGemConfig 51 , baseRuby ? buildPackages.ruby_3_1.override { 52 useRailsExpress = false; 53 docSupport = false; ··· 272 }; 273 274 inherit (import ../../ruby-modules/with-packages { 275 - inherit lib stdenv makeWrapper buildRubyGem buildEnv; 276 gemConfig = defaultGemConfig; 277 ruby = self; 278 }) withPackages buildGems gems;
··· 3 , zlib, gdbm, ncurses, readline, groff, libyaml, libffi, jemalloc, autoreconfHook, bison 4 , autoconf, libiconv, libobjc, libunwind, Foundation 5 , buildEnv, bundler, bundix 6 + , makeBinaryWrapper, buildRubyGem, defaultGemConfig, removeReferencesTo 7 , openssl, openssl_1_1 8 } @ args: 9 ··· 47 , autoreconfHook, bison, autoconf 48 , buildEnv, bundler, bundix 49 , libiconv, libobjc, libunwind, Foundation 50 + , makeBinaryWrapper, buildRubyGem, defaultGemConfig 51 , baseRuby ? buildPackages.ruby_3_1.override { 52 useRailsExpress = false; 53 docSupport = false; ··· 272 }; 273 274 inherit (import ../../ruby-modules/with-packages { 275 + inherit lib stdenv makeBinaryWrapper buildRubyGem buildEnv; 276 gemConfig = defaultGemConfig; 277 ruby = self; 278 }) withPackages buildGems gems;
+2 -5
pkgs/development/libraries/g2o/default.nix
··· 3 4 mkDerivation rec { 5 pname = "g2o"; 6 - version = "20201223"; 7 8 src = fetchFromGitHub { 9 owner = "RainerKuemmerle"; 10 repo = pname; 11 rev = "${version}_git"; 12 - sha256 = "sha256-Ik6uBz4Z4rc5+mPNdT8vlNZSBom4Tvt8Y6myBC/s0m8="; 13 }; 14 15 # Removes a reference to gcc that is only used in a debug message ··· 19 20 nativeBuildInputs = [ cmake makeWrapper ]; 21 buildInputs = [ eigen suitesparse blas lapack libGLU qtbase libqglviewer ]; 22 - 23 - # Silence noisy warning 24 - CXXFLAGS = "-Wno-deprecated-copy"; 25 26 dontWrapQtApps = true; 27
··· 3 4 mkDerivation rec { 5 pname = "g2o"; 6 + version = "20230223"; 7 8 src = fetchFromGitHub { 9 owner = "RainerKuemmerle"; 10 repo = pname; 11 rev = "${version}_git"; 12 + sha256 = "sha256-J2Z3oRkyiinIfywBQvnq1Q8Z5WuzQXOVTZTwN8oivf0="; 13 }; 14 15 # Removes a reference to gcc that is only used in a debug message ··· 19 20 nativeBuildInputs = [ cmake makeWrapper ]; 21 buildInputs = [ eigen suitesparse blas lapack libGLU qtbase libqglviewer ]; 22 23 dontWrapQtApps = true; 24
+1 -1
pkgs/development/libraries/hipsparse/default.nix
··· 17 # This can also use cuSPARSE as a backend instead of rocSPARSE 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "hipsparse"; 20 - version = "5.4.2"; 21 22 outputs = [ 23 "out"
··· 17 # This can also use cuSPARSE as a backend instead of rocSPARSE 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "hipsparse"; 20 + version = "5.4.3"; 21 22 outputs = [ 23 "out"
+2 -2
pkgs/development/libraries/httplib/default.nix
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "httplib"; 8 - version = "0.12.0"; 9 10 src = fetchFromGitHub { 11 owner = "yhirose"; 12 repo = "cpp-httplib"; 13 rev = "v${version}"; 14 - hash = "sha256-Qr8jaZSj5xPiTF8reur09/R2jrtDk5hxHKeVTccHbZQ="; 15 }; 16 17 # Header-only library.
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "httplib"; 8 + version = "0.12.1"; 9 10 src = fetchFromGitHub { 11 owner = "yhirose"; 12 repo = "cpp-httplib"; 13 rev = "v${version}"; 14 + hash = "sha256-F0MXuScZP2kmyCWv+DVXOB9rRk2T7hMgum7Zbs8X7QI="; 15 }; 16 17 # Header-only library.
+2 -2
pkgs/development/libraries/mlt/qt-5.nix
··· 27 28 mkDerivation rec { 29 pname = "mlt"; 30 - version = "7.12.0"; 31 32 src = fetchFromGitHub { 33 owner = "mltframework"; 34 repo = "mlt"; 35 rev = "v${version}"; 36 - sha256 = "sha256-Y7lbfwA0lkQB3PjYQIQaQ0BeXGcgyCmMnDqqZJ8zUaA="; 37 }; 38 39 buildInputs = [
··· 27 28 mkDerivation rec { 29 pname = "mlt"; 30 + version = "7.14.0"; 31 32 src = fetchFromGitHub { 33 owner = "mltframework"; 34 repo = "mlt"; 35 rev = "v${version}"; 36 + sha256 = "sha256-BmvgDj/zgGJNpTy5A9XPOl+9001Kc0qSFSqQ3gwZPmI="; 37 }; 38 39 buildInputs = [
+2 -2
pkgs/development/libraries/muparserx/default.nix
··· 5 6 stdenv.mkDerivation rec { 7 pname = "muparserx"; 8 - version = "4.0.11"; 9 10 src = fetchFromGitHub { 11 owner = "beltoforion"; 12 repo = "muparserx"; 13 rev = "v${version}"; 14 - sha256 = "sha256-BWzHlz1mQYsvWa53EtO05Rb4rRHJBSRguJTHLtgqpPw="; 15 }; 16 17 nativeBuildInputs = [ cmake ];
··· 5 6 stdenv.mkDerivation rec { 7 pname = "muparserx"; 8 + version = "4.0.12"; 9 10 src = fetchFromGitHub { 11 owner = "beltoforion"; 12 repo = "muparserx"; 13 rev = "v${version}"; 14 + sha256 = "sha256-rekPXmncNdVX6LvPQP1M2Pzs3pyiCCcLPLnPFiyWJ4s="; 15 }; 16 17 nativeBuildInputs = [ cmake ];
+2 -1
pkgs/development/libraries/presage/default.nix
··· 26 27 patches = [ 28 (fetchpatch { 29 - url = "https://git.alpinelinux.org/aports/plain/community/presage/gcc6.patch"; 30 sha256 = "0243nx1ygggmsly7057vndb4pkjxg9rpay5gyqqrq9jjzjzh63dj"; 31 }) 32 ./fixed-cppunit-detection.patch
··· 26 27 patches = [ 28 (fetchpatch { 29 + name = "gcc6.patch"; 30 + url = "https://git.alpinelinux.org/aports/plain/community/presage/gcc6.patch?id=40e2044c9ecb36eacb3a1fd043f09548d210dc01"; 31 sha256 = "0243nx1ygggmsly7057vndb4pkjxg9rpay5gyqqrq9jjzjzh63dj"; 32 }) 33 ./fixed-cppunit-detection.patch
+2 -1
pkgs/development/libraries/rapidjson/default.nix
··· 25 sha256 = "1qm62iad1xfsixv1li7qy475xc7gc04hmi2q21qdk6l69gk7mf82"; 26 }) 27 (fetchpatch { 28 - url = "https://git.alpinelinux.org/aports/plain/community/rapidjson/do-not-include-gtest-src-dir.patch"; 29 hash = "sha256-BjSZEwfCXA/9V+kxQ/2JPWbc26jQn35CfN8+8NW24s4="; 30 }) 31 ];
··· 25 sha256 = "1qm62iad1xfsixv1li7qy475xc7gc04hmi2q21qdk6l69gk7mf82"; 26 }) 27 (fetchpatch { 28 + name = "do-not-include-gtest-src-dir.patch"; 29 + url = "https://git.alpinelinux.org/aports/plain/community/rapidjson/do-not-include-gtest-src-dir.patch?id=9e5eefc7a5fcf5938a8dc8a3be8c75e9e6809909"; 30 hash = "sha256-BjSZEwfCXA/9V+kxQ/2JPWbc26jQn35CfN8+8NW24s4="; 31 }) 32 ];
+2 -2
pkgs/development/libraries/science/math/ipopt/default.nix
··· 12 13 stdenv.mkDerivation rec { 14 pname = "ipopt"; 15 - version = "3.14.10"; 16 17 src = fetchFromGitHub { 18 owner = "coin-or"; 19 repo = "Ipopt"; 20 rev = "releases/${version}"; 21 - sha256 = "sha256-4SHmqalrGeqp1nBx2BQLRnRWEYw5lJk5Yao67GQw3qM="; 22 }; 23 24 CXXDEFS = [ "-DHAVE_RAND" "-DHAVE_CSTRING" "-DHAVE_CSTDIO" ];
··· 12 13 stdenv.mkDerivation rec { 14 pname = "ipopt"; 15 + version = "3.14.11"; 16 17 src = fetchFromGitHub { 18 owner = "coin-or"; 19 repo = "Ipopt"; 20 rev = "releases/${version}"; 21 + sha256 = "sha256-PzNDiTZkPORFckFJryFuvn/rsfx3wrXJ9Qde88gH5o4="; 22 }; 23 24 CXXDEFS = [ "-DHAVE_RAND" "-DHAVE_CSTRING" "-DHAVE_CSTDIO" ];
+2 -2
pkgs/development/libraries/simdjson/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "simdjson"; 5 - version = "3.1.3"; 6 7 src = fetchFromGitHub { 8 owner = "simdjson"; 9 repo = "simdjson"; 10 rev = "v${version}"; 11 - sha256 = "sha256-VDwpCPyjhkXgehcMJs6srD3PFtlC2m4jurJum6wNeVY="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "simdjson"; 5 + version = "3.1.5"; 6 7 src = fetchFromGitHub { 8 owner = "simdjson"; 9 repo = "simdjson"; 10 rev = "v${version}"; 11 + sha256 = "sha256-gBHgPKEeoryjMVL/EonmeY/7imcJej/Yj8ovPk/moTk="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/waffle/default.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "waffle"; 20 - version = "1.7.0"; 21 22 src = fetchFromGitLab { 23 domain = "gitlab.freedesktop.org"; 24 owner = "mesa"; 25 repo = "waffle"; 26 rev = "v${version}"; 27 - sha256 = "iY+dAgXutD/uDFocwd9QXjq502IOsk+3RQMA2S/CMV4="; 28 }; 29 30 buildInputs = [
··· 17 18 stdenv.mkDerivation rec { 19 pname = "waffle"; 20 + version = "1.7.2"; 21 22 src = fetchFromGitLab { 23 domain = "gitlab.freedesktop.org"; 24 owner = "mesa"; 25 repo = "waffle"; 26 rev = "v${version}"; 27 + sha256 = "sha256-dwDNMLgZrILb559yGs4sNA7D+nD60972+JOy0PKfL0w="; 28 }; 29 30 buildInputs = [
+2 -2
pkgs/development/misc/brev-cli/default.nix
··· 5 6 buildGoModule rec { 7 pname = "brev-cli"; 8 - version = "0.6.208"; 9 10 src = fetchFromGitHub { 11 owner = "brevdev"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-fgbHaY0trO7MiYxhdatq81PaOIVQpSIU3cUnrIvGI2M="; 15 }; 16 17 vendorHash = "sha256-IR/tgqh8rS4uN5jSOcopCutbHCKHSU9icUfRhOgu4t8=";
··· 5 6 buildGoModule rec { 7 pname = "brev-cli"; 8 + version = "0.6.211"; 9 10 src = fetchFromGitHub { 11 owner = "brevdev"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-cDG++heWXGJw6ctho/lJfHZ9eTrsmexFzh0i+tIDpMI="; 15 }; 16 17 vendorHash = "sha256-IR/tgqh8rS4uN5jSOcopCutbHCKHSU9icUfRhOgu4t8=";
+2 -2
pkgs/development/python-modules/datasette/default.nix
··· 29 30 buildPythonPackage rec { 31 pname = "datasette"; 32 - version = "0.64.1"; 33 format = "setuptools"; 34 35 disabled = pythonOlder "3.7"; ··· 38 owner = "simonw"; 39 repo = pname; 40 rev = "refs/tags/${version}"; 41 - hash = "sha256-EXYAiXqEfQVDTwc4MFTroLPEaTZ3QYTlUsuNQ72oHpA="; 42 }; 43 44 postPatch = ''
··· 29 30 buildPythonPackage rec { 31 pname = "datasette"; 32 + version = "0.64.2"; 33 format = "setuptools"; 34 35 disabled = pythonOlder "3.7"; ··· 38 owner = "simonw"; 39 repo = pname; 40 rev = "refs/tags/${version}"; 41 + hash = "sha256-AxIJUJzFEAvAV59hYDB3pb5/1rS9d7T0ltl6lVWTCrE="; 42 }; 43 44 postPatch = ''
+2 -2
pkgs/development/python-modules/dkimpy/default.nix
··· 3 4 buildPythonPackage rec { 5 pname = "dkimpy"; 6 - version = "1.1.0"; 7 8 src = fetchPypi { 9 inherit pname version; 10 - hash = "sha256-NQDukEVLfCz3ElgeA5jrRwONJ+aRSDKd9jTs2Y3YYhw="; 11 }; 12 13 nativeCheckInputs = [ pytest ];
··· 3 4 buildPythonPackage rec { 5 pname = "dkimpy"; 6 + version = "1.1.1"; 7 8 src = fetchPypi { 9 inherit pname version; 10 + hash = "sha256-dVl0S1qQGWkZCPCgxlPiBrbL9jbIxtZuGggnz8jsf5E="; 11 }; 12 13 nativeCheckInputs = [ pytest ];
+2 -2
pkgs/development/python-modules/holidays/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "holidays"; 14 - version = "0.20"; 15 format = "setuptools"; 16 17 disabled = pythonOlder "3.7"; ··· 20 owner = "dr-prodigy"; 21 repo = "python-holidays"; 22 rev = "refs/tags/v.${version}"; 23 - hash = "sha256-hz0v4g94RMA1dKOLu4BSYnK5EPNl1hIWEShFJWO0F3A="; 24 }; 25 26 propagatedBuildInputs = [
··· 11 12 buildPythonPackage rec { 13 pname = "holidays"; 14 + version = "0.21"; 15 format = "setuptools"; 16 17 disabled = pythonOlder "3.7"; ··· 20 owner = "dr-prodigy"; 21 repo = "python-holidays"; 22 rev = "refs/tags/v.${version}"; 23 + hash = "sha256-acV/m4orkOEbON7C4ThGvaQtTMpp4c8FNesC7UepJFc="; 24 }; 25 26 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/jenkins-job-builder/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "jenkins-job-builder"; 12 - version = "4.1.0"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - hash = "sha256-5jCltdomD4u5LZrYJFUHB/sLORXYuWoeJOalAci0+XQ="; 17 }; 18 19 postPatch = ''
··· 9 10 buildPythonPackage rec { 11 pname = "jenkins-job-builder"; 12 + version = "4.3.0"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + hash = "sha256-pvka8TLMEclzJ2Iw4iLSiR1ioV3frzQStLu21+kSSHI="; 17 }; 18 19 postPatch = ''
+2 -2
pkgs/development/python-modules/pyrogram/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "pyrogram"; 13 - version = "2.0.100"; 14 15 disabled = pythonOlder "3.7"; 16 ··· 20 owner = "pyrogram"; 21 repo = "pyrogram"; 22 rev = "v${version}"; 23 - hash = "sha256-WlKzBhToSrBl6T8XFlqi3p0ABDufBGdhmK/0Fn7V61A="; 24 }; 25 26 propagatedBuildInputs = [
··· 10 11 buildPythonPackage rec { 12 pname = "pyrogram"; 13 + version = "2.0.101"; 14 15 disabled = pythonOlder "3.7"; 16 ··· 20 owner = "pyrogram"; 21 repo = "pyrogram"; 22 rev = "v${version}"; 23 + hash = "sha256-HFOT8PqK7n42j2H8EJ5c7h9PL28icQwYErPNcxPgoM8="; 24 }; 25 26 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/python-benedict/default.nix
··· 24 25 buildPythonPackage rec { 26 pname = "python-benedict"; 27 - version = "0.28.3"; 28 format = "setuptools"; 29 30 disabled = pythonOlder "3.7"; ··· 33 owner = "fabiocaccamo"; 34 repo = pname; 35 rev = "refs/tags/${version}"; 36 - hash = "sha256-6gzmVOuJfNpNJlea4Am20HI98mgcKkwtU/28l7qg20Y="; 37 }; 38 39 nativeBuildInputs = [
··· 24 25 buildPythonPackage rec { 26 pname = "python-benedict"; 27 + version = "0.29.1"; 28 format = "setuptools"; 29 30 disabled = pythonOlder "3.7"; ··· 33 owner = "fabiocaccamo"; 34 repo = pname; 35 rev = "refs/tags/${version}"; 36 + hash = "sha256-tsTd9EJkwI98ynXu/vz5hX+X55vxOkhIfeawQNn2f6Q="; 37 }; 38 39 nativeBuildInputs = [
+2 -1
pkgs/development/python-modules/python-rapidjson/default.nix
··· 21 }; 22 patches = [ 23 (fetchpatch { 24 - url = "https://git.alpinelinux.org/aports/plain/community/rapidjson/do-not-include-gtest-src-dir.patch"; 25 hash = "sha256-BjSZEwfCXA/9V+kxQ/2JPWbc26jQn35CfN8+8NW24s4="; 26 }) 27 ];
··· 21 }; 22 patches = [ 23 (fetchpatch { 24 + name = "do-not-include-gtest-src-dir.patch"; 25 + url = "https://git.alpinelinux.org/aports/plain/community/rapidjson/do-not-include-gtest-src-dir.patch?id=9e5eefc7a5fcf5938a8dc8a3be8c75e9e6809909"; 26 hash = "sha256-BjSZEwfCXA/9V+kxQ/2JPWbc26jQn35CfN8+8NW24s4="; 27 }) 28 ];
+2 -2
pkgs/development/python-modules/swift/default.nix
··· 24 25 buildPythonPackage rec { 26 pname = "swift"; 27 - version = "2.31.0"; 28 29 src = fetchPypi { 30 inherit pname version; 31 - hash = "sha256-gU6XQKiLv6E1OtSjwDunjhNIMK36//arcSsQRwuRtTY="; 32 }; 33 34 postPatch = ''
··· 24 25 buildPythonPackage rec { 26 pname = "swift"; 27 + version = "2.31.1"; 28 29 src = fetchPypi { 30 inherit pname version; 31 + hash = "sha256-6CRSIv2m2pqZdzRAEJ/6Qo90PZ7LRNg1zQg50Ecq2RQ="; 32 }; 33 34 postPatch = ''
+2 -2
pkgs/development/python-modules/unrardll/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "unrardll"; 5 - version = "0.1.5"; 6 7 src = fetchPypi { 8 inherit pname version; 9 - sha256 = "8bebb480b96cd49d4290d814914f39cff75cf0fa0514c4790bb32b1757227c78"; 10 }; 11 12 buildInputs = [ unrar ];
··· 2 3 buildPythonPackage rec { 4 pname = "unrardll"; 5 + version = "0.1.7"; 6 7 src = fetchPypi { 8 inherit pname version; 9 + sha256 = "sha256-4QZ/4nu03iBO+PNpLyPZPF07QpL3iyksb8fcT3V0n3Y="; 10 }; 11 12 buildInputs = [ unrar ];
+3 -3
pkgs/development/ruby-modules/with-packages/default.nix
··· 1 - { stdenv, lib, buildEnv, buildRubyGem, ruby, gemConfig, makeWrapper }: 2 3 /* 4 Example usage: ··· 43 44 wrappedRuby = stdenv.mkDerivation { 45 name = "wrapped-${ruby.name}"; 46 - nativeBuildInputs = [ makeWrapper ]; 47 buildCommand = '' 48 mkdir -p $out/bin 49 for i in ${ruby}/bin/*; do ··· 54 55 in stdenv.mkDerivation { 56 name = "${ruby.name}-with-packages"; 57 - nativeBuildInputs = [ makeWrapper ]; 58 buildInputs = [ selected ruby ]; 59 60 dontUnpack = true;
··· 1 + { stdenv, lib, buildEnv, buildRubyGem, ruby, gemConfig, makeBinaryWrapper }: 2 3 /* 4 Example usage: ··· 43 44 wrappedRuby = stdenv.mkDerivation { 45 name = "wrapped-${ruby.name}"; 46 + nativeBuildInputs = [ makeBinaryWrapper ]; 47 buildCommand = '' 48 mkdir -p $out/bin 49 for i in ${ruby}/bin/*; do ··· 54 55 in stdenv.mkDerivation { 56 name = "${ruby.name}-with-packages"; 57 + nativeBuildInputs = [ makeBinaryWrapper ]; 58 buildInputs = [ selected ruby ]; 59 60 dontUnpack = true;
+17 -1
pkgs/development/ruby-modules/with-packages/test.nix
··· 15 pkgs.ruby.gems) // 16 (import ./require_exceptions.nix); 17 18 tests = ruby: 19 lib.mapAttrs (name: gem: 20 let ··· 39 in 40 stdenv.mkDerivation { 41 name = "test-all-ruby-gems"; 42 - buildInputs = builtins.foldl' (sum: ruby: sum ++ ( builtins.attrValues (tests ruby) )) [] rubyVersions; 43 buildCommand = '' 44 touch $out 45 '';
··· 15 pkgs.ruby.gems) // 16 (import ./require_exceptions.nix); 17 18 + testWrapper = ruby: stdenv.mkDerivation { 19 + name = "test-wrappedRuby-${ruby.name}"; 20 + buildInputs = [ ((ruby.withPackages (ps: [ ])).wrappedRuby) ]; 21 + buildCommand = '' 22 + cat <<'EOF' > test-ruby 23 + #!/usr/bin/env ruby 24 + puts RUBY_VERSION 25 + EOF 26 + 27 + chmod +x test-ruby 28 + patchShebangs test-ruby 29 + [[ $(./test-ruby) = $(${ruby}/bin/ruby test-ruby) ]] 30 + touch $out 31 + ''; 32 + }; 33 + 34 tests = ruby: 35 lib.mapAttrs (name: gem: 36 let ··· 55 in 56 stdenv.mkDerivation { 57 name = "test-all-ruby-gems"; 58 + buildInputs = builtins.foldl' (sum: ruby: sum ++ [ (testWrapper ruby) ] ++ ( builtins.attrValues (tests ruby) )) [] rubyVersions; 59 buildCommand = '' 60 touch $out 61 '';
+4
pkgs/development/tools/analysis/hotspot/default.nix
··· 62 mkdir -p 3rdparty/{perfparser,PrefixTickLabels}/.git 63 ''; 64 65 meta = with lib; { 66 description = "A GUI for Linux perf"; 67 longDescription = ''
··· 62 mkdir -p 3rdparty/{perfparser,PrefixTickLabels}/.git 63 ''; 64 65 + qtWrapperArgs = [ 66 + "--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ rustc-demangle ]}" 67 + ]; 68 + 69 meta = with lib; { 70 description = "A GUI for Linux perf"; 71 longDescription = ''
+3 -3
pkgs/development/tools/buf/default.nix
··· 10 11 buildGoModule rec { 12 pname = "buf"; 13 - version = "1.15.0"; 14 15 src = fetchFromGitHub { 16 owner = "bufbuild"; 17 repo = pname; 18 rev = "v${version}"; 19 - hash = "sha256-63JWRyB586klWSQskBY/fDRTdXrQa15IygdZfmHpEqM="; 20 }; 21 22 - vendorHash = "sha256-XRv8AnktIPR1emRdRMmDwOh7r3kNByy0REwZbg3NYPc="; 23 24 patches = [ 25 # Skip a test that requires networking to be available to work.
··· 10 11 buildGoModule rec { 12 pname = "buf"; 13 + version = "1.15.1"; 14 15 src = fetchFromGitHub { 16 owner = "bufbuild"; 17 repo = pname; 18 rev = "v${version}"; 19 + hash = "sha256-XiB8ZlbtzU66abM9zJotaMCrbYScqWmDv4ulEeQS6+g="; 20 }; 21 22 + vendorHash = "sha256-bQKpy5xjUItgQ79r8TrMUOjo0Ze9E25glvOv312W1k0="; 23 24 patches = [ 25 # Skip a test that requires networking to be available to work.
+1 -1
pkgs/development/tools/continuous-integration/github-runner/default.nix
··· 21 owner = "actions"; 22 repo = "runner"; 23 rev = "v${version}"; 24 - hash = "sha256-bzCa3OI8/pE8K9U38RN0xWbLkjJPA4mUlsrbH1etpG4="; 25 # Required to obtain HEAD's Git commit hash 26 leaveDotGit = true; 27 };
··· 21 owner = "actions"; 22 repo = "runner"; 23 rev = "v${version}"; 24 + hash = "sha256-gGIYlYM4Rf7Ils2rThsQHWIkLDt5Htg4NDuJhxvl1rU="; 25 # Required to obtain HEAD's Git commit hash 26 leaveDotGit = true; 27 };
+2 -2
pkgs/development/tools/continuous-integration/gitlab-runner/default.nix
··· 1 { lib, buildGoModule, fetchFromGitLab, fetchurl, bash }: 2 3 let 4 - version = "15.9.0"; 5 in 6 buildGoModule rec { 7 inherit version; ··· 23 owner = "gitlab-org"; 24 repo = "gitlab-runner"; 25 rev = "v${version}"; 26 - sha256 = "sha256-wdeH1/1FNG1vwmSmXo7KjhxfQTmQk9lNAxVNoUKlLi4="; 27 }; 28 29 patches = [
··· 1 { lib, buildGoModule, fetchFromGitLab, fetchurl, bash }: 2 3 let 4 + version = "15.9.1"; 5 in 6 buildGoModule rec { 7 inherit version; ··· 23 owner = "gitlab-org"; 24 repo = "gitlab-runner"; 25 rev = "v${version}"; 26 + sha256 = "sha256-J8wcTU2bilhEKwOAVgaJk743b66TLndYOxc1k+S/cBg="; 27 }; 28 29 patches = [
+2 -2
pkgs/development/tools/datree/default.nix
··· 8 9 buildGoModule rec { 10 pname = "datree"; 11 - version = "1.8.36"; 12 13 src = fetchFromGitHub { 14 owner = "datreeio"; 15 repo = "datree"; 16 rev = "refs/tags/${version}"; 17 - hash = "sha256-h3Bfdd5v8lder5N+75P/u9rSxxhvpw5mf/T4bNYWdOY="; 18 }; 19 20 vendorHash = "sha256-mkVguYzjNGgFUdATjGfenCx3h97LS3SEOkYo3CuP9fA=";
··· 8 9 buildGoModule rec { 10 pname = "datree"; 11 + version = "1.8.37"; 12 13 src = fetchFromGitHub { 14 owner = "datreeio"; 15 repo = "datree"; 16 rev = "refs/tags/${version}"; 17 + hash = "sha256-qcdeAVQlZ3dR/cvwOyvOQ7XQE1gflKEY1l9TdywvDBA="; 18 }; 19 20 vendorHash = "sha256-mkVguYzjNGgFUdATjGfenCx3h97LS3SEOkYo3CuP9fA=";
+3 -3
pkgs/development/tools/go-protobuf/default.nix
··· 2 3 buildGoModule rec { 4 pname = "go-protobuf"; 5 - version = "1.5.2"; 6 7 src = fetchFromGitHub { 8 owner = "golang"; 9 repo = "protobuf"; 10 rev = "v${version}"; 11 - sha256 = "sha256-E/6Qh8hWilaGeSojOCz8PzP9qnVqNG2DQLYJUqN3BdY="; 12 }; 13 14 - vendorSha256 = "sha256-CcJjFMslSUiZMM0LLMM3BR53YMxyWk8m7hxjMI9tduE="; 15 16 meta = with lib; { 17 homepage = "https://github.com/golang/protobuf";
··· 2 3 buildGoModule rec { 4 pname = "go-protobuf"; 5 + version = "1.5.3"; 6 7 src = fetchFromGitHub { 8 owner = "golang"; 9 repo = "protobuf"; 10 rev = "v${version}"; 11 + sha256 = "sha256-cRB4oicBfYvhqtzafWWmf82AuvSnB0NhHwpp0pjgwQ0="; 12 }; 13 14 + vendorHash = "sha256-CcJjFMslSUiZMM0LLMM3BR53YMxyWk8m7hxjMI9tduE="; 15 16 meta = with lib; { 17 homepage = "https://github.com/golang/protobuf";
+10 -5
pkgs/development/tools/kafkactl/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub }: 2 3 buildGoModule rec { 4 pname = "kafkactl"; 5 - version = "3.0.3"; 6 7 src = fetchFromGitHub { 8 owner = "deviceinsight"; 9 repo = pname; 10 - rev = "v${version}"; 11 - sha256 = "sha256-rz3cAA5iqhrCZhLc+RKZhudiMlfu3m6wWYNHAnUP/kg="; 12 }; 13 14 vendorHash = "sha256-Y3BPt3PsedrlCoKiKUObf6UQd+MuNiCGLpJUg94XSgA="; 15 doCheck = false; 16 17 meta = with lib; { 18 - inherit (src.meta) homepage; 19 description = "Command Line Tool for managing Apache Kafka"; 20 longDescription = '' 21 A command-line interface for interaction with Apache Kafka.
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 6 buildGoModule rec { 7 pname = "kafkactl"; 8 + version = "3.1.0"; 9 10 src = fetchFromGitHub { 11 owner = "deviceinsight"; 12 repo = pname; 13 + rev = "refs/tags/v${version}"; 14 + hash = "sha256-H6oSkPQx5bk9VBBoeGVg0Ri5LTCv96tR4Vq4guymAbQ="; 15 }; 16 17 vendorHash = "sha256-Y3BPt3PsedrlCoKiKUObf6UQd+MuNiCGLpJUg94XSgA="; 18 + 19 doCheck = false; 20 21 meta = with lib; { 22 + homepage = "https://github.com/deviceinsight/kafkactl"; 23 + changelog = "https://github.com/deviceinsight/kafkactl/blob/v${version}/CHANGELOG.md"; 24 description = "Command Line Tool for managing Apache Kafka"; 25 longDescription = '' 26 A command-line interface for interaction with Apache Kafka.
+2 -2
pkgs/development/tools/misc/circleci-cli/default.nix
··· 2 3 buildGoModule rec { 4 pname = "circleci-cli"; 5 - version = "0.1.23816"; 6 7 src = fetchFromGitHub { 8 owner = "CircleCI-Public"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-Ab22+fEHQry8dRIElFydxQXVWOXLo4Ch8Q26F8qPUDw="; 12 }; 13 14 vendorHash = "sha256-8HAiZ0zEJ+nnCsSUrNv0qQlvROCyNXO49fLWnKi6anE=";
··· 2 3 buildGoModule rec { 4 pname = "circleci-cli"; 5 + version = "0.1.23845"; 6 7 src = fetchFromGitHub { 8 owner = "CircleCI-Public"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-oLjr3aWJ8+X+T7oD1NdDfNDBuufwA180AOT3K8WR/q0="; 12 }; 13 14 vendorHash = "sha256-8HAiZ0zEJ+nnCsSUrNv0qQlvROCyNXO49fLWnKi6anE=";
+2 -2
pkgs/development/tools/misc/seer/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "seer"; 5 - version = "1.14"; 6 7 src = fetchFromGitHub { 8 owner = "epasveer"; 9 repo = "seer"; 10 rev = "v${version}"; 11 - sha256 = "sha256-IxFG+OhRhPRPSyGFJh559Tz2E7aMOtpphm9GbYS0dRA="; 12 }; 13 14 preConfigure = ''
··· 2 3 stdenv.mkDerivation rec { 4 pname = "seer"; 5 + version = "1.15"; 6 7 src = fetchFromGitHub { 8 owner = "epasveer"; 9 repo = "seer"; 10 rev = "v${version}"; 11 + sha256 = "sha256-TktCUO281Cok47qT60DMAO5uUIg1iDH1RKx+fBPezLs="; 12 }; 13 14 preConfigure = ''
+2 -2
pkgs/development/tools/oh-my-posh/default.nix
··· 6 7 buildGoModule rec { 8 pname = "oh-my-posh"; 9 - version = "14.9.2"; 10 11 src = fetchFromGitHub { 12 owner = "jandedobbeleer"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-9ZIMAJVVrJk8ny3TgwXHSxrg713dSbPlgQnY/b0m2Ps="; 16 }; 17 18 vendorHash = "sha256-JZ5UiL2vGsXy/xmz+NcAKYDmp5hq7bx54/OdUyQHUp0=";
··· 6 7 buildGoModule rec { 8 pname = "oh-my-posh"; 9 + version = "14.12.0"; 10 11 src = fetchFromGitHub { 12 owner = "jandedobbeleer"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 + hash = "sha256-brwfM/IPgwLdVwMNur4EBCsubbv/DCVhTMJbAn6mbFg="; 16 }; 17 18 vendorHash = "sha256-JZ5UiL2vGsXy/xmz+NcAKYDmp5hq7bx54/OdUyQHUp0=";
+3 -3
pkgs/development/tools/rust/cargo-zigbuild/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cargo-zigbuild"; 5 - version = "0.16.2"; 6 7 src = fetchFromGitHub { 8 owner = "messense"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-3PzzaZ62My+11yXGrQSWpJvKvbcKXMfy7CLDBnSVDuI="; 12 }; 13 14 - cargoSha256 = "sha256-ZnsrqbB89C4E5yBDN/wgNgpSEh/aS078h2X+ewtMX8E="; 15 16 nativeBuildInputs = [ makeWrapper ]; 17
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cargo-zigbuild"; 5 + version = "0.16.3"; 6 7 src = fetchFromGitHub { 8 owner = "messense"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-IqGKK3g56RB9o6i+sJjlod3KuAAB9O7RerQshKoCOfk="; 12 }; 13 14 + cargoSha256 = "sha256-RPOMc0+FwjhewqiMwVxAwg5g7GphOtXW8xMElDyTPUk="; 15 16 nativeBuildInputs = [ makeWrapper ]; 17
+3 -3
pkgs/development/tools/skaffold/default.nix
··· 2 3 buildGoModule rec { 4 pname = "skaffold"; 5 - version = "2.1.0"; 6 7 src = fetchFromGitHub { 8 owner = "GoogleContainerTools"; 9 repo = "skaffold"; 10 rev = "v${version}"; 11 - sha256 = "sha256-D0KcnxfjPBGHLGs5YLdecuKL07jIhF6w/SIr/I/W1rI="; 12 }; 13 14 - vendorSha256 = "sha256-yy1BVorjLEcZR6PqupBiZx2plwPJ6xlxripbyB6RLek="; 15 16 subPackages = ["cmd/skaffold"]; 17
··· 2 3 buildGoModule rec { 4 pname = "skaffold"; 5 + version = "2.2.0"; 6 7 src = fetchFromGitHub { 8 owner = "GoogleContainerTools"; 9 repo = "skaffold"; 10 rev = "v${version}"; 11 + sha256 = "sha256-4/FnuyesqW+9zA4TArm/7MpTzWURGG7ZjQKh3WFghZQ="; 12 }; 13 14 + vendorHash = "sha256-hy0xi21Lq3MzXnBB8+8FqNZsxp4fLshnaRm4v+GyLUg="; 15 16 subPackages = ["cmd/skaffold"]; 17
+3 -3
pkgs/development/tools/stylua/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "stylua"; 10 - version = "0.16.1"; 11 12 src = fetchFromGitHub { 13 owner = "johnnymorganz"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-PpkJwCVZr21P1WmU2Kid+X9JwKdJs1krY6keQoMqDvc="; 17 }; 18 19 - cargoSha256 = "sha256-oCoE+Fk2zcVlV8H+f/soAWlhXNsLTysmqLXx9yjdnFY="; 20 21 # remove cargo config so it can find the linker on aarch64-unknown-linux-gnu 22 postPatch = ''
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "stylua"; 10 + version = "0.17.0"; 11 12 src = fetchFromGitHub { 13 owner = "johnnymorganz"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-Q+0B7O769blQVHC4++G+FZTKa1llmn6xkS1UDBcFLOA="; 17 }; 18 19 + cargoSha256 = "sha256-lnodLMqiJsxm5rO+FMbvVhzX3z9R4eyPf+ujDCDk8ow="; 20 21 # remove cargo config so it can find the linker on aarch64-unknown-linux-gnu 22 postPatch = ''
+3 -3
pkgs/games/sm64ex/coop.nix
··· 7 8 callPackage ./generic.nix { 9 pname = "sm64ex-coop"; 10 - version = "0.pre+date=2022-08-05"; 11 12 src = fetchFromGitHub { 13 owner = "djoslin0"; 14 repo = "sm64ex-coop"; 15 - rev = "68634493de4cdd9db263e0f4f0b9b6772a60d30a"; 16 - sha256 = "sha256-3Ve93WGyBd8SAA0TBrpIrhj+ernjn1q7qXSi9mp36cQ="; 17 }; 18 19 extraNativeBuildInputs = [
··· 7 8 callPackage ./generic.nix { 9 pname = "sm64ex-coop"; 10 + version = "unstable-2023-02-22"; 11 12 src = fetchFromGitHub { 13 owner = "djoslin0"; 14 repo = "sm64ex-coop"; 15 + rev = "8746a503086793c87860daadfaeaaf0a31b2d6cf"; 16 + sha256 = "sha256-iwJsq0FN9npxveIoMiB7zL5j1V72IExtEpzGj6lwLXQ="; 17 }; 18 19 extraNativeBuildInputs = [
+3 -3
pkgs/games/sm64ex/sm64ex.nix
··· 4 5 callPackage ./generic.nix { 6 pname = "sm64ex"; 7 - version = "0.pre+date=2021-11-30"; 8 9 src = fetchFromGitHub { 10 owner = "sm64pc"; 11 repo = "sm64ex"; 12 - rev = "db9a6345baa5acb41f9d77c480510442cab26025"; 13 - sha256 = "sha256-q7JWDvNeNrDpcKVtIGqB1k7I0FveYwrfqu7ZZK7T8F8="; 14 }; 15 16 extraMeta = {
··· 4 5 callPackage ./generic.nix { 6 pname = "sm64ex"; 7 + version = "unstable-2022-12-19"; 8 9 src = fetchFromGitHub { 10 owner = "sm64pc"; 11 repo = "sm64ex"; 12 + rev = "afc7e8da695bdf1aea5400a0d5c8b188d16a2088"; 13 + sha256 = "sha256-TbA9yGPtP2uGsxN3eFaQwFeNjAjZ5hSk8Qmx1pRQxf8="; 14 }; 15 16 extraMeta = {
+8 -4
pkgs/os-specific/linux/musl/default.nix
··· 4 }: 5 let 6 cdefs_h = fetchurl { 7 - url = "http://git.alpinelinux.org/cgit/aports/plain/main/libc-dev/sys-cdefs.h"; 8 sha256 = "16l3dqnfq0f20rzbkhc38v74nqcsh9n3f343bpczqq8b1rz6vfrh"; 9 }; 10 queue_h = fetchurl { 11 - url = "http://git.alpinelinux.org/cgit/aports/plain/main/libc-dev/sys-queue.h"; 12 sha256 = "12qm82id7zys92a1qh2l1qf2wqgq6jr4qlbjmqyfffz3s3nhfd61"; 13 }; 14 tree_h = fetchurl { 15 - url = "http://git.alpinelinux.org/cgit/aports/plain/main/libc-dev/sys-tree.h"; 16 sha256 = "14igk6k00bnpfw660qhswagyhvr0gfqg4q55dxvaaq7ikfkrir71"; 17 }; 18 19 stack_chk_fail_local_c = fetchurl { 20 - url = "https://git.alpinelinux.org/aports/plain/main/musl/__stack_chk_fail_local.c?h=3.10-stable"; 21 sha256 = "1nhkzzy9pklgjcq2yg89d3l18jif331srd3z3vhy5qwxl1spv6i9"; 22 }; 23
··· 4 }: 5 let 6 cdefs_h = fetchurl { 7 + name = "sys-cdefs.h"; 8 + url = "https://git.alpinelinux.org/aports/plain/main/libc-dev/sys-cdefs.h?id=7ca0ed62d4c0d713d9c7dd5b9a077fba78bce578"; 9 sha256 = "16l3dqnfq0f20rzbkhc38v74nqcsh9n3f343bpczqq8b1rz6vfrh"; 10 }; 11 queue_h = fetchurl { 12 + name = "sys-queue.h"; 13 + url = "http://git.alpinelinux.org/aports/plain/main/libc-dev/sys-queue.h?id=7ca0ed62d4c0d713d9c7dd5b9a077fba78bce578"; 14 sha256 = "12qm82id7zys92a1qh2l1qf2wqgq6jr4qlbjmqyfffz3s3nhfd61"; 15 }; 16 tree_h = fetchurl { 17 + name = "sys-tree.h"; 18 + url = "http://git.alpinelinux.org/aports/plain/main/libc-dev/sys-tree.h?id=7ca0ed62d4c0d713d9c7dd5b9a077fba78bce578"; 19 sha256 = "14igk6k00bnpfw660qhswagyhvr0gfqg4q55dxvaaq7ikfkrir71"; 20 }; 21 22 stack_chk_fail_local_c = fetchurl { 23 + name = "__stack_chk_fail_local.c"; 24 + url = "https://git.alpinelinux.org/aports/plain/main/musl/__stack_chk_fail_local.c?id=9afbe3cbbf4c30ff23c733218c3c03d7e8c6461d"; 25 sha256 = "1nhkzzy9pklgjcq2yg89d3l18jif331srd3z3vhy5qwxl1spv6i9"; 26 }; 27
+1 -1
pkgs/servers/dns/knot-dns/default.nix
··· 59 passthru.tests = { 60 inherit knot-resolver; 61 } // lib.optionalAttrs stdenv.isLinux { 62 - inherit (nixosTests) knot; 63 # Some dependencies are very version-sensitive, so the might get dropped 64 # or embedded after some update, even if the nixPackagers didn't intend to. 65 # For non-linux I don't know a good replacement for `ldd`.
··· 59 passthru.tests = { 60 inherit knot-resolver; 61 } // lib.optionalAttrs stdenv.isLinux { 62 + inherit (nixosTests) knot kea; 63 # Some dependencies are very version-sensitive, so the might get dropped 64 # or embedded after some update, even if the nixPackagers didn't intend to. 65 # For non-linux I don't know a good replacement for `ldd`.
+3 -3
pkgs/servers/matrix-synapse/matrix-appservice-irc/default.nix
··· 9 10 buildNpmPackage rec { 11 pname = "matrix-appservice-irc"; 12 - version = "0.37.0"; 13 14 src = fetchFromGitHub { 15 owner = "matrix-org"; 16 repo = "matrix-appservice-irc"; 17 rev = "refs/tags/${version}"; 18 - hash = "sha256-krF/eUyGHB4M3sQVaBh7+OaHnM/g9XVaBa8gizPkLKE="; 19 }; 20 21 - npmDepsHash = "sha256-VkVpFt3cwnBkN0AGDaE5Bd6xINGL6XugZ4TBsDONWCg="; 22 23 nativeBuildInputs = [ 24 python3
··· 9 10 buildNpmPackage rec { 11 pname = "matrix-appservice-irc"; 12 + version = "0.37.1"; 13 14 src = fetchFromGitHub { 15 owner = "matrix-org"; 16 repo = "matrix-appservice-irc"; 17 rev = "refs/tags/${version}"; 18 + hash = "sha256-d/CA27A0txnVnSCJeS/qeK90gOu1QjQaFBk+gblEdH8="; 19 }; 20 21 + npmDepsHash = "sha256-s/b/G49HlDbYsSmwRYrm4Bcv/81tHLC8Ac1IMEwGFW8="; 22 23 nativeBuildInputs = [ 24 python3
+3 -3
pkgs/servers/monitoring/prometheus/influxdb-exporter.nix
··· 6 7 buildGoModule rec { 8 pname = "influxdb_exporter"; 9 - version = "0.11.2"; 10 rev = "v${version}"; 11 12 src = fetchFromGitHub { 13 inherit rev; 14 owner = "prometheus"; 15 repo = "influxdb_exporter"; 16 - hash = "sha256-UIB6/0rYOrS/B7CFffg0lPaAhSbmk0KSEogjCundXAU="; 17 }; 18 19 - vendorHash = "sha256-ueE1eE0cxr7+APvIEzR26Uprx0CXN1jfNLzGVgDmJQk="; 20 21 ldflags = [ 22 "-s"
··· 6 7 buildGoModule rec { 8 pname = "influxdb_exporter"; 9 + version = "0.11.3"; 10 rev = "v${version}"; 11 12 src = fetchFromGitHub { 13 inherit rev; 14 owner = "prometheus"; 15 repo = "influxdb_exporter"; 16 + hash = "sha256-jb384/i76KxQEgqnebEDkH33iPLAAzKFkA8OtmExrWc="; 17 }; 18 19 + vendorHash = "sha256-pD/oWbFa6pg9miNA2z6RubsBd3+X/DWRoQuaVwjuOmI="; 20 21 ldflags = [ 22 "-s"
+55 -16
pkgs/servers/pufferpanel/default.nix
··· 2 , buildGoModule 3 , fetchFromGitHub 4 , makeWrapper 5 - , pkgs 6 - , stdenv 7 , fetchzip 8 - , jdk 9 - , nodejs 10 , pathDeps ? [ ] 11 }: 12 13 buildGoModule rec { 14 pname = "pufferpanel"; 15 - version = "2.2.0"; 16 17 src = fetchFromGitHub { 18 owner = "pufferpanel"; 19 repo = pname; 20 rev = "v${version}"; 21 - sha256 = "1ifig8ckjlg47wj0lfk4q941dan7llb1i5l76akcpjq726b2j8lh"; 22 }; 23 24 # PufferPanel is split into two parts: the backend daemon and the ··· 28 # we just download the built frontend and package that. 29 frontend = fetchzip { 30 url = "https://github.com/PufferPanel/PufferPanel/releases/download/v${version}/pufferpanel_${version}_linux_arm64.zip"; 31 - sha256 = "0phbf4asr0dns7if84crx05kfgr44yaxrbsbihdywbhh2mb16052"; 32 stripRoot = false; 33 - } + "/www"; 34 35 nativeBuildInputs = [ makeWrapper ]; 36 37 - vendorSha256 = "061l1sy0z3kd7rc2blqh333gy66nbadfxy9hyxgq07dszds4byys"; 38 39 postFixup = '' 40 mkdir -p $out/share/pufferpanel 41 cp -r ${src}/assets/email $out/share/pufferpanel/templates 42 cp -r ${frontend} $out/share/pufferpanel/www 43 44 - # Wrap the binary with the path to the external files. 45 - mv $out/bin/cmd $out/bin/pufferpanel 46 - wrapProgram "$out/bin/pufferpanel" \ 47 - --set PUFFER_PANEL_EMAIL_TEMPLATES $out/share/pufferpanel/templates/emails.json \ 48 - --set GIN_MODE release \ 49 - --set PUFFER_PANEL_WEB_FILES $out/share/pufferpanel/www \ 50 --prefix PATH : ${lib.escapeShellArg (lib.makeBinPath pathDeps)} 51 ''; 52 ··· 55 homepage = "https://www.pufferpanel.com/"; 56 license = with licenses; [ asl20 ]; 57 maintainers = with maintainers; [ ckie ]; 58 - broken = stdenv.isDarwin; # never built on Hydra https://hydra.nixos.org/job/nixpkgs/trunk/pufferpanel.x86_64-darwin 59 }; 60 }
··· 2 , buildGoModule 3 , fetchFromGitHub 4 , makeWrapper 5 , fetchzip 6 + , fetchpatch 7 , pathDeps ? [ ] 8 }: 9 10 buildGoModule rec { 11 pname = "pufferpanel"; 12 + version = "2.6.6"; 13 + 14 + patches = [ 15 + # Bump go-sqlite3 version to avoid a GNU C compiler error. 16 + # See https://github.com/PufferPanel/PufferPanel/pull/1240 17 + (fetchpatch { 18 + url = "https://github.com/PufferPanel/PufferPanel/pull/1240/commits/3065dca2d9b05a56789971ccf0f43a7079a390b8.patch"; 19 + hash = "sha256-ygMrhJoba8swoRBBii7BEiLihqOebLUtSH7os7W3s+k="; 20 + }) 21 + 22 + # Fix errors in tests. 23 + # See https://github.com/PufferPanel/PufferPanel/pull/1241 24 + (fetchpatch { 25 + url = "https://github.com/PufferPanel/PufferPanel/pull/1241/commits/ffd21bce4bff3040c8e3e783e5b4779222e7a3a5.patch"; 26 + hash = "sha256-BzGfcWhzRrCHKkAhWf0uvXiiiutWqthn/ed7bN2hR8U="; 27 + }) 28 + 29 + # Seems to be an anti-feature. Startup is the only place where user/group is 30 + # hardcoded and checked. 31 + # 32 + # There is no technical reason PufferPanel cannot run as a different user, 33 + # especially for simple commands like `pufferpanel version`. 34 + ./disable-group-checks.patch 35 + 36 + # Some tests do not have network requests stubbed :( 37 + ./skip-network-tests.patch 38 + ]; 39 + 40 + ldflags = [ 41 + "-s" 42 + "-w" 43 + "-X=github.com/pufferpanel/pufferpanel/v2.Hash=none" 44 + "-X=github.com/pufferpanel/pufferpanel/v2.Version=${version}-nixpkgs" 45 + ]; 46 47 src = fetchFromGitHub { 48 owner = "pufferpanel"; 49 repo = pname; 50 rev = "v${version}"; 51 + hash = "sha256-0Vyi47Rkpe3oODHfsl/7tCerENpiEa3EWBHhfTO/uu4="; 52 }; 53 54 # PufferPanel is split into two parts: the backend daemon and the ··· 58 # we just download the built frontend and package that. 59 frontend = fetchzip { 60 url = "https://github.com/PufferPanel/PufferPanel/releases/download/v${version}/pufferpanel_${version}_linux_arm64.zip"; 61 + hash = "sha256-z7HWhiEBma37OMGEkTGaEbnF++Nat8wAZE2UeOoaO/U="; 62 stripRoot = false; 63 + postFetch = '' 64 + mv $out $TMPDIR/subdir 65 + mv $TMPDIR/subdir/www $out 66 + ''; 67 + }; 68 69 nativeBuildInputs = [ makeWrapper ]; 70 71 + vendorHash = "sha256-fB8MxSl9E2W+BdO6i+drbCe9Z3bPHPi0MvpJEomU9co="; 72 + proxyVendor = true; 73 74 postFixup = '' 75 mkdir -p $out/share/pufferpanel 76 cp -r ${src}/assets/email $out/share/pufferpanel/templates 77 cp -r ${frontend} $out/share/pufferpanel/www 78 79 + # Rename cmd to pufferpanel and remove other binaries. 80 + mv $out/bin $TMPDIR/bin 81 + mkdir $out/bin 82 + mv $TMPDIR/bin/cmd $out/bin/pufferpanel 83 + 84 + # Wrap the binary with the path to the external files, but allow setting 85 + # custom paths if needed. 86 + wrapProgram $out/bin/pufferpanel \ 87 + --set-default GIN_MODE release \ 88 + --set-default PUFFER_PANEL_EMAIL_TEMPLATES $out/share/pufferpanel/templates/emails.json \ 89 + --set-default PUFFER_PANEL_WEB_FILES $out/share/pufferpanel/www \ 90 --prefix PATH : ${lib.escapeShellArg (lib.makeBinPath pathDeps)} 91 ''; 92 ··· 95 homepage = "https://www.pufferpanel.com/"; 96 license = with licenses; [ asl20 ]; 97 maintainers = with maintainers; [ ckie ]; 98 }; 99 }
+34
pkgs/servers/pufferpanel/disable-group-checks.patch
···
··· 1 + diff --git a/cmd/main.go b/cmd/main.go 2 + index f9af7038..099ff2e2 100644 3 + --- a/cmd/main.go 4 + +++ b/cmd/main.go 5 + @@ -24,11 +24,6 @@ import ( 6 + ) 7 + 8 + func main() { 9 + - if !pufferpanel.UserInGroup("pufferpanel") { 10 + - fmt.Println("You do not have permission to use this command") 11 + - return 12 + - } 13 + - 14 + defer logging.Close() 15 + 16 + defer func() { 17 + diff --git a/cmd/user.go b/cmd/user.go 18 + index d4a27aaf..9bf21910 100644 19 + --- a/cmd/user.go 20 + +++ b/cmd/user.go 21 + @@ -218,10 +218,9 @@ type userCreate struct { 22 + } 23 + 24 + func editUser(cmd *cobra.Command, args []string) { 25 + - if !pufferpanel.UserInGroup() { 26 + - fmt.Printf("You do not have permission to use this command") 27 + - return 28 + - } 29 + + // Keeping import to avoid merge conflicts with future updates in case 30 + + // PufferPanel starts using this import elsewhere in this file. 31 + + _ = pufferpanel.UserInGroup 32 + 33 + db, err := database.GetConnection() 34 + if err != nil {
+61
pkgs/servers/pufferpanel/skip-network-tests.patch
···
··· 1 + diff --git a/operations/javadl/javadl_test.go b/operations/javadl/javadl_test.go 2 + index 3938a58c..a51e2f4a 100644 3 + --- a/operations/javadl/javadl_test.go 4 + +++ b/operations/javadl/javadl_test.go 5 + @@ -22,6 +22,8 @@ import ( 6 + ) 7 + 8 + func Test_downloadJava(t *testing.T) { 9 + + t.Skip("requires network access") 10 + + 11 + tests := []struct { 12 + name string 13 + wantErr bool 14 + diff --git a/operations/spongedl/spongedl_test.go b/operations/spongedl/spongedl_test.go 15 + index efb1665c..1b93be8c 100644 16 + --- a/operations/spongedl/spongedl_test.go 17 + +++ b/operations/spongedl/spongedl_test.go 18 + @@ -5,6 +5,8 @@ import ( 19 + ) 20 + 21 + func TestSpongeDl_Run(t *testing.T) { 22 + + t.Skip("requires network access") 23 + + 24 + type fields struct { 25 + Recommended bool 26 + SpongeType string 27 + diff --git a/operations/steamgamedl/dl_test.go b/operations/steamgamedl/dl_test.go 28 + index f4df4bf3..f7cd9681 100644 29 + --- a/operations/steamgamedl/dl_test.go 30 + +++ b/operations/steamgamedl/dl_test.go 31 + @@ -19,6 +19,8 @@ import ( 32 + ) 33 + 34 + func Test_downloadSteamcmd(t *testing.T) { 35 + + t.Skip("requires network access") 36 + + 37 + tests := []struct { 38 + name string 39 + wantErr bool 40 + diff --git a/services/templates_test.go b/services/templates_test.go 41 + index 5305dbc0..127efc54 100644 42 + --- a/services/templates_test.go 43 + +++ b/services/templates_test.go 44 + @@ -9,6 +9,8 @@ import ( 45 + ) 46 + 47 + func TestTemplate_GetImportableTemplates(t1 *testing.T) { 48 + + t1.Skip("requires network access") 49 + + 50 + t1.Run("GetImportableTemplates", func(t1 *testing.T) { 51 + t := &Template{} 52 + 53 + @@ -26,6 +28,8 @@ func TestTemplate_GetImportableTemplates(t1 *testing.T) { 54 + } 55 + 56 + func TestTemplate_ImportTemplates(t1 *testing.T) { 57 + + t1.Skip("requires network access") 58 + + 59 + t1.Run("GetImportableTemplates", func(t1 *testing.T) { 60 + db := prepareDatabase(t1) 61 + if t1.Failed() {
+2 -2
pkgs/servers/snappymail/default.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "snappymail"; 10 - version = "2.26.3"; 11 12 src = fetchurl { 13 url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz"; 14 - sha256 = "sha256-kNfFQnUFfIS9x6da0nmm4cHK16ZTScQXOa7lL6QFBDQ="; 15 }; 16 17 sourceRoot = "snappymail";
··· 7 8 stdenv.mkDerivation rec { 9 pname = "snappymail"; 10 + version = "2.26.4"; 11 12 src = fetchurl { 13 url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz"; 14 + sha256 = "sha256-BWjkdzAm9/bvPTjsdg+Vr+gr0fqzEvARmaySth95fsI="; 15 }; 16 17 sourceRoot = "snappymail";
+3 -3
pkgs/servers/spicedb/default.nix
··· 6 7 buildGoModule rec { 8 pname = "spicedb"; 9 - version = "1.16.2"; 10 11 src = fetchFromGitHub { 12 owner = "authzed"; 13 repo = "spicedb"; 14 rev = "v${version}"; 15 - hash = "sha256-OH5O0wOg36sAKWr8sFPYU8RX/S9DbbSnGJvQ1v2pXmQ="; 16 }; 17 18 - vendorHash = "sha256-drnVAWMj7x8HlEQXoichgl35qW07tsk3JvXU/d1ukAc="; 19 20 subPackages = [ "cmd/spicedb" ]; 21
··· 6 7 buildGoModule rec { 8 pname = "spicedb"; 9 + version = "1.17.0"; 10 11 src = fetchFromGitHub { 12 owner = "authzed"; 13 repo = "spicedb"; 14 rev = "v${version}"; 15 + hash = "sha256-oTmEMFoSIW1JQIzhGxAuHW/VSZZk5FnzdLZvjhg90ZQ="; 16 }; 17 18 + vendorHash = "sha256-tIjHgEfq7kKwyQ9iCzI51ne88WrxUATYvJYcHbVX4jQ="; 19 20 subPackages = [ "cmd/spicedb" ]; 21
+3 -3
pkgs/servers/web-apps/vikunja/api.nix
··· 2 3 buildGoModule rec { 4 pname = "vikunja-api"; 5 - version = "0.20.2"; 6 7 src = fetchFromGitea { 8 domain = "kolaente.dev"; 9 owner = "vikunja"; 10 repo = "api"; 11 rev = "v${version}"; 12 - sha256 = "sha256-VSzjP6fC9zxUnY3ZhapRUXUS4V7+BVvXJKrxm71CK4o="; 13 }; 14 15 nativeBuildInputs = ··· 24 ''; 25 in [ fakeGit mage ]; 26 27 - vendorSha256 = "sha256-8qaEMHBZcop1wH3tmNKAAMEYA4qrE6dlwxhRsCDeZaY="; 28 29 # checks need to be disabled because of needed internet for some checks 30 doCheck = false;
··· 2 3 buildGoModule rec { 4 pname = "vikunja-api"; 5 + version = "0.20.3"; 6 7 src = fetchFromGitea { 8 domain = "kolaente.dev"; 9 owner = "vikunja"; 10 repo = "api"; 11 rev = "v${version}"; 12 + hash = "sha256-krmshpv7X8Ua61NUSZGTT1+avoBBNSFuxPa93go3qBY="; 13 }; 14 15 nativeBuildInputs = ··· 24 ''; 25 in [ fakeGit mage ]; 26 27 + vendorSha256 = "sha256-TY6xJnz6phIrybZ2Ix7xwuMzGQ1f0xk0KwgPnaTaKYw="; 28 29 # checks need to be disabled because of needed internet for some checks 30 doCheck = false;
+2 -2
pkgs/servers/web-apps/vikunja/frontend.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "vikunja-frontend"; 5 - version = "0.20.3"; 6 7 src = fetchurl { 8 url = "https://dl.vikunja.io/frontend/${pname}-${version}.zip"; 9 - sha256 = "sha256-+VtdgbJaXcPlO70Gqsur6osBb7iAvVnPv2iaHbs2Rmk="; 10 }; 11 12 nativeBuildInputs = [ unzip ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "vikunja-frontend"; 5 + version = "0.20.4"; 6 7 src = fetchurl { 8 url = "https://dl.vikunja.io/frontend/${pname}-${version}.zip"; 9 + hash = "sha256-gkeX/2f6T8GW6jQa+qFcGc/k5cu9QoO9b3tL6B4lPOQ="; 10 }; 11 12 nativeBuildInputs = [ unzip ];
-20
pkgs/shells/fish/plugins/autopair-fish.nix
··· 1 - { lib, stdenv, buildFishPlugin, fetchFromGitHub }: 2 - 3 - buildFishPlugin rec { 4 - pname = "autopair.fish"; 5 - version = "1.0.4"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "jorgebucaran"; 9 - repo = pname; 10 - rev = version; 11 - sha256 = "sha256-s1o188TlwpUQEN3X5MxUlD/2CFCpEkWu83U9O+wg3VU="; 12 - }; 13 - 14 - meta = with lib; { 15 - description = "Auto-complete matching pairs in the Fish command line."; 16 - homepage = "https://github.com/jorgebucaran/autopair.fish"; 17 - license = licenses.mit; 18 - maintainers = with maintainers; [ thehedgeh0g ]; 19 - }; 20 - }
···
+3 -3
pkgs/shells/fish/plugins/autopair.nix
··· 2 3 buildFishPlugin rec { 4 pname = "autopair"; 5 - version = "1.0.3"; 6 7 src = fetchFromGitHub { 8 owner = "jorgebucaran"; 9 repo = "autopair.fish"; 10 rev = version; 11 - sha256 = "sha256-l6WJ2kjDO/TnU9FSigjxk5xFp90xl68gDfggkE/wrlM="; 12 }; 13 14 meta = with lib; { 15 description = "Auto-complete matching pairs in the Fish command line"; 16 homepage = "https://github.com/jorgebucaran/autopair.fish"; 17 license = licenses.mit; 18 - maintainers = with maintainers; [ kidonng ]; 19 }; 20 }
··· 2 3 buildFishPlugin rec { 4 pname = "autopair"; 5 + version = "1.0.4"; 6 7 src = fetchFromGitHub { 8 owner = "jorgebucaran"; 9 repo = "autopair.fish"; 10 rev = version; 11 + sha256 = "sha256-s1o188TlwpUQEN3X5MxUlD/2CFCpEkWu83U9O+wg3VU="; 12 }; 13 14 meta = with lib; { 15 description = "Auto-complete matching pairs in the Fish command line"; 16 homepage = "https://github.com/jorgebucaran/autopair.fish"; 17 license = licenses.mit; 18 + maintainers = with maintainers; [ figsoda kidonng thehedgeh0g ]; 19 }; 20 }
+3 -3
pkgs/shells/fish/plugins/default.nix
··· 1 - { lib, newScope }: 2 3 lib.makeScope newScope (self: with self; { 4 autopair = callPackage ./autopair.nix { }; 5 - 6 - autopair-fish = callPackage ./autopair-fish.nix { }; 7 8 buildFishPlugin = callPackage ./build-fish-plugin.nix { }; 9 ··· 41 sponge = callPackage ./sponge.nix { }; 42 43 tide = callPackage ./tide.nix { }; 44 })
··· 1 + { lib, newScope, config }: 2 3 lib.makeScope newScope (self: with self; { 4 autopair = callPackage ./autopair.nix { }; 5 6 buildFishPlugin = callPackage ./build-fish-plugin.nix { }; 7 ··· 39 sponge = callPackage ./sponge.nix { }; 40 41 tide = callPackage ./tide.nix { }; 42 + } // lib.optionalAttrs config.allowAliases { 43 + autopair-fish = self.autopair; # Added 2023-03-10 44 })
+20
pkgs/test/texlive/default.nix
··· 1 { lib, runCommand, fetchurl, file, texlive, writeShellScript }: 2 3 { 4 chktex = runCommand "texlive-test-chktex" { 5 nativeBuildInputs = [ 6 (with texlive; combine { inherit scheme-infraonly chktex; })
··· 1 { lib, runCommand, fetchurl, file, texlive, writeShellScript }: 2 3 { 4 + 5 + luaotfload-fonts = runCommand "texlive-test-lualatex" { 6 + nativeBuildInputs = [ 7 + (with texlive; combine { inherit scheme-medium libertinus-fonts; }) 8 + ]; 9 + input = builtins.toFile "lualatex-testfile.tex" '' 10 + \documentclass{article} 11 + \usepackage{fontspec} 12 + \setmainfont{Libertinus Serif} 13 + \begin{document} 14 + \LaTeX{} is great 15 + \end{document} 16 + ''; 17 + } 18 + '' 19 + export HOME="$(mktemp -d)" 20 + lualatex -halt-on-error "$input" 21 + echo success > $out 22 + ''; 23 + 24 chktex = runCommand "texlive-test-chktex" { 25 nativeBuildInputs = [ 26 (with texlive; combine { inherit scheme-infraonly chktex; })
+3 -3
pkgs/tools/admin/aws-vault/default.nix
··· 7 }: 8 buildGoModule rec { 9 pname = "aws-vault"; 10 - version = "7.0.0"; 11 12 src = fetchFromGitHub { 13 owner = "99designs"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-i7wL59MvjsLhEIs3Ejc/DB2m6IfrZqLCeSs1ziPCz+0="; 17 }; 18 19 - vendorHash = "sha256-kcaQw2ooJupMsK9rYlYZOIAW5H4Oa346K9VGjdnaq1E="; 20 21 nativeBuildInputs = [ installShellFiles makeWrapper ]; 22
··· 7 }: 8 buildGoModule rec { 9 pname = "aws-vault"; 10 + version = "7.0.2"; 11 12 src = fetchFromGitHub { 13 owner = "99designs"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-uNe2dltwLoUBUH/p4CN6HCOvBsq2yASxxwkSEtkJRbQ="; 17 }; 18 19 + vendorHash = "sha256-CPn4JLIZz23ZNcl3LPJumx20WOXTI13s69MVo/Pof+s="; 20 21 nativeBuildInputs = [ installShellFiles makeWrapper ]; 22
+3 -3
pkgs/tools/admin/pulumi/default.nix
··· 14 15 buildGoModule rec { 16 pname = "pulumi"; 17 - version = "3.56.0"; 18 19 # Used in pulumi-language packages, which inherit this prop 20 sdkVendorHash = "sha256-oXsU4h4CwukJHttYLT7JiW2He8Yq5qAwnxL8+G5FIpc="; ··· 23 owner = pname; 24 repo = pname; 25 rev = "v${version}"; 26 - hash = "sha256-cXNYg5zNfZTTuv+EaSGuaA9mbMPq7vKTKcsxfnM3NbQ="; 27 # Some tests rely on checkout directory name 28 name = "pulumi"; 29 }; 30 31 - vendorHash = "sha256-TWpH3y+7kLknPy+CExhnjfEvaIWWs1d5JCVF3FA1Z7I="; 32 33 sourceRoot = "${src.name}/pkg"; 34
··· 14 15 buildGoModule rec { 16 pname = "pulumi"; 17 + version = "3.57.1"; 18 19 # Used in pulumi-language packages, which inherit this prop 20 sdkVendorHash = "sha256-oXsU4h4CwukJHttYLT7JiW2He8Yq5qAwnxL8+G5FIpc="; ··· 23 owner = pname; 24 repo = pname; 25 rev = "v${version}"; 26 + hash = "sha256-F5mrk0Qb5Hxjx49KEXEUBN6wB52ztTuV+L37/I0tF48="; 27 # Some tests rely on checkout directory name 28 name = "pulumi"; 29 }; 30 31 + vendorHash = "sha256-G+5UuiIMWQSp5I8EnlWo32jUkg0ini/UhQYA/MTYB0Y="; 32 33 sourceRoot = "${src.name}/pkg"; 34
+3 -3
pkgs/tools/admin/trivy/default.nix
··· 5 6 buildGoModule rec { 7 pname = "trivy"; 8 - version = "0.38.1"; 9 10 src = fetchFromGitHub { 11 owner = "aquasecurity"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-b5HKYZOitn8opqlrgULEYU6fsmQjWKEHRyM0GwLH9jk="; 15 }; 16 # hash missmatch on across linux and darwin 17 proxyVendor = true; 18 - vendorHash = "sha256-HBmQOd6uihGJULnHYU+biXRUYJkpL2Dw7S9EswqsbNs="; 19 20 excludedPackages = "misc"; 21
··· 5 6 buildGoModule rec { 7 pname = "trivy"; 8 + version = "0.38.2"; 9 10 src = fetchFromGitHub { 11 owner = "aquasecurity"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-mQXXS3Hg7bnspdznvThRKaY7aoCB8UsBP6J1tVZKTj4="; 15 }; 16 # hash missmatch on across linux and darwin 17 proxyVendor = true; 18 + vendorHash = "sha256-PTPhfgI7wheK1brr/YvDh1T01vCu7YoJX8UB+SGV3Zg="; 19 20 excludedPackages = "misc"; 21
+3 -3
pkgs/tools/misc/boxxy/default.nix
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "boxxy"; 9 - version = "0.3.5"; 10 11 src = fetchFromGitHub { 12 owner = "queer"; 13 repo = "boxxy"; 14 rev = "v${version}"; 15 - hash = "sha256-BTVbx6Fk10A2SayXAH4hRRcUqI6+3VEW25vj3sdApqI="; 16 }; 17 18 - cargoHash = "sha256-eCi8dcaeNjuU7a7W4IJqz9bRbde6PLy/WJCipgancRE="; 19 20 meta = with lib; { 21 description = "Puts bad Linux applications in a box with only their files";
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "boxxy"; 9 + version = "0.3.6"; 10 11 src = fetchFromGitHub { 12 owner = "queer"; 13 repo = "boxxy"; 14 rev = "v${version}"; 15 + hash = "sha256-Iy4PDtqjAqZ8MKPAnPqLqsd+d37PB57fJE8C1fOdfQ4="; 16 }; 17 18 + cargoHash = "sha256-wBSgdVNoGksvMFcRRAvYXrIw12BlW40zSPOmboGuVhQ="; 19 20 meta = with lib; { 21 description = "Puts bad Linux applications in a box with only their files";
+2 -2
pkgs/tools/networking/dnsperf/default.nix
··· 11 12 stdenv.mkDerivation rec { 13 pname = "dnsperf"; 14 - version = "2.11.0"; 15 16 src = fetchFromGitHub { 17 owner = "DNS-OARC"; 18 repo = "dnsperf"; 19 rev = "v${version}"; 20 - sha256 = "sha256-HLh+Z+ik7F52MBqQEMf1PuqTB32JOrpS8sHrqqln5kU="; 21 }; 22 23 nativeBuildInputs = [
··· 11 12 stdenv.mkDerivation rec { 13 pname = "dnsperf"; 14 + version = "2.11.1"; 15 16 src = fetchFromGitHub { 17 owner = "DNS-OARC"; 18 repo = "dnsperf"; 19 rev = "v${version}"; 20 + sha256 = "sha256-dgPpuX8Geo20BV8g0uhjSdsZUOoC+Dnz4Y2vdMW6KjY="; 21 }; 22 23 nativeBuildInputs = [
+3 -3
pkgs/tools/networking/frp/default.nix
··· 2 3 buildGoModule rec { 4 pname = "frp"; 5 - version = "0.47.0"; 6 7 src = fetchFromGitHub { 8 owner = "fatedier"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-S2qccDzS+Kj1tEAUR4a0G/4Eu3DAF7lY7ffxU6aykVU="; 12 }; 13 14 - vendorHash = "sha256-ffkXNE3LkgdCGfO6K9lGxEMxT/9Q1o0m3BMtu6tDHdk="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "frp"; 5 + version = "0.48.0"; 6 7 src = fetchFromGitHub { 8 owner = "fatedier"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-e9Qof+HxSJHzAUbLb+w5oWPTOslTPxnC8BVAmtMQGlE="; 12 }; 13 14 + vendorHash = "sha256-DhzirX+AGe8dE62M0hiE5SlWK8HqhNN0MMk9i2Ntrs8="; 15 16 doCheck = false; 17
+2 -2
pkgs/tools/networking/smartdns/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "smartdns"; 5 - version = "40"; 6 7 src = fetchFromGitHub { 8 owner = "pymumu"; 9 repo = pname; 10 rev = "Release${version}"; 11 - sha256 = "sha256-Un4LUBWVwbWYK4rZY2+gdk6Zi+n36Xawma8Dok2Sa0U="; 12 }; 13 14 buildInputs = [ openssl ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "smartdns"; 5 + version = "41"; 6 7 src = fetchFromGitHub { 8 owner = "pymumu"; 9 repo = pname; 10 rev = "Release${version}"; 11 + sha256 = "sha256-FVHOjW5SEShxTPPd4IuEfPV6vvqr0RepV976eJmxqwM="; 12 }; 13 14 buildInputs = [ openssl ];
+34
pkgs/tools/security/goverview/default.nix
···
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "goverview"; 8 + version = "1.0.1"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "j3ssie"; 12 + repo = "goverview"; 13 + rev = "refs/tags/v${version}"; 14 + hash = "sha256-IgvpMuDwMK9IdPs1IRbPbpgr7xZuDX3boVT5d7Lb+3w="; 15 + }; 16 + 17 + vendorHash = "sha256-i/m2s9e8PDfGmguNihynVI3Y7nAXC4weoWFXOwUVDSE="; 18 + 19 + ldflags = [ 20 + "-w" 21 + "-s" 22 + ]; 23 + 24 + # Tests require network access 25 + doCheck = false; 26 + 27 + meta = with lib; { 28 + description = "Tool to get an overview of the list of URLs"; 29 + homepage = "https://github.com/j3ssie/goverview"; 30 + changelog = "https://github.com/j3ssie/goverview/releases/tag/v${version}"; 31 + license = licenses.mit; 32 + maintainers = with maintainers; [ fab ]; 33 + }; 34 + }
+14
pkgs/tools/text/csvquote/csvquote-path.patch
···
··· 1 + --- a/csvheader 2 + +++ b/csvheader 3 + @@ -29,10 +29,6 @@ while getopts "d:tq:r:" arg; do 4 + esac 5 + done 6 + 7 + -CSVQUOTE=`which csvquote` || CSVQUOTE="./csvquote" 8 + -if [ ! -f $CSVQUOTE ]; then 9 + - echo "csvquote program not found. exiting" 10 + - exit 1 11 + -fi 12 + +CSVQUOTE=@out@/bin/csvquote 13 + 14 + $CSVQUOTE $@ | head -n 1 | tr "$DEL" '\n' | nl -ba | $CSVQUOTE -u -d "$DEL" -q "$QUO" -r "$REC"
+47
pkgs/tools/text/csvquote/default.nix
···
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , patsh 5 + }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "csvquote"; 9 + version = "0.1.5"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "dbro"; 13 + repo = "csvquote"; 14 + rev = "v${version}"; 15 + hash = "sha256-847JAoDEfA9K4LB8z9cqSw+GTImqmITBylB/4odLDb0="; 16 + }; 17 + 18 + patches = [ 19 + # patch csvheader to use csvquote from the derivation 20 + ./csvquote-path.patch 21 + ]; 22 + 23 + nativeBuildInputs = [ 24 + patsh 25 + ]; 26 + 27 + makeFlags = [ 28 + "BINDIR=$(out)/bin" 29 + ]; 30 + 31 + preInstall = '' 32 + mkdir -p "$out/bin" 33 + ''; 34 + 35 + postInstall = '' 36 + substituteAllInPlace $out/bin/csvheader 37 + patsh $out/bin/csvheader -fs ${builtins.storeDir} 38 + ''; 39 + 40 + meta = with lib; { 41 + description = "Enables common unix utlities like cut, awk, wc, head to work correctly with csv data containing delimiters and newlines"; 42 + homepage = "https://github.com/dbro/csvquote"; 43 + license = licenses.mit; 44 + maintainers = with maintainers; [ figsoda ]; 45 + platforms = platforms.all; 46 + }; 47 + }
+3 -3
pkgs/tools/text/mdbook-katex/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "mdbook-katex"; 5 - version = "0.3.9"; 6 7 src = fetchCrate { 8 inherit pname version; 9 - hash = "sha256-FsKHGw/6n/8eCJh1XatNsw3iCzD+siHdJ3i0dNKD5Go="; 10 }; 11 12 - cargoHash = "sha256-nyLWbwruzQeyPGkVuMiRCTHtFE+E9nQ57ZMXxqIcLxE="; 13 14 OPENSSL_DIR = "${lib.getDev openssl}"; 15 OPENSSL_LIB_DIR = "${lib.getLib openssl}/lib";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "mdbook-katex"; 5 + version = "0.3.10"; 6 7 src = fetchCrate { 8 inherit pname version; 9 + hash = "sha256-oGefjf4URmE0i6mOjpZfBcSh280O+IvrAhu3vFAyntQ="; 10 }; 11 12 + cargoHash = "sha256-tkMdxkJcvmDSH2ree1nol1JlKKhI5G4x9x5Hs0peKI8="; 13 14 OPENSSL_DIR = "${lib.getDev openssl}"; 15 OPENSSL_LIB_DIR = "${lib.getLib openssl}/lib";
+8
pkgs/tools/typesetting/tex/texlive/bin.nix
··· 30 for i in texk/kpathsea/mktex*; do 31 sed -i '/^mydir=/d' "$i" 32 done 33 ''; 34 35 configureFlags = [
··· 30 for i in texk/kpathsea/mktex*; do 31 sed -i '/^mydir=/d' "$i" 32 done 33 + 34 + # ST_NLINK_TRICK causes kpathsea to treat folders with no real subfolders 35 + # as leaves, even if they contain symlinks to other folders; must be 36 + # disabled to work correctly with the nix store", see section 5.3.6 37 + # “Subdirectory expansion” of the kpathsea manual 38 + # http://mirrors.ctan.org/systems/doc/kpathsea/kpathsea.pdf for more 39 + # details 40 + sed -i '/^#define ST_NLINK_TRICK/d' texk/kpathsea/config.h 41 ''; 42 43 configureFlags = [
+4
pkgs/top-level/all-packages.nix
··· 4315 4316 csvkit = callPackage ../tools/text/csvkit { }; 4317 4318 csvtool = callPackage ../development/ocaml-modules/csv/csvtool.nix { }; 4319 4320 csv2latex = callPackage ../tools/misc/csv2latex { }; ··· 26610 govers = callPackage ../development/tools/govers { }; 26611 26612 govendor = callPackage ../development/tools/govendor { }; 26613 26614 go-tools = callPackage ../development/tools/go-tools { }; 26615
··· 4315 4316 csvkit = callPackage ../tools/text/csvkit { }; 4317 4318 + csvquote = callPackage ../tools/text/csvquote { }; 4319 + 4320 csvtool = callPackage ../development/ocaml-modules/csv/csvtool.nix { }; 4321 4322 csv2latex = callPackage ../tools/misc/csv2latex { }; ··· 26612 govers = callPackage ../development/tools/govers { }; 26613 26614 govendor = callPackage ../development/tools/govendor { }; 26615 + 26616 + goverview = callPackage ../tools/security/goverview { }; 26617 26618 go-tools = callPackage ../development/tools/go-tools { }; 26619