Merge remote-tracking branch 'origin/staging-next' into staging

K900 2be92526 70e8bf7d

+1103 -764
+10 -9
.github/workflows/check-cherry-picks.yml
··· 115 115 repo: context.repo.repo, 116 116 pull_number: context.payload.pull_request.number 117 117 })).filter(review => 118 - review.user.login == 'github-actions[bot]' && 119 - review.state == 'CHANGES_REQUESTED' 118 + review.user.login == 'github-actions[bot]' 120 119 ).map(async (review) => { 121 - await github.rest.pulls.dismissReview({ 122 - owner: context.repo.owner, 123 - repo: context.repo.repo, 124 - pull_number: context.payload.pull_request.number, 125 - review_id: review.id, 126 - message: 'All cherry-picks are good now, thank you!' 127 - }) 120 + if (review.state == 'CHANGES_REQUESTED') { 121 + await github.rest.pulls.dismissReview({ 122 + owner: context.repo.owner, 123 + repo: context.repo.repo, 124 + pull_number: context.payload.pull_request.number, 125 + review_id: review.id, 126 + message: 'All cherry-picks are good now, thank you!' 127 + }) 128 + } 128 129 await github.graphql(`mutation($node_id:ID!) { 129 130 minimizeComment(input: { 130 131 classifier: RESOLVED,
+1 -1
.github/workflows/check-format.yml
··· 25 25 with: 26 26 merged-as-untrusted: true 27 27 28 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 28 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 29 29 with: 30 30 extra_nix_config: sandbox = true 31 31
+1 -1
.github/workflows/check-shell.yml
··· 42 42 with: 43 43 merged-as-untrusted: true 44 44 45 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 45 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 46 46 47 47 - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 48 48 with:
+7 -9
.github/workflows/codeowners-v2.yml
··· 45 45 check: 46 46 name: Check 47 47 runs-on: ubuntu-24.04-arm 48 - if: github.repository_owner == 'NixOS' 49 48 steps: 50 49 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 51 50 with: ··· 56 55 merged-as-untrusted: true 57 56 target-as-trusted: true 58 57 59 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 58 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 60 59 61 60 - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 62 61 with: ··· 68 67 run: nix-build trusted/ci -A codeownersValidator 69 68 70 69 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 71 - if: vars.OWNER_RO_APP_ID 70 + if: github.event_name == 'pull_request_target' && vars.OWNER_RO_APP_ID 72 71 id: app-token 73 72 with: 74 73 app-id: ${{ vars.OWNER_RO_APP_ID }} ··· 91 90 request: 92 91 name: Request 93 92 runs-on: ubuntu-24.04-arm 94 - if: github.repository_owner == 'NixOS' 95 93 steps: 96 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 94 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 97 95 98 96 # Important: Because we use pull_request_target, this checks out the base branch of the PR, not the PR head. 99 97 # This is intentional, because we need to request the review of owners as declared in the base branch. ··· 101 99 with: 102 100 path: trusted 103 101 102 + - name: Build review request package 103 + run: nix-build trusted/ci -A requestReviews 104 + 104 105 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 105 - if: vars.OWNER_APP_ID 106 + if: github.event_name == 'pull_request_target' && vars.OWNER_APP_ID 106 107 id: app-token 107 108 with: 108 109 app-id: ${{ vars.OWNER_APP_ID }} ··· 110 111 permission-administration: read 111 112 permission-members: read 112 113 permission-pull-requests: write 113 - 114 - - name: Build review request package 115 - run: nix-build trusted/ci -A requestReviews 116 114 117 115 - name: Request reviews 118 116 if: steps.app-token.outputs.token
+1 -1
.github/workflows/eval-aliases.yml
··· 26 26 merged-as-untrusted: true 27 27 28 28 - name: Install Nix 29 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 29 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 30 30 with: 31 31 extra_nix_config: sandbox = true 32 32
+3 -3
.github/workflows/eval.yml
··· 4 4 pull_request: 5 5 paths: 6 6 - .github/workflows/eval.yml 7 - - .github/workflows/reviews.yml # needs eval results from the same event type 7 + - .github/workflows/reviewers.yml # needs eval results from the same event type 8 8 pull_request_target: 9 9 push: 10 10 # Keep this synced with ci/request-reviews/dev-branches.txt ··· 68 68 path: untrusted 69 69 70 70 - name: Install Nix 71 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 71 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 72 72 with: 73 73 extra_nix_config: sandbox = true 74 74 ··· 180 180 path: trusted 181 181 182 182 - name: Install Nix 183 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 183 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 184 184 with: 185 185 extra_nix_config: sandbox = true 186 186
+1 -1
.github/workflows/lib-tests.yml
··· 28 28 with: 29 29 merged-as-untrusted: true 30 30 31 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 31 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 32 32 with: 33 33 extra_nix_config: sandbox = true 34 34
+1 -1
.github/workflows/manual-nixos-v2.yml
··· 45 45 with: 46 46 merged-as-untrusted: true 47 47 48 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 48 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 49 49 with: 50 50 extra_nix_config: sandbox = true 51 51
+1 -1
.github/workflows/manual-nixpkgs-v2.yml
··· 29 29 with: 30 30 merged-as-untrusted: true 31 31 32 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 32 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 33 33 with: 34 34 extra_nix_config: sandbox = true 35 35
+1 -1
.github/workflows/nix-parse-v2.yml
··· 26 26 with: 27 27 merged-as-untrusted: true 28 28 29 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 29 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 30 30 with: 31 31 extra_nix_config: sandbox = true 32 32 nix_path: nixpkgs=channel:nixpkgs-unstable
+1 -1
.github/workflows/nixpkgs-vet.yml
··· 36 36 merged-as-untrusted: true 37 37 target-as-trusted: true 38 38 39 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 39 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 40 40 41 41 - name: Running nixpkgs-vet 42 42 env:
+2 -2
.github/workflows/reviewers.yml
··· 34 34 sparse-checkout: ci 35 35 36 36 - name: Install Nix 37 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 37 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 38 38 with: 39 39 extra_nix_config: sandbox = true 40 40 ··· 44 44 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions 45 45 # Can't use the token received from permissions above, because it can't get enough permissions 46 46 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 47 - if: vars.OWNER_APP_ID 47 + if: github.event_name == 'pull_request_target' && vars.OWNER_APP_ID 48 48 id: app-token 49 49 with: 50 50 app-id: ${{ vars.OWNER_APP_ID }}
+2
ci/nixpkgs-vet.nix
··· 25 25 env.NIXPKGS_VET_NIX_PACKAGE = nix; 26 26 } 27 27 '' 28 + export NIX_STATE_DIR=$(mktemp -d) 29 + 28 30 nixpkgs-vet --base ${filtered base} ${filtered head} 29 31 30 32 touch $out
+21
doc/languages-frameworks/haskell.section.md
··· 161 161 162 162 <!-- TODO(@maralorn) Link to package set generation docs in the contributors guide below. --> 163 163 164 + ### GHC Deprecation Policy {#ghc-deprecation-policy} 165 + 166 + We remove GHC versions according to the following policy: 167 + 168 + #### Major GHC versions {#major-ghc-deprecation} 169 + 170 + We keep the following GHC major versions: 171 + 1. The current Stackage LTS as the default and all later major versions. 172 + 2. The two latest major versions older than our default. 173 + 3. The currently recommended GHCup version and all later major versions. 174 + 175 + Older GHC versions might be kept longer, if there are in-tree consumers. We will coordinate with the maintainers of those dependencies to find a way forward. 176 + 177 + #### Minor GHC versions {#minor-ghc-deprecation} 178 + 179 + Every major version has a default minor version. The default minor version will be updated as soon as viable without breakage. 180 + 181 + Older minor versions for a supported major version will only be kept, if they are the last supported version of a major Stackage LTS release. 182 + 183 + <!-- Policy introduced here: https://discourse.nixos.org/t/nixpkgs-ghc-deprecation-policy-user-feedback-necessary/64153 --> 184 + 164 185 ## `haskellPackages.mkDerivation` {#haskell-mkderivation} 165 186 166 187 Every haskell package set has its own haskell-aware `mkDerivation` which is used
+8 -4
doc/languages-frameworks/rust.section.md
··· 605 605 directory. In such cases, the `cargoRoot` attribute can be used to 606 606 specify the crate's directory relative to `sourceRoot`. In the 607 607 following example, the crate is in `src/rust`, as specified in the 608 - `cargoRoot` attribute. Note that we also need to specify the correct 609 - path for `fetchCargoVendor`. 608 + `cargoRoot` attribute. Note that we also need to pass in `cargoRoot` 609 + to `fetchCargoVendor`. 610 610 611 611 ```nix 612 612 { ··· 627 627 }; 628 628 629 629 cargoDeps = rustPlatform.fetchCargoVendor { 630 - inherit pname version src; 631 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 630 + inherit 631 + pname 632 + version 633 + src 634 + cargoRoot 635 + ; 632 636 hash = "sha256-ctUt8maCjnGddKPf+Ii++wKsAXA1h+JM6zKQNXXwJqQ="; 633 637 }; 634 638
+9
doc/redirects.json
··· 40 40 "ex-testEqualArrayOrMap-test-function-add-cowbell": [ 41 41 "index.html#ex-testEqualArrayOrMap-test-function-add-cowbell" 42 42 ], 43 + "ghc-deprecation-policy": [ 44 + "index.html#ghc-deprecation-policy" 45 + ], 43 46 "inkscape-plugins": [ 44 47 "index.html#inkscape-plugins" 48 + ], 49 + "major-ghc-deprecation": [ 50 + "index.html#major-ghc-deprecation" 51 + ], 52 + "minor-ghc-deprecation": [ 53 + "index.html#minor-ghc-deprecation" 45 54 ], 46 55 "neovim": [ 47 56 "index.html#neovim"
+1 -1
doc/release-notes/rl-2511.section.md
··· 13 13 14 14 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 15 15 16 - - The `boot.readOnlyNixStore` has been removed. Control over bind mount options on `/nix/store` is now offered by the `boot.nixStoreMountOpts` option. 16 + - The `offrss` package was removed due to lack of upstream maintenance since 2012. It's recommended for users to migrate to another RSS reader 17 17 18 18 ## Other Notable Changes {#sec-nixpkgs-release-25.11-notable-changes} 19 19
+6
maintainers/maintainer-list.nix
··· 17139 17139 githubId = 1131571; 17140 17140 name = "naelstrof"; 17141 17141 }; 17142 + naggie = { 17143 + name = "Cal Bryant"; 17144 + email = "callan.bryant@gmail.com"; 17145 + github = "naggie"; 17146 + githubId = 208440; 17147 + }; 17142 17148 nagisa = { 17143 17149 name = "Simonas Kazlauskas"; 17144 17150 email = "nixpkgs@kazlauskas.me";
+2
nixos/doc/manual/release-notes/rl-2511.section.md
··· 30 30 31 31 - `renovate` was updated to v40. See the [upstream release notes](https://github.com/renovatebot/renovate/releases/tag/40.0.0) for breaking changes. 32 32 33 + - The `boot.readOnlyNixStore` has been removed. Control over bind mount options on `/nix/store` is now offered by the `boot.nixStoreMountOpts` option. 34 + 33 35 ## Other Notable Changes {#sec-release-25.11-notable-changes} 34 36 35 37 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+1 -1
nixos/modules/programs/nix-required-mounts.nix
··· 90 90 } 91 91 ''; 92 92 example.require-ipfs.paths = [ "/ipfs" ]; 93 - example.require-ipfs.onFeatures = [ "ifps" ]; 93 + example.require-ipfs.onFeatures = [ "ipfs" ]; 94 94 }; 95 95 extraWrapperArgs = lib.mkOption { 96 96 type = with lib.types; listOf str;
+2 -2
nixos/modules/services/home-automation/wyoming/satellite.nix
··· 23 23 ; 24 24 25 25 finalPackage = cfg.package.overridePythonAttrs (oldAttrs: { 26 - propagatedBuildInputs = 27 - oldAttrs.propagatedBuildInputs 26 + dependencies = 27 + oldAttrs.dependencies 28 28 # for audio enhancements like auto-gain, noise suppression 29 29 ++ cfg.package.optional-dependencies.webrtc 30 30 # vad is currently optional, because it is broken on aarch64-linux
+31
nixos/modules/services/networking/dsnet.md
··· 1 + # dsnet {#module-services-dsnet} 2 + 3 + dsnet is a CLI tool to manage a centralised wireguard server. It allows easy 4 + generation of client configuration, handling key generation, IP allocation etc. 5 + 6 + It keeps its own configuration at `/etc/dsnetconfig.json`, which is more of a 7 + database. It contains key material too. 8 + 9 + The way this module works is to patch this database with whatever is configured 10 + in the nix service instantiation. This happens automatically when required. 11 + 12 + This way it is possible to decide what to let dnset manage and what parts you 13 + want to keep declaratively. 14 + 15 + ``` 16 + services.dsnet = { 17 + enable = true; 18 + settings = { 19 + ExternalHostname = "vpn.example.com"; 20 + Network = "10.171.90.0/24"; 21 + Network6 = ""; 22 + IP = "10.171.90.1"; 23 + IP6 = ""; 24 + DNS = "10.171.90.1"; 25 + Networks = [ "0.0.0.0/0" ]; 26 + }; 27 + 28 + ``` 29 + 30 + 31 + See <https://github.com/naggie/dsnet> for more information.
+184
nixos/modules/services/networking/dsnet.nix
··· 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 7 + 8 + let 9 + cfg = config.services.dsnet; 10 + settingsFormat = pkgs.formats.json { }; 11 + patchFile = settingsFormat.generate "dsnet-patch.json" cfg.settings; 12 + in 13 + { 14 + options.services.dsnet = { 15 + enable = lib.mkEnableOption "dsnet, a centralised Wireguard VPN manager"; 16 + 17 + package = lib.mkPackageOption pkgs "dsnet" { }; 18 + 19 + settings = lib.mkOption { 20 + type = lib.types.submodule { 21 + 22 + freeformType = settingsFormat.type; 23 + 24 + options = { 25 + ExternalHostname = lib.mkOption { 26 + type = lib.types.nullOr lib.types.str; 27 + default = null; 28 + example = "vpn.example.com"; 29 + description = '' 30 + The hostname that clients should use to connect to this server. 31 + This is used to generate the client configuration files. 32 + 33 + This is preferred over ExternalIP, as it allows for IPv4 and 34 + IPv6, as well as enabling the ability tp change IP. 35 + ''; 36 + }; 37 + 38 + ExternalIP = lib.mkOption { 39 + type = lib.types.nullOr lib.types.str; 40 + default = null; 41 + example = "192.0.2.1"; 42 + description = '' 43 + The external IP address of the server. This is used to generate 44 + the client configuration files for when an ExternalHostname is not set. 45 + 46 + Leaving this empty will cause dsnet to use the IP address of 47 + what looks like the WAN interface. 48 + ''; 49 + }; 50 + 51 + ExternalIP6 = lib.mkOption { 52 + type = lib.types.nullOr lib.types.str; 53 + default = null; 54 + example = "2001:db8::1"; 55 + description = '' 56 + The external IPv6 address of the server. This is used to generate 57 + the client configuration files for when an ExternalHostname is 58 + not set. Used in preference to ExternalIP. 59 + 60 + Leaving this empty will cause dsnet to use the IP address of 61 + what looks like the WAN interface. 62 + ''; 63 + }; 64 + 65 + Network = lib.mkOption { 66 + type = lib.types.nullOr lib.types.str; 67 + default = null; 68 + example = "172.18.0.0/24"; 69 + description = '' 70 + The IPv4 network that the server will use to allocate IPs on the network. 71 + Leave this empty to let dsnet choose a network. 72 + ''; 73 + }; 74 + 75 + Network6 = lib.mkOption { 76 + type = lib.types.nullOr lib.types.str; 77 + default = null; 78 + example = "2001:db8::1/64"; 79 + description = '' 80 + The IPv6 network that the server will use to allocate IPs on the 81 + network. 82 + Leave this empty to let dsnet choose a network. 83 + ''; 84 + }; 85 + 86 + IP = lib.mkOption { 87 + type = lib.types.nullOr lib.types.str; 88 + default = null; 89 + example = "172.18.0.1"; 90 + description = '' 91 + The IPv4 address that the server will use on the network. 92 + Leave this empty to let dsnet choose an address. 93 + ''; 94 + }; 95 + 96 + IP6 = lib.mkOption { 97 + type = lib.types.nullOr lib.types.str; 98 + default = null; 99 + example = "2001:db8::1"; 100 + description = '' 101 + The IPv6 address that the server will use on the network 102 + Leave this empty to let dsnet choose an address. 103 + ''; 104 + }; 105 + 106 + Networks = lib.mkOption { 107 + type = lib.types.nullOr (lib.types.listOf lib.types.str); 108 + default = null; 109 + example = [ 110 + "0.0.0.0/0" 111 + "192.168.0.0/24" 112 + ]; 113 + description = '' 114 + The CIDR networks that should route through this server. Clients 115 + will be configured to route traffic for these networks through 116 + the server peer. 117 + ''; 118 + }; 119 + }; 120 + }; 121 + 122 + default = { }; 123 + description = '' 124 + The settings to use for dsnet. This will be converted to a JSON 125 + object that will be passed to dsnet as a patch, using the patch 126 + command when the service is started. See the dsnet documentation for 127 + more information on the additional options. 128 + 129 + Note that the resulting /etc/dsnetconfg.json is more of a database 130 + than it is a configuration file. It is therefore recommended that 131 + system specific values are configured here, rather than the full 132 + configuration including peers. 133 + 134 + Peers may be managed via the dsnet add/remove commands, negating the 135 + need to manage key material and cumbersom configuration with nix. If 136 + you want peer configuration in nix, you may as well use the regular 137 + wireguard module. 138 + ''; 139 + example = { 140 + ExternalHostname = "vpn.example.com"; 141 + ExternalIP = "127.0.0.1"; 142 + ExternalIP6 = ""; 143 + ListenPort = 51820; 144 + Network = "10.3.148.0/22"; 145 + Network6 = ""; 146 + IP = "10.3.148.1"; 147 + IP6 = ""; 148 + DNS = "8.8.8.8"; 149 + Networks = [ "0.0.0.0/0" ]; 150 + }; 151 + }; 152 + }; 153 + 154 + config = lib.mkIf cfg.enable { 155 + environment.systemPackages = [ cfg.package ]; 156 + 157 + systemd.services.dsnet = { 158 + description = "dsnet VPN Management"; 159 + after = [ "network-online.target" ]; 160 + wants = [ "network-online.target" ]; 161 + wantedBy = [ "multi-user.target" ]; 162 + preStart = '' 163 + test ! -f /etc/dsnetconfig.json && ${lib.getExe cfg.package} init 164 + ${lib.getExe cfg.package} patch < ${patchFile} 165 + ''; 166 + serviceConfig = { 167 + ExecStart = "${lib.getExe cfg.package} up"; 168 + ExecStop = "${lib.getExe cfg.package} down"; 169 + Type = "oneshot"; 170 + # consider the service to be active after process exits, so it can be 171 + # reloaded 172 + RemainAfterExit = true; 173 + }; 174 + 175 + reload = '' 176 + ${lib.getExe cfg.package} patch < ${patchFile} 177 + ${lib.getExe cfg.package} sync < ${patchFile} 178 + ''; 179 + 180 + # reload _instead_ of restarting on change 181 + reloadIfChanged = true; 182 + }; 183 + }; 184 + }
+99 -127
nixos/modules/services/networking/murmur.nix
··· 5 5 ... 6 6 }: 7 7 8 - with lib; 9 - 10 8 let 11 9 cfg = config.services.murmur; 12 10 forking = cfg.logFile != null; ··· 14 12 database=${cfg.stateDir}/murmur.sqlite 15 13 dbDriver=QSQLITE 16 14 17 - autobanAttempts=${toString cfg.autobanAttempts} 18 - autobanTimeframe=${toString cfg.autobanTimeframe} 19 - autobanTime=${toString cfg.autobanTime} 15 + autobanAttempts=${lib.toString cfg.autobanAttempts} 16 + autobanTimeframe=${lib.toString cfg.autobanTimeframe} 17 + autobanTime=${lib.toString cfg.autobanTime} 20 18 21 - logfile=${optionalString (cfg.logFile != null) cfg.logFile} 22 - ${optionalString forking "pidfile=/run/murmur/murmurd.pid"} 19 + logfile=${lib.optionalString (cfg.logFile != null) cfg.logFile} 20 + ${lib.optionalString forking "pidfile=/run/murmur/murmurd.pid"} 23 21 24 22 welcometext="${cfg.welcometext}" 25 - port=${toString cfg.port} 23 + port=${lib.toString cfg.port} 26 24 27 - ${optionalString (cfg.hostName != "") "host=${cfg.hostName}"} 28 - ${optionalString (cfg.password != "") "serverpassword=${cfg.password}"} 25 + ${lib.optionalString (cfg.hostName != "") "host=${cfg.hostName}"} 26 + ${lib.optionalString (cfg.password != "") "serverpassword=${cfg.password}"} 29 27 30 - bandwidth=${toString cfg.bandwidth} 31 - users=${toString cfg.users} 28 + bandwidth=${lib.toString cfg.bandwidth} 29 + users=${lib.toString cfg.users} 32 30 33 - textmessagelength=${toString cfg.textMsgLength} 34 - imagemessagelength=${toString cfg.imgMsgLength} 35 - allowhtml=${boolToString cfg.allowHtml} 36 - logdays=${toString cfg.logDays} 37 - bonjour=${boolToString cfg.bonjour} 38 - sendversion=${boolToString cfg.sendVersion} 31 + textmessagelength=${lib.toString cfg.textMsgLength} 32 + imagemessagelength=${lib.toString cfg.imgMsgLength} 33 + allowhtml=${lib.boolToString cfg.allowHtml} 34 + logdays=${lib.toString cfg.logDays} 35 + bonjour=${lib.boolToString cfg.bonjour} 36 + sendversion=${lib.boolToString cfg.sendVersion} 39 37 40 - ${optionalString (cfg.registerName != "") "registerName=${cfg.registerName}"} 41 - ${optionalString (cfg.registerPassword != "") "registerPassword=${cfg.registerPassword}"} 42 - ${optionalString (cfg.registerUrl != "") "registerUrl=${cfg.registerUrl}"} 43 - ${optionalString (cfg.registerHostname != "") "registerHostname=${cfg.registerHostname}"} 38 + ${lib.optionalString (cfg.registerName != "") "registerName=${cfg.registerName}"} 39 + ${lib.optionalString (cfg.registerPassword != "") "registerPassword=${cfg.registerPassword}"} 40 + ${lib.optionalString (cfg.registerUrl != "") "registerUrl=${cfg.registerUrl}"} 41 + ${lib.optionalString (cfg.registerHostname != "") "registerHostname=${cfg.registerHostname}"} 44 42 45 - certrequired=${boolToString cfg.clientCertRequired} 46 - ${optionalString (cfg.sslCert != "") "sslCert=${cfg.sslCert}"} 47 - ${optionalString (cfg.sslKey != "") "sslKey=${cfg.sslKey}"} 48 - ${optionalString (cfg.sslCa != "") "sslCA=${cfg.sslCa}"} 43 + certrequired=${lib.boolToString cfg.clientCertRequired} 44 + ${lib.optionalString (cfg.sslCert != "") "sslCert=${cfg.sslCert}"} 45 + ${lib.optionalString (cfg.sslKey != "") "sslKey=${cfg.sslKey}"} 46 + ${lib.optionalString (cfg.sslCa != "") "sslCA=${cfg.sslCa}"} 49 47 50 - ${optionalString (cfg.dbus != null) "dbus=${cfg.dbus}"} 48 + ${lib.optionalString (cfg.dbus != null) "dbus=${cfg.dbus}"} 51 49 52 50 ${cfg.extraConfig} 53 51 ''; 54 52 in 55 53 { 56 - imports = [ 57 - (mkRenamedOptionModule [ "services" "murmur" "welcome" ] [ "services" "murmur" "welcometext" ]) 58 - (mkRemovedOptionModule [ "services" "murmur" "pidfile" ] "Hardcoded to /run/murmur/murmurd.pid now") 59 - ]; 60 - 61 54 options = { 62 55 services.murmur = { 63 - enable = mkOption { 64 - type = types.bool; 65 - default = false; 66 - description = "If enabled, start the Murmur Mumble server."; 67 - }; 56 + enable = lib.mkEnableOption "Mumble server"; 68 57 69 - openFirewall = mkOption { 70 - type = types.bool; 71 - default = false; 72 - description = '' 73 - Open ports in the firewall for the Murmur Mumble server. 74 - ''; 75 - }; 58 + openFirewall = lib.mkEnableOption "opening ports in the firewall for the Mumble server"; 76 59 77 - user = mkOption { 78 - type = types.str; 60 + user = lib.mkOption { 61 + type = lib.types.str; 79 62 default = "murmur"; 80 63 description = '' 81 64 The name of an existing user to use to run the service. ··· 83 66 ''; 84 67 }; 85 68 86 - group = mkOption { 87 - type = types.str; 69 + group = lib.mkOption { 70 + type = lib.types.str; 88 71 default = "murmur"; 89 72 description = '' 90 73 The name of an existing group to use to run the service. ··· 92 75 ''; 93 76 }; 94 77 95 - stateDir = mkOption { 96 - type = types.path; 78 + stateDir = lib.mkOption { 79 + type = lib.types.path; 97 80 default = "/var/lib/murmur"; 98 81 description = '' 99 82 Directory to store data for the server. 100 83 ''; 101 84 }; 102 85 103 - autobanAttempts = mkOption { 104 - type = types.int; 86 + autobanAttempts = lib.mkOption { 87 + type = lib.types.int; 105 88 default = 10; 106 89 description = '' 107 90 Number of attempts a client is allowed to make in ··· 110 93 ''; 111 94 }; 112 95 113 - autobanTimeframe = mkOption { 114 - type = types.int; 96 + autobanTimeframe = lib.mkOption { 97 + type = lib.types.int; 115 98 default = 120; 116 99 description = '' 117 100 Timeframe in which a client can connect without being banned ··· 119 102 ''; 120 103 }; 121 104 122 - autobanTime = mkOption { 123 - type = types.int; 105 + autobanTime = lib.mkOption { 106 + type = lib.types.int; 124 107 default = 300; 125 108 description = "The amount of time an IP ban lasts (in seconds)."; 126 109 }; 127 110 128 - logFile = mkOption { 129 - type = types.nullOr types.path; 111 + logFile = lib.mkOption { 112 + type = lib.types.nullOr lib.types.path; 130 113 default = null; 131 114 example = "/var/log/murmur/murmurd.log"; 132 115 description = "Path to the log file for Murmur daemon. Empty means log to journald."; 133 116 }; 134 117 135 - welcometext = mkOption { 136 - type = types.str; 118 + welcometext = lib.mkOption { 119 + type = lib.types.str; 137 120 default = ""; 138 121 description = "Welcome message for connected clients."; 139 122 }; 140 123 141 - port = mkOption { 142 - type = types.port; 124 + port = lib.mkOption { 125 + type = lib.types.port; 143 126 default = 64738; 144 127 description = "Ports to bind to (UDP and TCP)."; 145 128 }; 146 129 147 - hostName = mkOption { 148 - type = types.str; 130 + hostName = lib.mkOption { 131 + type = lib.types.str; 149 132 default = ""; 150 133 description = "Host to bind to. Defaults binding on all addresses."; 151 134 }; 152 135 153 - package = mkPackageOption pkgs "murmur" { }; 136 + package = lib.mkPackageOption pkgs "murmur" { }; 154 137 155 - password = mkOption { 156 - type = types.str; 138 + password = lib.mkOption { 139 + type = lib.types.str; 157 140 default = ""; 158 141 description = "Required password to join server, if specified."; 159 142 }; 160 143 161 - bandwidth = mkOption { 162 - type = types.int; 144 + bandwidth = lib.mkOption { 145 + type = lib.types.int; 163 146 default = 72000; 164 147 description = '' 165 148 Maximum bandwidth (in bits per second) that clients may send ··· 167 150 ''; 168 151 }; 169 152 170 - users = mkOption { 171 - type = types.int; 153 + users = lib.mkOption { 154 + type = lib.types.int; 172 155 default = 100; 173 156 description = "Maximum number of concurrent clients allowed."; 174 157 }; 175 158 176 - textMsgLength = mkOption { 177 - type = types.int; 159 + textMsgLength = lib.mkOption { 160 + type = lib.types.int; 178 161 default = 5000; 179 162 description = "Max length of text messages. Set 0 for no limit."; 180 163 }; 181 164 182 - imgMsgLength = mkOption { 183 - type = types.int; 165 + imgMsgLength = lib.mkOption { 166 + type = lib.types.int; 184 167 default = 131072; 185 168 description = "Max length of image messages. Set 0 for no limit."; 186 169 }; 187 170 188 - allowHtml = mkOption { 189 - type = types.bool; 171 + allowHtml = lib.mkOption { 172 + type = lib.types.bool; 190 173 default = true; 191 174 description = '' 192 175 Allow HTML in client messages, comments, and channel ··· 194 177 ''; 195 178 }; 196 179 197 - logDays = mkOption { 198 - type = types.int; 180 + logDays = lib.mkOption { 181 + type = lib.types.int; 199 182 default = 31; 200 183 description = '' 201 184 How long to store RPC logs for in the database. Set 0 to ··· 203 186 ''; 204 187 }; 205 188 206 - bonjour = mkOption { 207 - type = types.bool; 208 - default = false; 209 - description = '' 210 - Enable Bonjour auto-discovery, which allows clients over 211 - your LAN to automatically discover Murmur servers. 212 - ''; 213 - }; 189 + bonjour = lib.mkEnableOption "Bonjour auto-discovery, which allows clients over your LAN to automatically discover Mumble servers"; 214 190 215 - sendVersion = mkOption { 216 - type = types.bool; 191 + sendVersion = lib.mkOption { 192 + type = lib.types.bool; 217 193 default = true; 218 194 description = "Send Murmur version in UDP response."; 219 195 }; 220 196 221 - registerName = mkOption { 222 - type = types.str; 197 + registerName = lib.mkOption { 198 + type = lib.types.str; 223 199 default = ""; 224 200 description = '' 225 201 Public server registration name, and also the name of the ··· 228 204 ''; 229 205 }; 230 206 231 - registerPassword = mkOption { 232 - type = types.str; 207 + registerPassword = lib.mkOption { 208 + type = lib.types.str; 233 209 default = ""; 234 210 description = '' 235 211 Public server registry password, used authenticate your ··· 238 214 ''; 239 215 }; 240 216 241 - registerUrl = mkOption { 242 - type = types.str; 217 + registerUrl = lib.mkOption { 218 + type = lib.types.str; 243 219 default = ""; 244 220 description = "URL website for your server."; 245 221 }; 246 222 247 - registerHostname = mkOption { 248 - type = types.str; 223 + registerHostname = lib.mkOption { 224 + type = lib.types.str; 249 225 default = ""; 250 226 description = '' 251 227 DNS hostname where your server can be reached. This is only ··· 255 231 ''; 256 232 }; 257 233 258 - clientCertRequired = mkOption { 259 - type = types.bool; 260 - default = false; 261 - description = "Require clients to authenticate via certificates."; 262 - }; 234 + clientCertRequired = lib.mkEnableOption "requiring clients to authenticate via certificates"; 263 235 264 - sslCert = mkOption { 265 - type = types.str; 236 + sslCert = lib.mkOption { 237 + type = lib.types.str; 266 238 default = ""; 267 239 description = "Path to your SSL certificate."; 268 240 }; 269 241 270 - sslKey = mkOption { 271 - type = types.str; 242 + sslKey = lib.mkOption { 243 + type = lib.types.str; 272 244 default = ""; 273 245 description = "Path to your SSL key."; 274 246 }; 275 247 276 - sslCa = mkOption { 277 - type = types.str; 248 + sslCa = lib.mkOption { 249 + type = lib.types.str; 278 250 default = ""; 279 251 description = "Path to your SSL CA certificate."; 280 252 }; 281 253 282 - extraConfig = mkOption { 283 - type = types.lines; 254 + extraConfig = lib.mkOption { 255 + type = lib.types.lines; 284 256 default = ""; 285 257 description = "Extra configuration to put into murmur.ini."; 286 258 }; 287 259 288 - environmentFile = mkOption { 289 - type = types.nullOr types.path; 260 + environmentFile = lib.mkOption { 261 + type = lib.types.nullOr lib.types.path; 290 262 default = null; 291 - example = literalExpression ''"''${config.services.murmur.stateDir}/murmurd.env"''; 263 + example = lib.literalExpression ''"''${config.services.murmur.stateDir}/murmurd.env"''; 292 264 description = '' 293 265 Environment file as defined in {manpage}`systemd.exec(5)`. 294 266 ··· 311 283 ''; 312 284 }; 313 285 314 - dbus = mkOption { 315 - type = types.enum [ 286 + dbus = lib.mkOption { 287 + type = lib.types.enum [ 316 288 null 317 289 "session" 318 290 "system" ··· 323 295 }; 324 296 }; 325 297 326 - config = mkIf cfg.enable { 327 - users.users.murmur = mkIf (cfg.user == "murmur") { 298 + config = lib.mkIf cfg.enable { 299 + users.users.murmur = lib.mkIf (cfg.user == "murmur") { 328 300 description = "Murmur Service user"; 329 301 home = cfg.stateDir; 330 302 createHome = true; 331 303 uid = config.ids.uids.murmur; 332 304 group = cfg.group; 333 305 }; 334 - users.groups.murmur = mkIf (cfg.group == "murmur") { 306 + users.groups.murmur = lib.mkIf (cfg.group == "murmur") { 335 307 gid = config.ids.gids.murmur; 336 308 }; 337 309 338 - networking.firewall = mkIf cfg.openFirewall { 310 + networking.firewall = lib.mkIf cfg.openFirewall { 339 311 allowedTCPPorts = [ cfg.port ]; 340 312 allowedUDPPorts = [ cfg.port ]; 341 313 }; ··· 353 325 serviceConfig = { 354 326 # murmurd doesn't fork when logging to the console. 355 327 Type = if forking then "forking" else "simple"; 356 - PIDFile = mkIf forking "/run/murmur/murmurd.pid"; 357 - EnvironmentFile = mkIf (cfg.environmentFile != null) cfg.environmentFile; 328 + PIDFile = lib.mkIf forking "/run/murmur/murmurd.pid"; 329 + EnvironmentFile = lib.mkIf (cfg.environmentFile != null) cfg.environmentFile; 358 330 ExecStart = "${cfg.package}/bin/mumble-server -ini /run/murmur/murmurd.ini"; 359 331 Restart = "always"; 360 332 RuntimeDirectory = "murmur"; ··· 390 362 391 363 # currently not included in upstream package, addition requested at 392 364 # https://github.com/mumble-voip/mumble/issues/6078 393 - services.dbus.packages = mkIf (cfg.dbus == "system") [ 365 + services.dbus.packages = lib.mkIf (cfg.dbus == "system") [ 394 366 (pkgs.writeTextFile { 395 367 name = "murmur-dbus-policy"; 396 368 text = '' ··· 432 404 r /run/murmur/murmurd.ini, 433 405 r ${configFile}, 434 406 '' 435 - + optionalString (cfg.logFile != null) '' 407 + + lib.optionalString (cfg.logFile != null) '' 436 408 rw ${cfg.logFile}, 437 409 '' 438 - + optionalString (cfg.sslCert != "") '' 410 + + lib.optionalString (cfg.sslCert != "") '' 439 411 r ${cfg.sslCert}, 440 412 '' 441 - + optionalString (cfg.sslKey != "") '' 413 + + lib.optionalString (cfg.sslKey != "") '' 442 414 r ${cfg.sslKey}, 443 415 '' 444 - + optionalString (cfg.sslCa != "") '' 416 + + lib.optionalString (cfg.sslCa != "") '' 445 417 r ${cfg.sslCa}, 446 418 '' 447 - + optionalString (cfg.dbus != null) '' 419 + + lib.optionalString (cfg.dbus != null) '' 448 420 dbus bus=${cfg.dbus} 449 421 '' 450 422 + ''
+7 -6
nixos/modules/services/web-apps/lasuite-docs.nix
··· 9 9 inherit (lib) 10 10 getExe 11 11 mapAttrs 12 + match 12 13 mkEnableOption 13 14 mkIf 14 15 mkPackageOption ··· 31 32 else 32 33 toString value 33 34 ) cfg.settings; 35 + 36 + proxySuffix = if match "unix:.*" cfg.bind != null then ":" else ""; 34 37 35 38 commonServiceConfig = { 36 39 RuntimeDirectory = "lasuite-docs"; ··· 264 267 type = types.str; 265 268 default = if cfg.enableNginx then "localhost,127.0.0.1,${cfg.domain}" else ""; 266 269 defaultText = lib.literalExpression '' 267 - if cfg.enableNginx then "localhost,127.0.0.1,$${cfg.domain}" else "" 270 + if cfg.enableNginx then "localhost,127.0.0.1,''${cfg.domain}" else "" 268 271 ''; 269 272 description = "Comma-separated list of hosts that are able to connect to the server"; 270 273 }; ··· 348 351 wantedBy = [ "multi-user.target" ]; 349 352 350 353 preStart = '' 351 - ln -sfT ${cfg.backendPackage}/share/static /var/lib/lasuite-docs/static 352 - 353 354 if [ ! -f .version ]; then 354 355 touch .version 355 356 fi ··· 371 372 environment = pythonEnvironment; 372 373 373 374 serviceConfig = { 375 + BindReadOnlyPaths = "${cfg.backendPackage}/share/static:/var/lib/lasuite-docs/static"; 376 + 374 377 ExecStart = utils.escapeSystemdExecArgs ( 375 378 [ 376 379 (lib.getExe' cfg.backendPackage "gunicorn") ··· 476 479 }; 477 480 478 481 locations."/media-auth" = { 479 - proxyPass = "http://${cfg.bind}"; 482 + proxyPass = "http://${cfg.bind}${proxySuffix}/api/v1.0/documents/media-auth/"; 480 483 recommendedProxySettings = true; 481 484 extraConfig = '' 482 - rewrite $/(.*)^ /api/v1.0/documents/$1 break; 483 485 proxy_set_header X-Original-URL $request_uri; 484 486 proxy_pass_request_body off; 485 487 proxy_set_header Content-Length ""; ··· 489 491 490 492 locations."/media/" = { 491 493 proxyPass = cfg.s3Url; 492 - recommendedProxySettings = true; 493 494 extraConfig = '' 494 495 auth_request /media-auth; 495 496 auth_request_set $authHeader $upstream_http_authorization;
+2 -2
nixos/tests/minio.nix
··· 82 82 83 83 # Create a test bucket on the server 84 84 machine.succeed( 85 - "mc config host add minio http://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 85 + "mc alias set minio http://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 86 86 ) 87 87 machine.succeed("mc mb minio/test-bucket") 88 88 machine.succeed("${minioPythonScript}") ··· 101 101 102 102 # Create a test bucket on the server 103 103 machine.succeed( 104 - "mc config host add minio https://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 104 + "mc alias set minio https://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 105 105 ) 106 106 machine.succeed("mc --insecure mb minio/test-bucket") 107 107 machine.succeed("${minioPythonScript} tls")
+3 -3
pkgs/applications/editors/vim/plugins/non-generated/avante-nvim/default.nix
··· 12 12 pkgs, 13 13 }: 14 14 let 15 - version = "0.0.23-unstable-2025-05-30"; 15 + version = "0.0.23-unstable-2025-06-02"; 16 16 src = fetchFromGitHub { 17 17 owner = "yetone"; 18 18 repo = "avante.nvim"; 19 - rev = "22418bff8bcac4377ebf975cd48f716823867979"; 20 - hash = "sha256-qyeiDDjeReOr+TvgCWnKhb8FBN9t1YPFGvVqPvxXr0k="; 19 + rev = "647a459a2b87e5c9b2987cb44150b71beffdfb10"; 20 + hash = "sha256-GgLOcVp2IuMBr4aBRWJTvrAuWWiMEIHmec/S97piBaM="; 21 21 }; 22 22 avante-nvim-lib = rustPlatform.buildRustPackage { 23 23 pname = "avante-nvim-lib";
+3 -3
pkgs/applications/editors/vim/plugins/non-generated/sonarlint-nvim/default.nix
··· 6 6 }: 7 7 vimUtils.buildVimPlugin { 8 8 pname = "sonarlint.nvim"; 9 - version = "0-unstable-2025-05-16"; 9 + version = "0-unstable-2025-05-30"; 10 10 11 11 src = fetchFromGitLab { 12 12 owner = "schrieveslaach"; 13 13 repo = "sonarlint.nvim"; 14 - rev = "2aa7a9fd9d8022d1c8d472fb63ce62e021d70130"; 15 - hash = "sha256-RfQthodqF6r24I6EJxlewjYiX3jLAIb/RMAOVnWs73s="; 14 + rev = "060df51352f9fb876d4ff43b8cd4b669a6bdfd89"; 15 + hash = "sha256-2MAi0nZIvAly+5p5fWKMi3tGSzMJgMnAzWnsr0rt+NM="; 16 16 }; 17 17 18 18 passthru.updateScript = nix-update-script {
+4 -4
pkgs/applications/editors/vscode/extensions/default.nix
··· 2792 2792 mktplcRef = { 2793 2793 name = "language-julia"; 2794 2794 publisher = "julialang"; 2795 - version = "1.140.2"; 2796 - hash = "sha256-YQwJq3QSzb2pAOLyy0w8RtrjAlxudBGN52fQtj+OmOk="; 2795 + version = "1.141.2"; 2796 + hash = "sha256-i5mY037rs65BKiQLvUbu9Lup2ljhZI0owqjZ0AUsXMw="; 2797 2797 }; 2798 2798 meta = { 2799 2799 changelog = "https://marketplace.visualstudio.com/items/julialang.language-julia/changelog"; ··· 4703 4703 mktplcRef = { 4704 4704 name = "tabnine-vscode"; 4705 4705 publisher = "tabnine"; 4706 - version = "3.283.0"; 4707 - hash = "sha256-zn58iml+uN6K1qneLqnikaL5Gyk4rmNXo8TKKlO88jA="; 4706 + version = "3.287.0"; 4707 + hash = "sha256-E4ew40NNuOW9e7ZIsJjkO/4r6gbbC2IsghFbO+n27cg="; 4708 4708 }; 4709 4709 meta = { 4710 4710 license = lib.licenses.mit;
+3 -5
pkgs/applications/graphics/gimp/default.nix
··· 77 77 in 78 78 stdenv.mkDerivation (finalAttrs: { 79 79 pname = "gimp"; 80 - version = "3.0.2"; 80 + version = "3.0.4"; 81 81 82 82 outputs = [ 83 83 "out" ··· 87 87 88 88 src = fetchurl { 89 89 url = "https://download.gimp.org/gimp/v${lib.versions.majorMinor finalAttrs.version}/gimp-${finalAttrs.version}.tar.xz"; 90 - hash = "sha256-VG3cMMstDnkSPH/LTXghHh7npqrOkaagrYy8v26lcaI="; 90 + hash = "sha256-jKouwnW/CTJldWVKwnavwIP4SR58ykXRnPKeaWrsqyU="; 91 91 }; 92 92 93 93 patches = [ ··· 242 242 }; 243 243 244 244 postPatch = '' 245 - patchShebangs \ 246 - app/tests/create_test_env.sh \ 247 - tools/gimp-mkenums 245 + patchShebangs tools/gimp-mkenums 248 246 249 247 # GIMP is executed at build time so we need to fix this. 250 248 # TODO: Look into if we can fix the interp thing.
+1 -5
pkgs/applications/misc/openbangla-keyboard/default.nix
··· 62 62 ]; 63 63 64 64 cargoDeps = rustPlatform.fetchCargoVendor { 65 - inherit src; 66 - postPatch = '' 67 - cp ${./Cargo.lock} Cargo.lock 68 - ''; 69 - sourceRoot = "${src.name}/${cargoRoot}"; 65 + inherit src cargoRoot postPatch; 70 66 hash = "sha256-qZMTZi7eqEp5kSmVx7qdS7eDKOzSv9fMjWT0h/MGyeY="; 71 67 }; 72 68
+10 -10
pkgs/applications/networking/browsers/chromium/info.json
··· 1 1 { 2 2 "chromium": { 3 - "version": "137.0.7151.55", 3 + "version": "137.0.7151.68", 4 4 "chromedriver": { 5 - "version": "137.0.7151.56", 6 - "hash_darwin": "sha256-z4GTPrONaXARP0d8vInJdFxR052PuuI6IJy1PEv2RNg=", 7 - "hash_darwin_aarch64": "sha256-wlSDfCiBTdLWwabpHwOiM8Y3asn7ueHGSMh2AANaE+A=" 5 + "version": "137.0.7151.69", 6 + "hash_darwin": "sha256-G88jte6xraXrrfEvCj7zndpQ7nxyzappuu4oZ79XY8U=", 7 + "hash_darwin_aarch64": "sha256-wbOD/sVjLVcpPzrbAGu8b8YMbUOKkOt7eNxJDLKRjxo=" 8 8 }, 9 9 "deps": { 10 10 "depot_tools": { ··· 20 20 "DEPS": { 21 21 "src": { 22 22 "url": "https://chromium.googlesource.com/chromium/src.git", 23 - "rev": "254bc711794d7ad269495f3d419a209935b78cad", 24 - "hash": "sha256-dB81lgjgVK0qXWgAddB7G4L7rsJpZp+0VsjDKvGugEs=", 23 + "rev": "2989ffee9373ea8b8623bd98b3cb350a8e95cadc", 24 + "hash": "sha256-lPmmXVCNUa9of8d52hUejImPSEfOz7v7PlovZS4cfIE=", 25 25 "recompress": true 26 26 }, 27 27 "src/third_party/clang-format/script": { ··· 241 241 }, 242 242 "src/third_party/devtools-frontend/src": { 243 243 "url": "https://chromium.googlesource.com/devtools/devtools-frontend", 244 - "rev": "a54ed1df191a9e2aff2e9ef453ee6fdc959dd125", 245 - "hash": "sha256-E6sx2ioDZRWJljbS17ztRwz+gsDhIHiluvkUx1rRZcw=" 244 + "rev": "fdc8ca697612f90e7ddf2621dffbc43733d2d238", 245 + "hash": "sha256-jKYldgZJwJeTQavmcM9enTdGN8+zt/EG7K1E9wQYIBA=" 246 246 }, 247 247 "src/third_party/dom_distiller_js/dist": { 248 248 "url": "https://chromium.googlesource.com/chromium/dom-distiller/dist.git", ··· 791 791 }, 792 792 "src/v8": { 793 793 "url": "https://chromium.googlesource.com/v8/v8.git", 794 - "rev": "44fdd9108308773dd3f4fa040de5f4f75edf671f", 795 - "hash": "sha256-BkLOmb97p2NcAIuQiDjIoVAe49h9iv79rC5G8wyD1as=" 794 + "rev": "e398f9bf6d5c8a768ab736f46146d7349cf31547", 795 + "hash": "sha256-cJx8IgUB3UA3jEPvb5aDvHLYmAnHydK1qR11q6Y5PnA=" 796 796 } 797 797 } 798 798 },
+23 -23
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 126 126 "vendorHash": null 127 127 }, 128 128 "aws": { 129 - "hash": "sha256-gBVJx6rk7rjrvyLaDJrHUmLRUbvgy60c/uQwsFXuQzA=", 129 + "hash": "sha256-asrIQrhSSHjuOBFomgq9lbHc8rmkcy3OjJ5ig9I7XbU=", 130 130 "homepage": "https://registry.terraform.io/providers/hashicorp/aws", 131 131 "owner": "hashicorp", 132 132 "repo": "terraform-provider-aws", 133 - "rev": "v5.98.0", 133 + "rev": "v5.99.1", 134 134 "spdx": "MPL-2.0", 135 - "vendorHash": "sha256-OxyOD/um7hOpYpsZCyNnbdvo5K/r/L7JlWvXQBncIDw=" 135 + "vendorHash": "sha256-low0aq3i3pmqbadYg1VZra+ZzoV6nqyGutf8xzaces0=" 136 136 }, 137 137 "azuread": { 138 138 "hash": "sha256-lNjU/206yS+smSe1SYlz0TOqHRlvSQKqhJ67fswNlIQ=", ··· 216 216 "vendorHash": "sha256-arLGaa/o9X0MYg/qIl6qhpBqcduu5Bu06FteR5KGSPw=" 217 217 }, 218 218 "buildkite": { 219 - "hash": "sha256-+9gxJjLVExnpWtcF1NRQoKPg0jn1zGNSkmim5YFgs4w=", 219 + "hash": "sha256-u2BkD6h12drlz6MQIjoi/EFSj7l1dBWBjHVSmL+hB4g=", 220 220 "homepage": "https://registry.terraform.io/providers/buildkite/buildkite", 221 221 "owner": "buildkite", 222 222 "repo": "terraform-provider-buildkite", 223 - "rev": "v1.18.0", 223 + "rev": "v1.19.0", 224 224 "spdx": "MIT", 225 225 "vendorHash": "sha256-bhPpFPn1hdpSJYTvO1HWTrFRBvcm8gIDmMEGOaFjM6c=" 226 226 }, ··· 390 390 "vendorHash": "sha256-xu5t7VaLvbwo/Q7Xb4mkNt7UjU+hzfk7NgfFlxwbIhU=" 391 391 }, 392 392 "dnsimple": { 393 - "hash": "sha256-CkfgHBNtYCFZIMoXpX0ivkm1dyIs4mKSrHaiQ3qt/+w=", 393 + "hash": "sha256-7o8shnWECaCLTCvmXrJ2eYloxtln2A2No8OK8Ig36qE=", 394 394 "homepage": "https://registry.terraform.io/providers/dnsimple/dnsimple", 395 395 "owner": "dnsimple", 396 396 "repo": "terraform-provider-dnsimple", 397 - "rev": "v1.9.0", 397 + "rev": "v1.9.1", 398 398 "spdx": "MPL-2.0", 399 - "vendorHash": "sha256-WZqwBkVXoFmDikIyt9GWszLA/9YBoQHAdBuWbGKZBZw=" 399 + "vendorHash": "sha256-0axKIqF1t4AW1PPi+fHfsFQLRrjhpsloQIZ9clR+8Gc=" 400 400 }, 401 401 "docker": { 402 402 "hash": "sha256-sPeX1bupACBSmt8ppyxQKyD+FXIPdCBWn8cnOAvNHwQ=", ··· 516 516 "vendorHash": "sha256-X0vbtUIKYzCeRD/BbMj3VPVAwx6d7gkbHV8j9JXlaFM=" 517 517 }, 518 518 "google": { 519 - "hash": "sha256-q/BFHpA3ig0QfB0mhJGqr/uQYs/SH5YX8QgWCyjcSio=", 519 + "hash": "sha256-TSDkXXYkneTsY10WV5cSFzOX04kFdFVHJPgpKt5hBSE=", 520 520 "homepage": "https://registry.terraform.io/providers/hashicorp/google", 521 521 "owner": "hashicorp", 522 522 "repo": "terraform-provider-google", 523 - "rev": "v6.36.1", 523 + "rev": "v6.37.0", 524 524 "spdx": "MPL-2.0", 525 - "vendorHash": "sha256-rGpnPH8ebHXasvelGoJEUU4YbeGJY4adFBbgAHJ8vSs=" 525 + "vendorHash": "sha256-YZI6zhxXU2aABARP6GcTMeU98F4+imbL1vKIEMzsJHM=" 526 526 }, 527 527 "google-beta": { 528 528 "hash": "sha256-VpfIfzIG1h5qnvEqogCK359LLLSgdgxg0DtRGvdZtLU=", ··· 840 840 "vendorHash": "sha256-7AU79r4OQbmrMI385KVIHon/4pWk6J9qnH+zQRrWtJI=" 841 841 }, 842 842 "mongodbatlas": { 843 - "hash": "sha256-JQW9y1EfrEInmz2+Er8BE0+6ZdcrO/w1y+czg7jPeRE=", 843 + "hash": "sha256-+JYvL6xGA2zIOg2fl8Bl7CYU4x9N4aVJpIl/6PYdyPU=", 844 844 "homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas", 845 845 "owner": "mongodb", 846 846 "repo": "terraform-provider-mongodbatlas", 847 - "rev": "v1.34.0", 847 + "rev": "v1.35.1", 848 848 "spdx": "MPL-2.0", 849 - "vendorHash": "sha256-y9dhiG0zyOcvjgygLEW2o+GPXUug0ibxC2aLvfcY260=" 849 + "vendorHash": "sha256-fz6e/QEcWQY7ZrWyUbk8M/+RPB8dwN3NHPLmNLyGVhQ=" 850 850 }, 851 851 "namecheap": { 852 852 "hash": "sha256-fHH9sHI1mqQ9q9nX9DHJ0qfEfmDB4/2uzyVvUuIAF18=", ··· 1084 1084 "vendorHash": "sha256-j+3qtGlueKZgf0LuNps4Wc9G3EmpSgl8ZNSLqslyizI=" 1085 1085 }, 1086 1086 "rancher2": { 1087 - "hash": "sha256-H6ZdGvKSYRlDsCKIHlPHdEv1+6aa1rll/73IeJ+PDhc=", 1087 + "hash": "sha256-5NkvGETjJ5eoZC5Ohnoq2y1DQVs2WTrh/wEVO1HQsOA=", 1088 1088 "homepage": "https://registry.terraform.io/providers/rancher/rancher2", 1089 1089 "owner": "rancher", 1090 1090 "repo": "terraform-provider-rancher2", 1091 - "rev": "v7.0.0", 1091 + "rev": "v7.2.0", 1092 1092 "spdx": "MPL-2.0", 1093 1093 "vendorHash": "sha256-M2lJKmIR66lQKFkInjizn68ax2Gq4sim5Y3vZKyDhZ8=" 1094 1094 }, ··· 1111 1111 "vendorHash": "sha256-xo0alLK3fccbKRG5bN1G7orDsP47I3ySAzpZ9O0f2Fg=" 1112 1112 }, 1113 1113 "rootly": { 1114 - "hash": "sha256-SwZm4XCQUf3TQ6m77fAnhHMoW6ckpO5XSnjpEYuNyec=", 1114 + "hash": "sha256-2TVqXQYiCMsMQJtZMWtYiPbeOOsPck5Hpu6cmo9ZaIM=", 1115 1115 "homepage": "https://registry.terraform.io/providers/rootlyhq/rootly", 1116 1116 "owner": "rootlyhq", 1117 1117 "repo": "terraform-provider-rootly", 1118 - "rev": "v2.27.1", 1118 + "rev": "v2.27.2", 1119 1119 "spdx": "MPL-2.0", 1120 1120 "vendorHash": "sha256-KezwDRmQQj0MnmsVlrX1OhNG6oMgw8fCxX5VFGdUynw=" 1121 1121 }, ··· 1327 1327 "vendorHash": "sha256-HBdvXWZNPPAqPEKodwG0ZeiJOhfJHe9HRCcuozKpwVs=" 1328 1328 }, 1329 1329 "tencentcloud": { 1330 - "hash": "sha256-CHYuiAgzFIAApK8wZ75DtgVf8sAEVwrXP7l/l+VxB1o=", 1330 + "hash": "sha256-JMLuH/NDCNiByLh65NQH/goaN7/J7MGfsUNKfHJ3LFQ=", 1331 1331 "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", 1332 1332 "owner": "tencentcloudstack", 1333 1333 "repo": "terraform-provider-tencentcloud", 1334 - "rev": "v1.81.194", 1334 + "rev": "v1.81.197", 1335 1335 "spdx": "MPL-2.0", 1336 1336 "vendorHash": null 1337 1337 }, 1338 1338 "tfe": { 1339 - "hash": "sha256-hMpCuLAnwwAb8ugKxKDuFvtII2k/lcwYYL0sCvZewOY=", 1339 + "hash": "sha256-w66HR1X/EUloz3W/6aBNvTsC5vWuAZytd2ej7DHVMU0=", 1340 1340 "homepage": "https://registry.terraform.io/providers/hashicorp/tfe", 1341 1341 "owner": "hashicorp", 1342 1342 "repo": "terraform-provider-tfe", 1343 - "rev": "v0.65.2", 1343 + "rev": "v0.66.0", 1344 1344 "spdx": "MPL-2.0", 1345 - "vendorHash": "sha256-PSUob2u8hue5ii+kV4bGcvexkIQxzWsHbbEbYO0celU=" 1345 + "vendorHash": "sha256-z1gbeYR+UFl+sBgehLgBITc9VwxEV6bRpN9A/4Fp7Oc=" 1346 1346 }, 1347 1347 "thunder": { 1348 1348 "hash": "sha256-2i1DSOSt/vbFs0QCPogEBvADhLJFKbrQzwZ20ChCQMk=",
+3 -3
pkgs/applications/networking/cluster/timoni/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "timoni"; 10 - version = "0.24.0"; 10 + version = "0.25.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "stefanprodan"; 14 14 repo = "timoni"; 15 15 rev = "v${version}"; 16 - hash = "sha256-nI0yy/zhsJUvisHo+C+/uNRF96ZQ1Ve8VWpE8ZvUeJc="; 16 + hash = "sha256-Obx8I8n2UY6sTHKQ0qFNQ50XI+ajrbQtjQ7PCVwrSTI="; 17 17 }; 18 18 19 - vendorHash = "sha256-YpwESaR+X2eOyaPdR+I3mURD7yvwzmpPmgPoSPrXjH8="; 19 + vendorHash = "sha256-hCvFe27DdX/pAeyfSEDx5oiLEZjhldOVDz6ElsUPjJs="; 20 20 21 21 subPackages = [ "cmd/timoni" ]; 22 22 nativeBuildInputs = [ installShellFiles ];
+1 -2
pkgs/applications/science/electronics/librepcb/default.nix
··· 42 42 buildInputs = [ qtbase ]; 43 43 44 44 cargoDeps = rustPlatform.fetchCargoVendor { 45 - inherit src; 46 - sourceRoot = "source/${cargoRoot}"; 45 + inherit src cargoRoot; 47 46 hash = "sha256-1td3WjxbDq2lX7c0trpYRhO82ChNAG/ZABBRsekYtq4="; 48 47 }; 49 48
+8 -20
pkgs/applications/video/animdl/default.nix pkgs/by-name/an/animdl/package.nix
··· 1 1 { 2 2 lib, 3 - buildPythonApplication, 4 3 fetchFromGitHub, 5 - poetry-core, 6 - anchor-kr, 7 - anitopy, 8 - click, 9 - cssselect, 10 - httpx, 11 - lxml, 12 - packaging, 13 - pkginfo, 14 - pycryptodomex, 15 - pyyaml, 16 - regex, 17 - rich, 18 - tqdm, 19 - yarl, 4 + python3Packages, 20 5 }: 21 - buildPythonApplication { 6 + python3Packages.buildPythonApplication { 22 7 pname = "animdl"; 23 8 version = "1.7.27"; 24 - format = "pyproject"; 9 + pyproject = true; 25 10 26 11 src = fetchFromGitHub { 27 12 owner = "justfoolingaround"; ··· 34 19 pythonRemoveDeps = [ 35 20 "comtypes" # windows only 36 21 ]; 22 + 37 23 pythonRelaxDeps = [ 24 + "cssselect" 38 25 "httpx" 39 26 "lxml" 40 27 "packaging" ··· 45 32 "yarl" 46 33 ]; 47 34 48 - nativeBuildInputs = [ 35 + build-system = with python3Packages; [ 49 36 poetry-core 50 37 ]; 51 - propagatedBuildInputs = [ 38 + 39 + dependencies = with python3Packages; [ 52 40 anchor-kr 53 41 anitopy 54 42 click
+8
pkgs/applications/video/obs-studio/plugins/default.nix
··· 22 22 23 23 obs-advanced-masks = callPackage ./obs-advanced-masks.nix { }; 24 24 25 + obs-aitum-multistream = qt6Packages.callPackage ./obs-aitum-multistream.nix { }; 26 + 25 27 obs-backgroundremoval = callPackage ./obs-backgroundremoval { }; 26 28 27 29 obs-color-monitor = qt6Packages.callPackage ./obs-color-monitor.nix { }; ··· 29 31 obs-command-source = callPackage ./obs-command-source.nix { }; 30 32 31 33 obs-composite-blur = callPackage ./obs-composite-blur.nix { }; 34 + 35 + obs-dir-watch-media = callPackage ./obs-dir-watch-media.nix { }; 32 36 33 37 obs-dvd-screensaver = callPackage ./obs-dvd-screensaver.nix { }; 34 38 ··· 42 46 43 47 obs-livesplit-one = callPackage ./obs-livesplit-one { }; 44 48 49 + obs-markdown = callPackage ./obs-markdown.nix { }; 50 + 45 51 obs-media-controls = qt6Packages.callPackage ./obs-media-controls.nix { }; 46 52 47 53 obs-move-transition = callPackage ./obs-move-transition.nix { }; ··· 61 67 obs-recursion-effect = callPackage ./obs-recursion-effect.nix { }; 62 68 63 69 obs-replay-source = qt6Packages.callPackage ./obs-replay-source.nix { }; 70 + 71 + obs-retro-effects = callPackage ./obs-retro-effects.nix { }; 64 72 65 73 obs-rgb-levels = callPackage ./obs-rgb-levels.nix { }; 66 74
+51
pkgs/applications/video/obs-studio/plugins/obs-aitum-multistream.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + curl, 7 + obs-studio, 8 + qtbase, 9 + }: 10 + 11 + stdenv.mkDerivation rec { 12 + pname = "obs-aitum-multistream"; 13 + version = "1.0.7"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "Aitum"; 17 + repo = "obs-aitum-multistream"; 18 + tag = version; 19 + hash = "sha256-TqddyTBRWLyfwYi9I0nQE8Z19YL2RwkZqUwi7F9XpwQ="; 20 + }; 21 + 22 + # Fix FTBFS with Qt >= 6.8 23 + prePatch = '' 24 + substituteInPlace CMakeLists.txt \ 25 + --replace-fail 'find_qt(COMPONENTS Widgets Core)' 'find_package(Qt6 REQUIRED COMPONENTS Core Widgets)' 26 + ''; 27 + 28 + nativeBuildInputs = [ cmake ]; 29 + buildInputs = [ 30 + curl 31 + obs-studio 32 + qtbase 33 + ]; 34 + dontWrapQtApps = true; 35 + 36 + cmakeFlags = [ 37 + # Prevent deprecation warnings from failing the build 38 + (lib.cmakeOptionType "string" "CMAKE_CXX_FLAGS" "-Wno-error=deprecated-declarations") 39 + ]; 40 + 41 + meta = { 42 + description = "Plugin to stream everywhere from a single instance of OBS"; 43 + homepage = "https://github.com/Aitum/obs-aitum-multistream"; 44 + maintainers = with lib.maintainers; [ flexiondotorg ]; 45 + license = lib.licenses.gpl2Plus; 46 + platforms = [ 47 + "x86_64-linux" 48 + "i686-linux" 49 + ]; 50 + }; 51 + }
+37
pkgs/applications/video/obs-studio/plugins/obs-dir-watch-media.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + obs-studio, 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "obs-dir-watch-media"; 11 + version = "0.7.0"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "exeldro"; 15 + repo = "obs-dir-watch-media"; 16 + rev = version; 17 + sha256 = "sha256-zvg8Bu5wlcQe91ggteEj7G9Kx+mY1R6EN64T13vp7pc="; 18 + }; 19 + 20 + nativeBuildInputs = [ cmake ]; 21 + buildInputs = [ obs-studio ]; 22 + 23 + postInstall = '' 24 + rm -rf $out/obs-plugins $out/data 25 + ''; 26 + 27 + meta = with lib; { 28 + description = "Plugin for OBS Studio adding a filter that can watch a directory for media files"; 29 + homepage = "https://github.com/exeldro/obs-dir-watch-media"; 30 + maintainers = with maintainers; [ flexiondotorg ]; 31 + license = licenses.gpl2Only; 32 + platforms = [ 33 + "x86_64-linux" 34 + "i686-linux" 35 + ]; 36 + }; 37 + }
+37
pkgs/applications/video/obs-studio/plugins/obs-markdown.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + obs-studio, 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "obs-markdown"; 11 + version = "0.2.7"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "exeldro"; 15 + repo = "obs-markdown"; 16 + rev = version; 17 + sha256 = "sha256-5ajX/cEa0n12Putx1k3ctl1v9wRzJRhyJNDlmjSMbeU="; 18 + }; 19 + 20 + nativeBuildInputs = [ cmake ]; 21 + buildInputs = [ obs-studio ]; 22 + 23 + postInstall = '' 24 + rm -rf $out/obs-plugins $out/data 25 + ''; 26 + 27 + meta = with lib; { 28 + description = "Plugin for OBS Studio to add Markdown sources"; 29 + homepage = "https://github.com/exeldro/obs-markdown"; 30 + maintainers = with maintainers; [ flexiondotorg ]; 31 + license = licenses.gpl2Only; 32 + platforms = [ 33 + "x86_64-linux" 34 + "i686-linux" 35 + ]; 36 + }; 37 + }
+39
pkgs/applications/video/obs-studio/plugins/obs-retro-effects.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + obs-studio, 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "obs-retro-effects"; 11 + version = "1.0.0"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "FiniteSingularity"; 15 + repo = "obs-retro-effects"; 16 + rev = "${version}"; 17 + sha256 = "sha256-+dg5ySleMb9abT9kIM7HvRSRx9V08B9XPjfoAVe+tWY="; 18 + }; 19 + 20 + nativeBuildInputs = [ cmake ]; 21 + buildInputs = [ obs-studio ]; 22 + 23 + postFixup = '' 24 + mv $out/data/obs-plugins/${pname}/shaders $out/share/obs/obs-plugins/${pname}/ 25 + rm -rf $out/obs-plugins 26 + rm -rf $out/data 27 + ''; 28 + 29 + meta = with lib; { 30 + description = "A collection of OBS filters to give your stream that retro feel."; 31 + homepage = "https://github.com/FiniteSingularity/obs-retro-effects"; 32 + maintainers = with maintainers; [ flexiondotorg ]; 33 + license = licenses.gpl2Plus; 34 + platforms = [ 35 + "x86_64-linux" 36 + "i686-linux" 37 + ]; 38 + }; 39 + }
+3 -1
pkgs/build-support/fetchgit/tests.nix
··· 90 90 rev = "9d9dbe6ed05854e03811c361a3380e09183f4f4a"; 91 91 fetchTags = true; 92 92 leaveDotGit = true; 93 - sha256 = "sha256-2vfZnYjZlnC8ODz6B6aOqAqtb1Wbjojnn/5TmzwUrmo="; 93 + sha256 = "sha256-y7l+46lVP2pzJwGON5qEV0EoxWofRoWAym5q9VXvpc8="; 94 94 postFetch = '' 95 95 cd $out && git describe --tags --always > describe-output.txt 2>&1 || echo "git describe failed" > describe-output.txt 96 + # See https://github.com/NixOS/nixpkgs/issues/412967#issuecomment-2927452118 97 + rm -rf .git 96 98 ''; 97 99 }; 98 100 }
+2 -2
pkgs/by-name/ac/act/package.nix
··· 8 8 }: 9 9 10 10 let 11 - version = "0.2.77"; 11 + version = "0.2.78"; 12 12 in 13 13 buildGoModule { 14 14 pname = "act"; ··· 18 18 owner = "nektos"; 19 19 repo = "act"; 20 20 tag = "v${version}"; 21 - hash = "sha256-bcqHj40lySE2xXGuUbXbH5cjQ5NoJCvjE/uX8HaKVho="; 21 + hash = "sha256-S4Ev7MszuvlsUstnjOltYnZTuhzeqP/GDqMEWsFLe5Y="; 22 22 }; 23 23 24 24 vendorHash = "sha256-YH5SIZ73VYqg7+sSJpvqkIlBUy1rs3uNEWiEBDRdkQw=";
+3 -3
pkgs/by-name/al/alertmanager-ntfy/package.nix
··· 8 8 9 9 buildGoModule { 10 10 pname = "alertmanager-ntfy"; 11 - version = "0-unstable-2025-05-04"; 11 + version = "0-unstable-2025-05-31"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "alexbakker"; 15 15 repo = "alertmanager-ntfy"; 16 - rev = "f05e3c029bab3bdfb9aefbddbfc6bd9c7d4aa80f"; 17 - hash = "sha256-rKCJnffsBEXmTg2s0nqQf8BuHQnSgcwVBhC7gRzg4ew="; 16 + rev = "76d5f772f70d6915c89da00414c20009b03cc361"; 17 + hash = "sha256-newJ1fCMEE3gsZncWU899Q6cS6llPNwJlHT7HdLQZf8="; 18 18 }; 19 19 20 20 vendorHash = "sha256-e1JAoDNm2+xB/bZcEGr5l4+va8GIg1R8pdj3d+/Y+UY=";
+3 -15
pkgs/by-name/bo/bootspec/package.nix
··· 2 2 lib, 3 3 rustPlatform, 4 4 fetchFromGitHub, 5 - fetchpatch, 6 5 }: 7 6 rustPlatform.buildRustPackage rec { 8 7 pname = "bootspec"; 9 - version = "1.0.0"; 8 + version = "1.0.1"; 10 9 11 10 src = fetchFromGitHub { 12 11 owner = "DeterminateSystems"; 13 12 repo = "bootspec"; 14 13 rev = "v${version}"; 15 - hash = "sha256-5IGSMHeL0eKfl7teDejAckYQjc8aeLwfwIQSzQ8YaAg="; 14 + hash = "sha256-0MO+SqG7Gjq+fmMJkIFvaKsfTmC7z3lGfi7bbBv7iBE="; 16 15 }; 17 16 18 - patches = [ 19 - # https://github.com/DeterminateSystems/bootspec/pull/127 20 - # Fixes the synthesize tool for aarch64-linux 21 - (fetchpatch { 22 - name = "aarch64-support.patch"; 23 - url = "https://github.com/DeterminateSystems/bootspec/commit/1d0e925f360f0199f13422fb7541225fd162fd4f.patch"; 24 - sha256 = "sha256-wU/jWnOqVBrU2swANdXbQfzRpNd/JIS4cxSyCvixZM0="; 25 - }) 26 - 27 - ]; 28 - 29 17 useFetchCargoVendor = true; 30 - cargoHash = "sha256-65jk8UlXZgQoxuwRcGlMnI4e+LpCJuP2TaqK+Kn4GnQ="; 18 + cargoHash = "sha256-fKbF5SyI0UlZTWsygdE8BGWuOoNSU4jx+CGdJoJFhZs="; 31 19 32 20 meta = with lib; { 33 21 description = "Implementation of RFC-0125's datatype and synthesis tooling";
+5 -3
pkgs/by-name/bu/burpsuite/package.nix
··· 9 9 }: 10 10 11 11 let 12 - version = "2025.4.2"; 12 + version = "2025.5.1"; 13 13 14 14 product = 15 15 if proEdition then 16 16 { 17 17 productName = "pro"; 18 18 productDesktop = "Burp Suite Professional Edition"; 19 - hash = "sha256-wtCZ3/7JvygSCka4i3Il2ajpSuuTPTwHeVJa4gGFDPw="; 19 + hash = "sha256-1AXAVXselQKqKsjTRJVN3rBQpSReTH3d0ulIahp9QCc="; 20 20 } 21 21 else 22 22 { 23 23 productName = "community"; 24 24 productDesktop = "Burp Suite Community Edition"; 25 - hash = "sha256-+1aTq7XKacsi/gzUpeZvSuwpKPDMo6H3C81pxWCC4w8="; 25 + hash = "sha256-zX5QJz996WgKvDA6p5dRtmbZTRsgCl0URn302MkhVew="; 26 26 }; 27 27 28 28 src = fetchurl { ··· 90 90 ${lib.getBin unzip}/bin/unzip -p ${src} resources/Media/icon64${product.productName}.png > "$out/share/pixmaps/burpsuite.png" 91 91 cp -r ${desktopItem}/share/applications $out/share 92 92 ''; 93 + 94 + passthru.updateScript = ./update.sh; 93 95 94 96 meta = with lib; { 95 97 inherit description;
+39
pkgs/by-name/bu/burpsuite/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p curl jq xxd gnused diffutils 3 + set -eu -o pipefail 4 + 5 + SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" &>/dev/null && pwd)" 6 + 7 + curl -s 'https://portswigger.net/burp/releases/data' | 8 + jq -r ' 9 + [[ 10 + .ResultSet.Results[] 11 + | select( 12 + (.categories | sort) == (["Professional","Community"] | sort) 13 + and .releaseChannels == ["Early Adopter"] 14 + ) 15 + ][0].builds[] 16 + | select(.ProductPlatform == "Jar") 17 + ]' >latest.json 18 + 19 + version=$(jq -r '.[0].Version' latest.json) 20 + 21 + comm_hex=$(jq -r '.[] | select(.ProductId=="community") .Sha256Checksum' latest.json) 22 + pro_hex=$(jq -r '.[] | select(.ProductId=="pro") .Sha256Checksum' latest.json) 23 + 24 + comm_sri="sha256-$(printf %s "$comm_hex" | xxd -r -p | base64 -w0)" 25 + pro_sri="sha256-$(printf %s "$pro_hex" | xxd -r -p | base64 -w0)" 26 + 27 + sed -i \ 28 + -e "s|^\(\s*version = \)\"[^\"]*\";|\1\"$version\";|" \ 29 + -e "/productName = \"community\"/,/hash =/ { 30 + s|sha256-[^\"]*|$comm_sri| 31 + }" \ 32 + -e "/productName = \"pro\"/,/hash =/ { 33 + s|sha256-[^\"]*|$pro_sri| 34 + }" \ 35 + $SCRIPT_DIR/package.nix 36 + 37 + echo "burpsuite → $version" 38 + echo " community: $comm_sri" 39 + echo " pro : $pro_sri"
+1 -3
pkgs/by-name/cc/ccextractor/package.nix
··· 49 49 cargoRoot = "src/rust"; 50 50 51 51 cargoDeps = rustPlatform.fetchCargoVendor { 52 - inherit (finalAttrs) src; 53 - sourceRoot = "${finalAttrs.src.name}/${finalAttrs.cargoRoot}"; 52 + inherit (finalAttrs) src cargoRoot; 54 53 patches = [ ./use-rsmpeg-0.15.patch ]; 55 - patchFlags = [ "-p3" ]; 56 54 hash = "sha256-7v3gQghByUDWZLJRRGa/7X2ivUumirq6BbexNQcCXCk="; 57 55 }; 58 56
+2 -2
pkgs/by-name/cd/cdncheck/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "cdncheck"; 9 - version = "1.1.20"; 9 + version = "1.1.21"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "projectdiscovery"; 13 13 repo = "cdncheck"; 14 14 tag = "v${version}"; 15 - hash = "sha256-qL2SNVHsAH+Z0A5Vv+kBa1O9VgdR7eZ29Z19s5GuTXA="; 15 + hash = "sha256-GTYgo5rx4PrWLytqdH3LrasgyEAr1FuPyI26tGRaV0A="; 16 16 }; 17 17 18 18 vendorHash = "sha256-/1REkZ5+sz/H4T4lXhloz7fu5cLv1GoaD3dlttN+Qd4=";
+3 -3
pkgs/by-name/ch/chart-testing/package.nix
··· 14 14 15 15 buildGoModule rec { 16 16 pname = "chart-testing"; 17 - version = "3.12.0"; 17 + version = "3.13.0"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "helm"; 21 21 repo = "chart-testing"; 22 22 rev = "v${version}"; 23 - hash = "sha256-q56ZM+YzL7RRC3RD3xO3K0hIDomKun5xmSKuiDTq1cU="; 23 + hash = "sha256-59a86yR/TDAWGCsj3pbDjXJGMvyHYnjsnxzjWr61PuU="; 24 24 }; 25 25 26 - vendorHash = "sha256-kTlqGZVOppf+WMcFw0T9FVbu9eOWAWzotR8fPPyo2Ms="; 26 + vendorHash = "sha256-aVXISRthJxxvtrfC0DpewLHCiJPh4tO+SKl3Q9uP14k="; 27 27 28 28 postPatch = '' 29 29 substituteInPlace pkg/config/config.go \
+3 -3
pkgs/by-name/ch/chirp/package.nix
··· 11 11 12 12 python3Packages.buildPythonApplication { 13 13 pname = "chirp"; 14 - version = "0.4.0-unstable-2025-05-14"; 14 + version = "0.4.0-unstable-2025-05-29"; 15 15 pyproject = true; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "kk7ds"; 19 19 repo = "chirp"; 20 - rev = "eb4e4547b517c3d10ede760bcd31eeb448c455dc"; 21 - hash = "sha256-e10WFYpIy6JnPAqUcapli9Q6R0GxNwb1YjnE4cu+xfk="; 20 + rev = "db838b0c1ae9b0964efcd625c415a76ff9fbea4a"; 21 + hash = "sha256-C8sicZ4krALpsRFbX8Ls5GZc7FUimg2Ix6WsQP2oMvw="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+3 -3
pkgs/by-name/cl/clorinde/package.nix
··· 8 8 9 9 rustPlatform.buildRustPackage (finalAttrs: { 10 10 pname = "clorinde"; 11 - version = "0.15.1"; 11 + version = "0.15.2"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "halcyonnouveau"; 15 15 repo = "clorinde"; 16 16 tag = "clorinde-v${finalAttrs.version}"; 17 - hash = "sha256-Ynz1pdgckQzMLuUJUGSzNRNwWZKrEZuYgrrT/BxAxzc="; 17 + hash = "sha256-CrgJtgFX5RBNfFFr2ZZ0d3oKfryyLAHva7g2JyBFiB8="; 18 18 }; 19 19 20 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-g3pWvoTq1DlKlIDJq79IJrvDiLR0HZRPIt4K1YUPsvM="; 21 + cargoHash = "sha256-jUtkhOAosrxHGRbAdzdrgLzL5Xp2YhxcrG/dcwUhdLg="; 22 22 23 23 cargoBuildFlags = [ "--package=clorinde" ]; 24 24
+5 -5
pkgs/by-name/cl/clouddrive2/package.nix
··· 11 11 in 12 12 stdenv.mkDerivation (finalAttrs: { 13 13 pname = "clouddrive2"; 14 - version = "0.8.19"; 14 + version = "0.8.20"; 15 15 16 16 src = fetchurl { 17 17 url = "https://github.com/cloud-fs/cloud-fs.github.io/releases/download/v${finalAttrs.version}/clouddrive-2-${os}-${arch}-${finalAttrs.version}.tgz"; 18 18 hash = 19 19 { 20 - x86_64-linux = "sha256-pLimn6OfqByOyFIDYq0VD4yQ0BpL+st5VwYBKP5zSug="; 21 - aarch64-linux = "sha256-Xr3locwzuCg0LRPvNBphhleHFZOnXLi9Md8R17k4vWU="; 22 - x86_64-darwin = "sha256-klwicOa/jbjsGL09HR6v2CTA+vhHd1EjCbblAmEPqWQ="; 23 - aarch64-darwin = "sha256-47AbC8SHDb1hRlePF6CszHqf2gpwIxsOhJK4+PMCHbQ="; 20 + x86_64-linux = "sha256-pDZmrPLIppMMj8KqNGQLUM4ue43vSwVyEKCYrN0G2LM="; 21 + aarch64-linux = "sha256-GraqtexpHN+bpArA1HQDYC7DG2QHK1P7o9QDXyFEir4="; 22 + x86_64-darwin = "sha256-X/Gf4OipbUM8FwAYfA1+yMBVbsZK5UYz4HFiOYYaTdA="; 23 + aarch64-darwin = "sha256-jmsj1VPpxTgly0xIB5pxl79NBZe1zp9rqAYePScMe80="; 24 24 } 25 25 .${stdenv.hostPlatform.system} or (throw "unsupported system ${stdenv.hostPlatform.system}"); 26 26 };
+2 -2
pkgs/by-name/di/diffoscope/package.nix
··· 106 106 # Note: when upgrading this package, please run the list-missing-tools.sh script as described below! 107 107 python.pkgs.buildPythonApplication rec { 108 108 pname = "diffoscope"; 109 - version = "295"; 109 + version = "297"; 110 110 111 111 src = fetchurl { 112 112 url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2"; 113 - hash = "sha256-BxyE14vXS7lGFwWsruDAcdXMRsoETFwXPQxfMpSh1+E="; 113 + hash = "sha256-3dEZb7XZluTi+sUTgSqwLzCdNMJwekt1Em0XEDSAY/E="; 114 114 }; 115 115 116 116 outputs = [
+2 -2
pkgs/by-name/di/distroshelf/package.nix
··· 17 17 18 18 stdenv.mkDerivation (finalAttrs: { 19 19 pname = "distroshelf"; 20 - version = "1.0.7"; 20 + version = "1.0.8"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "ranfdev"; 24 24 repo = "DistroShelf"; 25 25 tag = "v${finalAttrs.version}"; 26 - hash = "sha256-4xiqdLSmO9LXfVwF/QRJL8BhZDsNistdGVVT4YDdt4A="; 26 + hash = "sha256-UZP/VohgYUe6Ly89oD9WlYyiAfQmTK1lXnf5TipoiNI="; 27 27 }; 28 28 29 29 cargoDeps = rustPlatform.fetchCargoVendor {
+3 -3
pkgs/by-name/dp/dprint/plugins/dprint-plugin-typescript.nix
··· 1 1 { mkDprintPlugin }: 2 2 mkDprintPlugin { 3 3 description = "TypeScript/JavaScript code formatter."; 4 - hash = "sha256-g41K7aTCZZc1zRoc9k1oG8rk88ZwJJH3jnnX+MKQ9mE="; 4 + hash = "sha256-sn10yaYbp6VWspqEMKCd7HbDvKi35AW5Xn8FGzzN3kM="; 5 5 initConfig = { 6 6 configExcludes = [ "**/node_modules" ]; 7 7 configKey = "typescript"; ··· 16 16 }; 17 17 pname = "dprint-plugin-typescript"; 18 18 updateUrl = "https://plugins.dprint.dev/dprint/typescript/latest.json"; 19 - url = "https://plugins.dprint.dev/typescript-0.95.4.wasm"; 20 - version = "0.95.4"; 19 + url = "https://plugins.dprint.dev/typescript-0.95.5.wasm"; 20 + version = "0.95.5"; 21 21 }
+3 -3
pkgs/by-name/dr/dracula-theme/package.nix
··· 8 8 9 9 let 10 10 themeName = "Dracula"; 11 - version = "4.0.0-unstable-2025-04-27"; 11 + version = "4.0.0-unstable-2025-05-24"; 12 12 in 13 13 stdenvNoCC.mkDerivation { 14 14 pname = "dracula-theme"; ··· 17 17 src = fetchFromGitHub { 18 18 owner = "dracula"; 19 19 repo = "gtk"; 20 - rev = "3834a1bac175b226cff6b1c94faac9aba2819bd5"; 21 - hash = "sha256-T0X0h4Bz3sy5jqtB1PkpjFnB8jO3CehOxgRwPPG54Ds="; 20 + rev = "74255b110e7e5f50a07f500f739bc59c2cbee472"; 21 + hash = "sha256-0NA/MTmcgRlR6JEOFz1+SgyoRwRygygEWAQDrpznA5w="; 22 22 }; 23 23 24 24 propagatedUserEnvPkgs = [
+47
pkgs/by-name/ds/dsnet/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + buildGoModule, 6 + }: 7 + 8 + buildGoModule (finalAttrs: { 9 + pname = "dsnet"; 10 + version = "0.8.1"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "naggie"; 14 + repo = "dsnet"; 15 + tag = "v${finalAttrs.version}"; 16 + hash = "sha256-CKDtILZMWFeSU5nTSguM2fi0BCFdvR2LqELIZ6LYOMk="; 17 + }; 18 + vendorHash = "sha256-Q2Ipj9yZ+/GUBEmDvgwFLLww7EXnbvdvj/shGQnh1G8="; 19 + 20 + subPackages = [ "cmd" ]; 21 + 22 + postInstall = '' 23 + mv $out/bin/cmd $out/bin/dsnet 24 + ''; 25 + 26 + # The ldflags reduce the executable size by stripping some debug stuff. 27 + # The other variables are set so that the output of dsnet version shows the 28 + # git ref and the release version from github. 29 + # Ref <https://github.com/NixOS/nixpkgs/pull/87383#discussion_r432097657> 30 + ldflags = [ 31 + "-w" 32 + "-s" 33 + "-X github.com/naggie/dsnet.VERSION=${finalAttrs.src.tag}" 34 + "-X github.com/naggie/dsnet.GIT_COMMIT=${finalAttrs.src.tag}" 35 + ]; 36 + 37 + meta = { 38 + description = "Fast command to manage a centralised Wireguard VPN"; 39 + homepage = "https://github.com/naggie/dsnet"; 40 + changelog = "https://github.com/naggie/dsnet/releases/tag/${finalAttrs.src.tag}"; 41 + license = lib.licenses.mit; 42 + platforms = lib.platforms.linux; 43 + maintainers = [ lib.maintainers.naggie ]; 44 + mainProgram = "dsnet"; 45 + }; 46 + 47 + })
+3 -3
pkgs/by-name/fl/flaresolverr/package.nix
··· 59 59 ''; 60 60 61 61 installPhase = '' 62 - mkdir -p $out/{bin,share/${finalAttrs.pname}-${finalAttrs.version}} 63 - cp -r * $out/share/${finalAttrs.pname}-${finalAttrs.version}/. 62 + mkdir -p $out/{bin,share/flaresolverr-${finalAttrs.version}} 63 + cp -r * $out/share/flaresolverr-${finalAttrs.version}/. 64 64 65 65 makeWrapper ${python}/bin/python $out/bin/flaresolverr \ 66 - --add-flags "$out/share/${finalAttrs.pname}-${finalAttrs.version}/src/flaresolverr.py" \ 66 + --add-flags "$out/share/flaresolverr-${finalAttrs.version}/src/flaresolverr.py" \ 67 67 --prefix PATH : "${lib.makeBinPath [ xorg.xvfb ]}" 68 68 ''; 69 69
+1 -1
pkgs/by-name/ge/geoclock/package.nix
··· 20 20 }; 21 21 22 22 cargoHash = "sha256-7mApZj3Ksy8Av0W+0+UZQCkH281bSBd4xo8/7JowmHs="; 23 - cargoDepsName = finalAttrs.pname; 23 + cargoDepsName = "geoclock"; 24 24 25 25 meta = { 26 26 description = "Displays time as calculated by your longitude";
+3 -3
pkgs/by-name/gi/gildas/package.nix
··· 24 24 in 25 25 26 26 stdenv.mkDerivation rec { 27 - srcVersion = "may25a"; 28 - version = "20250501_a"; 27 + srcVersion = "jun25a"; 28 + version = "20250601_a"; 29 29 pname = "gildas"; 30 30 31 31 src = fetchurl { ··· 35 35 "http://www.iram.fr/~gildas/dist/gildas-src-${srcVersion}.tar.xz" 36 36 "http://www.iram.fr/~gildas/dist/archive/gildas/gildas-src-${srcVersion}.tar.xz" 37 37 ]; 38 - hash = "sha256-ofcuwc4vIKLbY/2uRqWG4sdrm9N0hpqz6zYwkZyySWo="; 38 + hash = "sha256-DhUGaG96bsZ1NGfDQEujtiM0AUwZBMD42uRpRWI5DX0="; 39 39 }; 40 40 41 41 nativeBuildInputs = [
+3 -3
pkgs/by-name/gi/gitleaks/package.nix
··· 11 11 12 12 buildGoModule rec { 13 13 pname = "gitleaks"; 14 - version = "8.26.0"; 14 + version = "8.27.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "zricethezav"; 18 18 repo = "gitleaks"; 19 19 tag = "v${version}"; 20 - hash = "sha256-lBIoEUjAllhUTS9PRSqdWUeBhEGs6wOHOWivj0PC9Is="; 20 + hash = "sha256-62Tcj5NiEk4uaGpiallCjDzpkFbuTazfMiemEe+ATLg="; 21 21 }; 22 22 23 - vendorHash = "sha256-MSF9N9kXsIM2WKsjKAVztYypwGPng2EElHx7p6vADqc="; 23 + vendorHash = "sha256-vd39TbooEdmYa6QZGEnYOmYU9p+9mV+SrLKVY+h/PEM="; 24 24 25 25 ldflags = [ 26 26 "-s"
+7 -4
pkgs/by-name/gl/gleam/package.nix
··· 15 15 16 16 rustPlatform.buildRustPackage (finalAttrs: { 17 17 pname = "gleam"; 18 - version = "1.10.0"; 18 + version = "1.11.0"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "gleam-lang"; 22 22 repo = "gleam"; 23 23 tag = "v${finalAttrs.version}"; 24 - hash = "sha256-0qK9dWkKnoXbIIBMN3p5noPEke/bgC8Bjtmf6lwtyr4="; 24 + hash = "sha256-oxzFAqPZ+ZHd/+GwofDg0gA4NIFYWi2v8fOjMn8ixSU="; 25 25 }; 26 26 27 - cargoHash = "sha256-EoRu8p6cUe1li54nVUkf+3qywIsDXh4ptIVLluJ3eFs="; 27 + cargoHash = "sha256-9kk7w85imYIhywBuAgJS8wYAIEM3hXoHymGgMMmrgnI="; 28 28 29 29 nativeBuildInputs = [ 30 30 git ··· 53 53 homepage = "https://gleam.run/"; 54 54 changelog = "https://github.com/gleam-lang/gleam/blob/v${finalAttrs.version}/CHANGELOG.md"; 55 55 license = lib.licenses.asl20; 56 - maintainers = [ lib.maintainers.philtaken ]; 56 + maintainers = with lib.maintainers; [ 57 + philtaken 58 + llakala 59 + ]; 57 60 teams = [ lib.teams.beam ]; 58 61 }; 59 62 })
-13
pkgs/by-name/go/gopher/int_main.patch
··· 1 - diff --git a/configure b/configure 2 - index 1b20711..79ce215 100644 3 - --- a/configure 4 - +++ b/configure 5 - @@ -679,7 +679,7 @@ cat > conftest.$ac_ext << EOF 6 - #line 680 "configure" 7 - #include "confdefs.h" 8 - 9 - -main(){return(0);} 10 - +int main(){return(0);} 11 - EOF 12 - if { (eval echo configure:685: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext}; then 13 - ac_cv_prog_cc_works=yes
+2 -6
pkgs/by-name/go/gopher/package.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "gopher"; 10 - version = "3.0.18"; 10 + version = "3.0.19"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "jgoerzen"; 14 14 repo = "gopher"; 15 15 rev = "release/${version}"; 16 - sha256 = "sha256-YAcpEV3SbiUZ4nqYk6k1M41YWdTGSSH7rNB15gv31qQ="; 16 + sha256 = "sha256-8J63TnC3Yq7+64PPLrlPEueMa9D/eWkPsb08t1+rPAA="; 17 17 }; 18 18 19 19 buildInputs = [ ncurses ]; 20 - 21 - patches = [ 22 - ./int_main.patch # https://github.com/jgoerzen/gopher/pull/8 23 - ]; 24 20 25 21 preConfigure = "export LIBS=-lncurses"; 26 22
+3 -3
pkgs/by-name/he/helm-ls/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "helm-ls"; 12 - version = "0.2.2"; 12 + version = "0.3.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "mrjosh"; 16 16 repo = "helm-ls"; 17 17 rev = "v${version}"; 18 - hash = "sha256-NI9qtbt0Ci300DhDR+yjFThTGLXKrbsc1wuLPpC1l9o="; 18 + hash = "sha256-OxrPqDa2g5jmm+XtLE0YCnVhkvVK60xxrO49Gl8VT60="; 19 19 }; 20 20 21 - vendorHash = "sha256-1BO/0Ous4mclainPV+nqk5K+tHKgRnaxMtsI4xAhZF4="; 21 + vendorHash = "sha256-w/BWPbpSYum0SU8PJj76XiLUjTWO4zNQY+khuLRK0O8="; 22 22 23 23 nativeBuildInputs = [ installShellFiles ]; 24 24
+3 -3
pkgs/by-name/hy/hyprls/package.nix
··· 6 6 }: 7 7 buildGoModule rec { 8 8 pname = "hyprls"; 9 - version = "0.6.0"; 9 + version = "0.7.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "hyprland-community"; 13 13 repo = "hyprls"; 14 14 rev = "v${version}"; 15 - hash = "sha256-sXC/JMd2NYc74k19DxZyldH+QLZ6W8dVHy0uyqyuCmg="; 15 + hash = "sha256-cJDDyF44nD/XvxtaGPYCk2MC574HDBHP1ByhVwqatvQ="; 16 16 }; 17 17 18 - vendorHash = "sha256-rG+oGJOABA9ee5nIpC5/U0mMsPhwvVtQvJBlQWfxi5Y="; 18 + vendorHash = "sha256-WTdwIAC3gDWgCKlVuOtMyl0ZfdZ9RhlpqUl2S2d65HA="; 19 19 20 20 checkFlags = [ 21 21 # Not yet implemented
+12 -12
pkgs/by-name/ik/ike-scan/package.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "ike-scan"; 12 - version = "1.9.5"; 12 + version = "1.9.5-unstable-2024-09-15"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "royhills"; 16 16 repo = "ike-scan"; 17 - rev = version; 18 - sha256 = "sha256-mbfg8p3y4aKoXpmLuF9GXAMPEqV5CsvetwGCRDJ9UNY="; 17 + rev = "c74c01fd22d9a3aae3d8ba9a0bd2eb1a2146ac6f"; 18 + hash = "sha256-+eicvirqzZrAJiaGaVjqZlSpU2+jTG/MRPv50P+1Tpc="; 19 19 }; 20 20 21 - nativeBuildInputs = [ 22 - autoreconfHook 23 - openssl 24 - ]; 25 - 26 - configureFlags = [ "--with-openssl=${openssl.dev}" ]; 27 - 28 21 patches = [ 29 22 # Using the same patches as for the Fedora RPM 30 23 (fetchpatch { 31 24 # Memory leaks, https://github.com/royhills/ike-scan/pull/15 32 25 url = "https://github.com/royhills/ike-scan/pull/15/commits/d864811de08dcddd65ac9b8d0f2acf5d7ddb9dea.patch"; 33 - sha256 = "0wbrq89dl8js7cdivd0c45hckmflan33cpgc3qm5s3az6r4mjljm"; 26 + hash = "sha256-VVJZSTZfDV0qHuxdNoZV1NXJYCEMtB0bO1oi2hLCeXE="; 34 27 }) 35 28 ]; 36 29 30 + nativeBuildInputs = [ 31 + autoreconfHook 32 + openssl 33 + ]; 34 + 35 + configureFlags = [ "--with-openssl=${openssl.dev}" ]; 36 + 37 37 meta = with lib; { 38 38 description = "Tool to discover, fingerprint and test IPsec VPN servers"; 39 39 longDescription = '' ··· 41 41 fingerprint and test IPsec VPN servers. 42 42 ''; 43 43 homepage = "https://github.com/royhills/ike-scan"; 44 - license = with licenses; [ gpl3Plus ]; 44 + license = licenses.gpl3Plus; 45 45 platforms = platforms.linux; 46 46 maintainers = with maintainers; [ fab ]; 47 47 };
+2 -2
pkgs/by-name/ko/kool/package.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "kool"; 11 - version = "3.5.0"; 11 + version = "3.5.2"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "kool-dev"; 15 15 repo = "kool"; 16 16 rev = version; 17 - hash = "sha256-iB/9owaBNQVzdA4edrx0zl+COs7yVLs61Mij5kfjEhg="; 17 + hash = "sha256-yUJbuMOLEa9LVRltskSwD0XBdmwwLcEaLYUHsSQOiCk="; 18 18 }; 19 19 20 20 vendorHash = "sha256-IqUkIf0uk4iUTedTO5xRzjmJwHS+p6apo4E0WEEU6cc=";
+3 -3
pkgs/by-name/kr/krapslog/package.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "krapslog"; 11 - version = "0.6.0"; 11 + version = "0.6.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "acj"; 15 15 repo = "krapslog-rs"; 16 16 rev = version; 17 - sha256 = "sha256-wRziLNMwLZBCn330FNC9x6loCCyuC+31Kh51ZI/j1Cc="; 17 + sha256 = "sha256-c/Zh4fOsSKY0XopaklRbFEh4QM5jjUcj0zhAx5v9amI="; 18 18 }; 19 19 20 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-Mv0wTuTWCsBGjlr4BhLezBOCtgQ0qq2kwLcZxU1nREM="; 21 + cargoHash = "sha256-cXK7YZ9i/eKXTHPYnJcvcKyzFlZDnqmCBrEa75Mxfqc="; 22 22 23 23 buildInputs = lib.optional stdenv.hostPlatform.isDarwin libiconv; 24 24
+3 -3
pkgs/by-name/kr/krillinai/package.nix
··· 11 11 12 12 buildGoModule (finalAttrs: { 13 13 pname = "krillinai"; 14 - version = "1.1.5"; 14 + version = "1.2.1-hotfix-2"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "krillinai"; 18 18 repo = "KrillinAI"; 19 19 tag = "v${finalAttrs.version}"; 20 - hash = "sha256-jQlgkpQ+UTzn6MqGa+yVQ9v04IGGlMQQim3s0Oc9Zts="; 20 + hash = "sha256-Dw30Lsf4pHMDlrLmdoU+4v5SJfzx5UId6v/OocrsiS4="; 21 21 }; 22 22 23 - vendorHash = "sha256-mpvypCZmvVVljftGpcV1aea3s7Xmhr0jLfKZIZ0nkX8="; 23 + vendorHash = "sha256-14YNdIfylUpcWqHhrpgmjxBHYRXaoR59jb1QdTckuLY="; 24 24 25 25 nativeBuildInputs = [ pkg-config ]; 26 26
-13
pkgs/by-name/li/libfaketime/0001-Remove-unsupported-clang-flags.patch
··· 1 - diff --git a/src/Makefile b/src/Makefile 2 - index 2af4804..bcff809 100644 3 - --- a/src/Makefile 4 - +++ b/src/Makefile 5 - @@ -80,7 +80,7 @@ PREFIX ?= /usr/local 6 - LIBDIRNAME ?= /lib/faketime 7 - PLATFORM ?=$(shell uname) 8 - 9 - -CFLAGS += -std=gnu99 -Wall -Wextra -Werror -Wno-nonnull-compare -DFAKE_PTHREAD -DFAKE_STAT -DFAKE_UTIME -DFAKE_SLEEP -DFAKE_TIMERS -DFAKE_INTERNAL_CALLS -fPIC -DPREFIX='"'$(PREFIX)'"' -DLIBDIRNAME='"'$(LIBDIRNAME)'"' $(FAKETIME_COMPILE_CFLAGS) 10 - +CFLAGS += -std=gnu99 -Wall -Wextra -DFAKE_PTHREAD -DFAKE_STAT -DFAKE_UTIME -DFAKE_SLEEP -DFAKE_TIMERS -DFAKE_INTERNAL_CALLS -fPIC -DPREFIX='"'$(PREFIX)'"' -DLIBDIRNAME='"'$(LIBDIRNAME)'"' $(FAKETIME_COMPILE_CFLAGS) 11 - ifeq ($(PLATFORM),SunOS) 12 - CFLAGS += -D__EXTENSIONS__ -D_XOPEN_SOURCE=600 13 - endif
+7 -22
pkgs/by-name/li/libfaketime/package.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "libfaketime"; 12 - version = "0.9.10"; 12 + version = "0.9.11"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "wolfcw"; 16 16 repo = "libfaketime"; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-DYRuQmIhQu0CNEboBAtHOr/NnWxoXecuPMSR/UQ/VIQ="; 18 + sha256 = "sha256-a0TjHYzwbkRQyvr9Sj/DqjgLBnE1Z8kjsTQxTfGqLjE="; 19 19 }; 20 20 21 - patches = 22 - [ 23 - ./nix-store-date.patch 24 - (fetchpatch { 25 - name = "0001-libfaketime.c-wrap-timespec_get-in-TIME_UTC-macro.patch"; 26 - url = "https://github.com/wolfcw/libfaketime/commit/e0e6b79568d36a8fd2b3c41f7214769221182128.patch"; 27 - sha256 = "sha256-KwwP76v0DXNW73p/YBvwUOPdKMAcVdbQSKexD/uFOYo="; 28 - }) 29 - (fetchpatch { 30 - name = "LFS64.patch"; 31 - url = "https://github.com/wolfcw/libfaketime/commit/f32986867addc9d22b0fab29c1c927f079d44ac1.patch"; 32 - hash = "sha256-fIXuxxcV9J2IcgwcwSrMo4maObkH9WYv1DC/wdtbq/g="; 33 - }) 34 - ] 35 - ++ (lib.optionals stdenv.cc.isClang [ 36 - # https://github.com/wolfcw/libfaketime/issues/277 37 - ./0001-Remove-unsupported-clang-flags.patch 38 - ]); 21 + patches = [ 22 + ./nix-store-date.patch 23 + ]; 39 24 40 25 postPatch = '' 41 26 patchShebangs test src 42 27 for a in test/functests/test_exclude_mono.sh src/faketime.c ; do 43 28 substituteInPlace $a \ 44 - --replace /bin/bash ${stdenv.shell} 29 + --replace-fail /bin/bash ${stdenv.shell} 45 30 done 46 - substituteInPlace src/faketime.c --replace @DATE_CMD@ ${coreutils}/bin/date 31 + substituteInPlace src/faketime.c --replace-fail @DATE_CMD@ ${coreutils}/bin/date 47 32 ''; 48 33 49 34 PREFIX = placeholder "out";
+27 -11
pkgs/by-name/li/libkate/package.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchurl, 4 + fetchFromGitLab, 5 + autoreconfHook, 6 + bison, 7 + flex, 5 8 libogg, 6 9 libpng, 10 + pkg-config, 7 11 }: 8 12 9 - stdenv.mkDerivation rec { 13 + stdenv.mkDerivation (finalAttrs: { 10 14 pname = "libkate"; 11 - version = "0.4.1"; 15 + version = "0.4.3"; 12 16 13 - src = fetchurl { 14 - url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libkate/${pname}-${version}.tar.gz"; 15 - sha256 = "0s3vr2nxfxlf1k75iqpp4l78yf4gil3f0v778kvlngbchvaq23n4"; 17 + src = fetchFromGitLab { 18 + domain = "gitlab.xiph.org/"; 19 + owner = "xiph"; 20 + repo = "kate"; 21 + tag = "kate-${finalAttrs.version}"; 22 + hash = "sha256-HwDahmjDC+O321Ba7MnHoQdHOFUMpFzaNdLHQeEg11Q="; 16 23 }; 17 24 25 + nativeBuildInputs = [ 26 + autoreconfHook 27 + bison 28 + flex 29 + pkg-config # provides macro PKG_CHECK_MODULES 30 + ]; 31 + 18 32 buildInputs = [ 19 33 libogg 20 34 libpng 21 35 ]; 22 36 23 - meta = with lib; { 37 + enableParallelBuilding = true; 38 + 39 + meta = { 24 40 description = "Library for encoding and decoding Kate streams"; 25 41 longDescription = '' 26 42 This is libkate, the reference implementation of a codec for the Kate 27 43 bitstream format. Kate is a karaoke and text codec meant for encapsulation 28 44 in an Ogg container. It can carry Unicode text, images, and animate 29 45 them.''; 30 - homepage = "https://code.google.com/archive/p/libkate/"; 31 - platforms = platforms.unix; 32 - license = licenses.bsd3; 46 + homepage = "https://wiki.xiph.org/index.php/OggKate"; 47 + platforms = lib.platforms.unix; 48 + license = lib.licenses.bsd3; 33 49 }; 34 - } 50 + })
+2 -2
pkgs/by-name/lo/logdy/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "logdy"; 10 - version = "0.16.0"; 10 + version = "0.17.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "logdyhq"; 14 14 repo = "logdy-core"; 15 15 tag = "v${version}"; 16 - hash = "sha256-OpG9jgm/A++PBDQH5IYY6PyXx87QvihyZqnwhdBWZGg="; 16 + hash = "sha256-779ZO9WhE3IKbHJLchCfrIepMH+GOrlQJALLpoNZvbc="; 17 17 }; 18 18 19 19 vendorHash = "sha256-kFhcbBMymzlJ+2zw7l09LJfCdps26Id+VzOehqrLDWU=";
+3 -3
pkgs/by-name/ma/manga-tui/package.nix
··· 10 10 nix-update-script, 11 11 }: 12 12 let 13 - version = "0.7.0"; 13 + version = "0.8.0"; 14 14 in 15 15 rustPlatform.buildRustPackage { 16 16 pname = "manga-tui"; ··· 20 20 owner = "josueBarretogit"; 21 21 repo = "manga-tui"; 22 22 rev = "v${version}"; 23 - hash = "sha256-1WFg2hG3UnOO9+HpUcdPkZNhsNYa2QG1PhzLZ4bQiQM="; 23 + hash = "sha256-81P5LwL9njxA0qx4FvqgrHdqVgUXkZTTzAXLdRTftS4="; 24 24 }; 25 25 26 26 useFetchCargoVendor = true; 27 - cargoHash = "sha256-1nERwIZCR/afgfGdronpy145GnDkbsB7YjF6XyDcfEY="; 27 + cargoHash = "sha256-dne0sJ0K/UVXGaj/vUM9O++ZS0hu69bdLnV8VAr3tbM="; 28 28 29 29 nativeBuildInputs = [ pkg-config ]; 30 30
+2 -2
pkgs/by-name/mi/minio-client/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "minio-client"; 10 - version = "2025-04-16T18-13-26Z"; 10 + version = "2025-05-21T01-59-54Z"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "minio"; 14 14 repo = "mc"; 15 15 rev = "RELEASE.${version}"; 16 - sha256 = "sha256-23shNQWVIuTLL0FLM00919JaT2QR4R0ou5ZA2/mQ4PA="; 16 + sha256 = "sha256-ss/GqOJz9FNrQzYABb8ePCMcmNVTYVji/Id1WOuu24M="; 17 17 }; 18 18 19 19 vendorHash = "sha256-MpLQZFrf2sBAweXtYeFi5j6p6GaXuN99x+r4UK8D9xM=";
+14 -10
pkgs/by-name/ne/ne/package.nix
··· 9 9 ghostscript, 10 10 }: 11 11 12 - stdenv.mkDerivation rec { 12 + stdenv.mkDerivation (finalAttrs: { 13 13 pname = "ne"; 14 14 version = "3.3.4"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "vigna"; 18 18 repo = "ne"; 19 - rev = version; 20 - sha256 = "sha256-n8PERQD9G4jmW4avQjbFofrSapyRoSbQ2k1LzVt0i1o="; 19 + tag = finalAttrs.version; 20 + hash = "sha256-n8PERQD9G4jmW4avQjbFofrSapyRoSbQ2k1LzVt0i1o="; 21 21 }; 22 22 23 23 postPatch = '' 24 - substituteInPlace makefile --replace "./version.pl" "perl version.pl" 25 - substituteInPlace src/makefile --replace "-lcurses" "-lncurses" 24 + substituteInPlace makefile --replace-fail "./version.pl" "perl version.pl" 25 + substituteInPlace src/makefile --replace-fail "-lcurses" "-lncurses" 26 26 ''; 27 + 28 + strictDeps = true; 27 29 28 30 nativeBuildInputs = [ 29 31 texliveMedium ··· 35 37 36 38 makeFlags = [ "PREFIX=${placeholder "out"}" ]; 37 39 38 - meta = with lib; { 40 + meta = { 39 41 description = "Nice editor"; 40 42 homepage = "https://ne.di.unimi.it/"; 43 + changelog = "https://github.com/vigna/ne/releases/tag/${finalAttrs.version}"; 44 + downloadPage = "https://github.com/vigna/ne"; 41 45 longDescription = '' 42 46 ne is a free (GPL'd) text editor based on the POSIX standard that runs 43 47 (we hope) on almost any UN*X machine. ne is easy to use for the beginner, 44 48 but powerful and fully configurable for the wizard, and most sparing in its 45 49 resource usage. See the manual for some highlights of ne's features. 46 50 ''; 47 - license = licenses.gpl3; 48 - platforms = platforms.unix; 49 - maintainers = with maintainers; [ geri1701 ]; 51 + license = lib.licenses.gpl3Only; 52 + platforms = lib.platforms.unix; 53 + maintainers = with lib.maintainers; [ geri1701 ]; 50 54 mainProgram = "ne"; 51 55 }; 52 - } 56 + })
-58
pkgs/by-name/of/offrss/package.nix
··· 1 - { 2 - lib, 3 - stdenv, 4 - fetchurl, 5 - curl, 6 - libmrss, 7 - podofo, 8 - libiconv, 9 - }: 10 - 11 - stdenv.mkDerivation (finalAttrs: { 12 - pname = "offrss"; 13 - version = "1.3"; 14 - 15 - installPhase = '' 16 - mkdir -p $out/bin 17 - cp offrss $out/bin 18 - ''; 19 - 20 - buildInputs = 21 - [ 22 - curl 23 - libmrss 24 - ] 25 - ++ lib.optional (stdenv.hostPlatform == stdenv.buildPlatform) podofo 26 - ++ lib.optional (!stdenv.hostPlatform.isLinux) libiconv; 27 - 28 - # Workaround build failure on -fno-common toolchains: 29 - # ld: serve_pdf.o:offrss.h:75: multiple definition of `cgi_url_path'; 30 - # offrss.o:offrss.h:75: first defined here 31 - env.NIX_CFLAGS_COMPILE = "-fcommon -Wno-error=implicit-function-declaration"; 32 - 33 - configurePhase = 34 - '' 35 - substituteInPlace Makefile \ 36 - --replace '$(CC) $(CFLAGS) $(LDFLAGS)' '$(CXX) $(CFLAGS) $(LDFLAGS)' 37 - '' 38 - + lib.optionalString (!stdenv.hostPlatform.isLinux) '' 39 - sed 's/#EXTRA/EXTRA/' -i Makefile 40 - '' 41 - + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' 42 - sed 's/^PDF/#PDF/' -i Makefile 43 - ''; 44 - 45 - src = fetchurl { 46 - url = "http://vicerveza.homeunix.net/~viric/soft/offrss/offrss-${finalAttrs.version}.tar.gz"; 47 - hash = "sha256-5oIiDLdFrnEfPfSiwCv3inIcxK+bbgbMT1VISVAPfKo="; 48 - }; 49 - 50 - meta = { 51 - homepage = "http://vicerveza.homeunix.net/~viric/cgi-bin/offrss"; 52 - description = "Offline RSS/Atom reader"; 53 - license = lib.licenses.agpl3Plus; 54 - maintainers = [ ]; 55 - platforms = lib.platforms.linux; 56 - mainProgram = "offrss"; 57 - }; 58 - })
+3 -3
pkgs/by-name/og/ogen/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "ogen"; 9 - version = "1.13.0"; 9 + version = "1.14.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "ogen-go"; 13 13 repo = "ogen"; 14 14 tag = "v${version}"; 15 - hash = "sha256-M2xKxaf+iWXTq+vMXsucMmVqs9BarCoyG6prmwcL8KI="; 15 + hash = "sha256-w3h65MNXBgsH8PCHfoPqY+XNI6TMbLUAMI4Y3WWLEJM="; 16 16 }; 17 17 18 - vendorHash = "sha256-TVnTg+SbTmpdfxWSr3KIPioQ/0OlUxCuCfyn5oMWPu8="; 18 + vendorHash = "sha256-PQ2ZrigS9jZY1oL3Dsuc2RZwedZLzLKUqhMYfWiZ854="; 19 19 20 20 patches = [ ./modify-version-handling.patch ]; 21 21
+3 -3
pkgs/by-name/ol/olivetin/package.nix
··· 81 81 82 82 { 83 83 pname = "olivetin"; 84 - version = "2025.5.26"; 84 + version = "2025.6.1"; 85 85 86 86 src = fetchFromGitHub { 87 87 owner = "OliveTin"; 88 88 repo = "OliveTin"; 89 89 tag = finalAttrs.version; 90 - hash = "sha256-BD52MxIHE56y3oWuRTCYmrEYMge70/MXt4B6g84ahF0="; 90 + hash = "sha256-Bd+zxVEhP7LZk74Mfai/MkML1pKlPBKm4kh4jAkC/kQ="; 91 91 }; 92 92 93 93 modRoot = "service"; 94 94 95 - vendorHash = "sha256-kfk4QFG+l+XKkKoOs2C1B6ZuMeeDz9DrzzR46S8Qnyk="; 95 + vendorHash = "sha256-8rPJoB75de2Y56iyIwdI9HPk7OlCgfMPy28TW1i7+sU="; 96 96 97 97 ldflags = [ 98 98 "-s"
+2 -2
pkgs/by-name/ol/ollama/package.nix
··· 117 117 goBuild (finalAttrs: { 118 118 pname = "ollama"; 119 119 # don't forget to invalidate all hashes each update 120 - version = "0.7.1"; 120 + version = "0.9.0"; 121 121 122 122 src = fetchFromGitHub { 123 123 owner = "ollama"; 124 124 repo = "ollama"; 125 125 tag = "v${finalAttrs.version}"; 126 - hash = "sha256-ee2MkvdVDQaSFJDDuXEwedqOB2DUl3MIfp5tRxqbL8A="; 126 + hash = "sha256-+8UHE9M2JWUARuuIRdKwNkn1hoxtuitVH7do5V5uEg0="; 127 127 fetchSubmodules = true; 128 128 }; 129 129
+1 -2
pkgs/by-name/op/opengamepadui/package.nix
··· 35 35 }; 36 36 37 37 cargoDeps = rustPlatform.fetchCargoVendor { 38 - inherit (finalAttrs) src; 39 - sourceRoot = "source/${finalAttrs.cargoRoot}"; 38 + inherit (finalAttrs) src cargoRoot; 40 39 hash = "sha256-T79G2bShJuFRfaCqG3IDHqW0s68yAdGyv58kdDYg6kg="; 41 40 }; 42 41 cargoRoot = "extensions";
+3 -3
pkgs/by-name/ph/phrase-cli/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "phrase-cli"; 9 - version = "2.40.0"; 9 + version = "2.42.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "phrase"; 13 13 repo = "phrase-cli"; 14 14 rev = version; 15 - sha256 = "sha256-d/B5XzEAM1GlpQxshy0kEJexF01FlF99hnoctKDXhp0="; 15 + sha256 = "sha256-dLdgJdR2faxpfHmYhhzn7nQxTrXDhF6XqOIKFLXDEj4="; 16 16 }; 17 17 18 - vendorHash = "sha256-VV4ctHj9fPosAgqBOfkqOKETSeGJXFPPP+kBMgqV2nk="; 18 + vendorHash = "sha256-zVIxBZ2zTXk407piA4dXxKfyD7Ke8RIq7lYogr/+rcs="; 19 19 20 20 ldflags = [ "-X=github.com/phrase/phrase-cli/cmd.PHRASE_CLIENT_VERSION=${version}" ]; 21 21
+2 -2
pkgs/by-name/po/podman-desktop/package.nix
··· 27 27 passthru.updateScript = _experimental-update-script-combinators.sequence [ 28 28 (nix-update-script { }) 29 29 (lib.getExe (writeShellApplication { 30 - name = "${finalAttrs.pname}-dependencies-updater"; 30 + name = "podman-desktop-dependencies-updater"; 31 31 runtimeInputs = [ 32 32 nix 33 33 jq 34 34 gnugrep 35 35 ]; 36 36 runtimeEnv = { 37 - PNAME = finalAttrs.pname; 37 + PNAME = "podman-desktop"; 38 38 PKG_FILE = builtins.toString ./package.nix; 39 39 }; 40 40 text = ''
+7 -4
pkgs/by-name/pr/prelink/package.nix
··· 5 5 autoreconfHook, 6 6 libelf, 7 7 libiberty, 8 + unstableGitUpdater, 8 9 }: 9 10 10 11 stdenv.mkDerivation { 11 12 pname = "prelink"; 12 - version = "unstable-2019-06-24"; 13 + version = "20151030-unstable-2024-07-02"; 13 14 14 15 src = fetchgit { 15 - url = "https://git.yoctoproject.org/git/prelink-cross"; 16 + url = "https://git.yoctoproject.org/prelink-cross"; 16 17 branchName = "cross_prelink"; 17 - rev = "f9975537dbfd9ade0fc813bd5cf5fcbe41753a37"; 18 - sha256 = "sha256-O9/oZooLRyUBBZX3SFcB6LFMmi2vQqkUlqtZnrq5oZc="; 18 + rev = "ff2561c02ade96c5d4d56ddd4e27ff064840a176"; 19 + sha256 = "sha256-wmX7ybrZDWEop9fiInZMvgK/fpEk3sq+Wu8DSWWIvQY="; 19 20 }; 20 21 21 22 strictDeps = true; ··· 39 40 doCheck = false; 40 41 41 42 enableParallelBuilding = true; 43 + 44 + passthru.updateScript = unstableGitUpdater { }; 42 45 43 46 meta = with lib; { 44 47 description = "ELF prelinking utility to speed up dynamic linking";
+3 -3
pkgs/by-name/pr/protoc-gen-es/package.nix
··· 7 7 8 8 buildNpmPackage rec { 9 9 pname = "protoc-gen-es"; 10 - version = "2.5.0"; 10 + version = "2.5.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "bufbuild"; 14 14 repo = "protobuf-es"; 15 15 tag = "v${version}"; 16 - hash = "sha256-wllLeX7veCbpb/mTAIs0cf/hcVItEmw2HW/UR4k0Epc="; 16 + hash = "sha256-afCfRi9YSQS8BoYrDR66FBW7sbfYvSxVSpxYM8F6CRw="; 17 17 18 18 postFetch = '' 19 19 ${lib.getExe npm-lockfile-fix} $out/package-lock.json 20 20 ''; 21 21 }; 22 22 23 - npmDepsHash = "sha256-PGieFyPgb2ERTdQc3HH5mg/uh5xj7nkUa0qwmgxofVY="; 23 + npmDepsHash = "sha256-DDFMQqWoixZZ9u8MLOEaKiPAOB3pEGnsF7el8AIOPrc="; 24 24 25 25 npmWorkspace = "packages/protoc-gen-es"; 26 26
+3 -3
pkgs/by-name/pr/protolint/package.nix
··· 5 5 }: 6 6 buildGoModule rec { 7 7 pname = "protolint"; 8 - version = "0.55.5"; 8 + version = "0.55.6"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "yoheimuta"; 12 12 repo = "protolint"; 13 13 rev = "v${version}"; 14 - hash = "sha256-uim4M1C51VVCOhcE/dyCLzx/Bks0h50+haw5mbAfiN8="; 14 + hash = "sha256-RTej9zVQz6GESAoAAChidiolGEoHabUYlEZSV2gc8KQ="; 15 15 }; 16 16 17 - vendorHash = "sha256-Zt1HbmdUpQmmK+404tfSs6qfZxZEqHIgQBoN63Els3M="; 17 + vendorHash = "sha256-RS0t7n6pLYVKHluQtXsMjYL1SvN7IZFdKmkxOI8wFoE="; 18 18 19 19 # Something about the way we run tests causes issues. It doesn't happen 20 20 # when using "go test" directly:
+3 -3
pkgs/by-name/pr/protols/package.nix
··· 6 6 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "protols"; 9 - version = "0.12.0"; 9 + version = "0.12.5"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "coder3101"; 13 13 repo = "protols"; 14 14 tag = version; 15 - hash = "sha256-v4ROQVoJmrukHFrxykr6EuBFXRuaBnPZ7f36ly7rPhg="; 15 + hash = "sha256-zs78TKZU35UGAmEXK3EA9B6zRCqeCtNexHVAJERKyX8="; 16 16 }; 17 17 18 18 useFetchCargoVendor = true; 19 - cargoHash = "sha256-fmsPkXwu8qy+SRyP5w940gqNmXg0V/p/vDSI7EIFrh0="; 19 + cargoHash = "sha256-Lh6KJ5zclT650tPIpMJBALLj4gnis+fglhewiZ5mpMs="; 20 20 21 21 meta = { 22 22 description = "Protocol Buffers language server written in Rust";
+1 -1
pkgs/by-name/py/pykickstart/package.nix
··· 37 37 meta = { 38 38 description = "Python package to interact with Kickstart files commonly found in the RPM world"; 39 39 homepage = "https://github.com/pykickstart/pykickstart"; 40 - changelog = "https://github.com/pykickstart/pykickstart/releases/tag/r${src.tag}"; 40 + changelog = "https://github.com/pykickstart/pykickstart/releases/tag/${src.tag}"; 41 41 license = lib.licenses.gpl2Only; 42 42 maintainers = with lib.maintainers; [ 43 43 thefossguy
+2 -2
pkgs/by-name/qm/qmk/package.nix
··· 15 15 16 16 python3.pkgs.buildPythonApplication rec { 17 17 pname = "qmk"; 18 - version = "1.1.7"; 18 + version = "1.1.8"; 19 19 format = "pyproject"; 20 20 21 21 src = fetchPypi { 22 22 inherit pname version; 23 - hash = "sha256-4Qhzsa5GAAeSgt7FZsRWIVO1ZB+010WtBv9SV38Xgto="; 23 + hash = "sha256-C0Jra/IK61tngGsuEnMD4mySRc/iZVgdYEbMXtwpBZ0="; 24 24 }; 25 25 26 26 nativeBuildInputs = with python3.pkgs; [
+3 -3
pkgs/by-name/re/renode-dts2repl/package.nix
··· 7 7 8 8 python3.pkgs.buildPythonApplication { 9 9 pname = "renode-dts2repl"; 10 - version = "0-unstable-2025-05-20"; 10 + version = "0-unstable-2025-05-28"; 11 11 pyproject = true; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "antmicro"; 15 15 repo = "dts2repl"; 16 - rev = "be40a3764a727a7a22eebb481b1fd3e0f70fca8c"; 17 - hash = "sha256-r+7J7AgWpBZuGpPU7EBn0KxM5ksHC6aED4oLe4oZzfQ="; 16 + rev = "8413c5a08ed53867493b2a08fd4c730d7b419ee7"; 17 + hash = "sha256-Dl/JzkUP/mNBxz20C4qH5B3qpXjd4/q/r5n0RO3ga+U="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+2 -2
pkgs/by-name/sl/slirp4netns/package.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "slirp4netns"; 16 - version = "1.3.2"; 16 + version = "1.3.3"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "rootless-containers"; 20 20 repo = "slirp4netns"; 21 21 rev = "v${version}"; 22 - sha256 = "sha256-1OiomraQ4wfrBPihGrf9sq8hPJUB45gvf7Y5j7iN8/E="; 22 + sha256 = "sha256-dPhUr9GdujTpUsnfvZDp8eOBQwlzqwtwziII2QWD4JA="; 23 23 }; 24 24 25 25 nativeBuildInputs = [
+2 -2
pkgs/by-name/sn/snipaste/package.nix
··· 5 5 }: 6 6 let 7 7 pname = "snipaste"; 8 - version = "2.10.6"; 8 + version = "2.10.7"; 9 9 src = fetchurl { 10 10 url = "https://download.snipaste.com/archives/Snipaste-${version}-x86_64.AppImage"; 11 - hash = "sha256-lkP3YN4ZNbtM2beQEIWPxBE6JXToRBW48QAMLw/TBzQ="; 11 + hash = "sha256-WzCSI0BfjolbWbj/mLhRj75tW/CvlbzQtFuBizg8xl4="; 12 12 }; 13 13 contents = appimageTools.extract { inherit pname version src; }; 14 14 in
+2 -2
pkgs/by-name/sn/snort/package.nix
··· 19 19 20 20 stdenv.mkDerivation (finalAttrs: { 21 21 pname = "snort"; 22 - version = "3.7.4.0"; 22 + version = "3.8.1.0"; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "snort3"; 26 26 repo = "snort3"; 27 27 tag = finalAttrs.version; 28 - hash = "sha256-c5GVFzZOeaI2te49m9crt9I0E/awHjcDR621tvDVgSQ="; 28 + hash = "sha256-+59e6rLMvLQ+LNxwRRG6nLXqjMsbn3bdykfMpwPgSpA="; 29 29 }; 30 30 31 31 nativeBuildInputs = [
+2 -50
pkgs/by-name/sr/srb2/cmake.patch
··· 1 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index 80a3bdcd6..380a1573a 100644 2 + index a4c631102..13b5743ca 100644 3 3 --- a/CMakeLists.txt 4 4 +++ b/CMakeLists.txt 5 - @@ -61,7 +61,7 @@ option( 6 - "Link dependencies using CMake's find_package and do not use internal builds" 7 - ${SRB2_CONFIG_SYSTEM_LIBRARIES_DEFAULT} 8 - ) 9 - -option(SRB2_CONFIG_ENABLE_TESTS "Build the test suite" ON) 10 - +option(SRB2_CONFIG_ENABLE_TESTS "Build the test suite" OFF) 11 - # This option isn't recommended for distribution builds and probably won't work (yet). 12 - cmake_dependent_option( 13 - SRB2_CONFIG_SHARED_INTERNAL_LIBRARIES 14 - @@ -80,25 +80,6 @@ option(SRB2_CONFIG_ZDEBUG "Compile with ZDEBUG defined." OFF) 15 - option(SRB2_CONFIG_PROFILEMODE "Compile for profiling (GCC only)." OFF) 16 - set(SRB2_CONFIG_ASSET_DIRECTORY "" CACHE PATH "Path to directory that contains all asset files for the installer. If set, assets will be part of installation and cpack.") 17 - 18 - -if(SRB2_CONFIG_ENABLE_TESTS) 19 - - # https://github.com/catchorg/Catch2 20 - - CPMAddPackage( 21 - - NAME Catch2 22 - - VERSION 3.4.0 23 - - GITHUB_REPOSITORY catchorg/Catch2 24 - - OPTIONS 25 - - "CATCH_INSTALL_DOCS OFF" 26 - - ) 27 - - list(APPEND CMAKE_MODULE_PATH "${Catch2_SOURCE_DIR}/extras") 28 - - include(CTest) 29 - - include(Catch) 30 - - add_executable(srb2tests) 31 - - # To add tests, use target_sources to add individual test files to the target in subdirs. 32 - - target_link_libraries(srb2tests PRIVATE Catch2::Catch2 Catch2::Catch2WithMain) 33 - - target_compile_features(srb2tests PRIVATE c_std_11 cxx_std_17) 34 - - catch_discover_tests(srb2tests) 35 - -endif() 36 - - 37 - # Enable CCache 38 - # (Set USE_CCACHE=ON to use, CCACHE_OPTIONS for options) 39 - if("${CMAKE_HOST_SYSTEM_NAME}" STREQUAL Windows) 40 - @@ -113,12 +94,6 @@ if("${CMAKE_HOST_SYSTEM_NAME}" STREQUAL Windows) 41 - message(WARNING "USE_CCACHE was set but ccache is not found (set CCACHE_TOOL_PATH)") 42 - endif() 43 - endif() 44 - -else() 45 - - CPMAddPackage( 46 - - NAME Ccache.cmake 47 - - GITHUB_REPOSITORY TheLartians/Ccache.cmake 48 - - VERSION 1.2 49 - - ) 50 - endif() 51 - 52 - # Dependencies 53 - @@ -179,7 +154,7 @@ include(GitUtilities) 5 + @@ -141,7 +141,7 @@ include(GitUtilities) 54 6 if("${SRB2_SDL2_EXE_NAME}" STREQUAL "") 55 7 # cause a reconfigure if the branch changes 56 8 get_git_dir(SRB2_GIT_DIR)
+5 -12
pkgs/by-name/sr/srb2/package.nix
··· 7 7 curl, 8 8 nasm, 9 9 libopenmpt, 10 + miniupnpc, 10 11 game-music-emu, 11 - libGLU, 12 12 libpng, 13 13 SDL2, 14 14 SDL2_mixer, ··· 20 20 21 21 stdenv.mkDerivation (finalAttrs: { 22 22 pname = "srb2"; 23 - version = "2.2.13"; 23 + version = "2.2.15"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "STJr"; 27 27 repo = "SRB2"; 28 28 rev = "SRB2_release_${finalAttrs.version}"; 29 - hash = "sha256-OSkkjCz7ZW5+0vh6l7+TpnHLzXmd/5QvTidRQSHJYX8="; 29 + hash = "sha256-eJ0GYe3Rw6qQXj+jtyt8MkP87DaCiO9ffChg+SpQqaI="; 30 30 }; 31 31 32 32 nativeBuildInputs = [ ··· 41 41 game-music-emu 42 42 libpng 43 43 libopenmpt 44 + miniupnpc 44 45 SDL2 45 46 SDL2_mixer 46 47 zlib ··· 53 54 src = fetchgit { 54 55 url = "https://git.do.srb2.org/STJr/srb2assets-public"; 55 56 rev = "SRB2_release_${finalAttrs.version}"; 56 - hash = "sha256-OXvO5ZlujIYmYevc62Dtx192dxoujQMNFUCrH5quBBg="; 57 + hash = "sha256-1kwhWHzL2TbSx1rhFExbMhXqn0HMBRhR6LZiuoRx+iI="; 57 58 fetchLFS = true; 58 59 }; 59 60 ··· 76 77 ]; 77 78 78 79 patches = [ 79 - # Make the build work without internet connectivity 80 - # See: https://build.opensuse.org/request/show/1109889 81 80 ./cmake.patch 82 - ./thirdparty.patch 83 81 ]; 84 - 85 - postPatch = '' 86 - substituteInPlace ./src/sdl/ogl_sdl.c \ 87 - --replace libGLU.so.1 ${libGLU}/lib/libGLU.so.1 88 - ''; 89 82 90 83 desktopItems = [ 91 84 (makeDesktopItem rec {
-12
pkgs/by-name/sr/srb2/thirdparty.patch
··· 1 - diff --git a/thirdparty/CMakeLists.txt b/thirdparty/CMakeLists.txt 2 - index f33b3bf3f..1214f179c 100644 3 - --- a/thirdparty/CMakeLists.txt 4 - +++ b/thirdparty/CMakeLists.txt 5 - @@ -16,6 +16,5 @@ if(NOT "${SRB2_CONFIG_SYSTEM_LIBRARIES}") 6 - include("cpm-png.cmake") 7 - include("cpm-curl.cmake") 8 - include("cpm-openmpt.cmake") 9 - + include("cpm-libgme.cmake") 10 - endif() 11 - - 12 - -include("cpm-libgme.cmake")
+1 -2
pkgs/by-name/su/surrealist/package.nix
··· 60 60 }; 61 61 62 62 cargoDeps = rustPlatform.fetchCargoVendor { 63 - inherit (finalAttrs) src; 64 - sourceRoot = "${finalAttrs.src.name}/${finalAttrs.cargoRoot}"; 63 + inherit (finalAttrs) src cargoRoot; 65 64 hash = "sha256-Su9ZOPIskV5poeS8pgtri+sZANBpdgnuCsQqE4WKFdA="; 66 65 }; 67 66
+3 -3
pkgs/by-name/sy/synapse-admin-etkecc/package.nix
··· 17 17 18 18 stdenv.mkDerivation (finalAttrs: { 19 19 pname = "synapse-admin-etkecc"; 20 - version = "0.11.0-etke42"; 20 + version = "0.11.1-etke43"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "etkecc"; 24 24 repo = "synapse-admin"; 25 25 tag = "v${finalAttrs.version}"; 26 - hash = "sha256-HWhyG/dVP9M84OOYH95RPLqiXDYOs+QOxwLM8pPl1vA="; 26 + hash = "sha256-mubONaT4qnbPlnYY15UtHGEp45k5mIxWt1shHRdwwTA="; 27 27 }; 28 28 29 29 yarnOfflineCache = fetchYarnDeps { 30 30 yarnLock = finalAttrs.src + "/yarn.lock"; 31 - hash = "sha256-GO5m+7fcm/XO38XlsQq6fwKslzdZkE6WleP3GHNKuPU="; 31 + hash = "sha256-WFE2mtyK3xBOVIgJ0ODsv1C0pjpGdBM3+TtIiZUpj58="; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+3 -3
pkgs/by-name/te/terramate/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "terramate"; 10 - version = "0.13.1"; 10 + version = "0.13.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "terramate-io"; 14 14 repo = "terramate"; 15 15 rev = "v${version}"; 16 - hash = "sha256-lIYtNvluKRufV0bXi2z2/8F7221Sum20usA0j0pHU7I="; 16 + hash = "sha256-NN7M4ZJ67YwguDzSHkluW1wbwVbn+7otMQm+ot2el5I="; 17 17 }; 18 18 19 - vendorHash = "sha256-84xlUXCJhsZjNxdWQ/Tr/WA4/+gP8NlqQQHnA8R8nz8="; 19 + vendorHash = "sha256-Ldl4TGmfMLk9DJgoVUYCpjX5TyAwZyCSrOKdb6uo4eM="; 20 20 21 21 # required for version info 22 22 nativeBuildInputs = [ git ];
+4 -4
pkgs/by-name/ti/tigerbeetle/package.nix
··· 10 10 platform = 11 11 if stdenvNoCC.hostPlatform.isDarwin then "universal-macos" else stdenvNoCC.hostPlatform.system; 12 12 hash = builtins.getAttr platform { 13 - "universal-macos" = "sha256-RSP9nJ2dmLGci4v2iPRzE//QzAY1m7ZdzCkN43k3w8A="; 14 - "x86_64-linux" = "sha256-Xy3kGShqaTbuf9BLx4fUahZrrby2r04+nmuHwDxENMo="; 15 - "aarch64-linux" = "sha256-98BAH7yb6I1kG7j/zJyoFEwS1jBjF3oEM/YKk32bbZY="; 13 + "universal-macos" = "sha256-1U24bdd4tvkzZmsRrrc4AUwxm9IhxHNAcPtxxX5ZO2w="; 14 + "x86_64-linux" = "sha256-DCEqAePHkNj0bfgW5l83DyZG5+bre6C6C7AMbhxwytQ="; 15 + "aarch64-linux" = "sha256-jKpt7hqCbgcBv9npR7IhryaCgrdOlX40Icq9T10/Af0="; 16 16 }; 17 17 in 18 18 stdenvNoCC.mkDerivation (finalAttrs: { 19 19 pname = "tigerbeetle"; 20 - version = "0.16.41"; 20 + version = "0.16.42"; 21 21 22 22 src = fetchzip { 23 23 url = "https://github.com/tigerbeetle/tigerbeetle/releases/download/${finalAttrs.version}/tigerbeetle-${platform}.zip";
+3 -3
pkgs/by-name/tr/treesheets/package.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "treesheets"; 15 - version = "0-unstable-2025-05-19"; 15 + version = "0-unstable-2025-06-02"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "aardappel"; 19 19 repo = "treesheets"; 20 - rev = "a64445212a224b48c3daf054433a7ff68906670a"; 21 - hash = "sha256-o2En1E6MaYZcQLRPl4uU3isM2Q3aiu7mQ88ZJq1vrmo="; 20 + rev = "1e6604b6257b41ba518907bfa21c24fa8245c46f"; 21 + hash = "sha256-zSZ7tMjG5/kSzHifMSA7Wsypv0/x+Oir6jx0I5Fyk2c="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+3 -3
pkgs/by-name/ty/ty/package.nix
··· 14 14 15 15 rustPlatform.buildRustPackage (finalAttrs: { 16 16 pname = "ty"; 17 - version = "0.0.1-alpha.7"; 17 + version = "0.0.1-alpha.8"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "astral-sh"; 21 21 repo = "ty"; 22 22 tag = finalAttrs.version; 23 23 fetchSubmodules = true; 24 - hash = "sha256-aonCRtXi9MZWhZO3SjMxAxsTm8iZZdrm36psGArFz/I="; 24 + hash = "sha256-w/UEENP9tqwqFX/oCvI67DDMSmXzlCazAIP2wfmdDSs="; 25 25 }; 26 26 27 27 # For Darwin platforms, remove the integration test for file notifications, ··· 35 35 36 36 cargoBuildFlags = [ "--package=ty" ]; 37 37 38 - cargoHash = "sha256-pYv99huRgqcFcnkMkfFoejmZmVkb9q/VVlYfylPXo4o="; 38 + cargoHash = "sha256-XISRy7Ncy0lTlsCFYmJBcgGiDJfdygTDF4f9O9ZlzDU="; 39 39 40 40 nativeBuildInputs = [ installShellFiles ]; 41 41
+3 -3
pkgs/by-name/wa/waagent/package.nix
··· 15 15 in 16 16 python.pkgs.buildPythonApplication rec { 17 17 pname = "waagent"; 18 - version = "2.13.1.1"; 18 + version = "2.14.0.0"; 19 19 src = fetchFromGitHub { 20 20 owner = "Azure"; 21 21 repo = "WALinuxAgent"; 22 - tag = "v${version}"; 23 - hash = "sha256-W2NXxQOxRhJD/D/w58xknA9X8YYnQxwIhhjXzlCVVWA="; 22 + tag = "pre-v${version}"; 23 + hash = "sha256-nJZXyqdsSQgW+nGqyTS9XSW4z5mGRHtCYsDHKDw/eiM="; 24 24 }; 25 25 patches = [ 26 26 # Suppress the following error when waagent tries to configure sshd:
+6 -2
pkgs/by-name/we/wealthfolio/package.nix
··· 36 36 buildAndTestSubdir = finalAttrs.cargoRoot; 37 37 38 38 cargoDeps = rustPlatform.fetchCargoVendor { 39 - inherit (finalAttrs) pname version src; 40 - sourceRoot = "${finalAttrs.src.name}/${finalAttrs.cargoRoot}"; 39 + inherit (finalAttrs) 40 + pname 41 + version 42 + src 43 + cargoRoot 44 + ; 41 45 hash = "sha256-MmdvEutdkX98DgX1aVuxs4gabuMX5aM8yC4eqgvd8Q4="; 42 46 }; 43 47
+3 -3
pkgs/by-name/we/web-ext/package.nix
··· 8 8 9 9 buildNpmPackage rec { 10 10 pname = "web-ext"; 11 - version = "8.7.0"; 11 + version = "8.7.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "mozilla"; 15 15 repo = "web-ext"; 16 16 rev = version; 17 - hash = "sha256-k/S9YBU7D7FoXLK9aufBQfD4ZjCdlhGeDBnvfOk5H6Y="; 17 + hash = "sha256-B0wlGOg4ZfFRBVrHdERHMv3BPKfLX28YYtdyDphQTcE="; 18 18 }; 19 19 20 - npmDepsHash = "sha256-sykNWATICiPz3naZyzl6+b0g0v0D1AsfGYT5bahTlBI="; 20 + npmDepsHash = "sha256-J7uDivhLjdMVQyuejcrCL7m7EsAs/DeeKD7r1Cv81qQ="; 21 21 22 22 npmBuildFlags = [ "--production" ]; 23 23
+1 -1
pkgs/by-name/wi/windowmaker/package.nix
··· 83 83 license = lib.licenses.gpl2Plus; 84 84 mainProgram = "wmaker"; 85 85 maintainers = [ ]; 86 - platforms = lib.platforms.linux; 86 + platforms = lib.platforms.unix; 87 87 }; 88 88 })
+2 -2
pkgs/by-name/ya/yandex-music/package.nix
··· 29 29 assert lib.assertMsg (vibeAnimationMaxFps >= 0) "Vibe animation max FPS must be greater then 0"; 30 30 stdenvNoCC.mkDerivation rec { 31 31 pname = "yandex-music"; 32 - version = "5.51.1"; 32 + version = "5.52.0"; 33 33 34 34 src = fetchFromGitHub { 35 35 owner = "cucumber-sp"; 36 36 repo = "yandex-music-linux"; 37 37 rev = "v${version}"; 38 - hash = "sha256-jk/u0a6rnLDANHebtJ9yTAeFSIPg/CEIqm0oZnGdD0k="; 38 + hash = "sha256-39aVY2D8fM243Uhr4i3d9OdBKRqb4MNnkSjKOH3tF4s="; 39 39 }; 40 40 41 41 nativeBuildInputs = [
+4 -4
pkgs/by-name/ya/yandex-music/ym_info.json
··· 1 1 { 2 - "version": "5.51.1", 3 - "exe_name": "Yandex_Music_x64_5.51.1.exe", 4 - "exe_link": "https://music-desktop-application.s3.yandex.net/stable/Yandex_Music_x64_5.51.1.exe", 5 - "exe_hash": "sha256-iu7DqcFs9/4aw46eIgWKIYyZ6fIzoW6XkiqdpERup/M=" 2 + "version": "5.52.0", 3 + "exe_name": "Yandex_Music_x64_5.53.1.exe", 4 + "exe_link": "https://music-desktop-application.s3.yandex.net/stable/Yandex_Music_x64_5.53.1.exe", 5 + "exe_hash": "sha256-aTl3sF8n0v17TeAyQwjrXUDKK/MaCtoHQ34IHDEeme8=" 6 6 }
+3 -3
pkgs/by-name/ya/yazi/plugins/bypass/default.nix
··· 5 5 }: 6 6 mkYaziPlugin { 7 7 pname = "bypass.yazi"; 8 - version = "25.3.2-unstable-2025-05-30"; 8 + version = "25.3.2-unstable-2025-06-01"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "Rolv-Apneseth"; 12 12 repo = "bypass.yazi"; 13 - rev = "381fb89a21a58605c555c109f190309b2d116d30"; 14 - hash = "sha256-04cyOlG843Ot+jRT8GNFjJOzV4YdPBpI9XqbaK6KXu0="; 13 + rev = "c1e5fcf6eeed0bfceb57b9738da6db9d0fb8af56"; 14 + hash = "sha256-ZndDtTMkEwuIMXG4SGe4B95Nw4fChfFhxJHj+IY30Kc="; 15 15 }; 16 16 17 17 meta = {
+3 -3
pkgs/by-name/ya/yazi/plugins/ouch/default.nix
··· 5 5 }: 6 6 mkYaziPlugin { 7 7 pname = "ouch.yazi"; 8 - version = "0-unstable-2025-04-12"; 8 + version = "0-unstable-2025-06-01"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "ndtoan96"; 12 12 repo = "ouch.yazi"; 13 - rev = "2496cd9ac2d1fb52597b22ae84f3af06c826a86d"; 14 - hash = "sha256-OsNfR7rtnq+ceBTiFjbz+NFMSV/6cQ1THxEFzI4oPJk="; 13 + rev = "10b462765f37502065555e83c68a72bb26870fe2"; 14 + hash = "sha256-mtXl76a54Deg4cyrD0wr++sD/5b/kCsnJ+ngM6OokTc="; 15 15 }; 16 16 17 17 meta = {
+1 -2
pkgs/development/interpreters/ruby/default.nix
··· 216 216 cargoDeps = 217 217 if yjitSupport then 218 218 rustPlatform.fetchCargoVendor { 219 - inherit (finalAttrs) src; 220 - sourceRoot = "${finalAttrs.pname}-${version}/${finalAttrs.cargoRoot}"; 219 + inherit (finalAttrs) src cargoRoot; 221 220 hash = 222 221 assert cargoHash != null; 223 222 cargoHash;
+2 -2
pkgs/development/python-modules/aioairq/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "aioairq"; 15 - version = "0.4.4"; 15 + version = "0.4.6"; 16 16 pyproject = true; 17 17 18 18 disabled = pythonOlder "3.9"; ··· 21 21 owner = "CorantGmbH"; 22 22 repo = "aioairq"; 23 23 tag = "v${version}"; 24 - hash = "sha256-RwkqhPAKbNZ/RrVxJchtqGDpbmS9eusv1X/B3NseAFk="; 24 + hash = "sha256-XlOVCDWbcdh8VjNxlEcVNttRN3mw19AXlIIQJ1II144="; 25 25 }; 26 26 27 27 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/aiohomekit/default.nix
··· 21 21 22 22 buildPythonPackage rec { 23 23 pname = "aiohomekit"; 24 - version = "3.2.14"; 24 + version = "3.2.15"; 25 25 pyproject = true; 26 26 27 27 disabled = pythonOlder "3.10"; ··· 30 30 owner = "Jc2k"; 31 31 repo = "aiohomekit"; 32 32 tag = version; 33 - hash = "sha256-TP5YW4pIWO0xHV1EY5hDa80MrBOvkZLyQTNP7m0x+AU="; 33 + hash = "sha256-UAFiYTAz5TZVviwoCFzeSGi9acVytQU9hgVVVVecOBU="; 34 34 }; 35 35 36 36 build-system = [ poetry-core ];
+6 -2
pkgs/development/python-modules/bcrypt/default.nix
··· 33 33 34 34 cargoRoot = "src/_bcrypt"; 35 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 - inherit pname version src; 37 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 36 + inherit 37 + pname 38 + version 39 + src 40 + cargoRoot 41 + ; 38 42 hash = "sha256-HgHvfMBspPsSYhllnKBg5XZB6zxFIqJj+4//xKG8HwA="; 39 43 }; 40 44
+2 -1
pkgs/development/python-modules/biliass/default.nix
··· 28 28 pname 29 29 version 30 30 src 31 + sourceRoot 32 + cargoRoot 31 33 ; 32 - sourceRoot = "${sourceRoot}/${cargoRoot}"; 33 34 hash = "sha256-tkHl6z0En+od//fCGJXK/p8Dz5KDOXltHrXhxHmHL6U="; 34 35 }; 35 36
+2 -2
pkgs/development/python-modules/caldav/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "caldav"; 22 - version = "1.5.0"; 22 + version = "1.6.0"; 23 23 pyproject = true; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "python-caldav"; 27 27 repo = "caldav"; 28 28 tag = "v${version}"; 29 - hash = "sha256-SYjfQG4muuBcnVeu9cl00Zb2fGUhw157LLxA5/N5EJ0="; 29 + hash = "sha256-SWecaXiXp8DSOLVWzgPsbL7UGCtTBfNXYmuDQGdyqbQ="; 30 30 }; 31 31 32 32 build-system = [
+2 -2
pkgs/development/python-modules/command-runner/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "command-runner"; 12 - version = "1.7.3"; 12 + version = "1.7.4"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.7"; ··· 18 18 owner = "netinvent"; 19 19 repo = "command_runner"; 20 20 tag = "v${version}"; 21 - hash = "sha256-BNjMMs44eDnGmcFXiMydJIU0RpsFOyd2TjH7BOGQP2E="; 21 + hash = "sha256-i5VWoXHCdZtf4tJGgYvBqcMaBSSruCOkIl5ntZoSHio="; 22 22 }; 23 23 24 24 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/curl-cffi/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "curl-cffi"; 15 - version = "0.7.4"; 15 + version = "0.10.0"; 16 16 pyproject = true; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "lexiforest"; 20 20 repo = "curl_cffi"; 21 21 tag = "v${version}"; 22 - hash = "sha256-Q1VppzQ1Go+ia1D1BemTf40o9wV0miWyoGy/tY+95qE=="; 22 + hash = "sha256-h7PPlxjIVT6T9x7gKBSifuWl8wzUNDwRcaUifUS0icM="; 23 23 }; 24 24 25 25 patches = [ ./use-system-libs.patch ];
+2 -2
pkgs/development/python-modules/duckduckgo-search/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "duckduckgo-search"; 16 - version = "8.0.0"; 16 + version = "8.0.2"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.8"; ··· 22 22 owner = "deedy5"; 23 23 repo = "duckduckgo_search"; 24 24 tag = "v${version}"; 25 - hash = "sha256-FoGBVHxEXM9Mt0wpy7GctrlqUfhZb8DlK3UhlHld7E0="; 25 + hash = "sha256-Hbhrm++F6aVvJ//WAgyLNsJe+KS0cjnQ83I1ba72Ows="; 26 26 }; 27 27 28 28 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/fontparts/default.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "fontparts"; 23 - version = "0.12.5"; 23 + version = "0.12.7"; 24 24 pyproject = true; 25 25 26 26 disabled = pythonOlder "3.7"; 27 27 28 28 src = fetchPypi { 29 29 inherit pname version; 30 - hash = "sha256-cD7ppaYLnKOLyBMlSlF+ham74yid8MBunxgVkyE3I0I="; 30 + hash = "sha256-zg8QkiHh4UhhXdTRhDKulB+Q2E6GZyD0fnPIm6fWZGc="; 31 31 extension = "zip"; 32 32 }; 33 33
+2 -2
pkgs/development/python-modules/garth/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "garth"; 16 - version = "0.5.10"; 16 + version = "0.5.12"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.10"; 20 20 21 21 src = fetchPypi { 22 22 inherit pname version; 23 - hash = "sha256-IGBJNEGD+XgQQJG3sBh6t0CMZH9eRhJIfHE0+4Jx0H0="; 23 + hash = "sha256-bzEPHhIg6F/WQOUoXuaVlZGxn9PU8VdevA/DQuQ7fBw="; 24 24 }; 25 25 26 26 pythonRelaxDeps = [ "requests-oauthlib" ];
+2 -2
pkgs/development/python-modules/gflanguages/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "gflanguages"; 17 - version = "0.7.4"; 17 + version = "0.7.5"; 18 18 pyproject = true; 19 19 20 20 disabled = pythonOlder "3.7"; 21 21 22 22 src = fetchPypi { 23 23 inherit pname version; 24 - hash = "sha256-d/Q5Kh/ApXP0AcNOuATy8GyssLcNUjboQPEj1Q48tuA="; 24 + hash = "sha256-jc48DKUp3ai6AxcveyvR7TF80wmVLWfG58W2xR/HIsE="; 25 25 }; 26 26 27 27 # Relax the dependency on protobuf 3. Other packages in the Google Fonts
+3 -3
pkgs/development/python-modules/ghome-foyer-api/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "ghome-foyer-api"; 13 - version = "1.1.1"; 13 + version = "1.2.2"; 14 14 pyproject = true; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "KapJI"; 18 18 repo = "ghome-foyer-api"; 19 19 tag = "v${version}"; 20 - hash = "sha256-sup+j9GFGTR+HimpkpvvAqtgYWtJt2qCPZzLvMG8hzI="; 20 + hash = "sha256-Y8TfQ0cvmKyLw0UOoLbkXk2vSj+Qb11fCVfNrC1iYao="; 21 21 }; 22 22 23 23 buildInputs = [ ··· 37 37 meta = { 38 38 description = "Generated Python protobuf stubs for Google Home internal API"; 39 39 homepage = "https://github.com/KapJI/ghome-foyer-api"; 40 - changelog = "https://github.com/KapJI/ghome-foyer-api/releases/tag/v${version}"; 40 + changelog = "https://github.com/KapJI/ghome-foyer-api/releases/tag/${src.tag}"; 41 41 license = lib.licenses.mit; 42 42 maintainers = with lib.maintainers; [ 43 43 hensoko
+19 -10
pkgs/development/python-modules/gphoto2/default.nix
··· 1 1 { 2 2 lib, 3 - fetchPypi, 3 + fetchFromGitHub, 4 4 buildPythonPackage, 5 5 pkg-config, 6 6 libgphoto2, 7 + pytestCheckHook, 7 8 setuptools, 8 9 toml, 9 10 }: 10 11 11 12 buildPythonPackage rec { 12 13 pname = "gphoto2"; 13 - version = "2.5.1"; 14 + version = "2.6.0"; 14 15 pyproject = true; 15 16 16 - src = fetchPypi { 17 - inherit pname version; 18 - hash = "sha256-Jgh7ff+iUaeNQtBsXw2Jm+2gj1ctvrY3oahGrbxx3uE="; 17 + src = fetchFromGitHub { 18 + owner = "jim-easterbrook"; 19 + repo = "python-gphoto2"; 20 + tag = "v${version}"; 21 + hash = "sha256-S/uMP2kRXJDetpXT4+MmCvb35xSxEbzhtKJ0PbHIOIU="; 19 22 }; 20 23 24 + build-system = [ 25 + setuptools 26 + toml 27 + ]; 28 + 21 29 nativeBuildInputs = [ 22 30 pkg-config 23 - setuptools 24 - toml 25 31 ]; 26 32 27 33 buildInputs = [ libgphoto2 ]; 28 34 29 - doCheck = false; # No tests available 35 + nativeCheckInputs = [ 36 + pytestCheckHook 37 + ]; 30 38 31 39 pythonImportsCheck = [ "gphoto2" ]; 32 40 33 - meta = with lib; { 41 + meta = { 42 + changelog = "https://github.com/jim-easterbrook/python-gphoto2/blob/${src.tag}/CHANGELOG.txt"; 34 43 description = "Python interface to libgphoto2"; 35 44 homepage = "https://github.com/jim-easterbrook/python-gphoto2"; 36 - license = licenses.gpl3; 45 + license = lib.licenses.lgpl3Plus; 37 46 maintainers = [ ]; 38 47 }; 39 48 }
+2 -2
pkgs/development/python-modules/ha-mqtt-discoverable/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "ha-mqtt-discoverable"; 15 - version = "0.19.1"; 15 + version = "0.19.2"; 16 16 pyproject = true; 17 17 18 18 disabled = pythonOlder "3.10"; ··· 21 21 owner = "unixorn"; 22 22 repo = "ha-mqtt-discoverable"; 23 23 tag = "v${version}"; 24 - hash = "sha256-zQ3ABrKhuWBZhRPM5tH8VmYErM+mP26rNweFOpoSeEg="; 24 + hash = "sha256-LRXgB85jo0Frmdsq5cHQKQ60bYzuVPXsjPeGLj5uyNU="; 25 25 }; 26 26 27 27 pythonRelaxDeps = [
+12 -28
pkgs/development/python-modules/hyperion-py/default.nix
··· 3 3 aiohttp, 4 4 buildPythonPackage, 5 5 fetchFromGitHub, 6 - fetchpatch, 7 - pytestCheckHook, 8 - pythonOlder, 9 6 poetry-core, 10 7 pytest-aiohttp, 11 8 pytest-asyncio, 9 + pytest-cov-stub, 10 + pytest-timeout, 11 + pytestCheckHook, 12 12 }: 13 13 14 14 buildPythonPackage rec { 15 15 pname = "hyperion-py"; 16 - version = "0.7.5"; 17 - disabled = pythonOlder "3.8"; 18 - format = "pyproject"; 16 + version = "0.7.6"; 17 + pyproject = true; 19 18 20 19 src = fetchFromGitHub { 21 20 owner = "dermotduffy"; 22 21 repo = "hyperion-py"; 23 - rev = "v${version}"; 24 - hash = "sha256-arcnpCQsRuiWCrAz/t4TCjTe8DRDtRuzYp8k7nnjGDk="; 22 + tag = "v${version}"; 23 + hash = "sha256-14taFSrtmgTBiie0eY2fSRkZndJSZ4GJNRx3MonrTzs="; 25 24 }; 26 25 27 - patches = [ 28 - (fetchpatch { 29 - # python3.10 compat: Drop loop kwarg in asyncio.sleep call 30 - url = "https://github.com/dermotduffy/hyperion-py/commit/f02af52fcce17888984c99bfc03935e372011394.patch"; 31 - hash = "sha256-4nfsQVxd77VV9INwNxTyFRDlAjwdTYqfSGuF487hFCs="; 32 - }) 33 - ]; 34 - 35 - nativeBuildInputs = [ poetry-core ]; 26 + build-system = [ poetry-core ]; 36 27 37 - propagatedBuildInputs = [ aiohttp ]; 28 + dependencies = [ aiohttp ]; 38 29 39 30 nativeCheckInputs = [ 40 31 pytest-asyncio 41 32 pytest-aiohttp 33 + pytest-cov-stub 34 + pytest-timeout 42 35 pytestCheckHook 43 36 ]; 44 37 45 - pytestFlagsArray = [ 46 - # pytest-asyncio 0.17.0 compat 47 - "--asyncio-mode=auto" 48 - ]; 49 - 50 - postPatch = '' 51 - substituteInPlace pyproject.toml \ 52 - --replace " --timeout=9 --cov=hyperion" "" 53 - ''; 54 - 55 38 pythonImportsCheck = [ "hyperion" ]; 56 39 57 40 meta = with lib; { 58 41 description = "Python package for Hyperion Ambient Lighting"; 59 42 homepage = "https://github.com/dermotduffy/hyperion-py"; 43 + changelog = "https://github.com/dermotduffy/hyperion-py/releases/tag/${src.tag}"; 60 44 license = licenses.mit; 61 45 maintainers = with maintainers; [ fab ]; 62 46 };
+2 -2
pkgs/development/python-modules/ical/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "ical"; 20 - version = "9.2.5"; 20 + version = "10.0.0"; 21 21 pyproject = true; 22 22 23 23 disabled = pythonOlder "3.11"; ··· 26 26 owner = "allenporter"; 27 27 repo = "ical"; 28 28 tag = version; 29 - hash = "sha256-db7xwNN7xAoeqPngZNJxQNM2wLVcr7VpuG2IWswLCEE="; 29 + hash = "sha256-vEVhZ7UBftXsB5xq1LhwitV2Gl6kcR5P0ReJ+71SQFY="; 30 30 }; 31 31 32 32 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/langfuse/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "langfuse"; 21 - version = "2.60.5"; 21 + version = "2.60.7"; 22 22 pyproject = true; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "langfuse"; 26 26 repo = "langfuse-python"; 27 27 tag = "v${version}"; 28 - hash = "sha256-DpfbebbONJ8+7mVouvULRbGs9t1cGjOZHhk3KvaY+gM="; 28 + hash = "sha256-8IlqHO46Kzz+ifmIu2y5SxshNv/lpZO74b1KTE2Opk4="; 29 29 }; 30 30 31 31 build-system = [ poetry-core ];
+6 -2
pkgs/development/python-modules/libcst/default.nix
··· 33 33 }; 34 34 35 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 - inherit pname version src; 37 - sourceRoot = "${src.name}/${cargoRoot}"; 36 + inherit 37 + pname 38 + version 39 + src 40 + cargoRoot 41 + ; 38 42 hash = "sha256-K8hug7JeLPIvrqgVaONKfixu8XRvn+pnqS0fHV+nTqg="; 39 43 }; 40 44
+2 -2
pkgs/development/python-modules/mautrix/default.nix
··· 25 25 26 26 buildPythonPackage rec { 27 27 pname = "mautrix"; 28 - version = "0.20.7"; 28 + version = "0.20.8"; 29 29 pyproject = true; 30 30 31 31 disabled = pythonOlder "3.10"; ··· 34 34 owner = "mautrix"; 35 35 repo = "python"; 36 36 tag = "v${version}"; 37 - hash = "sha256-tOX/KQrECeEV3/0q3tpO4brUdalmw6IincF6pHzsEE8="; 37 + hash = "sha256-giK8JZ6nzsA8SV6CzDNEbJmbwDju9t6fLJr/oXNjvKs="; 38 38 }; 39 39 40 40 build-system = [ setuptools ];
+3 -3
pkgs/development/python-modules/numpy-groupies/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "numpy-groupies"; 15 - version = "0.11.2"; 15 + version = "0.11.3"; 16 16 pyproject = true; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "ml31415"; 20 20 repo = "numpy-groupies"; 21 21 tag = "v${version}"; 22 - hash = "sha256-Eu+5SR28jIasKe1p7rvbq2yo3PGZRQWWdG3A5vGhnyM="; 22 + hash = "sha256-pg9hOtIgS8pB/Y9Xqto9Omsdg8TxaA5ZGE1Qh1DCceU="; 23 23 }; 24 24 25 25 build-system = [ ··· 39 39 40 40 meta = { 41 41 homepage = "https://github.com/ml31415/numpy-groupies"; 42 - changelog = "https://github.com/ml31415/numpy-groupies/releases/tag/v${version}"; 42 + changelog = "https://github.com/ml31415/numpy-groupies/releases/tag/${src.tag}"; 43 43 description = "Optimised tools for group-indexing operations: aggregated sum and more"; 44 44 license = lib.licenses.bsd2; 45 45 maintainers = with lib.maintainers; [ berquist ];
+11 -7
pkgs/development/python-modules/primp/default.nix
··· 25 25 modRoot = "./src"; 26 26 patches = [ 27 27 # A patch required to build boringssl compatible with `boring-sys2`. 28 - # See https://github.com/0x676e67/boring2/blob/1a0f1cd24e728aac100df68027c820f858199224/boring-sys/build/main.rs#L486-L489 28 + # See https://github.com/0x676e67/boring2/blob/refs/tags/v4.15.11/boring-sys/build/main.rs#L486-L489 29 29 (fetchpatch { 30 30 name = "boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 31 - url = "https://raw.githubusercontent.com/0x676e67/boring2/4edbff8cade24d5d83cc372c4502b59c5192b5a1/boring-sys/patches/boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 32 - hash = "sha256-lM+2lLvfDHnxLl+OgZ6R8Y4Z6JfA9AiDqboT1mbxmao="; 31 + url = "https://raw.githubusercontent.com/0x676e67/boring2/refs/tags/v4.15.11/boring-sys/patches/boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 32 + hash = "sha256-JRRATcCXo0HBQTzgCAuLpxC3NEGrTw1cEmC0VHOgO2M="; 33 33 }) 34 34 ]; 35 35 ··· 45 45 oa.env.NIX_CFLAGS_COMPILE 46 46 + " " 47 47 + toString ( 48 - lib.optionals stdenv.cc.isGNU [ 48 + lib.optionals stdenv.cc.isClang [ 49 + "-Wno-error=reorder-ctor" 50 + ] 51 + ++ lib.optionals stdenv.cc.isGNU [ 52 + "-Wno-error=reorder" 49 53 "-Wno-error=ignored-attributes" 50 54 ] 51 55 ); ··· 61 65 in 62 66 buildPythonPackage rec { 63 67 pname = "primp"; 64 - version = "0.14.0"; 68 + version = "0.15.0"; 65 69 pyproject = true; 66 70 67 71 src = fetchFromGitHub { 68 72 owner = "deedy5"; 69 73 repo = "primp"; 70 74 tag = "v${version}"; 71 - hash = "sha256-LrSygeioJlccOH1oyagw02ankkZK+H6Mzrgy8tB83mo="; 75 + hash = "sha256-13o0Ni0dvZaoKgYy2cFQhebwKAJGm5Z2s+gVAddxYxU="; 72 76 }; 73 77 74 78 cargoDeps = rustPlatform.fetchCargoVendor { 75 79 inherit pname version src; 76 - hash = "sha256-iPf25DMGNHrWYByNTylB6bPpLfzs0ADwgkjfhVxiiXA="; 80 + hash = "sha256-UBpf9f3wJgbizHERsm83cuKHiMixj/8JX/IGvteySIo="; 77 81 }; 78 82 79 83 nativeBuildInputs = [
+11 -6
pkgs/development/python-modules/py-sucks/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "py-sucks"; 17 - version = "0.9.10"; 17 + version = "0.9.11"; 18 18 pyproject = true; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "mib1185"; 22 22 repo = "py-sucks"; 23 23 tag = "v${version}"; 24 - hash = "sha256-MjlE5HdxChAgV/O7cD3foqkmKie7FgRRxvOcW+NAtfA="; 24 + hash = "sha256-srj/3x04R9KgbdC6IgbQdgUz+srAx0OttB6Ndb2+Nh4="; 25 25 }; 26 26 27 27 build-system = [ setuptools ]; 28 28 29 29 dependencies = [ 30 - click 31 - pycountry-convert 32 30 pycryptodome 33 31 requests 34 32 sleekxmppfs 35 33 ]; 36 34 35 + optional-dependencies = { 36 + cli = [ 37 + click 38 + pycountry-convert 39 + ]; 40 + }; 41 + 37 42 pythonImportsCheck = [ "sucks" ]; 38 43 39 44 nativeCheckInputs = [ 40 45 requests-mock 41 46 pytestCheckHook 42 - ]; 47 + ] ++ lib.flatten (lib.attrValues optional-dependencies); 43 48 44 49 disabledTests = [ 45 50 # assumes $HOME is at a specific place ··· 47 52 ]; 48 53 49 54 meta = { 50 - changelog = "https://github.com/mib1185/py-sucks/releases/tag/v${version}"; 55 + changelog = "https://github.com/mib1185/py-sucks/releases/tag/${src.tag}"; 51 56 description = "Library for controlling certain robot vacuums"; 52 57 homepage = "https://github.com/mib1185/py-sucks"; 53 58 license = lib.licenses.gpl3Only;
+2 -2
pkgs/development/python-modules/pynitrokey/default.nix
··· 30 30 31 31 let 32 32 pname = "pynitrokey"; 33 - version = "0.8.4"; 33 + version = "0.8.5"; 34 34 mainProgram = "nitropy"; 35 35 in 36 36 ··· 40 40 41 41 src = fetchPypi { 42 42 inherit pname version; 43 - hash = "sha256-Sr3ecKyIjsemM2G72BQR0S5YzfXA0nK9i29yKNie9Ys="; 43 + hash = "sha256-mPhH4IdpKKA9d8sJOGMWpGerzki5qZHFHe4u4ao2RgE="; 44 44 }; 45 45 46 46 nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/development/python-modules/python-debian/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "python-debian"; 15 - version = "0.1.52"; 15 + version = "1.0.1"; 16 16 pyproject = true; 17 17 18 18 disabled = pythonOlder "3.7"; ··· 22 22 owner = "python-debian-team"; 23 23 repo = "python-debian"; 24 24 tag = version; 25 - hash = "sha256-+c+AiUCnpasOLbY6K4cuKUb6Ojwn0py78fL5W24WRwU="; 25 + hash = "sha256-lSKtlBqAa8cJZZHMVb90eYIGem4DwVZLldaYSAJBNek="; 26 26 }; 27 27 28 28 build-system = [
+2 -2
pkgs/development/python-modules/pytubefix/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "pytubefix"; 11 - version = "9.0.1"; 11 + version = "9.1.1"; 12 12 pyproject = true; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "JuanBindez"; 16 16 repo = "pytubefix"; 17 17 tag = "v${version}"; 18 - hash = "sha256-TIrt20FAQumtDisscY9jcJY+Cuh1zA92hU3HVmwr4Bk="; 18 + hash = "sha256-OKOP1kDPYXMQkVOITSxYqMYQvtVom8VCaLnCBYEhgR8="; 19 19 }; 20 20 21 21 build-system = [ setuptools ];
+1 -1
pkgs/development/python-modules/pyyaml-ft/default.nix
··· 10 10 }: 11 11 12 12 buildPythonPackage rec { 13 - pname = "pyyaml"; 13 + pname = "pyyaml-ft"; 14 14 version = "7.0.1"; 15 15 pyproject = true; 16 16
+2 -2
pkgs/development/python-modules/redshift-connector/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "redshift-connector"; 19 - version = "2.1.6"; 19 + version = "2.1.7"; 20 20 format = "setuptools"; 21 21 22 22 disabled = pythonOlder "3.6"; ··· 25 25 owner = "aws"; 26 26 repo = "amazon-redshift-python-driver"; 27 27 tag = "v${version}"; 28 - hash = "sha256-+tZMg0AmfmAFOqUQhOl+vHQVF1DApZbVNjGV4BkGRTg="; 28 + hash = "sha256-OMi8788F2qjMOVDLuJLVReqNv7c/DpXTy1UpqoKRmnQ="; 29 29 }; 30 30 31 31 # remove addops as they add test directory and coverage parameters to pytest
+2 -2
pkgs/development/python-modules/simsimd/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "simsimd"; 14 - version = "6.4.4"; 14 + version = "6.4.7"; 15 15 pyproject = true; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "ashvardanian"; 19 19 repo = "simsimd"; 20 20 tag = "v${version}"; 21 - hash = "sha256-lOE8ZQlUZ0Y+3Lpm4H/ps4o0YO9k245lADxrfR3oI1E="; 21 + hash = "sha256-FM1ge3opt0hwVSjNQWOAYeG6tDIwVLSbu9mZOJBxvJY="; 22 22 }; 23 23 24 24 build-system = [
+2 -2
pkgs/development/python-modules/sse-starlette/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "sse-starlette"; 25 - version = "2.3.5"; 25 + version = "2.3.6"; 26 26 pyproject = true; 27 27 28 28 disabled = pythonOlder "3.9"; ··· 31 31 owner = "sysid"; 32 32 repo = "sse-starlette"; 33 33 tag = "v${version}"; 34 - hash = "sha256-KTq8NwV4YhyfTLpsaF5jyrD3kyBcJ/xXtOwx4WvDFOo="; 34 + hash = "sha256-7FlyV+TsVKGFsecONPm/Z50cCnyuUsr6pimPdc4Cs6c="; 35 35 }; 36 36 37 37 build-system = [ setuptools ];
+6 -2
pkgs/development/python-modules/temporalio/default.nix
··· 33 33 }; 34 34 35 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 - inherit pname version src; 37 - sourceRoot = "${src.name}/${cargoRoot}"; 36 + inherit 37 + pname 38 + version 39 + src 40 + cargoRoot 41 + ; 38 42 hash = "sha256-9hP+zN6jcRmRhPmcZ4Zgp61IeS7gDPfsOvweAxKHnHM="; 39 43 }; 40 44
+2 -2
pkgs/development/python-modules/tencentcloud-sdk-python/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "tencentcloud-sdk-python"; 13 - version = "3.0.1390"; 13 + version = "3.0.1391"; 14 14 pyproject = true; 15 15 16 16 disabled = pythonOlder "3.9"; ··· 19 19 owner = "TencentCloud"; 20 20 repo = "tencentcloud-sdk-python"; 21 21 tag = version; 22 - hash = "sha256-UOJ1NCWKFqcrU2uMX4qTy8ooFEy6TIrb1YTIthHspuM="; 22 + hash = "sha256-bzxaCN2fXoZT2W8zpTg7DrBTmRfyUi2aVhrg+/Y1YkU="; 23 23 }; 24 24 25 25 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/yara-python/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "yara-python"; 13 - version = "4.5.2"; 13 + version = "4.5.4"; 14 14 pyproject = true; 15 15 16 16 disabled = pythonOlder "3.7"; ··· 19 19 owner = "VirusTotal"; 20 20 repo = "yara-python"; 21 21 tag = "v${version}"; 22 - hash = "sha256-RXqazMg78eGxA4JPUqSx0PTcNDmrGjBt5m6OJTmshNU="; 22 + hash = "sha256-2ZwLpkT46KNTQ1ymvMGjnrfHQaIy/rXid0kXoCBixXA="; 23 23 }; 24 24 25 25 # undefined symbol: yr_finalize
+1 -2
pkgs/kde/gear/akonadi-search/default.nix
··· 14 14 cargoRoot = "agent/rs/htmlparser"; 15 15 16 16 cargoDeps = rustPlatform.fetchCargoVendor { 17 - inherit pname version; 17 + inherit pname version cargoRoot; 18 18 src = sources.${pname}; 19 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 20 19 hash = "sha256-hdm4LfQcs4TTfBLzlZYJ0uzqfLxMXuYQExLGJg81W2U="; 21 20 }; 22 21
+1 -2
pkgs/kde/gear/kdepim-addons/default.nix
··· 17 17 cargoRoot = "plugins/webengineurlinterceptor/adblock"; 18 18 19 19 cargoDeps = rustPlatform.fetchCargoVendor { 20 - inherit pname version; 20 + inherit pname version cargoRoot; 21 21 src = sources.${pname}; 22 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 23 22 hash = "sha256-66FqoD3JoPbtg6zc32uaPYaTo4zHxywiN8wPI2jtcjc="; 24 23 }; 25 24
+4 -2
pkgs/servers/home-assistant/custom-components/oref_alert/package.nix
··· 2 2 lib, 3 3 buildHomeAssistantComponent, 4 4 fetchFromGitHub, 5 + aiofiles, 5 6 shapely, 6 7 pytestCheckHook, 7 8 pytest-homeassistant-custom-component, ··· 11 12 buildHomeAssistantComponent rec { 12 13 owner = "amitfin"; 13 14 domain = "oref_alert"; 14 - version = "2.20.1"; 15 + version = "2.21.1"; 15 16 16 17 src = fetchFromGitHub { 17 18 owner = "amitfin"; 18 19 repo = "oref_alert"; 19 20 tag = "v${version}"; 20 - hash = "sha256-EsDGH7/newjHRYu4Lr5UkJ3qaaNupqlhe5CdffEpIVg="; 21 + hash = "sha256-ov/smP7rflRfQMqYduTxDAYj5xQkpZJSzIQZrP0YADQ="; 21 22 }; 22 23 23 24 dependencies = [ 25 + aiofiles 24 26 shapely 25 27 ]; 26 28
+3 -3
pkgs/servers/home-assistant/custom-lovelace-modules/universal-remote-card/package.nix
··· 6 6 7 7 buildNpmPackage rec { 8 8 pname = "universal-remote-card"; 9 - version = "4.5.2"; 9 + version = "4.5.3"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Nerwyn"; 13 13 repo = "android-tv-card"; 14 14 rev = version; 15 - hash = "sha256-woplybqlpx+xJdLJ0RWgDp3mR1l8Ntt+JA0SVyFaDQA="; 15 + hash = "sha256-AxPpKp7SjeSB8VqclDJgkArC9zmjIkLQx+RBWQX0sLM="; 16 16 }; 17 17 18 18 patches = [ ./dont-call-git.patch ]; 19 19 20 - npmDepsHash = "sha256-YN+Ftv5gEwXHqoO7KAyijZMS6g6i3bKbEnvoVLakrTQ="; 20 + npmDepsHash = "sha256-KFgo1sKwCLmW0Il4tK2L+giF3th+YvVUWG3n+3HkRg4="; 21 21 22 22 installPhase = '' 23 23 runHook preInstall
+2 -2
pkgs/servers/http/tomcat/tomcat-native.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "tomcat-native"; 12 - version = "2.0.8"; 12 + version = "2.0.9"; 13 13 14 14 src = fetchurl { 15 15 url = "mirror://apache/tomcat/tomcat-connectors/native/${version}/source/${pname}-${version}-src.tar.gz"; 16 - hash = "sha256-x8U4L8taZHpc5v7QuWch6UGY+i9XJc9RJPW2URsF3+8="; 16 + hash = "sha256-iu0N70FNf0m2iOgmeXUT6VGC7L17b4tvAl5Se4UGXAI="; 17 17 }; 18 18 19 19 sourceRoot = "${pname}-${version}-src/native";
+6 -2
pkgs/tools/filesystems/ceph/default.nix
··· 243 243 }; 244 244 cargoRoot = "src/_bcrypt"; 245 245 cargoDeps = rustPlatform.fetchCargoVendor { 246 - inherit pname version src; 247 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 246 + inherit 247 + pname 248 + version 249 + src 250 + cargoRoot 251 + ; 248 252 hash = "sha256-8PyCgh/rUO8uynzGdgylAsb5k55dP9fCnf40UOTCR/M="; 249 253 }; 250 254 });
+6 -2
pkgs/tools/filesystems/ceph/old-python-packages/cryptography.nix
··· 42 42 }; 43 43 44 44 cargoDeps = rustPlatform.fetchCargoVendor { 45 - inherit pname version src; 46 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 45 + inherit 46 + pname 47 + version 48 + src 49 + cargoRoot 50 + ; 47 51 hash = "sha256-pZHu3Oo9DWRAtldU0UvrH1FIg0bEvyfizPUhj9IBL58="; 48 52 }; 49 53
+1
pkgs/top-level/aliases.nix
··· 1391 1391 oauth2_proxy = throw "'oauth2_proxy' has been renamed to/replaced by 'oauth2-proxy'"; # Converted to throw 2024-10-17 1392 1392 ocis-bin = throw "ocis-bin has been renamed to ocis_5-bin'. Future major.minor versions will be made available as separate packages"; # Added 2025-03-30 1393 1393 odoo15 = throw "odoo15 has been removed from nixpkgs as it is unsupported; migrate to a newer version of odoo"; # Added 2025-05-06 1394 + offrss = throw "offrss has been removed due to lack of upstream maintenance; consider using another rss reader"; # Added 2025-06-01 1394 1395 oil = lib.warnOnInstantiate "Oil has been replaced with the faster native C++ version and renamed to 'oils-for-unix'. See also https://github.com/oils-for-unix/oils/wiki/Oils-Deployments" oils-for-unix; # Added 2024-10-22 1395 1396 onevpl-intel-gpu = lib.warnOnInstantiate "onevpl-intel-gpu has been renamed to vpl-gpu-rt" vpl-gpu-rt; # Added 2024-06-04 1396 1397 openai-whisper-cpp = whisper-cpp; # Added 2024-12-13
-2
pkgs/top-level/all-packages.nix
··· 16928 16928 16929 16929 yaziPlugins = recurseIntoAttrs (callPackage ../by-name/ya/yazi/plugins { }); 16930 16930 16931 - animdl = python3Packages.callPackage ../applications/video/animdl { }; 16932 - 16933 16931 dillo = callPackage ../by-name/di/dillo/package.nix { 16934 16932 fltk = fltk13; 16935 16933 };