Merge remote-tracking branch 'origin/staging-next' into staging

K900 2be92526 70e8bf7d

+1103 -764
+10 -9
.github/workflows/check-cherry-picks.yml
··· 115 repo: context.repo.repo, 116 pull_number: context.payload.pull_request.number 117 })).filter(review => 118 - review.user.login == 'github-actions[bot]' && 119 - review.state == 'CHANGES_REQUESTED' 120 ).map(async (review) => { 121 - await github.rest.pulls.dismissReview({ 122 - owner: context.repo.owner, 123 - repo: context.repo.repo, 124 - pull_number: context.payload.pull_request.number, 125 - review_id: review.id, 126 - message: 'All cherry-picks are good now, thank you!' 127 - }) 128 await github.graphql(`mutation($node_id:ID!) { 129 minimizeComment(input: { 130 classifier: RESOLVED,
··· 115 repo: context.repo.repo, 116 pull_number: context.payload.pull_request.number 117 })).filter(review => 118 + review.user.login == 'github-actions[bot]' 119 ).map(async (review) => { 120 + if (review.state == 'CHANGES_REQUESTED') { 121 + await github.rest.pulls.dismissReview({ 122 + owner: context.repo.owner, 123 + repo: context.repo.repo, 124 + pull_number: context.payload.pull_request.number, 125 + review_id: review.id, 126 + message: 'All cherry-picks are good now, thank you!' 127 + }) 128 + } 129 await github.graphql(`mutation($node_id:ID!) { 130 minimizeComment(input: { 131 classifier: RESOLVED,
+1 -1
.github/workflows/check-format.yml
··· 25 with: 26 merged-as-untrusted: true 27 28 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 29 with: 30 extra_nix_config: sandbox = true 31
··· 25 with: 26 merged-as-untrusted: true 27 28 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 29 with: 30 extra_nix_config: sandbox = true 31
+1 -1
.github/workflows/check-shell.yml
··· 42 with: 43 merged-as-untrusted: true 44 45 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 46 47 - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 48 with:
··· 42 with: 43 merged-as-untrusted: true 44 45 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 46 47 - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 48 with:
+7 -9
.github/workflows/codeowners-v2.yml
··· 45 check: 46 name: Check 47 runs-on: ubuntu-24.04-arm 48 - if: github.repository_owner == 'NixOS' 49 steps: 50 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 51 with: ··· 56 merged-as-untrusted: true 57 target-as-trusted: true 58 59 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 60 61 - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 62 with: ··· 68 run: nix-build trusted/ci -A codeownersValidator 69 70 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 71 - if: vars.OWNER_RO_APP_ID 72 id: app-token 73 with: 74 app-id: ${{ vars.OWNER_RO_APP_ID }} ··· 91 request: 92 name: Request 93 runs-on: ubuntu-24.04-arm 94 - if: github.repository_owner == 'NixOS' 95 steps: 96 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 97 98 # Important: Because we use pull_request_target, this checks out the base branch of the PR, not the PR head. 99 # This is intentional, because we need to request the review of owners as declared in the base branch. ··· 101 with: 102 path: trusted 103 104 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 105 - if: vars.OWNER_APP_ID 106 id: app-token 107 with: 108 app-id: ${{ vars.OWNER_APP_ID }} ··· 110 permission-administration: read 111 permission-members: read 112 permission-pull-requests: write 113 - 114 - - name: Build review request package 115 - run: nix-build trusted/ci -A requestReviews 116 117 - name: Request reviews 118 if: steps.app-token.outputs.token
··· 45 check: 46 name: Check 47 runs-on: ubuntu-24.04-arm 48 steps: 49 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 50 with: ··· 55 merged-as-untrusted: true 56 target-as-trusted: true 57 58 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 59 60 - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 61 with: ··· 67 run: nix-build trusted/ci -A codeownersValidator 68 69 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 70 + if: github.event_name == 'pull_request_target' && vars.OWNER_RO_APP_ID 71 id: app-token 72 with: 73 app-id: ${{ vars.OWNER_RO_APP_ID }} ··· 90 request: 91 name: Request 92 runs-on: ubuntu-24.04-arm 93 steps: 94 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 95 96 # Important: Because we use pull_request_target, this checks out the base branch of the PR, not the PR head. 97 # This is intentional, because we need to request the review of owners as declared in the base branch. ··· 99 with: 100 path: trusted 101 102 + - name: Build review request package 103 + run: nix-build trusted/ci -A requestReviews 104 + 105 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 106 + if: github.event_name == 'pull_request_target' && vars.OWNER_APP_ID 107 id: app-token 108 with: 109 app-id: ${{ vars.OWNER_APP_ID }} ··· 111 permission-administration: read 112 permission-members: read 113 permission-pull-requests: write 114 115 - name: Request reviews 116 if: steps.app-token.outputs.token
+1 -1
.github/workflows/eval-aliases.yml
··· 26 merged-as-untrusted: true 27 28 - name: Install Nix 29 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 30 with: 31 extra_nix_config: sandbox = true 32
··· 26 merged-as-untrusted: true 27 28 - name: Install Nix 29 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 30 with: 31 extra_nix_config: sandbox = true 32
+3 -3
.github/workflows/eval.yml
··· 4 pull_request: 5 paths: 6 - .github/workflows/eval.yml 7 - - .github/workflows/reviews.yml # needs eval results from the same event type 8 pull_request_target: 9 push: 10 # Keep this synced with ci/request-reviews/dev-branches.txt ··· 68 path: untrusted 69 70 - name: Install Nix 71 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 72 with: 73 extra_nix_config: sandbox = true 74 ··· 180 path: trusted 181 182 - name: Install Nix 183 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 184 with: 185 extra_nix_config: sandbox = true 186
··· 4 pull_request: 5 paths: 6 - .github/workflows/eval.yml 7 + - .github/workflows/reviewers.yml # needs eval results from the same event type 8 pull_request_target: 9 push: 10 # Keep this synced with ci/request-reviews/dev-branches.txt ··· 68 path: untrusted 69 70 - name: Install Nix 71 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 72 with: 73 extra_nix_config: sandbox = true 74 ··· 180 path: trusted 181 182 - name: Install Nix 183 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 184 with: 185 extra_nix_config: sandbox = true 186
+1 -1
.github/workflows/lib-tests.yml
··· 28 with: 29 merged-as-untrusted: true 30 31 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 32 with: 33 extra_nix_config: sandbox = true 34
··· 28 with: 29 merged-as-untrusted: true 30 31 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 32 with: 33 extra_nix_config: sandbox = true 34
+1 -1
.github/workflows/manual-nixos-v2.yml
··· 45 with: 46 merged-as-untrusted: true 47 48 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 49 with: 50 extra_nix_config: sandbox = true 51
··· 45 with: 46 merged-as-untrusted: true 47 48 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 49 with: 50 extra_nix_config: sandbox = true 51
+1 -1
.github/workflows/manual-nixpkgs-v2.yml
··· 29 with: 30 merged-as-untrusted: true 31 32 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 33 with: 34 extra_nix_config: sandbox = true 35
··· 29 with: 30 merged-as-untrusted: true 31 32 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 33 with: 34 extra_nix_config: sandbox = true 35
+1 -1
.github/workflows/nix-parse-v2.yml
··· 26 with: 27 merged-as-untrusted: true 28 29 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 30 with: 31 extra_nix_config: sandbox = true 32 nix_path: nixpkgs=channel:nixpkgs-unstable
··· 26 with: 27 merged-as-untrusted: true 28 29 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 30 with: 31 extra_nix_config: sandbox = true 32 nix_path: nixpkgs=channel:nixpkgs-unstable
+1 -1
.github/workflows/nixpkgs-vet.yml
··· 36 merged-as-untrusted: true 37 target-as-trusted: true 38 39 - - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 40 41 - name: Running nixpkgs-vet 42 env:
··· 36 merged-as-untrusted: true 37 target-as-trusted: true 38 39 + - uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 40 41 - name: Running nixpkgs-vet 42 env:
+2 -2
.github/workflows/reviewers.yml
··· 34 sparse-checkout: ci 35 36 - name: Install Nix 37 - uses: cachix/install-nix-action@526118121621777ccd86f79b04685a9319637641 # v31 38 with: 39 extra_nix_config: sandbox = true 40 ··· 44 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions 45 # Can't use the token received from permissions above, because it can't get enough permissions 46 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 47 - if: vars.OWNER_APP_ID 48 id: app-token 49 with: 50 app-id: ${{ vars.OWNER_APP_ID }}
··· 34 sparse-checkout: ci 35 36 - name: Install Nix 37 + uses: cachix/install-nix-action@17fe5fb4a23ad6cbbe47d6b3f359611ad276644c # v31 38 with: 39 extra_nix_config: sandbox = true 40 ··· 44 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions 45 # Can't use the token received from permissions above, because it can't get enough permissions 46 - uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6 47 + if: github.event_name == 'pull_request_target' && vars.OWNER_APP_ID 48 id: app-token 49 with: 50 app-id: ${{ vars.OWNER_APP_ID }}
+2
ci/nixpkgs-vet.nix
··· 25 env.NIXPKGS_VET_NIX_PACKAGE = nix; 26 } 27 '' 28 nixpkgs-vet --base ${filtered base} ${filtered head} 29 30 touch $out
··· 25 env.NIXPKGS_VET_NIX_PACKAGE = nix; 26 } 27 '' 28 + export NIX_STATE_DIR=$(mktemp -d) 29 + 30 nixpkgs-vet --base ${filtered base} ${filtered head} 31 32 touch $out
+21
doc/languages-frameworks/haskell.section.md
··· 161 162 <!-- TODO(@maralorn) Link to package set generation docs in the contributors guide below. --> 163 164 ## `haskellPackages.mkDerivation` {#haskell-mkderivation} 165 166 Every haskell package set has its own haskell-aware `mkDerivation` which is used
··· 161 162 <!-- TODO(@maralorn) Link to package set generation docs in the contributors guide below. --> 163 164 + ### GHC Deprecation Policy {#ghc-deprecation-policy} 165 + 166 + We remove GHC versions according to the following policy: 167 + 168 + #### Major GHC versions {#major-ghc-deprecation} 169 + 170 + We keep the following GHC major versions: 171 + 1. The current Stackage LTS as the default and all later major versions. 172 + 2. The two latest major versions older than our default. 173 + 3. The currently recommended GHCup version and all later major versions. 174 + 175 + Older GHC versions might be kept longer, if there are in-tree consumers. We will coordinate with the maintainers of those dependencies to find a way forward. 176 + 177 + #### Minor GHC versions {#minor-ghc-deprecation} 178 + 179 + Every major version has a default minor version. The default minor version will be updated as soon as viable without breakage. 180 + 181 + Older minor versions for a supported major version will only be kept, if they are the last supported version of a major Stackage LTS release. 182 + 183 + <!-- Policy introduced here: https://discourse.nixos.org/t/nixpkgs-ghc-deprecation-policy-user-feedback-necessary/64153 --> 184 + 185 ## `haskellPackages.mkDerivation` {#haskell-mkderivation} 186 187 Every haskell package set has its own haskell-aware `mkDerivation` which is used
+8 -4
doc/languages-frameworks/rust.section.md
··· 605 directory. In such cases, the `cargoRoot` attribute can be used to 606 specify the crate's directory relative to `sourceRoot`. In the 607 following example, the crate is in `src/rust`, as specified in the 608 - `cargoRoot` attribute. Note that we also need to specify the correct 609 - path for `fetchCargoVendor`. 610 611 ```nix 612 { ··· 627 }; 628 629 cargoDeps = rustPlatform.fetchCargoVendor { 630 - inherit pname version src; 631 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 632 hash = "sha256-ctUt8maCjnGddKPf+Ii++wKsAXA1h+JM6zKQNXXwJqQ="; 633 }; 634
··· 605 directory. In such cases, the `cargoRoot` attribute can be used to 606 specify the crate's directory relative to `sourceRoot`. In the 607 following example, the crate is in `src/rust`, as specified in the 608 + `cargoRoot` attribute. Note that we also need to pass in `cargoRoot` 609 + to `fetchCargoVendor`. 610 611 ```nix 612 { ··· 627 }; 628 629 cargoDeps = rustPlatform.fetchCargoVendor { 630 + inherit 631 + pname 632 + version 633 + src 634 + cargoRoot 635 + ; 636 hash = "sha256-ctUt8maCjnGddKPf+Ii++wKsAXA1h+JM6zKQNXXwJqQ="; 637 }; 638
+9
doc/redirects.json
··· 40 "ex-testEqualArrayOrMap-test-function-add-cowbell": [ 41 "index.html#ex-testEqualArrayOrMap-test-function-add-cowbell" 42 ], 43 "inkscape-plugins": [ 44 "index.html#inkscape-plugins" 45 ], 46 "neovim": [ 47 "index.html#neovim"
··· 40 "ex-testEqualArrayOrMap-test-function-add-cowbell": [ 41 "index.html#ex-testEqualArrayOrMap-test-function-add-cowbell" 42 ], 43 + "ghc-deprecation-policy": [ 44 + "index.html#ghc-deprecation-policy" 45 + ], 46 "inkscape-plugins": [ 47 "index.html#inkscape-plugins" 48 + ], 49 + "major-ghc-deprecation": [ 50 + "index.html#major-ghc-deprecation" 51 + ], 52 + "minor-ghc-deprecation": [ 53 + "index.html#minor-ghc-deprecation" 54 ], 55 "neovim": [ 56 "index.html#neovim"
+1 -1
doc/release-notes/rl-2511.section.md
··· 13 14 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 15 16 - - The `boot.readOnlyNixStore` has been removed. Control over bind mount options on `/nix/store` is now offered by the `boot.nixStoreMountOpts` option. 17 18 ## Other Notable Changes {#sec-nixpkgs-release-25.11-notable-changes} 19
··· 13 14 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 15 16 + - The `offrss` package was removed due to lack of upstream maintenance since 2012. It's recommended for users to migrate to another RSS reader 17 18 ## Other Notable Changes {#sec-nixpkgs-release-25.11-notable-changes} 19
+6
maintainers/maintainer-list.nix
··· 17139 githubId = 1131571; 17140 name = "naelstrof"; 17141 }; 17142 nagisa = { 17143 name = "Simonas Kazlauskas"; 17144 email = "nixpkgs@kazlauskas.me";
··· 17139 githubId = 1131571; 17140 name = "naelstrof"; 17141 }; 17142 + naggie = { 17143 + name = "Cal Bryant"; 17144 + email = "callan.bryant@gmail.com"; 17145 + github = "naggie"; 17146 + githubId = 208440; 17147 + }; 17148 nagisa = { 17149 name = "Simonas Kazlauskas"; 17150 email = "nixpkgs@kazlauskas.me";
+2
nixos/doc/manual/release-notes/rl-2511.section.md
··· 30 31 - `renovate` was updated to v40. See the [upstream release notes](https://github.com/renovatebot/renovate/releases/tag/40.0.0) for breaking changes. 32 33 ## Other Notable Changes {#sec-release-25.11-notable-changes} 34 35 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
··· 30 31 - `renovate` was updated to v40. See the [upstream release notes](https://github.com/renovatebot/renovate/releases/tag/40.0.0) for breaking changes. 32 33 + - The `boot.readOnlyNixStore` has been removed. Control over bind mount options on `/nix/store` is now offered by the `boot.nixStoreMountOpts` option. 34 + 35 ## Other Notable Changes {#sec-release-25.11-notable-changes} 36 37 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+1 -1
nixos/modules/programs/nix-required-mounts.nix
··· 90 } 91 ''; 92 example.require-ipfs.paths = [ "/ipfs" ]; 93 - example.require-ipfs.onFeatures = [ "ifps" ]; 94 }; 95 extraWrapperArgs = lib.mkOption { 96 type = with lib.types; listOf str;
··· 90 } 91 ''; 92 example.require-ipfs.paths = [ "/ipfs" ]; 93 + example.require-ipfs.onFeatures = [ "ipfs" ]; 94 }; 95 extraWrapperArgs = lib.mkOption { 96 type = with lib.types; listOf str;
+2 -2
nixos/modules/services/home-automation/wyoming/satellite.nix
··· 23 ; 24 25 finalPackage = cfg.package.overridePythonAttrs (oldAttrs: { 26 - propagatedBuildInputs = 27 - oldAttrs.propagatedBuildInputs 28 # for audio enhancements like auto-gain, noise suppression 29 ++ cfg.package.optional-dependencies.webrtc 30 # vad is currently optional, because it is broken on aarch64-linux
··· 23 ; 24 25 finalPackage = cfg.package.overridePythonAttrs (oldAttrs: { 26 + dependencies = 27 + oldAttrs.dependencies 28 # for audio enhancements like auto-gain, noise suppression 29 ++ cfg.package.optional-dependencies.webrtc 30 # vad is currently optional, because it is broken on aarch64-linux
+31
nixos/modules/services/networking/dsnet.md
···
··· 1 + # dsnet {#module-services-dsnet} 2 + 3 + dsnet is a CLI tool to manage a centralised wireguard server. It allows easy 4 + generation of client configuration, handling key generation, IP allocation etc. 5 + 6 + It keeps its own configuration at `/etc/dsnetconfig.json`, which is more of a 7 + database. It contains key material too. 8 + 9 + The way this module works is to patch this database with whatever is configured 10 + in the nix service instantiation. This happens automatically when required. 11 + 12 + This way it is possible to decide what to let dnset manage and what parts you 13 + want to keep declaratively. 14 + 15 + ``` 16 + services.dsnet = { 17 + enable = true; 18 + settings = { 19 + ExternalHostname = "vpn.example.com"; 20 + Network = "10.171.90.0/24"; 21 + Network6 = ""; 22 + IP = "10.171.90.1"; 23 + IP6 = ""; 24 + DNS = "10.171.90.1"; 25 + Networks = [ "0.0.0.0/0" ]; 26 + }; 27 + 28 + ``` 29 + 30 + 31 + See <https://github.com/naggie/dsnet> for more information.
+184
nixos/modules/services/networking/dsnet.nix
···
··· 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 7 + 8 + let 9 + cfg = config.services.dsnet; 10 + settingsFormat = pkgs.formats.json { }; 11 + patchFile = settingsFormat.generate "dsnet-patch.json" cfg.settings; 12 + in 13 + { 14 + options.services.dsnet = { 15 + enable = lib.mkEnableOption "dsnet, a centralised Wireguard VPN manager"; 16 + 17 + package = lib.mkPackageOption pkgs "dsnet" { }; 18 + 19 + settings = lib.mkOption { 20 + type = lib.types.submodule { 21 + 22 + freeformType = settingsFormat.type; 23 + 24 + options = { 25 + ExternalHostname = lib.mkOption { 26 + type = lib.types.nullOr lib.types.str; 27 + default = null; 28 + example = "vpn.example.com"; 29 + description = '' 30 + The hostname that clients should use to connect to this server. 31 + This is used to generate the client configuration files. 32 + 33 + This is preferred over ExternalIP, as it allows for IPv4 and 34 + IPv6, as well as enabling the ability tp change IP. 35 + ''; 36 + }; 37 + 38 + ExternalIP = lib.mkOption { 39 + type = lib.types.nullOr lib.types.str; 40 + default = null; 41 + example = "192.0.2.1"; 42 + description = '' 43 + The external IP address of the server. This is used to generate 44 + the client configuration files for when an ExternalHostname is not set. 45 + 46 + Leaving this empty will cause dsnet to use the IP address of 47 + what looks like the WAN interface. 48 + ''; 49 + }; 50 + 51 + ExternalIP6 = lib.mkOption { 52 + type = lib.types.nullOr lib.types.str; 53 + default = null; 54 + example = "2001:db8::1"; 55 + description = '' 56 + The external IPv6 address of the server. This is used to generate 57 + the client configuration files for when an ExternalHostname is 58 + not set. Used in preference to ExternalIP. 59 + 60 + Leaving this empty will cause dsnet to use the IP address of 61 + what looks like the WAN interface. 62 + ''; 63 + }; 64 + 65 + Network = lib.mkOption { 66 + type = lib.types.nullOr lib.types.str; 67 + default = null; 68 + example = "172.18.0.0/24"; 69 + description = '' 70 + The IPv4 network that the server will use to allocate IPs on the network. 71 + Leave this empty to let dsnet choose a network. 72 + ''; 73 + }; 74 + 75 + Network6 = lib.mkOption { 76 + type = lib.types.nullOr lib.types.str; 77 + default = null; 78 + example = "2001:db8::1/64"; 79 + description = '' 80 + The IPv6 network that the server will use to allocate IPs on the 81 + network. 82 + Leave this empty to let dsnet choose a network. 83 + ''; 84 + }; 85 + 86 + IP = lib.mkOption { 87 + type = lib.types.nullOr lib.types.str; 88 + default = null; 89 + example = "172.18.0.1"; 90 + description = '' 91 + The IPv4 address that the server will use on the network. 92 + Leave this empty to let dsnet choose an address. 93 + ''; 94 + }; 95 + 96 + IP6 = lib.mkOption { 97 + type = lib.types.nullOr lib.types.str; 98 + default = null; 99 + example = "2001:db8::1"; 100 + description = '' 101 + The IPv6 address that the server will use on the network 102 + Leave this empty to let dsnet choose an address. 103 + ''; 104 + }; 105 + 106 + Networks = lib.mkOption { 107 + type = lib.types.nullOr (lib.types.listOf lib.types.str); 108 + default = null; 109 + example = [ 110 + "0.0.0.0/0" 111 + "192.168.0.0/24" 112 + ]; 113 + description = '' 114 + The CIDR networks that should route through this server. Clients 115 + will be configured to route traffic for these networks through 116 + the server peer. 117 + ''; 118 + }; 119 + }; 120 + }; 121 + 122 + default = { }; 123 + description = '' 124 + The settings to use for dsnet. This will be converted to a JSON 125 + object that will be passed to dsnet as a patch, using the patch 126 + command when the service is started. See the dsnet documentation for 127 + more information on the additional options. 128 + 129 + Note that the resulting /etc/dsnetconfg.json is more of a database 130 + than it is a configuration file. It is therefore recommended that 131 + system specific values are configured here, rather than the full 132 + configuration including peers. 133 + 134 + Peers may be managed via the dsnet add/remove commands, negating the 135 + need to manage key material and cumbersom configuration with nix. If 136 + you want peer configuration in nix, you may as well use the regular 137 + wireguard module. 138 + ''; 139 + example = { 140 + ExternalHostname = "vpn.example.com"; 141 + ExternalIP = "127.0.0.1"; 142 + ExternalIP6 = ""; 143 + ListenPort = 51820; 144 + Network = "10.3.148.0/22"; 145 + Network6 = ""; 146 + IP = "10.3.148.1"; 147 + IP6 = ""; 148 + DNS = "8.8.8.8"; 149 + Networks = [ "0.0.0.0/0" ]; 150 + }; 151 + }; 152 + }; 153 + 154 + config = lib.mkIf cfg.enable { 155 + environment.systemPackages = [ cfg.package ]; 156 + 157 + systemd.services.dsnet = { 158 + description = "dsnet VPN Management"; 159 + after = [ "network-online.target" ]; 160 + wants = [ "network-online.target" ]; 161 + wantedBy = [ "multi-user.target" ]; 162 + preStart = '' 163 + test ! -f /etc/dsnetconfig.json && ${lib.getExe cfg.package} init 164 + ${lib.getExe cfg.package} patch < ${patchFile} 165 + ''; 166 + serviceConfig = { 167 + ExecStart = "${lib.getExe cfg.package} up"; 168 + ExecStop = "${lib.getExe cfg.package} down"; 169 + Type = "oneshot"; 170 + # consider the service to be active after process exits, so it can be 171 + # reloaded 172 + RemainAfterExit = true; 173 + }; 174 + 175 + reload = '' 176 + ${lib.getExe cfg.package} patch < ${patchFile} 177 + ${lib.getExe cfg.package} sync < ${patchFile} 178 + ''; 179 + 180 + # reload _instead_ of restarting on change 181 + reloadIfChanged = true; 182 + }; 183 + }; 184 + }
+99 -127
nixos/modules/services/networking/murmur.nix
··· 5 ... 6 }: 7 8 - with lib; 9 - 10 let 11 cfg = config.services.murmur; 12 forking = cfg.logFile != null; ··· 14 database=${cfg.stateDir}/murmur.sqlite 15 dbDriver=QSQLITE 16 17 - autobanAttempts=${toString cfg.autobanAttempts} 18 - autobanTimeframe=${toString cfg.autobanTimeframe} 19 - autobanTime=${toString cfg.autobanTime} 20 21 - logfile=${optionalString (cfg.logFile != null) cfg.logFile} 22 - ${optionalString forking "pidfile=/run/murmur/murmurd.pid"} 23 24 welcometext="${cfg.welcometext}" 25 - port=${toString cfg.port} 26 27 - ${optionalString (cfg.hostName != "") "host=${cfg.hostName}"} 28 - ${optionalString (cfg.password != "") "serverpassword=${cfg.password}"} 29 30 - bandwidth=${toString cfg.bandwidth} 31 - users=${toString cfg.users} 32 33 - textmessagelength=${toString cfg.textMsgLength} 34 - imagemessagelength=${toString cfg.imgMsgLength} 35 - allowhtml=${boolToString cfg.allowHtml} 36 - logdays=${toString cfg.logDays} 37 - bonjour=${boolToString cfg.bonjour} 38 - sendversion=${boolToString cfg.sendVersion} 39 40 - ${optionalString (cfg.registerName != "") "registerName=${cfg.registerName}"} 41 - ${optionalString (cfg.registerPassword != "") "registerPassword=${cfg.registerPassword}"} 42 - ${optionalString (cfg.registerUrl != "") "registerUrl=${cfg.registerUrl}"} 43 - ${optionalString (cfg.registerHostname != "") "registerHostname=${cfg.registerHostname}"} 44 45 - certrequired=${boolToString cfg.clientCertRequired} 46 - ${optionalString (cfg.sslCert != "") "sslCert=${cfg.sslCert}"} 47 - ${optionalString (cfg.sslKey != "") "sslKey=${cfg.sslKey}"} 48 - ${optionalString (cfg.sslCa != "") "sslCA=${cfg.sslCa}"} 49 50 - ${optionalString (cfg.dbus != null) "dbus=${cfg.dbus}"} 51 52 ${cfg.extraConfig} 53 ''; 54 in 55 { 56 - imports = [ 57 - (mkRenamedOptionModule [ "services" "murmur" "welcome" ] [ "services" "murmur" "welcometext" ]) 58 - (mkRemovedOptionModule [ "services" "murmur" "pidfile" ] "Hardcoded to /run/murmur/murmurd.pid now") 59 - ]; 60 - 61 options = { 62 services.murmur = { 63 - enable = mkOption { 64 - type = types.bool; 65 - default = false; 66 - description = "If enabled, start the Murmur Mumble server."; 67 - }; 68 69 - openFirewall = mkOption { 70 - type = types.bool; 71 - default = false; 72 - description = '' 73 - Open ports in the firewall for the Murmur Mumble server. 74 - ''; 75 - }; 76 77 - user = mkOption { 78 - type = types.str; 79 default = "murmur"; 80 description = '' 81 The name of an existing user to use to run the service. ··· 83 ''; 84 }; 85 86 - group = mkOption { 87 - type = types.str; 88 default = "murmur"; 89 description = '' 90 The name of an existing group to use to run the service. ··· 92 ''; 93 }; 94 95 - stateDir = mkOption { 96 - type = types.path; 97 default = "/var/lib/murmur"; 98 description = '' 99 Directory to store data for the server. 100 ''; 101 }; 102 103 - autobanAttempts = mkOption { 104 - type = types.int; 105 default = 10; 106 description = '' 107 Number of attempts a client is allowed to make in ··· 110 ''; 111 }; 112 113 - autobanTimeframe = mkOption { 114 - type = types.int; 115 default = 120; 116 description = '' 117 Timeframe in which a client can connect without being banned ··· 119 ''; 120 }; 121 122 - autobanTime = mkOption { 123 - type = types.int; 124 default = 300; 125 description = "The amount of time an IP ban lasts (in seconds)."; 126 }; 127 128 - logFile = mkOption { 129 - type = types.nullOr types.path; 130 default = null; 131 example = "/var/log/murmur/murmurd.log"; 132 description = "Path to the log file for Murmur daemon. Empty means log to journald."; 133 }; 134 135 - welcometext = mkOption { 136 - type = types.str; 137 default = ""; 138 description = "Welcome message for connected clients."; 139 }; 140 141 - port = mkOption { 142 - type = types.port; 143 default = 64738; 144 description = "Ports to bind to (UDP and TCP)."; 145 }; 146 147 - hostName = mkOption { 148 - type = types.str; 149 default = ""; 150 description = "Host to bind to. Defaults binding on all addresses."; 151 }; 152 153 - package = mkPackageOption pkgs "murmur" { }; 154 155 - password = mkOption { 156 - type = types.str; 157 default = ""; 158 description = "Required password to join server, if specified."; 159 }; 160 161 - bandwidth = mkOption { 162 - type = types.int; 163 default = 72000; 164 description = '' 165 Maximum bandwidth (in bits per second) that clients may send ··· 167 ''; 168 }; 169 170 - users = mkOption { 171 - type = types.int; 172 default = 100; 173 description = "Maximum number of concurrent clients allowed."; 174 }; 175 176 - textMsgLength = mkOption { 177 - type = types.int; 178 default = 5000; 179 description = "Max length of text messages. Set 0 for no limit."; 180 }; 181 182 - imgMsgLength = mkOption { 183 - type = types.int; 184 default = 131072; 185 description = "Max length of image messages. Set 0 for no limit."; 186 }; 187 188 - allowHtml = mkOption { 189 - type = types.bool; 190 default = true; 191 description = '' 192 Allow HTML in client messages, comments, and channel ··· 194 ''; 195 }; 196 197 - logDays = mkOption { 198 - type = types.int; 199 default = 31; 200 description = '' 201 How long to store RPC logs for in the database. Set 0 to ··· 203 ''; 204 }; 205 206 - bonjour = mkOption { 207 - type = types.bool; 208 - default = false; 209 - description = '' 210 - Enable Bonjour auto-discovery, which allows clients over 211 - your LAN to automatically discover Murmur servers. 212 - ''; 213 - }; 214 215 - sendVersion = mkOption { 216 - type = types.bool; 217 default = true; 218 description = "Send Murmur version in UDP response."; 219 }; 220 221 - registerName = mkOption { 222 - type = types.str; 223 default = ""; 224 description = '' 225 Public server registration name, and also the name of the ··· 228 ''; 229 }; 230 231 - registerPassword = mkOption { 232 - type = types.str; 233 default = ""; 234 description = '' 235 Public server registry password, used authenticate your ··· 238 ''; 239 }; 240 241 - registerUrl = mkOption { 242 - type = types.str; 243 default = ""; 244 description = "URL website for your server."; 245 }; 246 247 - registerHostname = mkOption { 248 - type = types.str; 249 default = ""; 250 description = '' 251 DNS hostname where your server can be reached. This is only ··· 255 ''; 256 }; 257 258 - clientCertRequired = mkOption { 259 - type = types.bool; 260 - default = false; 261 - description = "Require clients to authenticate via certificates."; 262 - }; 263 264 - sslCert = mkOption { 265 - type = types.str; 266 default = ""; 267 description = "Path to your SSL certificate."; 268 }; 269 270 - sslKey = mkOption { 271 - type = types.str; 272 default = ""; 273 description = "Path to your SSL key."; 274 }; 275 276 - sslCa = mkOption { 277 - type = types.str; 278 default = ""; 279 description = "Path to your SSL CA certificate."; 280 }; 281 282 - extraConfig = mkOption { 283 - type = types.lines; 284 default = ""; 285 description = "Extra configuration to put into murmur.ini."; 286 }; 287 288 - environmentFile = mkOption { 289 - type = types.nullOr types.path; 290 default = null; 291 - example = literalExpression ''"''${config.services.murmur.stateDir}/murmurd.env"''; 292 description = '' 293 Environment file as defined in {manpage}`systemd.exec(5)`. 294 ··· 311 ''; 312 }; 313 314 - dbus = mkOption { 315 - type = types.enum [ 316 null 317 "session" 318 "system" ··· 323 }; 324 }; 325 326 - config = mkIf cfg.enable { 327 - users.users.murmur = mkIf (cfg.user == "murmur") { 328 description = "Murmur Service user"; 329 home = cfg.stateDir; 330 createHome = true; 331 uid = config.ids.uids.murmur; 332 group = cfg.group; 333 }; 334 - users.groups.murmur = mkIf (cfg.group == "murmur") { 335 gid = config.ids.gids.murmur; 336 }; 337 338 - networking.firewall = mkIf cfg.openFirewall { 339 allowedTCPPorts = [ cfg.port ]; 340 allowedUDPPorts = [ cfg.port ]; 341 }; ··· 353 serviceConfig = { 354 # murmurd doesn't fork when logging to the console. 355 Type = if forking then "forking" else "simple"; 356 - PIDFile = mkIf forking "/run/murmur/murmurd.pid"; 357 - EnvironmentFile = mkIf (cfg.environmentFile != null) cfg.environmentFile; 358 ExecStart = "${cfg.package}/bin/mumble-server -ini /run/murmur/murmurd.ini"; 359 Restart = "always"; 360 RuntimeDirectory = "murmur"; ··· 390 391 # currently not included in upstream package, addition requested at 392 # https://github.com/mumble-voip/mumble/issues/6078 393 - services.dbus.packages = mkIf (cfg.dbus == "system") [ 394 (pkgs.writeTextFile { 395 name = "murmur-dbus-policy"; 396 text = '' ··· 432 r /run/murmur/murmurd.ini, 433 r ${configFile}, 434 '' 435 - + optionalString (cfg.logFile != null) '' 436 rw ${cfg.logFile}, 437 '' 438 - + optionalString (cfg.sslCert != "") '' 439 r ${cfg.sslCert}, 440 '' 441 - + optionalString (cfg.sslKey != "") '' 442 r ${cfg.sslKey}, 443 '' 444 - + optionalString (cfg.sslCa != "") '' 445 r ${cfg.sslCa}, 446 '' 447 - + optionalString (cfg.dbus != null) '' 448 dbus bus=${cfg.dbus} 449 '' 450 + ''
··· 5 ... 6 }: 7 8 let 9 cfg = config.services.murmur; 10 forking = cfg.logFile != null; ··· 12 database=${cfg.stateDir}/murmur.sqlite 13 dbDriver=QSQLITE 14 15 + autobanAttempts=${lib.toString cfg.autobanAttempts} 16 + autobanTimeframe=${lib.toString cfg.autobanTimeframe} 17 + autobanTime=${lib.toString cfg.autobanTime} 18 19 + logfile=${lib.optionalString (cfg.logFile != null) cfg.logFile} 20 + ${lib.optionalString forking "pidfile=/run/murmur/murmurd.pid"} 21 22 welcometext="${cfg.welcometext}" 23 + port=${lib.toString cfg.port} 24 25 + ${lib.optionalString (cfg.hostName != "") "host=${cfg.hostName}"} 26 + ${lib.optionalString (cfg.password != "") "serverpassword=${cfg.password}"} 27 28 + bandwidth=${lib.toString cfg.bandwidth} 29 + users=${lib.toString cfg.users} 30 31 + textmessagelength=${lib.toString cfg.textMsgLength} 32 + imagemessagelength=${lib.toString cfg.imgMsgLength} 33 + allowhtml=${lib.boolToString cfg.allowHtml} 34 + logdays=${lib.toString cfg.logDays} 35 + bonjour=${lib.boolToString cfg.bonjour} 36 + sendversion=${lib.boolToString cfg.sendVersion} 37 38 + ${lib.optionalString (cfg.registerName != "") "registerName=${cfg.registerName}"} 39 + ${lib.optionalString (cfg.registerPassword != "") "registerPassword=${cfg.registerPassword}"} 40 + ${lib.optionalString (cfg.registerUrl != "") "registerUrl=${cfg.registerUrl}"} 41 + ${lib.optionalString (cfg.registerHostname != "") "registerHostname=${cfg.registerHostname}"} 42 43 + certrequired=${lib.boolToString cfg.clientCertRequired} 44 + ${lib.optionalString (cfg.sslCert != "") "sslCert=${cfg.sslCert}"} 45 + ${lib.optionalString (cfg.sslKey != "") "sslKey=${cfg.sslKey}"} 46 + ${lib.optionalString (cfg.sslCa != "") "sslCA=${cfg.sslCa}"} 47 48 + ${lib.optionalString (cfg.dbus != null) "dbus=${cfg.dbus}"} 49 50 ${cfg.extraConfig} 51 ''; 52 in 53 { 54 options = { 55 services.murmur = { 56 + enable = lib.mkEnableOption "Mumble server"; 57 58 + openFirewall = lib.mkEnableOption "opening ports in the firewall for the Mumble server"; 59 60 + user = lib.mkOption { 61 + type = lib.types.str; 62 default = "murmur"; 63 description = '' 64 The name of an existing user to use to run the service. ··· 66 ''; 67 }; 68 69 + group = lib.mkOption { 70 + type = lib.types.str; 71 default = "murmur"; 72 description = '' 73 The name of an existing group to use to run the service. ··· 75 ''; 76 }; 77 78 + stateDir = lib.mkOption { 79 + type = lib.types.path; 80 default = "/var/lib/murmur"; 81 description = '' 82 Directory to store data for the server. 83 ''; 84 }; 85 86 + autobanAttempts = lib.mkOption { 87 + type = lib.types.int; 88 default = 10; 89 description = '' 90 Number of attempts a client is allowed to make in ··· 93 ''; 94 }; 95 96 + autobanTimeframe = lib.mkOption { 97 + type = lib.types.int; 98 default = 120; 99 description = '' 100 Timeframe in which a client can connect without being banned ··· 102 ''; 103 }; 104 105 + autobanTime = lib.mkOption { 106 + type = lib.types.int; 107 default = 300; 108 description = "The amount of time an IP ban lasts (in seconds)."; 109 }; 110 111 + logFile = lib.mkOption { 112 + type = lib.types.nullOr lib.types.path; 113 default = null; 114 example = "/var/log/murmur/murmurd.log"; 115 description = "Path to the log file for Murmur daemon. Empty means log to journald."; 116 }; 117 118 + welcometext = lib.mkOption { 119 + type = lib.types.str; 120 default = ""; 121 description = "Welcome message for connected clients."; 122 }; 123 124 + port = lib.mkOption { 125 + type = lib.types.port; 126 default = 64738; 127 description = "Ports to bind to (UDP and TCP)."; 128 }; 129 130 + hostName = lib.mkOption { 131 + type = lib.types.str; 132 default = ""; 133 description = "Host to bind to. Defaults binding on all addresses."; 134 }; 135 136 + package = lib.mkPackageOption pkgs "murmur" { }; 137 138 + password = lib.mkOption { 139 + type = lib.types.str; 140 default = ""; 141 description = "Required password to join server, if specified."; 142 }; 143 144 + bandwidth = lib.mkOption { 145 + type = lib.types.int; 146 default = 72000; 147 description = '' 148 Maximum bandwidth (in bits per second) that clients may send ··· 150 ''; 151 }; 152 153 + users = lib.mkOption { 154 + type = lib.types.int; 155 default = 100; 156 description = "Maximum number of concurrent clients allowed."; 157 }; 158 159 + textMsgLength = lib.mkOption { 160 + type = lib.types.int; 161 default = 5000; 162 description = "Max length of text messages. Set 0 for no limit."; 163 }; 164 165 + imgMsgLength = lib.mkOption { 166 + type = lib.types.int; 167 default = 131072; 168 description = "Max length of image messages. Set 0 for no limit."; 169 }; 170 171 + allowHtml = lib.mkOption { 172 + type = lib.types.bool; 173 default = true; 174 description = '' 175 Allow HTML in client messages, comments, and channel ··· 177 ''; 178 }; 179 180 + logDays = lib.mkOption { 181 + type = lib.types.int; 182 default = 31; 183 description = '' 184 How long to store RPC logs for in the database. Set 0 to ··· 186 ''; 187 }; 188 189 + bonjour = lib.mkEnableOption "Bonjour auto-discovery, which allows clients over your LAN to automatically discover Mumble servers"; 190 191 + sendVersion = lib.mkOption { 192 + type = lib.types.bool; 193 default = true; 194 description = "Send Murmur version in UDP response."; 195 }; 196 197 + registerName = lib.mkOption { 198 + type = lib.types.str; 199 default = ""; 200 description = '' 201 Public server registration name, and also the name of the ··· 204 ''; 205 }; 206 207 + registerPassword = lib.mkOption { 208 + type = lib.types.str; 209 default = ""; 210 description = '' 211 Public server registry password, used authenticate your ··· 214 ''; 215 }; 216 217 + registerUrl = lib.mkOption { 218 + type = lib.types.str; 219 default = ""; 220 description = "URL website for your server."; 221 }; 222 223 + registerHostname = lib.mkOption { 224 + type = lib.types.str; 225 default = ""; 226 description = '' 227 DNS hostname where your server can be reached. This is only ··· 231 ''; 232 }; 233 234 + clientCertRequired = lib.mkEnableOption "requiring clients to authenticate via certificates"; 235 236 + sslCert = lib.mkOption { 237 + type = lib.types.str; 238 default = ""; 239 description = "Path to your SSL certificate."; 240 }; 241 242 + sslKey = lib.mkOption { 243 + type = lib.types.str; 244 default = ""; 245 description = "Path to your SSL key."; 246 }; 247 248 + sslCa = lib.mkOption { 249 + type = lib.types.str; 250 default = ""; 251 description = "Path to your SSL CA certificate."; 252 }; 253 254 + extraConfig = lib.mkOption { 255 + type = lib.types.lines; 256 default = ""; 257 description = "Extra configuration to put into murmur.ini."; 258 }; 259 260 + environmentFile = lib.mkOption { 261 + type = lib.types.nullOr lib.types.path; 262 default = null; 263 + example = lib.literalExpression ''"''${config.services.murmur.stateDir}/murmurd.env"''; 264 description = '' 265 Environment file as defined in {manpage}`systemd.exec(5)`. 266 ··· 283 ''; 284 }; 285 286 + dbus = lib.mkOption { 287 + type = lib.types.enum [ 288 null 289 "session" 290 "system" ··· 295 }; 296 }; 297 298 + config = lib.mkIf cfg.enable { 299 + users.users.murmur = lib.mkIf (cfg.user == "murmur") { 300 description = "Murmur Service user"; 301 home = cfg.stateDir; 302 createHome = true; 303 uid = config.ids.uids.murmur; 304 group = cfg.group; 305 }; 306 + users.groups.murmur = lib.mkIf (cfg.group == "murmur") { 307 gid = config.ids.gids.murmur; 308 }; 309 310 + networking.firewall = lib.mkIf cfg.openFirewall { 311 allowedTCPPorts = [ cfg.port ]; 312 allowedUDPPorts = [ cfg.port ]; 313 }; ··· 325 serviceConfig = { 326 # murmurd doesn't fork when logging to the console. 327 Type = if forking then "forking" else "simple"; 328 + PIDFile = lib.mkIf forking "/run/murmur/murmurd.pid"; 329 + EnvironmentFile = lib.mkIf (cfg.environmentFile != null) cfg.environmentFile; 330 ExecStart = "${cfg.package}/bin/mumble-server -ini /run/murmur/murmurd.ini"; 331 Restart = "always"; 332 RuntimeDirectory = "murmur"; ··· 362 363 # currently not included in upstream package, addition requested at 364 # https://github.com/mumble-voip/mumble/issues/6078 365 + services.dbus.packages = lib.mkIf (cfg.dbus == "system") [ 366 (pkgs.writeTextFile { 367 name = "murmur-dbus-policy"; 368 text = '' ··· 404 r /run/murmur/murmurd.ini, 405 r ${configFile}, 406 '' 407 + + lib.optionalString (cfg.logFile != null) '' 408 rw ${cfg.logFile}, 409 '' 410 + + lib.optionalString (cfg.sslCert != "") '' 411 r ${cfg.sslCert}, 412 '' 413 + + lib.optionalString (cfg.sslKey != "") '' 414 r ${cfg.sslKey}, 415 '' 416 + + lib.optionalString (cfg.sslCa != "") '' 417 r ${cfg.sslCa}, 418 '' 419 + + lib.optionalString (cfg.dbus != null) '' 420 dbus bus=${cfg.dbus} 421 '' 422 + ''
+7 -6
nixos/modules/services/web-apps/lasuite-docs.nix
··· 9 inherit (lib) 10 getExe 11 mapAttrs 12 mkEnableOption 13 mkIf 14 mkPackageOption ··· 31 else 32 toString value 33 ) cfg.settings; 34 35 commonServiceConfig = { 36 RuntimeDirectory = "lasuite-docs"; ··· 264 type = types.str; 265 default = if cfg.enableNginx then "localhost,127.0.0.1,${cfg.domain}" else ""; 266 defaultText = lib.literalExpression '' 267 - if cfg.enableNginx then "localhost,127.0.0.1,$${cfg.domain}" else "" 268 ''; 269 description = "Comma-separated list of hosts that are able to connect to the server"; 270 }; ··· 348 wantedBy = [ "multi-user.target" ]; 349 350 preStart = '' 351 - ln -sfT ${cfg.backendPackage}/share/static /var/lib/lasuite-docs/static 352 - 353 if [ ! -f .version ]; then 354 touch .version 355 fi ··· 371 environment = pythonEnvironment; 372 373 serviceConfig = { 374 ExecStart = utils.escapeSystemdExecArgs ( 375 [ 376 (lib.getExe' cfg.backendPackage "gunicorn") ··· 476 }; 477 478 locations."/media-auth" = { 479 - proxyPass = "http://${cfg.bind}"; 480 recommendedProxySettings = true; 481 extraConfig = '' 482 - rewrite $/(.*)^ /api/v1.0/documents/$1 break; 483 proxy_set_header X-Original-URL $request_uri; 484 proxy_pass_request_body off; 485 proxy_set_header Content-Length ""; ··· 489 490 locations."/media/" = { 491 proxyPass = cfg.s3Url; 492 - recommendedProxySettings = true; 493 extraConfig = '' 494 auth_request /media-auth; 495 auth_request_set $authHeader $upstream_http_authorization;
··· 9 inherit (lib) 10 getExe 11 mapAttrs 12 + match 13 mkEnableOption 14 mkIf 15 mkPackageOption ··· 32 else 33 toString value 34 ) cfg.settings; 35 + 36 + proxySuffix = if match "unix:.*" cfg.bind != null then ":" else ""; 37 38 commonServiceConfig = { 39 RuntimeDirectory = "lasuite-docs"; ··· 267 type = types.str; 268 default = if cfg.enableNginx then "localhost,127.0.0.1,${cfg.domain}" else ""; 269 defaultText = lib.literalExpression '' 270 + if cfg.enableNginx then "localhost,127.0.0.1,''${cfg.domain}" else "" 271 ''; 272 description = "Comma-separated list of hosts that are able to connect to the server"; 273 }; ··· 351 wantedBy = [ "multi-user.target" ]; 352 353 preStart = '' 354 if [ ! -f .version ]; then 355 touch .version 356 fi ··· 372 environment = pythonEnvironment; 373 374 serviceConfig = { 375 + BindReadOnlyPaths = "${cfg.backendPackage}/share/static:/var/lib/lasuite-docs/static"; 376 + 377 ExecStart = utils.escapeSystemdExecArgs ( 378 [ 379 (lib.getExe' cfg.backendPackage "gunicorn") ··· 479 }; 480 481 locations."/media-auth" = { 482 + proxyPass = "http://${cfg.bind}${proxySuffix}/api/v1.0/documents/media-auth/"; 483 recommendedProxySettings = true; 484 extraConfig = '' 485 proxy_set_header X-Original-URL $request_uri; 486 proxy_pass_request_body off; 487 proxy_set_header Content-Length ""; ··· 491 492 locations."/media/" = { 493 proxyPass = cfg.s3Url; 494 extraConfig = '' 495 auth_request /media-auth; 496 auth_request_set $authHeader $upstream_http_authorization;
+2 -2
nixos/tests/minio.nix
··· 82 83 # Create a test bucket on the server 84 machine.succeed( 85 - "mc config host add minio http://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 86 ) 87 machine.succeed("mc mb minio/test-bucket") 88 machine.succeed("${minioPythonScript}") ··· 101 102 # Create a test bucket on the server 103 machine.succeed( 104 - "mc config host add minio https://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 105 ) 106 machine.succeed("mc --insecure mb minio/test-bucket") 107 machine.succeed("${minioPythonScript} tls")
··· 82 83 # Create a test bucket on the server 84 machine.succeed( 85 + "mc alias set minio http://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 86 ) 87 machine.succeed("mc mb minio/test-bucket") 88 machine.succeed("${minioPythonScript}") ··· 101 102 # Create a test bucket on the server 103 machine.succeed( 104 + "mc alias set minio https://localhost:9000 ${accessKey} ${secretKey} --api s3v4" 105 ) 106 machine.succeed("mc --insecure mb minio/test-bucket") 107 machine.succeed("${minioPythonScript} tls")
+3 -3
pkgs/applications/editors/vim/plugins/non-generated/avante-nvim/default.nix
··· 12 pkgs, 13 }: 14 let 15 - version = "0.0.23-unstable-2025-05-30"; 16 src = fetchFromGitHub { 17 owner = "yetone"; 18 repo = "avante.nvim"; 19 - rev = "22418bff8bcac4377ebf975cd48f716823867979"; 20 - hash = "sha256-qyeiDDjeReOr+TvgCWnKhb8FBN9t1YPFGvVqPvxXr0k="; 21 }; 22 avante-nvim-lib = rustPlatform.buildRustPackage { 23 pname = "avante-nvim-lib";
··· 12 pkgs, 13 }: 14 let 15 + version = "0.0.23-unstable-2025-06-02"; 16 src = fetchFromGitHub { 17 owner = "yetone"; 18 repo = "avante.nvim"; 19 + rev = "647a459a2b87e5c9b2987cb44150b71beffdfb10"; 20 + hash = "sha256-GgLOcVp2IuMBr4aBRWJTvrAuWWiMEIHmec/S97piBaM="; 21 }; 22 avante-nvim-lib = rustPlatform.buildRustPackage { 23 pname = "avante-nvim-lib";
+3 -3
pkgs/applications/editors/vim/plugins/non-generated/sonarlint-nvim/default.nix
··· 6 }: 7 vimUtils.buildVimPlugin { 8 pname = "sonarlint.nvim"; 9 - version = "0-unstable-2025-05-16"; 10 11 src = fetchFromGitLab { 12 owner = "schrieveslaach"; 13 repo = "sonarlint.nvim"; 14 - rev = "2aa7a9fd9d8022d1c8d472fb63ce62e021d70130"; 15 - hash = "sha256-RfQthodqF6r24I6EJxlewjYiX3jLAIb/RMAOVnWs73s="; 16 }; 17 18 passthru.updateScript = nix-update-script {
··· 6 }: 7 vimUtils.buildVimPlugin { 8 pname = "sonarlint.nvim"; 9 + version = "0-unstable-2025-05-30"; 10 11 src = fetchFromGitLab { 12 owner = "schrieveslaach"; 13 repo = "sonarlint.nvim"; 14 + rev = "060df51352f9fb876d4ff43b8cd4b669a6bdfd89"; 15 + hash = "sha256-2MAi0nZIvAly+5p5fWKMi3tGSzMJgMnAzWnsr0rt+NM="; 16 }; 17 18 passthru.updateScript = nix-update-script {
+4 -4
pkgs/applications/editors/vscode/extensions/default.nix
··· 2792 mktplcRef = { 2793 name = "language-julia"; 2794 publisher = "julialang"; 2795 - version = "1.140.2"; 2796 - hash = "sha256-YQwJq3QSzb2pAOLyy0w8RtrjAlxudBGN52fQtj+OmOk="; 2797 }; 2798 meta = { 2799 changelog = "https://marketplace.visualstudio.com/items/julialang.language-julia/changelog"; ··· 4703 mktplcRef = { 4704 name = "tabnine-vscode"; 4705 publisher = "tabnine"; 4706 - version = "3.283.0"; 4707 - hash = "sha256-zn58iml+uN6K1qneLqnikaL5Gyk4rmNXo8TKKlO88jA="; 4708 }; 4709 meta = { 4710 license = lib.licenses.mit;
··· 2792 mktplcRef = { 2793 name = "language-julia"; 2794 publisher = "julialang"; 2795 + version = "1.141.2"; 2796 + hash = "sha256-i5mY037rs65BKiQLvUbu9Lup2ljhZI0owqjZ0AUsXMw="; 2797 }; 2798 meta = { 2799 changelog = "https://marketplace.visualstudio.com/items/julialang.language-julia/changelog"; ··· 4703 mktplcRef = { 4704 name = "tabnine-vscode"; 4705 publisher = "tabnine"; 4706 + version = "3.287.0"; 4707 + hash = "sha256-E4ew40NNuOW9e7ZIsJjkO/4r6gbbC2IsghFbO+n27cg="; 4708 }; 4709 meta = { 4710 license = lib.licenses.mit;
+3 -5
pkgs/applications/graphics/gimp/default.nix
··· 77 in 78 stdenv.mkDerivation (finalAttrs: { 79 pname = "gimp"; 80 - version = "3.0.2"; 81 82 outputs = [ 83 "out" ··· 87 88 src = fetchurl { 89 url = "https://download.gimp.org/gimp/v${lib.versions.majorMinor finalAttrs.version}/gimp-${finalAttrs.version}.tar.xz"; 90 - hash = "sha256-VG3cMMstDnkSPH/LTXghHh7npqrOkaagrYy8v26lcaI="; 91 }; 92 93 patches = [ ··· 242 }; 243 244 postPatch = '' 245 - patchShebangs \ 246 - app/tests/create_test_env.sh \ 247 - tools/gimp-mkenums 248 249 # GIMP is executed at build time so we need to fix this. 250 # TODO: Look into if we can fix the interp thing.
··· 77 in 78 stdenv.mkDerivation (finalAttrs: { 79 pname = "gimp"; 80 + version = "3.0.4"; 81 82 outputs = [ 83 "out" ··· 87 88 src = fetchurl { 89 url = "https://download.gimp.org/gimp/v${lib.versions.majorMinor finalAttrs.version}/gimp-${finalAttrs.version}.tar.xz"; 90 + hash = "sha256-jKouwnW/CTJldWVKwnavwIP4SR58ykXRnPKeaWrsqyU="; 91 }; 92 93 patches = [ ··· 242 }; 243 244 postPatch = '' 245 + patchShebangs tools/gimp-mkenums 246 247 # GIMP is executed at build time so we need to fix this. 248 # TODO: Look into if we can fix the interp thing.
+1 -5
pkgs/applications/misc/openbangla-keyboard/default.nix
··· 62 ]; 63 64 cargoDeps = rustPlatform.fetchCargoVendor { 65 - inherit src; 66 - postPatch = '' 67 - cp ${./Cargo.lock} Cargo.lock 68 - ''; 69 - sourceRoot = "${src.name}/${cargoRoot}"; 70 hash = "sha256-qZMTZi7eqEp5kSmVx7qdS7eDKOzSv9fMjWT0h/MGyeY="; 71 }; 72
··· 62 ]; 63 64 cargoDeps = rustPlatform.fetchCargoVendor { 65 + inherit src cargoRoot postPatch; 66 hash = "sha256-qZMTZi7eqEp5kSmVx7qdS7eDKOzSv9fMjWT0h/MGyeY="; 67 }; 68
+10 -10
pkgs/applications/networking/browsers/chromium/info.json
··· 1 { 2 "chromium": { 3 - "version": "137.0.7151.55", 4 "chromedriver": { 5 - "version": "137.0.7151.56", 6 - "hash_darwin": "sha256-z4GTPrONaXARP0d8vInJdFxR052PuuI6IJy1PEv2RNg=", 7 - "hash_darwin_aarch64": "sha256-wlSDfCiBTdLWwabpHwOiM8Y3asn7ueHGSMh2AANaE+A=" 8 }, 9 "deps": { 10 "depot_tools": { ··· 20 "DEPS": { 21 "src": { 22 "url": "https://chromium.googlesource.com/chromium/src.git", 23 - "rev": "254bc711794d7ad269495f3d419a209935b78cad", 24 - "hash": "sha256-dB81lgjgVK0qXWgAddB7G4L7rsJpZp+0VsjDKvGugEs=", 25 "recompress": true 26 }, 27 "src/third_party/clang-format/script": { ··· 241 }, 242 "src/third_party/devtools-frontend/src": { 243 "url": "https://chromium.googlesource.com/devtools/devtools-frontend", 244 - "rev": "a54ed1df191a9e2aff2e9ef453ee6fdc959dd125", 245 - "hash": "sha256-E6sx2ioDZRWJljbS17ztRwz+gsDhIHiluvkUx1rRZcw=" 246 }, 247 "src/third_party/dom_distiller_js/dist": { 248 "url": "https://chromium.googlesource.com/chromium/dom-distiller/dist.git", ··· 791 }, 792 "src/v8": { 793 "url": "https://chromium.googlesource.com/v8/v8.git", 794 - "rev": "44fdd9108308773dd3f4fa040de5f4f75edf671f", 795 - "hash": "sha256-BkLOmb97p2NcAIuQiDjIoVAe49h9iv79rC5G8wyD1as=" 796 } 797 } 798 },
··· 1 { 2 "chromium": { 3 + "version": "137.0.7151.68", 4 "chromedriver": { 5 + "version": "137.0.7151.69", 6 + "hash_darwin": "sha256-G88jte6xraXrrfEvCj7zndpQ7nxyzappuu4oZ79XY8U=", 7 + "hash_darwin_aarch64": "sha256-wbOD/sVjLVcpPzrbAGu8b8YMbUOKkOt7eNxJDLKRjxo=" 8 }, 9 "deps": { 10 "depot_tools": { ··· 20 "DEPS": { 21 "src": { 22 "url": "https://chromium.googlesource.com/chromium/src.git", 23 + "rev": "2989ffee9373ea8b8623bd98b3cb350a8e95cadc", 24 + "hash": "sha256-lPmmXVCNUa9of8d52hUejImPSEfOz7v7PlovZS4cfIE=", 25 "recompress": true 26 }, 27 "src/third_party/clang-format/script": { ··· 241 }, 242 "src/third_party/devtools-frontend/src": { 243 "url": "https://chromium.googlesource.com/devtools/devtools-frontend", 244 + "rev": "fdc8ca697612f90e7ddf2621dffbc43733d2d238", 245 + "hash": "sha256-jKYldgZJwJeTQavmcM9enTdGN8+zt/EG7K1E9wQYIBA=" 246 }, 247 "src/third_party/dom_distiller_js/dist": { 248 "url": "https://chromium.googlesource.com/chromium/dom-distiller/dist.git", ··· 791 }, 792 "src/v8": { 793 "url": "https://chromium.googlesource.com/v8/v8.git", 794 + "rev": "e398f9bf6d5c8a768ab736f46146d7349cf31547", 795 + "hash": "sha256-cJx8IgUB3UA3jEPvb5aDvHLYmAnHydK1qR11q6Y5PnA=" 796 } 797 } 798 },
+23 -23
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 126 "vendorHash": null 127 }, 128 "aws": { 129 - "hash": "sha256-gBVJx6rk7rjrvyLaDJrHUmLRUbvgy60c/uQwsFXuQzA=", 130 "homepage": "https://registry.terraform.io/providers/hashicorp/aws", 131 "owner": "hashicorp", 132 "repo": "terraform-provider-aws", 133 - "rev": "v5.98.0", 134 "spdx": "MPL-2.0", 135 - "vendorHash": "sha256-OxyOD/um7hOpYpsZCyNnbdvo5K/r/L7JlWvXQBncIDw=" 136 }, 137 "azuread": { 138 "hash": "sha256-lNjU/206yS+smSe1SYlz0TOqHRlvSQKqhJ67fswNlIQ=", ··· 216 "vendorHash": "sha256-arLGaa/o9X0MYg/qIl6qhpBqcduu5Bu06FteR5KGSPw=" 217 }, 218 "buildkite": { 219 - "hash": "sha256-+9gxJjLVExnpWtcF1NRQoKPg0jn1zGNSkmim5YFgs4w=", 220 "homepage": "https://registry.terraform.io/providers/buildkite/buildkite", 221 "owner": "buildkite", 222 "repo": "terraform-provider-buildkite", 223 - "rev": "v1.18.0", 224 "spdx": "MIT", 225 "vendorHash": "sha256-bhPpFPn1hdpSJYTvO1HWTrFRBvcm8gIDmMEGOaFjM6c=" 226 }, ··· 390 "vendorHash": "sha256-xu5t7VaLvbwo/Q7Xb4mkNt7UjU+hzfk7NgfFlxwbIhU=" 391 }, 392 "dnsimple": { 393 - "hash": "sha256-CkfgHBNtYCFZIMoXpX0ivkm1dyIs4mKSrHaiQ3qt/+w=", 394 "homepage": "https://registry.terraform.io/providers/dnsimple/dnsimple", 395 "owner": "dnsimple", 396 "repo": "terraform-provider-dnsimple", 397 - "rev": "v1.9.0", 398 "spdx": "MPL-2.0", 399 - "vendorHash": "sha256-WZqwBkVXoFmDikIyt9GWszLA/9YBoQHAdBuWbGKZBZw=" 400 }, 401 "docker": { 402 "hash": "sha256-sPeX1bupACBSmt8ppyxQKyD+FXIPdCBWn8cnOAvNHwQ=", ··· 516 "vendorHash": "sha256-X0vbtUIKYzCeRD/BbMj3VPVAwx6d7gkbHV8j9JXlaFM=" 517 }, 518 "google": { 519 - "hash": "sha256-q/BFHpA3ig0QfB0mhJGqr/uQYs/SH5YX8QgWCyjcSio=", 520 "homepage": "https://registry.terraform.io/providers/hashicorp/google", 521 "owner": "hashicorp", 522 "repo": "terraform-provider-google", 523 - "rev": "v6.36.1", 524 "spdx": "MPL-2.0", 525 - "vendorHash": "sha256-rGpnPH8ebHXasvelGoJEUU4YbeGJY4adFBbgAHJ8vSs=" 526 }, 527 "google-beta": { 528 "hash": "sha256-VpfIfzIG1h5qnvEqogCK359LLLSgdgxg0DtRGvdZtLU=", ··· 840 "vendorHash": "sha256-7AU79r4OQbmrMI385KVIHon/4pWk6J9qnH+zQRrWtJI=" 841 }, 842 "mongodbatlas": { 843 - "hash": "sha256-JQW9y1EfrEInmz2+Er8BE0+6ZdcrO/w1y+czg7jPeRE=", 844 "homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas", 845 "owner": "mongodb", 846 "repo": "terraform-provider-mongodbatlas", 847 - "rev": "v1.34.0", 848 "spdx": "MPL-2.0", 849 - "vendorHash": "sha256-y9dhiG0zyOcvjgygLEW2o+GPXUug0ibxC2aLvfcY260=" 850 }, 851 "namecheap": { 852 "hash": "sha256-fHH9sHI1mqQ9q9nX9DHJ0qfEfmDB4/2uzyVvUuIAF18=", ··· 1084 "vendorHash": "sha256-j+3qtGlueKZgf0LuNps4Wc9G3EmpSgl8ZNSLqslyizI=" 1085 }, 1086 "rancher2": { 1087 - "hash": "sha256-H6ZdGvKSYRlDsCKIHlPHdEv1+6aa1rll/73IeJ+PDhc=", 1088 "homepage": "https://registry.terraform.io/providers/rancher/rancher2", 1089 "owner": "rancher", 1090 "repo": "terraform-provider-rancher2", 1091 - "rev": "v7.0.0", 1092 "spdx": "MPL-2.0", 1093 "vendorHash": "sha256-M2lJKmIR66lQKFkInjizn68ax2Gq4sim5Y3vZKyDhZ8=" 1094 }, ··· 1111 "vendorHash": "sha256-xo0alLK3fccbKRG5bN1G7orDsP47I3ySAzpZ9O0f2Fg=" 1112 }, 1113 "rootly": { 1114 - "hash": "sha256-SwZm4XCQUf3TQ6m77fAnhHMoW6ckpO5XSnjpEYuNyec=", 1115 "homepage": "https://registry.terraform.io/providers/rootlyhq/rootly", 1116 "owner": "rootlyhq", 1117 "repo": "terraform-provider-rootly", 1118 - "rev": "v2.27.1", 1119 "spdx": "MPL-2.0", 1120 "vendorHash": "sha256-KezwDRmQQj0MnmsVlrX1OhNG6oMgw8fCxX5VFGdUynw=" 1121 }, ··· 1327 "vendorHash": "sha256-HBdvXWZNPPAqPEKodwG0ZeiJOhfJHe9HRCcuozKpwVs=" 1328 }, 1329 "tencentcloud": { 1330 - "hash": "sha256-CHYuiAgzFIAApK8wZ75DtgVf8sAEVwrXP7l/l+VxB1o=", 1331 "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", 1332 "owner": "tencentcloudstack", 1333 "repo": "terraform-provider-tencentcloud", 1334 - "rev": "v1.81.194", 1335 "spdx": "MPL-2.0", 1336 "vendorHash": null 1337 }, 1338 "tfe": { 1339 - "hash": "sha256-hMpCuLAnwwAb8ugKxKDuFvtII2k/lcwYYL0sCvZewOY=", 1340 "homepage": "https://registry.terraform.io/providers/hashicorp/tfe", 1341 "owner": "hashicorp", 1342 "repo": "terraform-provider-tfe", 1343 - "rev": "v0.65.2", 1344 "spdx": "MPL-2.0", 1345 - "vendorHash": "sha256-PSUob2u8hue5ii+kV4bGcvexkIQxzWsHbbEbYO0celU=" 1346 }, 1347 "thunder": { 1348 "hash": "sha256-2i1DSOSt/vbFs0QCPogEBvADhLJFKbrQzwZ20ChCQMk=",
··· 126 "vendorHash": null 127 }, 128 "aws": { 129 + "hash": "sha256-asrIQrhSSHjuOBFomgq9lbHc8rmkcy3OjJ5ig9I7XbU=", 130 "homepage": "https://registry.terraform.io/providers/hashicorp/aws", 131 "owner": "hashicorp", 132 "repo": "terraform-provider-aws", 133 + "rev": "v5.99.1", 134 "spdx": "MPL-2.0", 135 + "vendorHash": "sha256-low0aq3i3pmqbadYg1VZra+ZzoV6nqyGutf8xzaces0=" 136 }, 137 "azuread": { 138 "hash": "sha256-lNjU/206yS+smSe1SYlz0TOqHRlvSQKqhJ67fswNlIQ=", ··· 216 "vendorHash": "sha256-arLGaa/o9X0MYg/qIl6qhpBqcduu5Bu06FteR5KGSPw=" 217 }, 218 "buildkite": { 219 + "hash": "sha256-u2BkD6h12drlz6MQIjoi/EFSj7l1dBWBjHVSmL+hB4g=", 220 "homepage": "https://registry.terraform.io/providers/buildkite/buildkite", 221 "owner": "buildkite", 222 "repo": "terraform-provider-buildkite", 223 + "rev": "v1.19.0", 224 "spdx": "MIT", 225 "vendorHash": "sha256-bhPpFPn1hdpSJYTvO1HWTrFRBvcm8gIDmMEGOaFjM6c=" 226 }, ··· 390 "vendorHash": "sha256-xu5t7VaLvbwo/Q7Xb4mkNt7UjU+hzfk7NgfFlxwbIhU=" 391 }, 392 "dnsimple": { 393 + "hash": "sha256-7o8shnWECaCLTCvmXrJ2eYloxtln2A2No8OK8Ig36qE=", 394 "homepage": "https://registry.terraform.io/providers/dnsimple/dnsimple", 395 "owner": "dnsimple", 396 "repo": "terraform-provider-dnsimple", 397 + "rev": "v1.9.1", 398 "spdx": "MPL-2.0", 399 + "vendorHash": "sha256-0axKIqF1t4AW1PPi+fHfsFQLRrjhpsloQIZ9clR+8Gc=" 400 }, 401 "docker": { 402 "hash": "sha256-sPeX1bupACBSmt8ppyxQKyD+FXIPdCBWn8cnOAvNHwQ=", ··· 516 "vendorHash": "sha256-X0vbtUIKYzCeRD/BbMj3VPVAwx6d7gkbHV8j9JXlaFM=" 517 }, 518 "google": { 519 + "hash": "sha256-TSDkXXYkneTsY10WV5cSFzOX04kFdFVHJPgpKt5hBSE=", 520 "homepage": "https://registry.terraform.io/providers/hashicorp/google", 521 "owner": "hashicorp", 522 "repo": "terraform-provider-google", 523 + "rev": "v6.37.0", 524 "spdx": "MPL-2.0", 525 + "vendorHash": "sha256-YZI6zhxXU2aABARP6GcTMeU98F4+imbL1vKIEMzsJHM=" 526 }, 527 "google-beta": { 528 "hash": "sha256-VpfIfzIG1h5qnvEqogCK359LLLSgdgxg0DtRGvdZtLU=", ··· 840 "vendorHash": "sha256-7AU79r4OQbmrMI385KVIHon/4pWk6J9qnH+zQRrWtJI=" 841 }, 842 "mongodbatlas": { 843 + "hash": "sha256-+JYvL6xGA2zIOg2fl8Bl7CYU4x9N4aVJpIl/6PYdyPU=", 844 "homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas", 845 "owner": "mongodb", 846 "repo": "terraform-provider-mongodbatlas", 847 + "rev": "v1.35.1", 848 "spdx": "MPL-2.0", 849 + "vendorHash": "sha256-fz6e/QEcWQY7ZrWyUbk8M/+RPB8dwN3NHPLmNLyGVhQ=" 850 }, 851 "namecheap": { 852 "hash": "sha256-fHH9sHI1mqQ9q9nX9DHJ0qfEfmDB4/2uzyVvUuIAF18=", ··· 1084 "vendorHash": "sha256-j+3qtGlueKZgf0LuNps4Wc9G3EmpSgl8ZNSLqslyizI=" 1085 }, 1086 "rancher2": { 1087 + "hash": "sha256-5NkvGETjJ5eoZC5Ohnoq2y1DQVs2WTrh/wEVO1HQsOA=", 1088 "homepage": "https://registry.terraform.io/providers/rancher/rancher2", 1089 "owner": "rancher", 1090 "repo": "terraform-provider-rancher2", 1091 + "rev": "v7.2.0", 1092 "spdx": "MPL-2.0", 1093 "vendorHash": "sha256-M2lJKmIR66lQKFkInjizn68ax2Gq4sim5Y3vZKyDhZ8=" 1094 }, ··· 1111 "vendorHash": "sha256-xo0alLK3fccbKRG5bN1G7orDsP47I3ySAzpZ9O0f2Fg=" 1112 }, 1113 "rootly": { 1114 + "hash": "sha256-2TVqXQYiCMsMQJtZMWtYiPbeOOsPck5Hpu6cmo9ZaIM=", 1115 "homepage": "https://registry.terraform.io/providers/rootlyhq/rootly", 1116 "owner": "rootlyhq", 1117 "repo": "terraform-provider-rootly", 1118 + "rev": "v2.27.2", 1119 "spdx": "MPL-2.0", 1120 "vendorHash": "sha256-KezwDRmQQj0MnmsVlrX1OhNG6oMgw8fCxX5VFGdUynw=" 1121 }, ··· 1327 "vendorHash": "sha256-HBdvXWZNPPAqPEKodwG0ZeiJOhfJHe9HRCcuozKpwVs=" 1328 }, 1329 "tencentcloud": { 1330 + "hash": "sha256-JMLuH/NDCNiByLh65NQH/goaN7/J7MGfsUNKfHJ3LFQ=", 1331 "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", 1332 "owner": "tencentcloudstack", 1333 "repo": "terraform-provider-tencentcloud", 1334 + "rev": "v1.81.197", 1335 "spdx": "MPL-2.0", 1336 "vendorHash": null 1337 }, 1338 "tfe": { 1339 + "hash": "sha256-w66HR1X/EUloz3W/6aBNvTsC5vWuAZytd2ej7DHVMU0=", 1340 "homepage": "https://registry.terraform.io/providers/hashicorp/tfe", 1341 "owner": "hashicorp", 1342 "repo": "terraform-provider-tfe", 1343 + "rev": "v0.66.0", 1344 "spdx": "MPL-2.0", 1345 + "vendorHash": "sha256-z1gbeYR+UFl+sBgehLgBITc9VwxEV6bRpN9A/4Fp7Oc=" 1346 }, 1347 "thunder": { 1348 "hash": "sha256-2i1DSOSt/vbFs0QCPogEBvADhLJFKbrQzwZ20ChCQMk=",
+3 -3
pkgs/applications/networking/cluster/timoni/default.nix
··· 7 8 buildGoModule rec { 9 pname = "timoni"; 10 - version = "0.24.0"; 11 12 src = fetchFromGitHub { 13 owner = "stefanprodan"; 14 repo = "timoni"; 15 rev = "v${version}"; 16 - hash = "sha256-nI0yy/zhsJUvisHo+C+/uNRF96ZQ1Ve8VWpE8ZvUeJc="; 17 }; 18 19 - vendorHash = "sha256-YpwESaR+X2eOyaPdR+I3mURD7yvwzmpPmgPoSPrXjH8="; 20 21 subPackages = [ "cmd/timoni" ]; 22 nativeBuildInputs = [ installShellFiles ];
··· 7 8 buildGoModule rec { 9 pname = "timoni"; 10 + version = "0.25.0"; 11 12 src = fetchFromGitHub { 13 owner = "stefanprodan"; 14 repo = "timoni"; 15 rev = "v${version}"; 16 + hash = "sha256-Obx8I8n2UY6sTHKQ0qFNQ50XI+ajrbQtjQ7PCVwrSTI="; 17 }; 18 19 + vendorHash = "sha256-hCvFe27DdX/pAeyfSEDx5oiLEZjhldOVDz6ElsUPjJs="; 20 21 subPackages = [ "cmd/timoni" ]; 22 nativeBuildInputs = [ installShellFiles ];
+1 -2
pkgs/applications/science/electronics/librepcb/default.nix
··· 42 buildInputs = [ qtbase ]; 43 44 cargoDeps = rustPlatform.fetchCargoVendor { 45 - inherit src; 46 - sourceRoot = "source/${cargoRoot}"; 47 hash = "sha256-1td3WjxbDq2lX7c0trpYRhO82ChNAG/ZABBRsekYtq4="; 48 }; 49
··· 42 buildInputs = [ qtbase ]; 43 44 cargoDeps = rustPlatform.fetchCargoVendor { 45 + inherit src cargoRoot; 46 hash = "sha256-1td3WjxbDq2lX7c0trpYRhO82ChNAG/ZABBRsekYtq4="; 47 }; 48
+8 -20
pkgs/applications/video/animdl/default.nix pkgs/by-name/an/animdl/package.nix
··· 1 { 2 lib, 3 - buildPythonApplication, 4 fetchFromGitHub, 5 - poetry-core, 6 - anchor-kr, 7 - anitopy, 8 - click, 9 - cssselect, 10 - httpx, 11 - lxml, 12 - packaging, 13 - pkginfo, 14 - pycryptodomex, 15 - pyyaml, 16 - regex, 17 - rich, 18 - tqdm, 19 - yarl, 20 }: 21 - buildPythonApplication { 22 pname = "animdl"; 23 version = "1.7.27"; 24 - format = "pyproject"; 25 26 src = fetchFromGitHub { 27 owner = "justfoolingaround"; ··· 34 pythonRemoveDeps = [ 35 "comtypes" # windows only 36 ]; 37 pythonRelaxDeps = [ 38 "httpx" 39 "lxml" 40 "packaging" ··· 45 "yarl" 46 ]; 47 48 - nativeBuildInputs = [ 49 poetry-core 50 ]; 51 - propagatedBuildInputs = [ 52 anchor-kr 53 anitopy 54 click
··· 1 { 2 lib, 3 fetchFromGitHub, 4 + python3Packages, 5 }: 6 + python3Packages.buildPythonApplication { 7 pname = "animdl"; 8 version = "1.7.27"; 9 + pyproject = true; 10 11 src = fetchFromGitHub { 12 owner = "justfoolingaround"; ··· 19 pythonRemoveDeps = [ 20 "comtypes" # windows only 21 ]; 22 + 23 pythonRelaxDeps = [ 24 + "cssselect" 25 "httpx" 26 "lxml" 27 "packaging" ··· 32 "yarl" 33 ]; 34 35 + build-system = with python3Packages; [ 36 poetry-core 37 ]; 38 + 39 + dependencies = with python3Packages; [ 40 anchor-kr 41 anitopy 42 click
+8
pkgs/applications/video/obs-studio/plugins/default.nix
··· 22 23 obs-advanced-masks = callPackage ./obs-advanced-masks.nix { }; 24 25 obs-backgroundremoval = callPackage ./obs-backgroundremoval { }; 26 27 obs-color-monitor = qt6Packages.callPackage ./obs-color-monitor.nix { }; ··· 29 obs-command-source = callPackage ./obs-command-source.nix { }; 30 31 obs-composite-blur = callPackage ./obs-composite-blur.nix { }; 32 33 obs-dvd-screensaver = callPackage ./obs-dvd-screensaver.nix { }; 34 ··· 42 43 obs-livesplit-one = callPackage ./obs-livesplit-one { }; 44 45 obs-media-controls = qt6Packages.callPackage ./obs-media-controls.nix { }; 46 47 obs-move-transition = callPackage ./obs-move-transition.nix { }; ··· 61 obs-recursion-effect = callPackage ./obs-recursion-effect.nix { }; 62 63 obs-replay-source = qt6Packages.callPackage ./obs-replay-source.nix { }; 64 65 obs-rgb-levels = callPackage ./obs-rgb-levels.nix { }; 66
··· 22 23 obs-advanced-masks = callPackage ./obs-advanced-masks.nix { }; 24 25 + obs-aitum-multistream = qt6Packages.callPackage ./obs-aitum-multistream.nix { }; 26 + 27 obs-backgroundremoval = callPackage ./obs-backgroundremoval { }; 28 29 obs-color-monitor = qt6Packages.callPackage ./obs-color-monitor.nix { }; ··· 31 obs-command-source = callPackage ./obs-command-source.nix { }; 32 33 obs-composite-blur = callPackage ./obs-composite-blur.nix { }; 34 + 35 + obs-dir-watch-media = callPackage ./obs-dir-watch-media.nix { }; 36 37 obs-dvd-screensaver = callPackage ./obs-dvd-screensaver.nix { }; 38 ··· 46 47 obs-livesplit-one = callPackage ./obs-livesplit-one { }; 48 49 + obs-markdown = callPackage ./obs-markdown.nix { }; 50 + 51 obs-media-controls = qt6Packages.callPackage ./obs-media-controls.nix { }; 52 53 obs-move-transition = callPackage ./obs-move-transition.nix { }; ··· 67 obs-recursion-effect = callPackage ./obs-recursion-effect.nix { }; 68 69 obs-replay-source = qt6Packages.callPackage ./obs-replay-source.nix { }; 70 + 71 + obs-retro-effects = callPackage ./obs-retro-effects.nix { }; 72 73 obs-rgb-levels = callPackage ./obs-rgb-levels.nix { }; 74
+51
pkgs/applications/video/obs-studio/plugins/obs-aitum-multistream.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + curl, 7 + obs-studio, 8 + qtbase, 9 + }: 10 + 11 + stdenv.mkDerivation rec { 12 + pname = "obs-aitum-multistream"; 13 + version = "1.0.7"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "Aitum"; 17 + repo = "obs-aitum-multistream"; 18 + tag = version; 19 + hash = "sha256-TqddyTBRWLyfwYi9I0nQE8Z19YL2RwkZqUwi7F9XpwQ="; 20 + }; 21 + 22 + # Fix FTBFS with Qt >= 6.8 23 + prePatch = '' 24 + substituteInPlace CMakeLists.txt \ 25 + --replace-fail 'find_qt(COMPONENTS Widgets Core)' 'find_package(Qt6 REQUIRED COMPONENTS Core Widgets)' 26 + ''; 27 + 28 + nativeBuildInputs = [ cmake ]; 29 + buildInputs = [ 30 + curl 31 + obs-studio 32 + qtbase 33 + ]; 34 + dontWrapQtApps = true; 35 + 36 + cmakeFlags = [ 37 + # Prevent deprecation warnings from failing the build 38 + (lib.cmakeOptionType "string" "CMAKE_CXX_FLAGS" "-Wno-error=deprecated-declarations") 39 + ]; 40 + 41 + meta = { 42 + description = "Plugin to stream everywhere from a single instance of OBS"; 43 + homepage = "https://github.com/Aitum/obs-aitum-multistream"; 44 + maintainers = with lib.maintainers; [ flexiondotorg ]; 45 + license = lib.licenses.gpl2Plus; 46 + platforms = [ 47 + "x86_64-linux" 48 + "i686-linux" 49 + ]; 50 + }; 51 + }
+37
pkgs/applications/video/obs-studio/plugins/obs-dir-watch-media.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + obs-studio, 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "obs-dir-watch-media"; 11 + version = "0.7.0"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "exeldro"; 15 + repo = "obs-dir-watch-media"; 16 + rev = version; 17 + sha256 = "sha256-zvg8Bu5wlcQe91ggteEj7G9Kx+mY1R6EN64T13vp7pc="; 18 + }; 19 + 20 + nativeBuildInputs = [ cmake ]; 21 + buildInputs = [ obs-studio ]; 22 + 23 + postInstall = '' 24 + rm -rf $out/obs-plugins $out/data 25 + ''; 26 + 27 + meta = with lib; { 28 + description = "Plugin for OBS Studio adding a filter that can watch a directory for media files"; 29 + homepage = "https://github.com/exeldro/obs-dir-watch-media"; 30 + maintainers = with maintainers; [ flexiondotorg ]; 31 + license = licenses.gpl2Only; 32 + platforms = [ 33 + "x86_64-linux" 34 + "i686-linux" 35 + ]; 36 + }; 37 + }
+37
pkgs/applications/video/obs-studio/plugins/obs-markdown.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + obs-studio, 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "obs-markdown"; 11 + version = "0.2.7"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "exeldro"; 15 + repo = "obs-markdown"; 16 + rev = version; 17 + sha256 = "sha256-5ajX/cEa0n12Putx1k3ctl1v9wRzJRhyJNDlmjSMbeU="; 18 + }; 19 + 20 + nativeBuildInputs = [ cmake ]; 21 + buildInputs = [ obs-studio ]; 22 + 23 + postInstall = '' 24 + rm -rf $out/obs-plugins $out/data 25 + ''; 26 + 27 + meta = with lib; { 28 + description = "Plugin for OBS Studio to add Markdown sources"; 29 + homepage = "https://github.com/exeldro/obs-markdown"; 30 + maintainers = with maintainers; [ flexiondotorg ]; 31 + license = licenses.gpl2Only; 32 + platforms = [ 33 + "x86_64-linux" 34 + "i686-linux" 35 + ]; 36 + }; 37 + }
+39
pkgs/applications/video/obs-studio/plugins/obs-retro-effects.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + obs-studio, 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "obs-retro-effects"; 11 + version = "1.0.0"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "FiniteSingularity"; 15 + repo = "obs-retro-effects"; 16 + rev = "${version}"; 17 + sha256 = "sha256-+dg5ySleMb9abT9kIM7HvRSRx9V08B9XPjfoAVe+tWY="; 18 + }; 19 + 20 + nativeBuildInputs = [ cmake ]; 21 + buildInputs = [ obs-studio ]; 22 + 23 + postFixup = '' 24 + mv $out/data/obs-plugins/${pname}/shaders $out/share/obs/obs-plugins/${pname}/ 25 + rm -rf $out/obs-plugins 26 + rm -rf $out/data 27 + ''; 28 + 29 + meta = with lib; { 30 + description = "A collection of OBS filters to give your stream that retro feel."; 31 + homepage = "https://github.com/FiniteSingularity/obs-retro-effects"; 32 + maintainers = with maintainers; [ flexiondotorg ]; 33 + license = licenses.gpl2Plus; 34 + platforms = [ 35 + "x86_64-linux" 36 + "i686-linux" 37 + ]; 38 + }; 39 + }
+3 -1
pkgs/build-support/fetchgit/tests.nix
··· 90 rev = "9d9dbe6ed05854e03811c361a3380e09183f4f4a"; 91 fetchTags = true; 92 leaveDotGit = true; 93 - sha256 = "sha256-2vfZnYjZlnC8ODz6B6aOqAqtb1Wbjojnn/5TmzwUrmo="; 94 postFetch = '' 95 cd $out && git describe --tags --always > describe-output.txt 2>&1 || echo "git describe failed" > describe-output.txt 96 ''; 97 }; 98 }
··· 90 rev = "9d9dbe6ed05854e03811c361a3380e09183f4f4a"; 91 fetchTags = true; 92 leaveDotGit = true; 93 + sha256 = "sha256-y7l+46lVP2pzJwGON5qEV0EoxWofRoWAym5q9VXvpc8="; 94 postFetch = '' 95 cd $out && git describe --tags --always > describe-output.txt 2>&1 || echo "git describe failed" > describe-output.txt 96 + # See https://github.com/NixOS/nixpkgs/issues/412967#issuecomment-2927452118 97 + rm -rf .git 98 ''; 99 }; 100 }
+2 -2
pkgs/by-name/ac/act/package.nix
··· 8 }: 9 10 let 11 - version = "0.2.77"; 12 in 13 buildGoModule { 14 pname = "act"; ··· 18 owner = "nektos"; 19 repo = "act"; 20 tag = "v${version}"; 21 - hash = "sha256-bcqHj40lySE2xXGuUbXbH5cjQ5NoJCvjE/uX8HaKVho="; 22 }; 23 24 vendorHash = "sha256-YH5SIZ73VYqg7+sSJpvqkIlBUy1rs3uNEWiEBDRdkQw=";
··· 8 }: 9 10 let 11 + version = "0.2.78"; 12 in 13 buildGoModule { 14 pname = "act"; ··· 18 owner = "nektos"; 19 repo = "act"; 20 tag = "v${version}"; 21 + hash = "sha256-S4Ev7MszuvlsUstnjOltYnZTuhzeqP/GDqMEWsFLe5Y="; 22 }; 23 24 vendorHash = "sha256-YH5SIZ73VYqg7+sSJpvqkIlBUy1rs3uNEWiEBDRdkQw=";
+3 -3
pkgs/by-name/al/alertmanager-ntfy/package.nix
··· 8 9 buildGoModule { 10 pname = "alertmanager-ntfy"; 11 - version = "0-unstable-2025-05-04"; 12 13 src = fetchFromGitHub { 14 owner = "alexbakker"; 15 repo = "alertmanager-ntfy"; 16 - rev = "f05e3c029bab3bdfb9aefbddbfc6bd9c7d4aa80f"; 17 - hash = "sha256-rKCJnffsBEXmTg2s0nqQf8BuHQnSgcwVBhC7gRzg4ew="; 18 }; 19 20 vendorHash = "sha256-e1JAoDNm2+xB/bZcEGr5l4+va8GIg1R8pdj3d+/Y+UY=";
··· 8 9 buildGoModule { 10 pname = "alertmanager-ntfy"; 11 + version = "0-unstable-2025-05-31"; 12 13 src = fetchFromGitHub { 14 owner = "alexbakker"; 15 repo = "alertmanager-ntfy"; 16 + rev = "76d5f772f70d6915c89da00414c20009b03cc361"; 17 + hash = "sha256-newJ1fCMEE3gsZncWU899Q6cS6llPNwJlHT7HdLQZf8="; 18 }; 19 20 vendorHash = "sha256-e1JAoDNm2+xB/bZcEGr5l4+va8GIg1R8pdj3d+/Y+UY=";
+3 -15
pkgs/by-name/bo/bootspec/package.nix
··· 2 lib, 3 rustPlatform, 4 fetchFromGitHub, 5 - fetchpatch, 6 }: 7 rustPlatform.buildRustPackage rec { 8 pname = "bootspec"; 9 - version = "1.0.0"; 10 11 src = fetchFromGitHub { 12 owner = "DeterminateSystems"; 13 repo = "bootspec"; 14 rev = "v${version}"; 15 - hash = "sha256-5IGSMHeL0eKfl7teDejAckYQjc8aeLwfwIQSzQ8YaAg="; 16 }; 17 18 - patches = [ 19 - # https://github.com/DeterminateSystems/bootspec/pull/127 20 - # Fixes the synthesize tool for aarch64-linux 21 - (fetchpatch { 22 - name = "aarch64-support.patch"; 23 - url = "https://github.com/DeterminateSystems/bootspec/commit/1d0e925f360f0199f13422fb7541225fd162fd4f.patch"; 24 - sha256 = "sha256-wU/jWnOqVBrU2swANdXbQfzRpNd/JIS4cxSyCvixZM0="; 25 - }) 26 - 27 - ]; 28 - 29 useFetchCargoVendor = true; 30 - cargoHash = "sha256-65jk8UlXZgQoxuwRcGlMnI4e+LpCJuP2TaqK+Kn4GnQ="; 31 32 meta = with lib; { 33 description = "Implementation of RFC-0125's datatype and synthesis tooling";
··· 2 lib, 3 rustPlatform, 4 fetchFromGitHub, 5 }: 6 rustPlatform.buildRustPackage rec { 7 pname = "bootspec"; 8 + version = "1.0.1"; 9 10 src = fetchFromGitHub { 11 owner = "DeterminateSystems"; 12 repo = "bootspec"; 13 rev = "v${version}"; 14 + hash = "sha256-0MO+SqG7Gjq+fmMJkIFvaKsfTmC7z3lGfi7bbBv7iBE="; 15 }; 16 17 useFetchCargoVendor = true; 18 + cargoHash = "sha256-fKbF5SyI0UlZTWsygdE8BGWuOoNSU4jx+CGdJoJFhZs="; 19 20 meta = with lib; { 21 description = "Implementation of RFC-0125's datatype and synthesis tooling";
+5 -3
pkgs/by-name/bu/burpsuite/package.nix
··· 9 }: 10 11 let 12 - version = "2025.4.2"; 13 14 product = 15 if proEdition then 16 { 17 productName = "pro"; 18 productDesktop = "Burp Suite Professional Edition"; 19 - hash = "sha256-wtCZ3/7JvygSCka4i3Il2ajpSuuTPTwHeVJa4gGFDPw="; 20 } 21 else 22 { 23 productName = "community"; 24 productDesktop = "Burp Suite Community Edition"; 25 - hash = "sha256-+1aTq7XKacsi/gzUpeZvSuwpKPDMo6H3C81pxWCC4w8="; 26 }; 27 28 src = fetchurl { ··· 90 ${lib.getBin unzip}/bin/unzip -p ${src} resources/Media/icon64${product.productName}.png > "$out/share/pixmaps/burpsuite.png" 91 cp -r ${desktopItem}/share/applications $out/share 92 ''; 93 94 meta = with lib; { 95 inherit description;
··· 9 }: 10 11 let 12 + version = "2025.5.1"; 13 14 product = 15 if proEdition then 16 { 17 productName = "pro"; 18 productDesktop = "Burp Suite Professional Edition"; 19 + hash = "sha256-1AXAVXselQKqKsjTRJVN3rBQpSReTH3d0ulIahp9QCc="; 20 } 21 else 22 { 23 productName = "community"; 24 productDesktop = "Burp Suite Community Edition"; 25 + hash = "sha256-zX5QJz996WgKvDA6p5dRtmbZTRsgCl0URn302MkhVew="; 26 }; 27 28 src = fetchurl { ··· 90 ${lib.getBin unzip}/bin/unzip -p ${src} resources/Media/icon64${product.productName}.png > "$out/share/pixmaps/burpsuite.png" 91 cp -r ${desktopItem}/share/applications $out/share 92 ''; 93 + 94 + passthru.updateScript = ./update.sh; 95 96 meta = with lib; { 97 inherit description;
+39
pkgs/by-name/bu/burpsuite/update.sh
···
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p curl jq xxd gnused diffutils 3 + set -eu -o pipefail 4 + 5 + SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" &>/dev/null && pwd)" 6 + 7 + curl -s 'https://portswigger.net/burp/releases/data' | 8 + jq -r ' 9 + [[ 10 + .ResultSet.Results[] 11 + | select( 12 + (.categories | sort) == (["Professional","Community"] | sort) 13 + and .releaseChannels == ["Early Adopter"] 14 + ) 15 + ][0].builds[] 16 + | select(.ProductPlatform == "Jar") 17 + ]' >latest.json 18 + 19 + version=$(jq -r '.[0].Version' latest.json) 20 + 21 + comm_hex=$(jq -r '.[] | select(.ProductId=="community") .Sha256Checksum' latest.json) 22 + pro_hex=$(jq -r '.[] | select(.ProductId=="pro") .Sha256Checksum' latest.json) 23 + 24 + comm_sri="sha256-$(printf %s "$comm_hex" | xxd -r -p | base64 -w0)" 25 + pro_sri="sha256-$(printf %s "$pro_hex" | xxd -r -p | base64 -w0)" 26 + 27 + sed -i \ 28 + -e "s|^\(\s*version = \)\"[^\"]*\";|\1\"$version\";|" \ 29 + -e "/productName = \"community\"/,/hash =/ { 30 + s|sha256-[^\"]*|$comm_sri| 31 + }" \ 32 + -e "/productName = \"pro\"/,/hash =/ { 33 + s|sha256-[^\"]*|$pro_sri| 34 + }" \ 35 + $SCRIPT_DIR/package.nix 36 + 37 + echo "burpsuite → $version" 38 + echo " community: $comm_sri" 39 + echo " pro : $pro_sri"
+1 -3
pkgs/by-name/cc/ccextractor/package.nix
··· 49 cargoRoot = "src/rust"; 50 51 cargoDeps = rustPlatform.fetchCargoVendor { 52 - inherit (finalAttrs) src; 53 - sourceRoot = "${finalAttrs.src.name}/${finalAttrs.cargoRoot}"; 54 patches = [ ./use-rsmpeg-0.15.patch ]; 55 - patchFlags = [ "-p3" ]; 56 hash = "sha256-7v3gQghByUDWZLJRRGa/7X2ivUumirq6BbexNQcCXCk="; 57 }; 58
··· 49 cargoRoot = "src/rust"; 50 51 cargoDeps = rustPlatform.fetchCargoVendor { 52 + inherit (finalAttrs) src cargoRoot; 53 patches = [ ./use-rsmpeg-0.15.patch ]; 54 hash = "sha256-7v3gQghByUDWZLJRRGa/7X2ivUumirq6BbexNQcCXCk="; 55 }; 56
+2 -2
pkgs/by-name/cd/cdncheck/package.nix
··· 6 7 buildGoModule rec { 8 pname = "cdncheck"; 9 - version = "1.1.20"; 10 11 src = fetchFromGitHub { 12 owner = "projectdiscovery"; 13 repo = "cdncheck"; 14 tag = "v${version}"; 15 - hash = "sha256-qL2SNVHsAH+Z0A5Vv+kBa1O9VgdR7eZ29Z19s5GuTXA="; 16 }; 17 18 vendorHash = "sha256-/1REkZ5+sz/H4T4lXhloz7fu5cLv1GoaD3dlttN+Qd4=";
··· 6 7 buildGoModule rec { 8 pname = "cdncheck"; 9 + version = "1.1.21"; 10 11 src = fetchFromGitHub { 12 owner = "projectdiscovery"; 13 repo = "cdncheck"; 14 tag = "v${version}"; 15 + hash = "sha256-GTYgo5rx4PrWLytqdH3LrasgyEAr1FuPyI26tGRaV0A="; 16 }; 17 18 vendorHash = "sha256-/1REkZ5+sz/H4T4lXhloz7fu5cLv1GoaD3dlttN+Qd4=";
+3 -3
pkgs/by-name/ch/chart-testing/package.nix
··· 14 15 buildGoModule rec { 16 pname = "chart-testing"; 17 - version = "3.12.0"; 18 19 src = fetchFromGitHub { 20 owner = "helm"; 21 repo = "chart-testing"; 22 rev = "v${version}"; 23 - hash = "sha256-q56ZM+YzL7RRC3RD3xO3K0hIDomKun5xmSKuiDTq1cU="; 24 }; 25 26 - vendorHash = "sha256-kTlqGZVOppf+WMcFw0T9FVbu9eOWAWzotR8fPPyo2Ms="; 27 28 postPatch = '' 29 substituteInPlace pkg/config/config.go \
··· 14 15 buildGoModule rec { 16 pname = "chart-testing"; 17 + version = "3.13.0"; 18 19 src = fetchFromGitHub { 20 owner = "helm"; 21 repo = "chart-testing"; 22 rev = "v${version}"; 23 + hash = "sha256-59a86yR/TDAWGCsj3pbDjXJGMvyHYnjsnxzjWr61PuU="; 24 }; 25 26 + vendorHash = "sha256-aVXISRthJxxvtrfC0DpewLHCiJPh4tO+SKl3Q9uP14k="; 27 28 postPatch = '' 29 substituteInPlace pkg/config/config.go \
+3 -3
pkgs/by-name/ch/chirp/package.nix
··· 11 12 python3Packages.buildPythonApplication { 13 pname = "chirp"; 14 - version = "0.4.0-unstable-2025-05-14"; 15 pyproject = true; 16 17 src = fetchFromGitHub { 18 owner = "kk7ds"; 19 repo = "chirp"; 20 - rev = "eb4e4547b517c3d10ede760bcd31eeb448c455dc"; 21 - hash = "sha256-e10WFYpIy6JnPAqUcapli9Q6R0GxNwb1YjnE4cu+xfk="; 22 }; 23 24 nativeBuildInputs = [
··· 11 12 python3Packages.buildPythonApplication { 13 pname = "chirp"; 14 + version = "0.4.0-unstable-2025-05-29"; 15 pyproject = true; 16 17 src = fetchFromGitHub { 18 owner = "kk7ds"; 19 repo = "chirp"; 20 + rev = "db838b0c1ae9b0964efcd625c415a76ff9fbea4a"; 21 + hash = "sha256-C8sicZ4krALpsRFbX8Ls5GZc7FUimg2Ix6WsQP2oMvw="; 22 }; 23 24 nativeBuildInputs = [
+3 -3
pkgs/by-name/cl/clorinde/package.nix
··· 8 9 rustPlatform.buildRustPackage (finalAttrs: { 10 pname = "clorinde"; 11 - version = "0.15.1"; 12 13 src = fetchFromGitHub { 14 owner = "halcyonnouveau"; 15 repo = "clorinde"; 16 tag = "clorinde-v${finalAttrs.version}"; 17 - hash = "sha256-Ynz1pdgckQzMLuUJUGSzNRNwWZKrEZuYgrrT/BxAxzc="; 18 }; 19 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-g3pWvoTq1DlKlIDJq79IJrvDiLR0HZRPIt4K1YUPsvM="; 22 23 cargoBuildFlags = [ "--package=clorinde" ]; 24
··· 8 9 rustPlatform.buildRustPackage (finalAttrs: { 10 pname = "clorinde"; 11 + version = "0.15.2"; 12 13 src = fetchFromGitHub { 14 owner = "halcyonnouveau"; 15 repo = "clorinde"; 16 tag = "clorinde-v${finalAttrs.version}"; 17 + hash = "sha256-CrgJtgFX5RBNfFFr2ZZ0d3oKfryyLAHva7g2JyBFiB8="; 18 }; 19 20 useFetchCargoVendor = true; 21 + cargoHash = "sha256-jUtkhOAosrxHGRbAdzdrgLzL5Xp2YhxcrG/dcwUhdLg="; 22 23 cargoBuildFlags = [ "--package=clorinde" ]; 24
+5 -5
pkgs/by-name/cl/clouddrive2/package.nix
··· 11 in 12 stdenv.mkDerivation (finalAttrs: { 13 pname = "clouddrive2"; 14 - version = "0.8.19"; 15 16 src = fetchurl { 17 url = "https://github.com/cloud-fs/cloud-fs.github.io/releases/download/v${finalAttrs.version}/clouddrive-2-${os}-${arch}-${finalAttrs.version}.tgz"; 18 hash = 19 { 20 - x86_64-linux = "sha256-pLimn6OfqByOyFIDYq0VD4yQ0BpL+st5VwYBKP5zSug="; 21 - aarch64-linux = "sha256-Xr3locwzuCg0LRPvNBphhleHFZOnXLi9Md8R17k4vWU="; 22 - x86_64-darwin = "sha256-klwicOa/jbjsGL09HR6v2CTA+vhHd1EjCbblAmEPqWQ="; 23 - aarch64-darwin = "sha256-47AbC8SHDb1hRlePF6CszHqf2gpwIxsOhJK4+PMCHbQ="; 24 } 25 .${stdenv.hostPlatform.system} or (throw "unsupported system ${stdenv.hostPlatform.system}"); 26 };
··· 11 in 12 stdenv.mkDerivation (finalAttrs: { 13 pname = "clouddrive2"; 14 + version = "0.8.20"; 15 16 src = fetchurl { 17 url = "https://github.com/cloud-fs/cloud-fs.github.io/releases/download/v${finalAttrs.version}/clouddrive-2-${os}-${arch}-${finalAttrs.version}.tgz"; 18 hash = 19 { 20 + x86_64-linux = "sha256-pDZmrPLIppMMj8KqNGQLUM4ue43vSwVyEKCYrN0G2LM="; 21 + aarch64-linux = "sha256-GraqtexpHN+bpArA1HQDYC7DG2QHK1P7o9QDXyFEir4="; 22 + x86_64-darwin = "sha256-X/Gf4OipbUM8FwAYfA1+yMBVbsZK5UYz4HFiOYYaTdA="; 23 + aarch64-darwin = "sha256-jmsj1VPpxTgly0xIB5pxl79NBZe1zp9rqAYePScMe80="; 24 } 25 .${stdenv.hostPlatform.system} or (throw "unsupported system ${stdenv.hostPlatform.system}"); 26 };
+2 -2
pkgs/by-name/di/diffoscope/package.nix
··· 106 # Note: when upgrading this package, please run the list-missing-tools.sh script as described below! 107 python.pkgs.buildPythonApplication rec { 108 pname = "diffoscope"; 109 - version = "295"; 110 111 src = fetchurl { 112 url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2"; 113 - hash = "sha256-BxyE14vXS7lGFwWsruDAcdXMRsoETFwXPQxfMpSh1+E="; 114 }; 115 116 outputs = [
··· 106 # Note: when upgrading this package, please run the list-missing-tools.sh script as described below! 107 python.pkgs.buildPythonApplication rec { 108 pname = "diffoscope"; 109 + version = "297"; 110 111 src = fetchurl { 112 url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2"; 113 + hash = "sha256-3dEZb7XZluTi+sUTgSqwLzCdNMJwekt1Em0XEDSAY/E="; 114 }; 115 116 outputs = [
+2 -2
pkgs/by-name/di/distroshelf/package.nix
··· 17 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "distroshelf"; 20 - version = "1.0.7"; 21 22 src = fetchFromGitHub { 23 owner = "ranfdev"; 24 repo = "DistroShelf"; 25 tag = "v${finalAttrs.version}"; 26 - hash = "sha256-4xiqdLSmO9LXfVwF/QRJL8BhZDsNistdGVVT4YDdt4A="; 27 }; 28 29 cargoDeps = rustPlatform.fetchCargoVendor {
··· 17 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "distroshelf"; 20 + version = "1.0.8"; 21 22 src = fetchFromGitHub { 23 owner = "ranfdev"; 24 repo = "DistroShelf"; 25 tag = "v${finalAttrs.version}"; 26 + hash = "sha256-UZP/VohgYUe6Ly89oD9WlYyiAfQmTK1lXnf5TipoiNI="; 27 }; 28 29 cargoDeps = rustPlatform.fetchCargoVendor {
+3 -3
pkgs/by-name/dp/dprint/plugins/dprint-plugin-typescript.nix
··· 1 { mkDprintPlugin }: 2 mkDprintPlugin { 3 description = "TypeScript/JavaScript code formatter."; 4 - hash = "sha256-g41K7aTCZZc1zRoc9k1oG8rk88ZwJJH3jnnX+MKQ9mE="; 5 initConfig = { 6 configExcludes = [ "**/node_modules" ]; 7 configKey = "typescript"; ··· 16 }; 17 pname = "dprint-plugin-typescript"; 18 updateUrl = "https://plugins.dprint.dev/dprint/typescript/latest.json"; 19 - url = "https://plugins.dprint.dev/typescript-0.95.4.wasm"; 20 - version = "0.95.4"; 21 }
··· 1 { mkDprintPlugin }: 2 mkDprintPlugin { 3 description = "TypeScript/JavaScript code formatter."; 4 + hash = "sha256-sn10yaYbp6VWspqEMKCd7HbDvKi35AW5Xn8FGzzN3kM="; 5 initConfig = { 6 configExcludes = [ "**/node_modules" ]; 7 configKey = "typescript"; ··· 16 }; 17 pname = "dprint-plugin-typescript"; 18 updateUrl = "https://plugins.dprint.dev/dprint/typescript/latest.json"; 19 + url = "https://plugins.dprint.dev/typescript-0.95.5.wasm"; 20 + version = "0.95.5"; 21 }
+3 -3
pkgs/by-name/dr/dracula-theme/package.nix
··· 8 9 let 10 themeName = "Dracula"; 11 - version = "4.0.0-unstable-2025-04-27"; 12 in 13 stdenvNoCC.mkDerivation { 14 pname = "dracula-theme"; ··· 17 src = fetchFromGitHub { 18 owner = "dracula"; 19 repo = "gtk"; 20 - rev = "3834a1bac175b226cff6b1c94faac9aba2819bd5"; 21 - hash = "sha256-T0X0h4Bz3sy5jqtB1PkpjFnB8jO3CehOxgRwPPG54Ds="; 22 }; 23 24 propagatedUserEnvPkgs = [
··· 8 9 let 10 themeName = "Dracula"; 11 + version = "4.0.0-unstable-2025-05-24"; 12 in 13 stdenvNoCC.mkDerivation { 14 pname = "dracula-theme"; ··· 17 src = fetchFromGitHub { 18 owner = "dracula"; 19 repo = "gtk"; 20 + rev = "74255b110e7e5f50a07f500f739bc59c2cbee472"; 21 + hash = "sha256-0NA/MTmcgRlR6JEOFz1+SgyoRwRygygEWAQDrpznA5w="; 22 }; 23 24 propagatedUserEnvPkgs = [
+47
pkgs/by-name/ds/dsnet/package.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + buildGoModule, 6 + }: 7 + 8 + buildGoModule (finalAttrs: { 9 + pname = "dsnet"; 10 + version = "0.8.1"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "naggie"; 14 + repo = "dsnet"; 15 + tag = "v${finalAttrs.version}"; 16 + hash = "sha256-CKDtILZMWFeSU5nTSguM2fi0BCFdvR2LqELIZ6LYOMk="; 17 + }; 18 + vendorHash = "sha256-Q2Ipj9yZ+/GUBEmDvgwFLLww7EXnbvdvj/shGQnh1G8="; 19 + 20 + subPackages = [ "cmd" ]; 21 + 22 + postInstall = '' 23 + mv $out/bin/cmd $out/bin/dsnet 24 + ''; 25 + 26 + # The ldflags reduce the executable size by stripping some debug stuff. 27 + # The other variables are set so that the output of dsnet version shows the 28 + # git ref and the release version from github. 29 + # Ref <https://github.com/NixOS/nixpkgs/pull/87383#discussion_r432097657> 30 + ldflags = [ 31 + "-w" 32 + "-s" 33 + "-X github.com/naggie/dsnet.VERSION=${finalAttrs.src.tag}" 34 + "-X github.com/naggie/dsnet.GIT_COMMIT=${finalAttrs.src.tag}" 35 + ]; 36 + 37 + meta = { 38 + description = "Fast command to manage a centralised Wireguard VPN"; 39 + homepage = "https://github.com/naggie/dsnet"; 40 + changelog = "https://github.com/naggie/dsnet/releases/tag/${finalAttrs.src.tag}"; 41 + license = lib.licenses.mit; 42 + platforms = lib.platforms.linux; 43 + maintainers = [ lib.maintainers.naggie ]; 44 + mainProgram = "dsnet"; 45 + }; 46 + 47 + })
+3 -3
pkgs/by-name/fl/flaresolverr/package.nix
··· 59 ''; 60 61 installPhase = '' 62 - mkdir -p $out/{bin,share/${finalAttrs.pname}-${finalAttrs.version}} 63 - cp -r * $out/share/${finalAttrs.pname}-${finalAttrs.version}/. 64 65 makeWrapper ${python}/bin/python $out/bin/flaresolverr \ 66 - --add-flags "$out/share/${finalAttrs.pname}-${finalAttrs.version}/src/flaresolverr.py" \ 67 --prefix PATH : "${lib.makeBinPath [ xorg.xvfb ]}" 68 ''; 69
··· 59 ''; 60 61 installPhase = '' 62 + mkdir -p $out/{bin,share/flaresolverr-${finalAttrs.version}} 63 + cp -r * $out/share/flaresolverr-${finalAttrs.version}/. 64 65 makeWrapper ${python}/bin/python $out/bin/flaresolverr \ 66 + --add-flags "$out/share/flaresolverr-${finalAttrs.version}/src/flaresolverr.py" \ 67 --prefix PATH : "${lib.makeBinPath [ xorg.xvfb ]}" 68 ''; 69
+1 -1
pkgs/by-name/ge/geoclock/package.nix
··· 20 }; 21 22 cargoHash = "sha256-7mApZj3Ksy8Av0W+0+UZQCkH281bSBd4xo8/7JowmHs="; 23 - cargoDepsName = finalAttrs.pname; 24 25 meta = { 26 description = "Displays time as calculated by your longitude";
··· 20 }; 21 22 cargoHash = "sha256-7mApZj3Ksy8Av0W+0+UZQCkH281bSBd4xo8/7JowmHs="; 23 + cargoDepsName = "geoclock"; 24 25 meta = { 26 description = "Displays time as calculated by your longitude";
+3 -3
pkgs/by-name/gi/gildas/package.nix
··· 24 in 25 26 stdenv.mkDerivation rec { 27 - srcVersion = "may25a"; 28 - version = "20250501_a"; 29 pname = "gildas"; 30 31 src = fetchurl { ··· 35 "http://www.iram.fr/~gildas/dist/gildas-src-${srcVersion}.tar.xz" 36 "http://www.iram.fr/~gildas/dist/archive/gildas/gildas-src-${srcVersion}.tar.xz" 37 ]; 38 - hash = "sha256-ofcuwc4vIKLbY/2uRqWG4sdrm9N0hpqz6zYwkZyySWo="; 39 }; 40 41 nativeBuildInputs = [
··· 24 in 25 26 stdenv.mkDerivation rec { 27 + srcVersion = "jun25a"; 28 + version = "20250601_a"; 29 pname = "gildas"; 30 31 src = fetchurl { ··· 35 "http://www.iram.fr/~gildas/dist/gildas-src-${srcVersion}.tar.xz" 36 "http://www.iram.fr/~gildas/dist/archive/gildas/gildas-src-${srcVersion}.tar.xz" 37 ]; 38 + hash = "sha256-DhUGaG96bsZ1NGfDQEujtiM0AUwZBMD42uRpRWI5DX0="; 39 }; 40 41 nativeBuildInputs = [
+3 -3
pkgs/by-name/gi/gitleaks/package.nix
··· 11 12 buildGoModule rec { 13 pname = "gitleaks"; 14 - version = "8.26.0"; 15 16 src = fetchFromGitHub { 17 owner = "zricethezav"; 18 repo = "gitleaks"; 19 tag = "v${version}"; 20 - hash = "sha256-lBIoEUjAllhUTS9PRSqdWUeBhEGs6wOHOWivj0PC9Is="; 21 }; 22 23 - vendorHash = "sha256-MSF9N9kXsIM2WKsjKAVztYypwGPng2EElHx7p6vADqc="; 24 25 ldflags = [ 26 "-s"
··· 11 12 buildGoModule rec { 13 pname = "gitleaks"; 14 + version = "8.27.0"; 15 16 src = fetchFromGitHub { 17 owner = "zricethezav"; 18 repo = "gitleaks"; 19 tag = "v${version}"; 20 + hash = "sha256-62Tcj5NiEk4uaGpiallCjDzpkFbuTazfMiemEe+ATLg="; 21 }; 22 23 + vendorHash = "sha256-vd39TbooEdmYa6QZGEnYOmYU9p+9mV+SrLKVY+h/PEM="; 24 25 ldflags = [ 26 "-s"
+7 -4
pkgs/by-name/gl/gleam/package.nix
··· 15 16 rustPlatform.buildRustPackage (finalAttrs: { 17 pname = "gleam"; 18 - version = "1.10.0"; 19 20 src = fetchFromGitHub { 21 owner = "gleam-lang"; 22 repo = "gleam"; 23 tag = "v${finalAttrs.version}"; 24 - hash = "sha256-0qK9dWkKnoXbIIBMN3p5noPEke/bgC8Bjtmf6lwtyr4="; 25 }; 26 27 - cargoHash = "sha256-EoRu8p6cUe1li54nVUkf+3qywIsDXh4ptIVLluJ3eFs="; 28 29 nativeBuildInputs = [ 30 git ··· 53 homepage = "https://gleam.run/"; 54 changelog = "https://github.com/gleam-lang/gleam/blob/v${finalAttrs.version}/CHANGELOG.md"; 55 license = lib.licenses.asl20; 56 - maintainers = [ lib.maintainers.philtaken ]; 57 teams = [ lib.teams.beam ]; 58 }; 59 })
··· 15 16 rustPlatform.buildRustPackage (finalAttrs: { 17 pname = "gleam"; 18 + version = "1.11.0"; 19 20 src = fetchFromGitHub { 21 owner = "gleam-lang"; 22 repo = "gleam"; 23 tag = "v${finalAttrs.version}"; 24 + hash = "sha256-oxzFAqPZ+ZHd/+GwofDg0gA4NIFYWi2v8fOjMn8ixSU="; 25 }; 26 27 + cargoHash = "sha256-9kk7w85imYIhywBuAgJS8wYAIEM3hXoHymGgMMmrgnI="; 28 29 nativeBuildInputs = [ 30 git ··· 53 homepage = "https://gleam.run/"; 54 changelog = "https://github.com/gleam-lang/gleam/blob/v${finalAttrs.version}/CHANGELOG.md"; 55 license = lib.licenses.asl20; 56 + maintainers = with lib.maintainers; [ 57 + philtaken 58 + llakala 59 + ]; 60 teams = [ lib.teams.beam ]; 61 }; 62 })
-13
pkgs/by-name/go/gopher/int_main.patch
··· 1 - diff --git a/configure b/configure 2 - index 1b20711..79ce215 100644 3 - --- a/configure 4 - +++ b/configure 5 - @@ -679,7 +679,7 @@ cat > conftest.$ac_ext << EOF 6 - #line 680 "configure" 7 - #include "confdefs.h" 8 - 9 - -main(){return(0);} 10 - +int main(){return(0);} 11 - EOF 12 - if { (eval echo configure:685: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext}; then 13 - ac_cv_prog_cc_works=yes
···
+2 -6
pkgs/by-name/go/gopher/package.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "gopher"; 10 - version = "3.0.18"; 11 12 src = fetchFromGitHub { 13 owner = "jgoerzen"; 14 repo = "gopher"; 15 rev = "release/${version}"; 16 - sha256 = "sha256-YAcpEV3SbiUZ4nqYk6k1M41YWdTGSSH7rNB15gv31qQ="; 17 }; 18 19 buildInputs = [ ncurses ]; 20 - 21 - patches = [ 22 - ./int_main.patch # https://github.com/jgoerzen/gopher/pull/8 23 - ]; 24 25 preConfigure = "export LIBS=-lncurses"; 26
··· 7 8 stdenv.mkDerivation rec { 9 pname = "gopher"; 10 + version = "3.0.19"; 11 12 src = fetchFromGitHub { 13 owner = "jgoerzen"; 14 repo = "gopher"; 15 rev = "release/${version}"; 16 + sha256 = "sha256-8J63TnC3Yq7+64PPLrlPEueMa9D/eWkPsb08t1+rPAA="; 17 }; 18 19 buildInputs = [ ncurses ]; 20 21 preConfigure = "export LIBS=-lncurses"; 22
+3 -3
pkgs/by-name/he/helm-ls/package.nix
··· 9 10 buildGoModule rec { 11 pname = "helm-ls"; 12 - version = "0.2.2"; 13 14 src = fetchFromGitHub { 15 owner = "mrjosh"; 16 repo = "helm-ls"; 17 rev = "v${version}"; 18 - hash = "sha256-NI9qtbt0Ci300DhDR+yjFThTGLXKrbsc1wuLPpC1l9o="; 19 }; 20 21 - vendorHash = "sha256-1BO/0Ous4mclainPV+nqk5K+tHKgRnaxMtsI4xAhZF4="; 22 23 nativeBuildInputs = [ installShellFiles ]; 24
··· 9 10 buildGoModule rec { 11 pname = "helm-ls"; 12 + version = "0.3.0"; 13 14 src = fetchFromGitHub { 15 owner = "mrjosh"; 16 repo = "helm-ls"; 17 rev = "v${version}"; 18 + hash = "sha256-OxrPqDa2g5jmm+XtLE0YCnVhkvVK60xxrO49Gl8VT60="; 19 }; 20 21 + vendorHash = "sha256-w/BWPbpSYum0SU8PJj76XiLUjTWO4zNQY+khuLRK0O8="; 22 23 nativeBuildInputs = [ installShellFiles ]; 24
+3 -3
pkgs/by-name/hy/hyprls/package.nix
··· 6 }: 7 buildGoModule rec { 8 pname = "hyprls"; 9 - version = "0.6.0"; 10 11 src = fetchFromGitHub { 12 owner = "hyprland-community"; 13 repo = "hyprls"; 14 rev = "v${version}"; 15 - hash = "sha256-sXC/JMd2NYc74k19DxZyldH+QLZ6W8dVHy0uyqyuCmg="; 16 }; 17 18 - vendorHash = "sha256-rG+oGJOABA9ee5nIpC5/U0mMsPhwvVtQvJBlQWfxi5Y="; 19 20 checkFlags = [ 21 # Not yet implemented
··· 6 }: 7 buildGoModule rec { 8 pname = "hyprls"; 9 + version = "0.7.0"; 10 11 src = fetchFromGitHub { 12 owner = "hyprland-community"; 13 repo = "hyprls"; 14 rev = "v${version}"; 15 + hash = "sha256-cJDDyF44nD/XvxtaGPYCk2MC574HDBHP1ByhVwqatvQ="; 16 }; 17 18 + vendorHash = "sha256-WTdwIAC3gDWgCKlVuOtMyl0ZfdZ9RhlpqUl2S2d65HA="; 19 20 checkFlags = [ 21 # Not yet implemented
+12 -12
pkgs/by-name/ik/ike-scan/package.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "ike-scan"; 12 - version = "1.9.5"; 13 14 src = fetchFromGitHub { 15 owner = "royhills"; 16 repo = "ike-scan"; 17 - rev = version; 18 - sha256 = "sha256-mbfg8p3y4aKoXpmLuF9GXAMPEqV5CsvetwGCRDJ9UNY="; 19 }; 20 21 - nativeBuildInputs = [ 22 - autoreconfHook 23 - openssl 24 - ]; 25 - 26 - configureFlags = [ "--with-openssl=${openssl.dev}" ]; 27 - 28 patches = [ 29 # Using the same patches as for the Fedora RPM 30 (fetchpatch { 31 # Memory leaks, https://github.com/royhills/ike-scan/pull/15 32 url = "https://github.com/royhills/ike-scan/pull/15/commits/d864811de08dcddd65ac9b8d0f2acf5d7ddb9dea.patch"; 33 - sha256 = "0wbrq89dl8js7cdivd0c45hckmflan33cpgc3qm5s3az6r4mjljm"; 34 }) 35 ]; 36 37 meta = with lib; { 38 description = "Tool to discover, fingerprint and test IPsec VPN servers"; 39 longDescription = '' ··· 41 fingerprint and test IPsec VPN servers. 42 ''; 43 homepage = "https://github.com/royhills/ike-scan"; 44 - license = with licenses; [ gpl3Plus ]; 45 platforms = platforms.linux; 46 maintainers = with maintainers; [ fab ]; 47 };
··· 9 10 stdenv.mkDerivation rec { 11 pname = "ike-scan"; 12 + version = "1.9.5-unstable-2024-09-15"; 13 14 src = fetchFromGitHub { 15 owner = "royhills"; 16 repo = "ike-scan"; 17 + rev = "c74c01fd22d9a3aae3d8ba9a0bd2eb1a2146ac6f"; 18 + hash = "sha256-+eicvirqzZrAJiaGaVjqZlSpU2+jTG/MRPv50P+1Tpc="; 19 }; 20 21 patches = [ 22 # Using the same patches as for the Fedora RPM 23 (fetchpatch { 24 # Memory leaks, https://github.com/royhills/ike-scan/pull/15 25 url = "https://github.com/royhills/ike-scan/pull/15/commits/d864811de08dcddd65ac9b8d0f2acf5d7ddb9dea.patch"; 26 + hash = "sha256-VVJZSTZfDV0qHuxdNoZV1NXJYCEMtB0bO1oi2hLCeXE="; 27 }) 28 ]; 29 30 + nativeBuildInputs = [ 31 + autoreconfHook 32 + openssl 33 + ]; 34 + 35 + configureFlags = [ "--with-openssl=${openssl.dev}" ]; 36 + 37 meta = with lib; { 38 description = "Tool to discover, fingerprint and test IPsec VPN servers"; 39 longDescription = '' ··· 41 fingerprint and test IPsec VPN servers. 42 ''; 43 homepage = "https://github.com/royhills/ike-scan"; 44 + license = licenses.gpl3Plus; 45 platforms = platforms.linux; 46 maintainers = with maintainers; [ fab ]; 47 };
+2 -2
pkgs/by-name/ko/kool/package.nix
··· 8 9 buildGoModule rec { 10 pname = "kool"; 11 - version = "3.5.0"; 12 13 src = fetchFromGitHub { 14 owner = "kool-dev"; 15 repo = "kool"; 16 rev = version; 17 - hash = "sha256-iB/9owaBNQVzdA4edrx0zl+COs7yVLs61Mij5kfjEhg="; 18 }; 19 20 vendorHash = "sha256-IqUkIf0uk4iUTedTO5xRzjmJwHS+p6apo4E0WEEU6cc=";
··· 8 9 buildGoModule rec { 10 pname = "kool"; 11 + version = "3.5.2"; 12 13 src = fetchFromGitHub { 14 owner = "kool-dev"; 15 repo = "kool"; 16 rev = version; 17 + hash = "sha256-yUJbuMOLEa9LVRltskSwD0XBdmwwLcEaLYUHsSQOiCk="; 18 }; 19 20 vendorHash = "sha256-IqUkIf0uk4iUTedTO5xRzjmJwHS+p6apo4E0WEEU6cc=";
+3 -3
pkgs/by-name/kr/krapslog/package.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "krapslog"; 11 - version = "0.6.0"; 12 13 src = fetchFromGitHub { 14 owner = "acj"; 15 repo = "krapslog-rs"; 16 rev = version; 17 - sha256 = "sha256-wRziLNMwLZBCn330FNC9x6loCCyuC+31Kh51ZI/j1Cc="; 18 }; 19 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-Mv0wTuTWCsBGjlr4BhLezBOCtgQ0qq2kwLcZxU1nREM="; 22 23 buildInputs = lib.optional stdenv.hostPlatform.isDarwin libiconv; 24
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "krapslog"; 11 + version = "0.6.1"; 12 13 src = fetchFromGitHub { 14 owner = "acj"; 15 repo = "krapslog-rs"; 16 rev = version; 17 + sha256 = "sha256-c/Zh4fOsSKY0XopaklRbFEh4QM5jjUcj0zhAx5v9amI="; 18 }; 19 20 useFetchCargoVendor = true; 21 + cargoHash = "sha256-cXK7YZ9i/eKXTHPYnJcvcKyzFlZDnqmCBrEa75Mxfqc="; 22 23 buildInputs = lib.optional stdenv.hostPlatform.isDarwin libiconv; 24
+3 -3
pkgs/by-name/kr/krillinai/package.nix
··· 11 12 buildGoModule (finalAttrs: { 13 pname = "krillinai"; 14 - version = "1.1.5"; 15 16 src = fetchFromGitHub { 17 owner = "krillinai"; 18 repo = "KrillinAI"; 19 tag = "v${finalAttrs.version}"; 20 - hash = "sha256-jQlgkpQ+UTzn6MqGa+yVQ9v04IGGlMQQim3s0Oc9Zts="; 21 }; 22 23 - vendorHash = "sha256-mpvypCZmvVVljftGpcV1aea3s7Xmhr0jLfKZIZ0nkX8="; 24 25 nativeBuildInputs = [ pkg-config ]; 26
··· 11 12 buildGoModule (finalAttrs: { 13 pname = "krillinai"; 14 + version = "1.2.1-hotfix-2"; 15 16 src = fetchFromGitHub { 17 owner = "krillinai"; 18 repo = "KrillinAI"; 19 tag = "v${finalAttrs.version}"; 20 + hash = "sha256-Dw30Lsf4pHMDlrLmdoU+4v5SJfzx5UId6v/OocrsiS4="; 21 }; 22 23 + vendorHash = "sha256-14YNdIfylUpcWqHhrpgmjxBHYRXaoR59jb1QdTckuLY="; 24 25 nativeBuildInputs = [ pkg-config ]; 26
-13
pkgs/by-name/li/libfaketime/0001-Remove-unsupported-clang-flags.patch
··· 1 - diff --git a/src/Makefile b/src/Makefile 2 - index 2af4804..bcff809 100644 3 - --- a/src/Makefile 4 - +++ b/src/Makefile 5 - @@ -80,7 +80,7 @@ PREFIX ?= /usr/local 6 - LIBDIRNAME ?= /lib/faketime 7 - PLATFORM ?=$(shell uname) 8 - 9 - -CFLAGS += -std=gnu99 -Wall -Wextra -Werror -Wno-nonnull-compare -DFAKE_PTHREAD -DFAKE_STAT -DFAKE_UTIME -DFAKE_SLEEP -DFAKE_TIMERS -DFAKE_INTERNAL_CALLS -fPIC -DPREFIX='"'$(PREFIX)'"' -DLIBDIRNAME='"'$(LIBDIRNAME)'"' $(FAKETIME_COMPILE_CFLAGS) 10 - +CFLAGS += -std=gnu99 -Wall -Wextra -DFAKE_PTHREAD -DFAKE_STAT -DFAKE_UTIME -DFAKE_SLEEP -DFAKE_TIMERS -DFAKE_INTERNAL_CALLS -fPIC -DPREFIX='"'$(PREFIX)'"' -DLIBDIRNAME='"'$(LIBDIRNAME)'"' $(FAKETIME_COMPILE_CFLAGS) 11 - ifeq ($(PLATFORM),SunOS) 12 - CFLAGS += -D__EXTENSIONS__ -D_XOPEN_SOURCE=600 13 - endif
···
+7 -22
pkgs/by-name/li/libfaketime/package.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "libfaketime"; 12 - version = "0.9.10"; 13 14 src = fetchFromGitHub { 15 owner = "wolfcw"; 16 repo = "libfaketime"; 17 rev = "v${version}"; 18 - sha256 = "sha256-DYRuQmIhQu0CNEboBAtHOr/NnWxoXecuPMSR/UQ/VIQ="; 19 }; 20 21 - patches = 22 - [ 23 - ./nix-store-date.patch 24 - (fetchpatch { 25 - name = "0001-libfaketime.c-wrap-timespec_get-in-TIME_UTC-macro.patch"; 26 - url = "https://github.com/wolfcw/libfaketime/commit/e0e6b79568d36a8fd2b3c41f7214769221182128.patch"; 27 - sha256 = "sha256-KwwP76v0DXNW73p/YBvwUOPdKMAcVdbQSKexD/uFOYo="; 28 - }) 29 - (fetchpatch { 30 - name = "LFS64.patch"; 31 - url = "https://github.com/wolfcw/libfaketime/commit/f32986867addc9d22b0fab29c1c927f079d44ac1.patch"; 32 - hash = "sha256-fIXuxxcV9J2IcgwcwSrMo4maObkH9WYv1DC/wdtbq/g="; 33 - }) 34 - ] 35 - ++ (lib.optionals stdenv.cc.isClang [ 36 - # https://github.com/wolfcw/libfaketime/issues/277 37 - ./0001-Remove-unsupported-clang-flags.patch 38 - ]); 39 40 postPatch = '' 41 patchShebangs test src 42 for a in test/functests/test_exclude_mono.sh src/faketime.c ; do 43 substituteInPlace $a \ 44 - --replace /bin/bash ${stdenv.shell} 45 done 46 - substituteInPlace src/faketime.c --replace @DATE_CMD@ ${coreutils}/bin/date 47 ''; 48 49 PREFIX = placeholder "out";
··· 9 10 stdenv.mkDerivation rec { 11 pname = "libfaketime"; 12 + version = "0.9.11"; 13 14 src = fetchFromGitHub { 15 owner = "wolfcw"; 16 repo = "libfaketime"; 17 rev = "v${version}"; 18 + sha256 = "sha256-a0TjHYzwbkRQyvr9Sj/DqjgLBnE1Z8kjsTQxTfGqLjE="; 19 }; 20 21 + patches = [ 22 + ./nix-store-date.patch 23 + ]; 24 25 postPatch = '' 26 patchShebangs test src 27 for a in test/functests/test_exclude_mono.sh src/faketime.c ; do 28 substituteInPlace $a \ 29 + --replace-fail /bin/bash ${stdenv.shell} 30 done 31 + substituteInPlace src/faketime.c --replace-fail @DATE_CMD@ ${coreutils}/bin/date 32 ''; 33 34 PREFIX = placeholder "out";
+27 -11
pkgs/by-name/li/libkate/package.nix
··· 1 { 2 lib, 3 stdenv, 4 - fetchurl, 5 libogg, 6 libpng, 7 }: 8 9 - stdenv.mkDerivation rec { 10 pname = "libkate"; 11 - version = "0.4.1"; 12 13 - src = fetchurl { 14 - url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libkate/${pname}-${version}.tar.gz"; 15 - sha256 = "0s3vr2nxfxlf1k75iqpp4l78yf4gil3f0v778kvlngbchvaq23n4"; 16 }; 17 18 buildInputs = [ 19 libogg 20 libpng 21 ]; 22 23 - meta = with lib; { 24 description = "Library for encoding and decoding Kate streams"; 25 longDescription = '' 26 This is libkate, the reference implementation of a codec for the Kate 27 bitstream format. Kate is a karaoke and text codec meant for encapsulation 28 in an Ogg container. It can carry Unicode text, images, and animate 29 them.''; 30 - homepage = "https://code.google.com/archive/p/libkate/"; 31 - platforms = platforms.unix; 32 - license = licenses.bsd3; 33 }; 34 - }
··· 1 { 2 lib, 3 stdenv, 4 + fetchFromGitLab, 5 + autoreconfHook, 6 + bison, 7 + flex, 8 libogg, 9 libpng, 10 + pkg-config, 11 }: 12 13 + stdenv.mkDerivation (finalAttrs: { 14 pname = "libkate"; 15 + version = "0.4.3"; 16 17 + src = fetchFromGitLab { 18 + domain = "gitlab.xiph.org/"; 19 + owner = "xiph"; 20 + repo = "kate"; 21 + tag = "kate-${finalAttrs.version}"; 22 + hash = "sha256-HwDahmjDC+O321Ba7MnHoQdHOFUMpFzaNdLHQeEg11Q="; 23 }; 24 25 + nativeBuildInputs = [ 26 + autoreconfHook 27 + bison 28 + flex 29 + pkg-config # provides macro PKG_CHECK_MODULES 30 + ]; 31 + 32 buildInputs = [ 33 libogg 34 libpng 35 ]; 36 37 + enableParallelBuilding = true; 38 + 39 + meta = { 40 description = "Library for encoding and decoding Kate streams"; 41 longDescription = '' 42 This is libkate, the reference implementation of a codec for the Kate 43 bitstream format. Kate is a karaoke and text codec meant for encapsulation 44 in an Ogg container. It can carry Unicode text, images, and animate 45 them.''; 46 + homepage = "https://wiki.xiph.org/index.php/OggKate"; 47 + platforms = lib.platforms.unix; 48 + license = lib.licenses.bsd3; 49 }; 50 + })
+2 -2
pkgs/by-name/lo/logdy/package.nix
··· 7 8 buildGoModule rec { 9 pname = "logdy"; 10 - version = "0.16.0"; 11 12 src = fetchFromGitHub { 13 owner = "logdyhq"; 14 repo = "logdy-core"; 15 tag = "v${version}"; 16 - hash = "sha256-OpG9jgm/A++PBDQH5IYY6PyXx87QvihyZqnwhdBWZGg="; 17 }; 18 19 vendorHash = "sha256-kFhcbBMymzlJ+2zw7l09LJfCdps26Id+VzOehqrLDWU=";
··· 7 8 buildGoModule rec { 9 pname = "logdy"; 10 + version = "0.17.0"; 11 12 src = fetchFromGitHub { 13 owner = "logdyhq"; 14 repo = "logdy-core"; 15 tag = "v${version}"; 16 + hash = "sha256-779ZO9WhE3IKbHJLchCfrIepMH+GOrlQJALLpoNZvbc="; 17 }; 18 19 vendorHash = "sha256-kFhcbBMymzlJ+2zw7l09LJfCdps26Id+VzOehqrLDWU=";
+3 -3
pkgs/by-name/ma/manga-tui/package.nix
··· 10 nix-update-script, 11 }: 12 let 13 - version = "0.7.0"; 14 in 15 rustPlatform.buildRustPackage { 16 pname = "manga-tui"; ··· 20 owner = "josueBarretogit"; 21 repo = "manga-tui"; 22 rev = "v${version}"; 23 - hash = "sha256-1WFg2hG3UnOO9+HpUcdPkZNhsNYa2QG1PhzLZ4bQiQM="; 24 }; 25 26 useFetchCargoVendor = true; 27 - cargoHash = "sha256-1nERwIZCR/afgfGdronpy145GnDkbsB7YjF6XyDcfEY="; 28 29 nativeBuildInputs = [ pkg-config ]; 30
··· 10 nix-update-script, 11 }: 12 let 13 + version = "0.8.0"; 14 in 15 rustPlatform.buildRustPackage { 16 pname = "manga-tui"; ··· 20 owner = "josueBarretogit"; 21 repo = "manga-tui"; 22 rev = "v${version}"; 23 + hash = "sha256-81P5LwL9njxA0qx4FvqgrHdqVgUXkZTTzAXLdRTftS4="; 24 }; 25 26 useFetchCargoVendor = true; 27 + cargoHash = "sha256-dne0sJ0K/UVXGaj/vUM9O++ZS0hu69bdLnV8VAr3tbM="; 28 29 nativeBuildInputs = [ pkg-config ]; 30
+2 -2
pkgs/by-name/mi/minio-client/package.nix
··· 7 8 buildGoModule rec { 9 pname = "minio-client"; 10 - version = "2025-04-16T18-13-26Z"; 11 12 src = fetchFromGitHub { 13 owner = "minio"; 14 repo = "mc"; 15 rev = "RELEASE.${version}"; 16 - sha256 = "sha256-23shNQWVIuTLL0FLM00919JaT2QR4R0ou5ZA2/mQ4PA="; 17 }; 18 19 vendorHash = "sha256-MpLQZFrf2sBAweXtYeFi5j6p6GaXuN99x+r4UK8D9xM=";
··· 7 8 buildGoModule rec { 9 pname = "minio-client"; 10 + version = "2025-05-21T01-59-54Z"; 11 12 src = fetchFromGitHub { 13 owner = "minio"; 14 repo = "mc"; 15 rev = "RELEASE.${version}"; 16 + sha256 = "sha256-ss/GqOJz9FNrQzYABb8ePCMcmNVTYVji/Id1WOuu24M="; 17 }; 18 19 vendorHash = "sha256-MpLQZFrf2sBAweXtYeFi5j6p6GaXuN99x+r4UK8D9xM=";
+14 -10
pkgs/by-name/ne/ne/package.nix
··· 9 ghostscript, 10 }: 11 12 - stdenv.mkDerivation rec { 13 pname = "ne"; 14 version = "3.3.4"; 15 16 src = fetchFromGitHub { 17 owner = "vigna"; 18 repo = "ne"; 19 - rev = version; 20 - sha256 = "sha256-n8PERQD9G4jmW4avQjbFofrSapyRoSbQ2k1LzVt0i1o="; 21 }; 22 23 postPatch = '' 24 - substituteInPlace makefile --replace "./version.pl" "perl version.pl" 25 - substituteInPlace src/makefile --replace "-lcurses" "-lncurses" 26 ''; 27 28 nativeBuildInputs = [ 29 texliveMedium ··· 35 36 makeFlags = [ "PREFIX=${placeholder "out"}" ]; 37 38 - meta = with lib; { 39 description = "Nice editor"; 40 homepage = "https://ne.di.unimi.it/"; 41 longDescription = '' 42 ne is a free (GPL'd) text editor based on the POSIX standard that runs 43 (we hope) on almost any UN*X machine. ne is easy to use for the beginner, 44 but powerful and fully configurable for the wizard, and most sparing in its 45 resource usage. See the manual for some highlights of ne's features. 46 ''; 47 - license = licenses.gpl3; 48 - platforms = platforms.unix; 49 - maintainers = with maintainers; [ geri1701 ]; 50 mainProgram = "ne"; 51 }; 52 - }
··· 9 ghostscript, 10 }: 11 12 + stdenv.mkDerivation (finalAttrs: { 13 pname = "ne"; 14 version = "3.3.4"; 15 16 src = fetchFromGitHub { 17 owner = "vigna"; 18 repo = "ne"; 19 + tag = finalAttrs.version; 20 + hash = "sha256-n8PERQD9G4jmW4avQjbFofrSapyRoSbQ2k1LzVt0i1o="; 21 }; 22 23 postPatch = '' 24 + substituteInPlace makefile --replace-fail "./version.pl" "perl version.pl" 25 + substituteInPlace src/makefile --replace-fail "-lcurses" "-lncurses" 26 ''; 27 + 28 + strictDeps = true; 29 30 nativeBuildInputs = [ 31 texliveMedium ··· 37 38 makeFlags = [ "PREFIX=${placeholder "out"}" ]; 39 40 + meta = { 41 description = "Nice editor"; 42 homepage = "https://ne.di.unimi.it/"; 43 + changelog = "https://github.com/vigna/ne/releases/tag/${finalAttrs.version}"; 44 + downloadPage = "https://github.com/vigna/ne"; 45 longDescription = '' 46 ne is a free (GPL'd) text editor based on the POSIX standard that runs 47 (we hope) on almost any UN*X machine. ne is easy to use for the beginner, 48 but powerful and fully configurable for the wizard, and most sparing in its 49 resource usage. See the manual for some highlights of ne's features. 50 ''; 51 + license = lib.licenses.gpl3Only; 52 + platforms = lib.platforms.unix; 53 + maintainers = with lib.maintainers; [ geri1701 ]; 54 mainProgram = "ne"; 55 }; 56 + })
-58
pkgs/by-name/of/offrss/package.nix
··· 1 - { 2 - lib, 3 - stdenv, 4 - fetchurl, 5 - curl, 6 - libmrss, 7 - podofo, 8 - libiconv, 9 - }: 10 - 11 - stdenv.mkDerivation (finalAttrs: { 12 - pname = "offrss"; 13 - version = "1.3"; 14 - 15 - installPhase = '' 16 - mkdir -p $out/bin 17 - cp offrss $out/bin 18 - ''; 19 - 20 - buildInputs = 21 - [ 22 - curl 23 - libmrss 24 - ] 25 - ++ lib.optional (stdenv.hostPlatform == stdenv.buildPlatform) podofo 26 - ++ lib.optional (!stdenv.hostPlatform.isLinux) libiconv; 27 - 28 - # Workaround build failure on -fno-common toolchains: 29 - # ld: serve_pdf.o:offrss.h:75: multiple definition of `cgi_url_path'; 30 - # offrss.o:offrss.h:75: first defined here 31 - env.NIX_CFLAGS_COMPILE = "-fcommon -Wno-error=implicit-function-declaration"; 32 - 33 - configurePhase = 34 - '' 35 - substituteInPlace Makefile \ 36 - --replace '$(CC) $(CFLAGS) $(LDFLAGS)' '$(CXX) $(CFLAGS) $(LDFLAGS)' 37 - '' 38 - + lib.optionalString (!stdenv.hostPlatform.isLinux) '' 39 - sed 's/#EXTRA/EXTRA/' -i Makefile 40 - '' 41 - + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' 42 - sed 's/^PDF/#PDF/' -i Makefile 43 - ''; 44 - 45 - src = fetchurl { 46 - url = "http://vicerveza.homeunix.net/~viric/soft/offrss/offrss-${finalAttrs.version}.tar.gz"; 47 - hash = "sha256-5oIiDLdFrnEfPfSiwCv3inIcxK+bbgbMT1VISVAPfKo="; 48 - }; 49 - 50 - meta = { 51 - homepage = "http://vicerveza.homeunix.net/~viric/cgi-bin/offrss"; 52 - description = "Offline RSS/Atom reader"; 53 - license = lib.licenses.agpl3Plus; 54 - maintainers = [ ]; 55 - platforms = lib.platforms.linux; 56 - mainProgram = "offrss"; 57 - }; 58 - })
···
+3 -3
pkgs/by-name/og/ogen/package.nix
··· 6 7 buildGoModule rec { 8 pname = "ogen"; 9 - version = "1.13.0"; 10 11 src = fetchFromGitHub { 12 owner = "ogen-go"; 13 repo = "ogen"; 14 tag = "v${version}"; 15 - hash = "sha256-M2xKxaf+iWXTq+vMXsucMmVqs9BarCoyG6prmwcL8KI="; 16 }; 17 18 - vendorHash = "sha256-TVnTg+SbTmpdfxWSr3KIPioQ/0OlUxCuCfyn5oMWPu8="; 19 20 patches = [ ./modify-version-handling.patch ]; 21
··· 6 7 buildGoModule rec { 8 pname = "ogen"; 9 + version = "1.14.0"; 10 11 src = fetchFromGitHub { 12 owner = "ogen-go"; 13 repo = "ogen"; 14 tag = "v${version}"; 15 + hash = "sha256-w3h65MNXBgsH8PCHfoPqY+XNI6TMbLUAMI4Y3WWLEJM="; 16 }; 17 18 + vendorHash = "sha256-PQ2ZrigS9jZY1oL3Dsuc2RZwedZLzLKUqhMYfWiZ854="; 19 20 patches = [ ./modify-version-handling.patch ]; 21
+3 -3
pkgs/by-name/ol/olivetin/package.nix
··· 81 82 { 83 pname = "olivetin"; 84 - version = "2025.5.26"; 85 86 src = fetchFromGitHub { 87 owner = "OliveTin"; 88 repo = "OliveTin"; 89 tag = finalAttrs.version; 90 - hash = "sha256-BD52MxIHE56y3oWuRTCYmrEYMge70/MXt4B6g84ahF0="; 91 }; 92 93 modRoot = "service"; 94 95 - vendorHash = "sha256-kfk4QFG+l+XKkKoOs2C1B6ZuMeeDz9DrzzR46S8Qnyk="; 96 97 ldflags = [ 98 "-s"
··· 81 82 { 83 pname = "olivetin"; 84 + version = "2025.6.1"; 85 86 src = fetchFromGitHub { 87 owner = "OliveTin"; 88 repo = "OliveTin"; 89 tag = finalAttrs.version; 90 + hash = "sha256-Bd+zxVEhP7LZk74Mfai/MkML1pKlPBKm4kh4jAkC/kQ="; 91 }; 92 93 modRoot = "service"; 94 95 + vendorHash = "sha256-8rPJoB75de2Y56iyIwdI9HPk7OlCgfMPy28TW1i7+sU="; 96 97 ldflags = [ 98 "-s"
+2 -2
pkgs/by-name/ol/ollama/package.nix
··· 117 goBuild (finalAttrs: { 118 pname = "ollama"; 119 # don't forget to invalidate all hashes each update 120 - version = "0.7.1"; 121 122 src = fetchFromGitHub { 123 owner = "ollama"; 124 repo = "ollama"; 125 tag = "v${finalAttrs.version}"; 126 - hash = "sha256-ee2MkvdVDQaSFJDDuXEwedqOB2DUl3MIfp5tRxqbL8A="; 127 fetchSubmodules = true; 128 }; 129
··· 117 goBuild (finalAttrs: { 118 pname = "ollama"; 119 # don't forget to invalidate all hashes each update 120 + version = "0.9.0"; 121 122 src = fetchFromGitHub { 123 owner = "ollama"; 124 repo = "ollama"; 125 tag = "v${finalAttrs.version}"; 126 + hash = "sha256-+8UHE9M2JWUARuuIRdKwNkn1hoxtuitVH7do5V5uEg0="; 127 fetchSubmodules = true; 128 }; 129
+1 -2
pkgs/by-name/op/opengamepadui/package.nix
··· 35 }; 36 37 cargoDeps = rustPlatform.fetchCargoVendor { 38 - inherit (finalAttrs) src; 39 - sourceRoot = "source/${finalAttrs.cargoRoot}"; 40 hash = "sha256-T79G2bShJuFRfaCqG3IDHqW0s68yAdGyv58kdDYg6kg="; 41 }; 42 cargoRoot = "extensions";
··· 35 }; 36 37 cargoDeps = rustPlatform.fetchCargoVendor { 38 + inherit (finalAttrs) src cargoRoot; 39 hash = "sha256-T79G2bShJuFRfaCqG3IDHqW0s68yAdGyv58kdDYg6kg="; 40 }; 41 cargoRoot = "extensions";
+3 -3
pkgs/by-name/ph/phrase-cli/package.nix
··· 6 7 buildGoModule rec { 8 pname = "phrase-cli"; 9 - version = "2.40.0"; 10 11 src = fetchFromGitHub { 12 owner = "phrase"; 13 repo = "phrase-cli"; 14 rev = version; 15 - sha256 = "sha256-d/B5XzEAM1GlpQxshy0kEJexF01FlF99hnoctKDXhp0="; 16 }; 17 18 - vendorHash = "sha256-VV4ctHj9fPosAgqBOfkqOKETSeGJXFPPP+kBMgqV2nk="; 19 20 ldflags = [ "-X=github.com/phrase/phrase-cli/cmd.PHRASE_CLIENT_VERSION=${version}" ]; 21
··· 6 7 buildGoModule rec { 8 pname = "phrase-cli"; 9 + version = "2.42.0"; 10 11 src = fetchFromGitHub { 12 owner = "phrase"; 13 repo = "phrase-cli"; 14 rev = version; 15 + sha256 = "sha256-dLdgJdR2faxpfHmYhhzn7nQxTrXDhF6XqOIKFLXDEj4="; 16 }; 17 18 + vendorHash = "sha256-zVIxBZ2zTXk407piA4dXxKfyD7Ke8RIq7lYogr/+rcs="; 19 20 ldflags = [ "-X=github.com/phrase/phrase-cli/cmd.PHRASE_CLIENT_VERSION=${version}" ]; 21
+2 -2
pkgs/by-name/po/podman-desktop/package.nix
··· 27 passthru.updateScript = _experimental-update-script-combinators.sequence [ 28 (nix-update-script { }) 29 (lib.getExe (writeShellApplication { 30 - name = "${finalAttrs.pname}-dependencies-updater"; 31 runtimeInputs = [ 32 nix 33 jq 34 gnugrep 35 ]; 36 runtimeEnv = { 37 - PNAME = finalAttrs.pname; 38 PKG_FILE = builtins.toString ./package.nix; 39 }; 40 text = ''
··· 27 passthru.updateScript = _experimental-update-script-combinators.sequence [ 28 (nix-update-script { }) 29 (lib.getExe (writeShellApplication { 30 + name = "podman-desktop-dependencies-updater"; 31 runtimeInputs = [ 32 nix 33 jq 34 gnugrep 35 ]; 36 runtimeEnv = { 37 + PNAME = "podman-desktop"; 38 PKG_FILE = builtins.toString ./package.nix; 39 }; 40 text = ''
+7 -4
pkgs/by-name/pr/prelink/package.nix
··· 5 autoreconfHook, 6 libelf, 7 libiberty, 8 }: 9 10 stdenv.mkDerivation { 11 pname = "prelink"; 12 - version = "unstable-2019-06-24"; 13 14 src = fetchgit { 15 - url = "https://git.yoctoproject.org/git/prelink-cross"; 16 branchName = "cross_prelink"; 17 - rev = "f9975537dbfd9ade0fc813bd5cf5fcbe41753a37"; 18 - sha256 = "sha256-O9/oZooLRyUBBZX3SFcB6LFMmi2vQqkUlqtZnrq5oZc="; 19 }; 20 21 strictDeps = true; ··· 39 doCheck = false; 40 41 enableParallelBuilding = true; 42 43 meta = with lib; { 44 description = "ELF prelinking utility to speed up dynamic linking";
··· 5 autoreconfHook, 6 libelf, 7 libiberty, 8 + unstableGitUpdater, 9 }: 10 11 stdenv.mkDerivation { 12 pname = "prelink"; 13 + version = "20151030-unstable-2024-07-02"; 14 15 src = fetchgit { 16 + url = "https://git.yoctoproject.org/prelink-cross"; 17 branchName = "cross_prelink"; 18 + rev = "ff2561c02ade96c5d4d56ddd4e27ff064840a176"; 19 + sha256 = "sha256-wmX7ybrZDWEop9fiInZMvgK/fpEk3sq+Wu8DSWWIvQY="; 20 }; 21 22 strictDeps = true; ··· 40 doCheck = false; 41 42 enableParallelBuilding = true; 43 + 44 + passthru.updateScript = unstableGitUpdater { }; 45 46 meta = with lib; { 47 description = "ELF prelinking utility to speed up dynamic linking";
+3 -3
pkgs/by-name/pr/protoc-gen-es/package.nix
··· 7 8 buildNpmPackage rec { 9 pname = "protoc-gen-es"; 10 - version = "2.5.0"; 11 12 src = fetchFromGitHub { 13 owner = "bufbuild"; 14 repo = "protobuf-es"; 15 tag = "v${version}"; 16 - hash = "sha256-wllLeX7veCbpb/mTAIs0cf/hcVItEmw2HW/UR4k0Epc="; 17 18 postFetch = '' 19 ${lib.getExe npm-lockfile-fix} $out/package-lock.json 20 ''; 21 }; 22 23 - npmDepsHash = "sha256-PGieFyPgb2ERTdQc3HH5mg/uh5xj7nkUa0qwmgxofVY="; 24 25 npmWorkspace = "packages/protoc-gen-es"; 26
··· 7 8 buildNpmPackage rec { 9 pname = "protoc-gen-es"; 10 + version = "2.5.1"; 11 12 src = fetchFromGitHub { 13 owner = "bufbuild"; 14 repo = "protobuf-es"; 15 tag = "v${version}"; 16 + hash = "sha256-afCfRi9YSQS8BoYrDR66FBW7sbfYvSxVSpxYM8F6CRw="; 17 18 postFetch = '' 19 ${lib.getExe npm-lockfile-fix} $out/package-lock.json 20 ''; 21 }; 22 23 + npmDepsHash = "sha256-DDFMQqWoixZZ9u8MLOEaKiPAOB3pEGnsF7el8AIOPrc="; 24 25 npmWorkspace = "packages/protoc-gen-es"; 26
+3 -3
pkgs/by-name/pr/protolint/package.nix
··· 5 }: 6 buildGoModule rec { 7 pname = "protolint"; 8 - version = "0.55.5"; 9 10 src = fetchFromGitHub { 11 owner = "yoheimuta"; 12 repo = "protolint"; 13 rev = "v${version}"; 14 - hash = "sha256-uim4M1C51VVCOhcE/dyCLzx/Bks0h50+haw5mbAfiN8="; 15 }; 16 17 - vendorHash = "sha256-Zt1HbmdUpQmmK+404tfSs6qfZxZEqHIgQBoN63Els3M="; 18 19 # Something about the way we run tests causes issues. It doesn't happen 20 # when using "go test" directly:
··· 5 }: 6 buildGoModule rec { 7 pname = "protolint"; 8 + version = "0.55.6"; 9 10 src = fetchFromGitHub { 11 owner = "yoheimuta"; 12 repo = "protolint"; 13 rev = "v${version}"; 14 + hash = "sha256-RTej9zVQz6GESAoAAChidiolGEoHabUYlEZSV2gc8KQ="; 15 }; 16 17 + vendorHash = "sha256-RS0t7n6pLYVKHluQtXsMjYL1SvN7IZFdKmkxOI8wFoE="; 18 19 # Something about the way we run tests causes issues. It doesn't happen 20 # when using "go test" directly:
+3 -3
pkgs/by-name/pr/protols/package.nix
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "protols"; 9 - version = "0.12.0"; 10 11 src = fetchFromGitHub { 12 owner = "coder3101"; 13 repo = "protols"; 14 tag = version; 15 - hash = "sha256-v4ROQVoJmrukHFrxykr6EuBFXRuaBnPZ7f36ly7rPhg="; 16 }; 17 18 useFetchCargoVendor = true; 19 - cargoHash = "sha256-fmsPkXwu8qy+SRyP5w940gqNmXg0V/p/vDSI7EIFrh0="; 20 21 meta = { 22 description = "Protocol Buffers language server written in Rust";
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "protols"; 9 + version = "0.12.5"; 10 11 src = fetchFromGitHub { 12 owner = "coder3101"; 13 repo = "protols"; 14 tag = version; 15 + hash = "sha256-zs78TKZU35UGAmEXK3EA9B6zRCqeCtNexHVAJERKyX8="; 16 }; 17 18 useFetchCargoVendor = true; 19 + cargoHash = "sha256-Lh6KJ5zclT650tPIpMJBALLj4gnis+fglhewiZ5mpMs="; 20 21 meta = { 22 description = "Protocol Buffers language server written in Rust";
+1 -1
pkgs/by-name/py/pykickstart/package.nix
··· 37 meta = { 38 description = "Python package to interact with Kickstart files commonly found in the RPM world"; 39 homepage = "https://github.com/pykickstart/pykickstart"; 40 - changelog = "https://github.com/pykickstart/pykickstart/releases/tag/r${src.tag}"; 41 license = lib.licenses.gpl2Only; 42 maintainers = with lib.maintainers; [ 43 thefossguy
··· 37 meta = { 38 description = "Python package to interact with Kickstart files commonly found in the RPM world"; 39 homepage = "https://github.com/pykickstart/pykickstart"; 40 + changelog = "https://github.com/pykickstart/pykickstart/releases/tag/${src.tag}"; 41 license = lib.licenses.gpl2Only; 42 maintainers = with lib.maintainers; [ 43 thefossguy
+2 -2
pkgs/by-name/qm/qmk/package.nix
··· 15 16 python3.pkgs.buildPythonApplication rec { 17 pname = "qmk"; 18 - version = "1.1.7"; 19 format = "pyproject"; 20 21 src = fetchPypi { 22 inherit pname version; 23 - hash = "sha256-4Qhzsa5GAAeSgt7FZsRWIVO1ZB+010WtBv9SV38Xgto="; 24 }; 25 26 nativeBuildInputs = with python3.pkgs; [
··· 15 16 python3.pkgs.buildPythonApplication rec { 17 pname = "qmk"; 18 + version = "1.1.8"; 19 format = "pyproject"; 20 21 src = fetchPypi { 22 inherit pname version; 23 + hash = "sha256-C0Jra/IK61tngGsuEnMD4mySRc/iZVgdYEbMXtwpBZ0="; 24 }; 25 26 nativeBuildInputs = with python3.pkgs; [
+3 -3
pkgs/by-name/re/renode-dts2repl/package.nix
··· 7 8 python3.pkgs.buildPythonApplication { 9 pname = "renode-dts2repl"; 10 - version = "0-unstable-2025-05-20"; 11 pyproject = true; 12 13 src = fetchFromGitHub { 14 owner = "antmicro"; 15 repo = "dts2repl"; 16 - rev = "be40a3764a727a7a22eebb481b1fd3e0f70fca8c"; 17 - hash = "sha256-r+7J7AgWpBZuGpPU7EBn0KxM5ksHC6aED4oLe4oZzfQ="; 18 }; 19 20 nativeBuildInputs = [
··· 7 8 python3.pkgs.buildPythonApplication { 9 pname = "renode-dts2repl"; 10 + version = "0-unstable-2025-05-28"; 11 pyproject = true; 12 13 src = fetchFromGitHub { 14 owner = "antmicro"; 15 repo = "dts2repl"; 16 + rev = "8413c5a08ed53867493b2a08fd4c730d7b419ee7"; 17 + hash = "sha256-Dl/JzkUP/mNBxz20C4qH5B3qpXjd4/q/r5n0RO3ga+U="; 18 }; 19 20 nativeBuildInputs = [
+2 -2
pkgs/by-name/sl/slirp4netns/package.nix
··· 13 14 stdenv.mkDerivation rec { 15 pname = "slirp4netns"; 16 - version = "1.3.2"; 17 18 src = fetchFromGitHub { 19 owner = "rootless-containers"; 20 repo = "slirp4netns"; 21 rev = "v${version}"; 22 - sha256 = "sha256-1OiomraQ4wfrBPihGrf9sq8hPJUB45gvf7Y5j7iN8/E="; 23 }; 24 25 nativeBuildInputs = [
··· 13 14 stdenv.mkDerivation rec { 15 pname = "slirp4netns"; 16 + version = "1.3.3"; 17 18 src = fetchFromGitHub { 19 owner = "rootless-containers"; 20 repo = "slirp4netns"; 21 rev = "v${version}"; 22 + sha256 = "sha256-dPhUr9GdujTpUsnfvZDp8eOBQwlzqwtwziII2QWD4JA="; 23 }; 24 25 nativeBuildInputs = [
+2 -2
pkgs/by-name/sn/snipaste/package.nix
··· 5 }: 6 let 7 pname = "snipaste"; 8 - version = "2.10.6"; 9 src = fetchurl { 10 url = "https://download.snipaste.com/archives/Snipaste-${version}-x86_64.AppImage"; 11 - hash = "sha256-lkP3YN4ZNbtM2beQEIWPxBE6JXToRBW48QAMLw/TBzQ="; 12 }; 13 contents = appimageTools.extract { inherit pname version src; }; 14 in
··· 5 }: 6 let 7 pname = "snipaste"; 8 + version = "2.10.7"; 9 src = fetchurl { 10 url = "https://download.snipaste.com/archives/Snipaste-${version}-x86_64.AppImage"; 11 + hash = "sha256-WzCSI0BfjolbWbj/mLhRj75tW/CvlbzQtFuBizg8xl4="; 12 }; 13 contents = appimageTools.extract { inherit pname version src; }; 14 in
+2 -2
pkgs/by-name/sn/snort/package.nix
··· 19 20 stdenv.mkDerivation (finalAttrs: { 21 pname = "snort"; 22 - version = "3.7.4.0"; 23 24 src = fetchFromGitHub { 25 owner = "snort3"; 26 repo = "snort3"; 27 tag = finalAttrs.version; 28 - hash = "sha256-c5GVFzZOeaI2te49m9crt9I0E/awHjcDR621tvDVgSQ="; 29 }; 30 31 nativeBuildInputs = [
··· 19 20 stdenv.mkDerivation (finalAttrs: { 21 pname = "snort"; 22 + version = "3.8.1.0"; 23 24 src = fetchFromGitHub { 25 owner = "snort3"; 26 repo = "snort3"; 27 tag = finalAttrs.version; 28 + hash = "sha256-+59e6rLMvLQ+LNxwRRG6nLXqjMsbn3bdykfMpwPgSpA="; 29 }; 30 31 nativeBuildInputs = [
+2 -50
pkgs/by-name/sr/srb2/cmake.patch
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index 80a3bdcd6..380a1573a 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 - @@ -61,7 +61,7 @@ option( 6 - "Link dependencies using CMake's find_package and do not use internal builds" 7 - ${SRB2_CONFIG_SYSTEM_LIBRARIES_DEFAULT} 8 - ) 9 - -option(SRB2_CONFIG_ENABLE_TESTS "Build the test suite" ON) 10 - +option(SRB2_CONFIG_ENABLE_TESTS "Build the test suite" OFF) 11 - # This option isn't recommended for distribution builds and probably won't work (yet). 12 - cmake_dependent_option( 13 - SRB2_CONFIG_SHARED_INTERNAL_LIBRARIES 14 - @@ -80,25 +80,6 @@ option(SRB2_CONFIG_ZDEBUG "Compile with ZDEBUG defined." OFF) 15 - option(SRB2_CONFIG_PROFILEMODE "Compile for profiling (GCC only)." OFF) 16 - set(SRB2_CONFIG_ASSET_DIRECTORY "" CACHE PATH "Path to directory that contains all asset files for the installer. If set, assets will be part of installation and cpack.") 17 - 18 - -if(SRB2_CONFIG_ENABLE_TESTS) 19 - - # https://github.com/catchorg/Catch2 20 - - CPMAddPackage( 21 - - NAME Catch2 22 - - VERSION 3.4.0 23 - - GITHUB_REPOSITORY catchorg/Catch2 24 - - OPTIONS 25 - - "CATCH_INSTALL_DOCS OFF" 26 - - ) 27 - - list(APPEND CMAKE_MODULE_PATH "${Catch2_SOURCE_DIR}/extras") 28 - - include(CTest) 29 - - include(Catch) 30 - - add_executable(srb2tests) 31 - - # To add tests, use target_sources to add individual test files to the target in subdirs. 32 - - target_link_libraries(srb2tests PRIVATE Catch2::Catch2 Catch2::Catch2WithMain) 33 - - target_compile_features(srb2tests PRIVATE c_std_11 cxx_std_17) 34 - - catch_discover_tests(srb2tests) 35 - -endif() 36 - - 37 - # Enable CCache 38 - # (Set USE_CCACHE=ON to use, CCACHE_OPTIONS for options) 39 - if("${CMAKE_HOST_SYSTEM_NAME}" STREQUAL Windows) 40 - @@ -113,12 +94,6 @@ if("${CMAKE_HOST_SYSTEM_NAME}" STREQUAL Windows) 41 - message(WARNING "USE_CCACHE was set but ccache is not found (set CCACHE_TOOL_PATH)") 42 - endif() 43 - endif() 44 - -else() 45 - - CPMAddPackage( 46 - - NAME Ccache.cmake 47 - - GITHUB_REPOSITORY TheLartians/Ccache.cmake 48 - - VERSION 1.2 49 - - ) 50 - endif() 51 - 52 - # Dependencies 53 - @@ -179,7 +154,7 @@ include(GitUtilities) 54 if("${SRB2_SDL2_EXE_NAME}" STREQUAL "") 55 # cause a reconfigure if the branch changes 56 get_git_dir(SRB2_GIT_DIR)
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 + index a4c631102..13b5743ca 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 + @@ -141,7 +141,7 @@ include(GitUtilities) 6 if("${SRB2_SDL2_EXE_NAME}" STREQUAL "") 7 # cause a reconfigure if the branch changes 8 get_git_dir(SRB2_GIT_DIR)
+5 -12
pkgs/by-name/sr/srb2/package.nix
··· 7 curl, 8 nasm, 9 libopenmpt, 10 game-music-emu, 11 - libGLU, 12 libpng, 13 SDL2, 14 SDL2_mixer, ··· 20 21 stdenv.mkDerivation (finalAttrs: { 22 pname = "srb2"; 23 - version = "2.2.13"; 24 25 src = fetchFromGitHub { 26 owner = "STJr"; 27 repo = "SRB2"; 28 rev = "SRB2_release_${finalAttrs.version}"; 29 - hash = "sha256-OSkkjCz7ZW5+0vh6l7+TpnHLzXmd/5QvTidRQSHJYX8="; 30 }; 31 32 nativeBuildInputs = [ ··· 41 game-music-emu 42 libpng 43 libopenmpt 44 SDL2 45 SDL2_mixer 46 zlib ··· 53 src = fetchgit { 54 url = "https://git.do.srb2.org/STJr/srb2assets-public"; 55 rev = "SRB2_release_${finalAttrs.version}"; 56 - hash = "sha256-OXvO5ZlujIYmYevc62Dtx192dxoujQMNFUCrH5quBBg="; 57 fetchLFS = true; 58 }; 59 ··· 76 ]; 77 78 patches = [ 79 - # Make the build work without internet connectivity 80 - # See: https://build.opensuse.org/request/show/1109889 81 ./cmake.patch 82 - ./thirdparty.patch 83 ]; 84 - 85 - postPatch = '' 86 - substituteInPlace ./src/sdl/ogl_sdl.c \ 87 - --replace libGLU.so.1 ${libGLU}/lib/libGLU.so.1 88 - ''; 89 90 desktopItems = [ 91 (makeDesktopItem rec {
··· 7 curl, 8 nasm, 9 libopenmpt, 10 + miniupnpc, 11 game-music-emu, 12 libpng, 13 SDL2, 14 SDL2_mixer, ··· 20 21 stdenv.mkDerivation (finalAttrs: { 22 pname = "srb2"; 23 + version = "2.2.15"; 24 25 src = fetchFromGitHub { 26 owner = "STJr"; 27 repo = "SRB2"; 28 rev = "SRB2_release_${finalAttrs.version}"; 29 + hash = "sha256-eJ0GYe3Rw6qQXj+jtyt8MkP87DaCiO9ffChg+SpQqaI="; 30 }; 31 32 nativeBuildInputs = [ ··· 41 game-music-emu 42 libpng 43 libopenmpt 44 + miniupnpc 45 SDL2 46 SDL2_mixer 47 zlib ··· 54 src = fetchgit { 55 url = "https://git.do.srb2.org/STJr/srb2assets-public"; 56 rev = "SRB2_release_${finalAttrs.version}"; 57 + hash = "sha256-1kwhWHzL2TbSx1rhFExbMhXqn0HMBRhR6LZiuoRx+iI="; 58 fetchLFS = true; 59 }; 60 ··· 77 ]; 78 79 patches = [ 80 ./cmake.patch 81 ]; 82 83 desktopItems = [ 84 (makeDesktopItem rec {
-12
pkgs/by-name/sr/srb2/thirdparty.patch
··· 1 - diff --git a/thirdparty/CMakeLists.txt b/thirdparty/CMakeLists.txt 2 - index f33b3bf3f..1214f179c 100644 3 - --- a/thirdparty/CMakeLists.txt 4 - +++ b/thirdparty/CMakeLists.txt 5 - @@ -16,6 +16,5 @@ if(NOT "${SRB2_CONFIG_SYSTEM_LIBRARIES}") 6 - include("cpm-png.cmake") 7 - include("cpm-curl.cmake") 8 - include("cpm-openmpt.cmake") 9 - + include("cpm-libgme.cmake") 10 - endif() 11 - - 12 - -include("cpm-libgme.cmake")
···
+1 -2
pkgs/by-name/su/surrealist/package.nix
··· 60 }; 61 62 cargoDeps = rustPlatform.fetchCargoVendor { 63 - inherit (finalAttrs) src; 64 - sourceRoot = "${finalAttrs.src.name}/${finalAttrs.cargoRoot}"; 65 hash = "sha256-Su9ZOPIskV5poeS8pgtri+sZANBpdgnuCsQqE4WKFdA="; 66 }; 67
··· 60 }; 61 62 cargoDeps = rustPlatform.fetchCargoVendor { 63 + inherit (finalAttrs) src cargoRoot; 64 hash = "sha256-Su9ZOPIskV5poeS8pgtri+sZANBpdgnuCsQqE4WKFdA="; 65 }; 66
+3 -3
pkgs/by-name/sy/synapse-admin-etkecc/package.nix
··· 17 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "synapse-admin-etkecc"; 20 - version = "0.11.0-etke42"; 21 22 src = fetchFromGitHub { 23 owner = "etkecc"; 24 repo = "synapse-admin"; 25 tag = "v${finalAttrs.version}"; 26 - hash = "sha256-HWhyG/dVP9M84OOYH95RPLqiXDYOs+QOxwLM8pPl1vA="; 27 }; 28 29 yarnOfflineCache = fetchYarnDeps { 30 yarnLock = finalAttrs.src + "/yarn.lock"; 31 - hash = "sha256-GO5m+7fcm/XO38XlsQq6fwKslzdZkE6WleP3GHNKuPU="; 32 }; 33 34 nativeBuildInputs = [
··· 17 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "synapse-admin-etkecc"; 20 + version = "0.11.1-etke43"; 21 22 src = fetchFromGitHub { 23 owner = "etkecc"; 24 repo = "synapse-admin"; 25 tag = "v${finalAttrs.version}"; 26 + hash = "sha256-mubONaT4qnbPlnYY15UtHGEp45k5mIxWt1shHRdwwTA="; 27 }; 28 29 yarnOfflineCache = fetchYarnDeps { 30 yarnLock = finalAttrs.src + "/yarn.lock"; 31 + hash = "sha256-WFE2mtyK3xBOVIgJ0ODsv1C0pjpGdBM3+TtIiZUpj58="; 32 }; 33 34 nativeBuildInputs = [
+3 -3
pkgs/by-name/te/terramate/package.nix
··· 7 8 buildGoModule rec { 9 pname = "terramate"; 10 - version = "0.13.1"; 11 12 src = fetchFromGitHub { 13 owner = "terramate-io"; 14 repo = "terramate"; 15 rev = "v${version}"; 16 - hash = "sha256-lIYtNvluKRufV0bXi2z2/8F7221Sum20usA0j0pHU7I="; 17 }; 18 19 - vendorHash = "sha256-84xlUXCJhsZjNxdWQ/Tr/WA4/+gP8NlqQQHnA8R8nz8="; 20 21 # required for version info 22 nativeBuildInputs = [ git ];
··· 7 8 buildGoModule rec { 9 pname = "terramate"; 10 + version = "0.13.2"; 11 12 src = fetchFromGitHub { 13 owner = "terramate-io"; 14 repo = "terramate"; 15 rev = "v${version}"; 16 + hash = "sha256-NN7M4ZJ67YwguDzSHkluW1wbwVbn+7otMQm+ot2el5I="; 17 }; 18 19 + vendorHash = "sha256-Ldl4TGmfMLk9DJgoVUYCpjX5TyAwZyCSrOKdb6uo4eM="; 20 21 # required for version info 22 nativeBuildInputs = [ git ];
+4 -4
pkgs/by-name/ti/tigerbeetle/package.nix
··· 10 platform = 11 if stdenvNoCC.hostPlatform.isDarwin then "universal-macos" else stdenvNoCC.hostPlatform.system; 12 hash = builtins.getAttr platform { 13 - "universal-macos" = "sha256-RSP9nJ2dmLGci4v2iPRzE//QzAY1m7ZdzCkN43k3w8A="; 14 - "x86_64-linux" = "sha256-Xy3kGShqaTbuf9BLx4fUahZrrby2r04+nmuHwDxENMo="; 15 - "aarch64-linux" = "sha256-98BAH7yb6I1kG7j/zJyoFEwS1jBjF3oEM/YKk32bbZY="; 16 }; 17 in 18 stdenvNoCC.mkDerivation (finalAttrs: { 19 pname = "tigerbeetle"; 20 - version = "0.16.41"; 21 22 src = fetchzip { 23 url = "https://github.com/tigerbeetle/tigerbeetle/releases/download/${finalAttrs.version}/tigerbeetle-${platform}.zip";
··· 10 platform = 11 if stdenvNoCC.hostPlatform.isDarwin then "universal-macos" else stdenvNoCC.hostPlatform.system; 12 hash = builtins.getAttr platform { 13 + "universal-macos" = "sha256-1U24bdd4tvkzZmsRrrc4AUwxm9IhxHNAcPtxxX5ZO2w="; 14 + "x86_64-linux" = "sha256-DCEqAePHkNj0bfgW5l83DyZG5+bre6C6C7AMbhxwytQ="; 15 + "aarch64-linux" = "sha256-jKpt7hqCbgcBv9npR7IhryaCgrdOlX40Icq9T10/Af0="; 16 }; 17 in 18 stdenvNoCC.mkDerivation (finalAttrs: { 19 pname = "tigerbeetle"; 20 + version = "0.16.42"; 21 22 src = fetchzip { 23 url = "https://github.com/tigerbeetle/tigerbeetle/releases/download/${finalAttrs.version}/tigerbeetle-${platform}.zip";
+3 -3
pkgs/by-name/tr/treesheets/package.nix
··· 12 13 stdenv.mkDerivation rec { 14 pname = "treesheets"; 15 - version = "0-unstable-2025-05-19"; 16 17 src = fetchFromGitHub { 18 owner = "aardappel"; 19 repo = "treesheets"; 20 - rev = "a64445212a224b48c3daf054433a7ff68906670a"; 21 - hash = "sha256-o2En1E6MaYZcQLRPl4uU3isM2Q3aiu7mQ88ZJq1vrmo="; 22 }; 23 24 nativeBuildInputs = [
··· 12 13 stdenv.mkDerivation rec { 14 pname = "treesheets"; 15 + version = "0-unstable-2025-06-02"; 16 17 src = fetchFromGitHub { 18 owner = "aardappel"; 19 repo = "treesheets"; 20 + rev = "1e6604b6257b41ba518907bfa21c24fa8245c46f"; 21 + hash = "sha256-zSZ7tMjG5/kSzHifMSA7Wsypv0/x+Oir6jx0I5Fyk2c="; 22 }; 23 24 nativeBuildInputs = [
+3 -3
pkgs/by-name/ty/ty/package.nix
··· 14 15 rustPlatform.buildRustPackage (finalAttrs: { 16 pname = "ty"; 17 - version = "0.0.1-alpha.7"; 18 19 src = fetchFromGitHub { 20 owner = "astral-sh"; 21 repo = "ty"; 22 tag = finalAttrs.version; 23 fetchSubmodules = true; 24 - hash = "sha256-aonCRtXi9MZWhZO3SjMxAxsTm8iZZdrm36psGArFz/I="; 25 }; 26 27 # For Darwin platforms, remove the integration test for file notifications, ··· 35 36 cargoBuildFlags = [ "--package=ty" ]; 37 38 - cargoHash = "sha256-pYv99huRgqcFcnkMkfFoejmZmVkb9q/VVlYfylPXo4o="; 39 40 nativeBuildInputs = [ installShellFiles ]; 41
··· 14 15 rustPlatform.buildRustPackage (finalAttrs: { 16 pname = "ty"; 17 + version = "0.0.1-alpha.8"; 18 19 src = fetchFromGitHub { 20 owner = "astral-sh"; 21 repo = "ty"; 22 tag = finalAttrs.version; 23 fetchSubmodules = true; 24 + hash = "sha256-w/UEENP9tqwqFX/oCvI67DDMSmXzlCazAIP2wfmdDSs="; 25 }; 26 27 # For Darwin platforms, remove the integration test for file notifications, ··· 35 36 cargoBuildFlags = [ "--package=ty" ]; 37 38 + cargoHash = "sha256-XISRy7Ncy0lTlsCFYmJBcgGiDJfdygTDF4f9O9ZlzDU="; 39 40 nativeBuildInputs = [ installShellFiles ]; 41
+3 -3
pkgs/by-name/wa/waagent/package.nix
··· 15 in 16 python.pkgs.buildPythonApplication rec { 17 pname = "waagent"; 18 - version = "2.13.1.1"; 19 src = fetchFromGitHub { 20 owner = "Azure"; 21 repo = "WALinuxAgent"; 22 - tag = "v${version}"; 23 - hash = "sha256-W2NXxQOxRhJD/D/w58xknA9X8YYnQxwIhhjXzlCVVWA="; 24 }; 25 patches = [ 26 # Suppress the following error when waagent tries to configure sshd:
··· 15 in 16 python.pkgs.buildPythonApplication rec { 17 pname = "waagent"; 18 + version = "2.14.0.0"; 19 src = fetchFromGitHub { 20 owner = "Azure"; 21 repo = "WALinuxAgent"; 22 + tag = "pre-v${version}"; 23 + hash = "sha256-nJZXyqdsSQgW+nGqyTS9XSW4z5mGRHtCYsDHKDw/eiM="; 24 }; 25 patches = [ 26 # Suppress the following error when waagent tries to configure sshd:
+6 -2
pkgs/by-name/we/wealthfolio/package.nix
··· 36 buildAndTestSubdir = finalAttrs.cargoRoot; 37 38 cargoDeps = rustPlatform.fetchCargoVendor { 39 - inherit (finalAttrs) pname version src; 40 - sourceRoot = "${finalAttrs.src.name}/${finalAttrs.cargoRoot}"; 41 hash = "sha256-MmdvEutdkX98DgX1aVuxs4gabuMX5aM8yC4eqgvd8Q4="; 42 }; 43
··· 36 buildAndTestSubdir = finalAttrs.cargoRoot; 37 38 cargoDeps = rustPlatform.fetchCargoVendor { 39 + inherit (finalAttrs) 40 + pname 41 + version 42 + src 43 + cargoRoot 44 + ; 45 hash = "sha256-MmdvEutdkX98DgX1aVuxs4gabuMX5aM8yC4eqgvd8Q4="; 46 }; 47
+3 -3
pkgs/by-name/we/web-ext/package.nix
··· 8 9 buildNpmPackage rec { 10 pname = "web-ext"; 11 - version = "8.7.0"; 12 13 src = fetchFromGitHub { 14 owner = "mozilla"; 15 repo = "web-ext"; 16 rev = version; 17 - hash = "sha256-k/S9YBU7D7FoXLK9aufBQfD4ZjCdlhGeDBnvfOk5H6Y="; 18 }; 19 20 - npmDepsHash = "sha256-sykNWATICiPz3naZyzl6+b0g0v0D1AsfGYT5bahTlBI="; 21 22 npmBuildFlags = [ "--production" ]; 23
··· 8 9 buildNpmPackage rec { 10 pname = "web-ext"; 11 + version = "8.7.1"; 12 13 src = fetchFromGitHub { 14 owner = "mozilla"; 15 repo = "web-ext"; 16 rev = version; 17 + hash = "sha256-B0wlGOg4ZfFRBVrHdERHMv3BPKfLX28YYtdyDphQTcE="; 18 }; 19 20 + npmDepsHash = "sha256-J7uDivhLjdMVQyuejcrCL7m7EsAs/DeeKD7r1Cv81qQ="; 21 22 npmBuildFlags = [ "--production" ]; 23
+1 -1
pkgs/by-name/wi/windowmaker/package.nix
··· 83 license = lib.licenses.gpl2Plus; 84 mainProgram = "wmaker"; 85 maintainers = [ ]; 86 - platforms = lib.platforms.linux; 87 }; 88 })
··· 83 license = lib.licenses.gpl2Plus; 84 mainProgram = "wmaker"; 85 maintainers = [ ]; 86 + platforms = lib.platforms.unix; 87 }; 88 })
+2 -2
pkgs/by-name/ya/yandex-music/package.nix
··· 29 assert lib.assertMsg (vibeAnimationMaxFps >= 0) "Vibe animation max FPS must be greater then 0"; 30 stdenvNoCC.mkDerivation rec { 31 pname = "yandex-music"; 32 - version = "5.51.1"; 33 34 src = fetchFromGitHub { 35 owner = "cucumber-sp"; 36 repo = "yandex-music-linux"; 37 rev = "v${version}"; 38 - hash = "sha256-jk/u0a6rnLDANHebtJ9yTAeFSIPg/CEIqm0oZnGdD0k="; 39 }; 40 41 nativeBuildInputs = [
··· 29 assert lib.assertMsg (vibeAnimationMaxFps >= 0) "Vibe animation max FPS must be greater then 0"; 30 stdenvNoCC.mkDerivation rec { 31 pname = "yandex-music"; 32 + version = "5.52.0"; 33 34 src = fetchFromGitHub { 35 owner = "cucumber-sp"; 36 repo = "yandex-music-linux"; 37 rev = "v${version}"; 38 + hash = "sha256-39aVY2D8fM243Uhr4i3d9OdBKRqb4MNnkSjKOH3tF4s="; 39 }; 40 41 nativeBuildInputs = [
+4 -4
pkgs/by-name/ya/yandex-music/ym_info.json
··· 1 { 2 - "version": "5.51.1", 3 - "exe_name": "Yandex_Music_x64_5.51.1.exe", 4 - "exe_link": "https://music-desktop-application.s3.yandex.net/stable/Yandex_Music_x64_5.51.1.exe", 5 - "exe_hash": "sha256-iu7DqcFs9/4aw46eIgWKIYyZ6fIzoW6XkiqdpERup/M=" 6 }
··· 1 { 2 + "version": "5.52.0", 3 + "exe_name": "Yandex_Music_x64_5.53.1.exe", 4 + "exe_link": "https://music-desktop-application.s3.yandex.net/stable/Yandex_Music_x64_5.53.1.exe", 5 + "exe_hash": "sha256-aTl3sF8n0v17TeAyQwjrXUDKK/MaCtoHQ34IHDEeme8=" 6 }
+3 -3
pkgs/by-name/ya/yazi/plugins/bypass/default.nix
··· 5 }: 6 mkYaziPlugin { 7 pname = "bypass.yazi"; 8 - version = "25.3.2-unstable-2025-05-30"; 9 10 src = fetchFromGitHub { 11 owner = "Rolv-Apneseth"; 12 repo = "bypass.yazi"; 13 - rev = "381fb89a21a58605c555c109f190309b2d116d30"; 14 - hash = "sha256-04cyOlG843Ot+jRT8GNFjJOzV4YdPBpI9XqbaK6KXu0="; 15 }; 16 17 meta = {
··· 5 }: 6 mkYaziPlugin { 7 pname = "bypass.yazi"; 8 + version = "25.3.2-unstable-2025-06-01"; 9 10 src = fetchFromGitHub { 11 owner = "Rolv-Apneseth"; 12 repo = "bypass.yazi"; 13 + rev = "c1e5fcf6eeed0bfceb57b9738da6db9d0fb8af56"; 14 + hash = "sha256-ZndDtTMkEwuIMXG4SGe4B95Nw4fChfFhxJHj+IY30Kc="; 15 }; 16 17 meta = {
+3 -3
pkgs/by-name/ya/yazi/plugins/ouch/default.nix
··· 5 }: 6 mkYaziPlugin { 7 pname = "ouch.yazi"; 8 - version = "0-unstable-2025-04-12"; 9 10 src = fetchFromGitHub { 11 owner = "ndtoan96"; 12 repo = "ouch.yazi"; 13 - rev = "2496cd9ac2d1fb52597b22ae84f3af06c826a86d"; 14 - hash = "sha256-OsNfR7rtnq+ceBTiFjbz+NFMSV/6cQ1THxEFzI4oPJk="; 15 }; 16 17 meta = {
··· 5 }: 6 mkYaziPlugin { 7 pname = "ouch.yazi"; 8 + version = "0-unstable-2025-06-01"; 9 10 src = fetchFromGitHub { 11 owner = "ndtoan96"; 12 repo = "ouch.yazi"; 13 + rev = "10b462765f37502065555e83c68a72bb26870fe2"; 14 + hash = "sha256-mtXl76a54Deg4cyrD0wr++sD/5b/kCsnJ+ngM6OokTc="; 15 }; 16 17 meta = {
+1 -2
pkgs/development/interpreters/ruby/default.nix
··· 216 cargoDeps = 217 if yjitSupport then 218 rustPlatform.fetchCargoVendor { 219 - inherit (finalAttrs) src; 220 - sourceRoot = "${finalAttrs.pname}-${version}/${finalAttrs.cargoRoot}"; 221 hash = 222 assert cargoHash != null; 223 cargoHash;
··· 216 cargoDeps = 217 if yjitSupport then 218 rustPlatform.fetchCargoVendor { 219 + inherit (finalAttrs) src cargoRoot; 220 hash = 221 assert cargoHash != null; 222 cargoHash;
+2 -2
pkgs/development/python-modules/aioairq/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "aioairq"; 15 - version = "0.4.4"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.9"; ··· 21 owner = "CorantGmbH"; 22 repo = "aioairq"; 23 tag = "v${version}"; 24 - hash = "sha256-RwkqhPAKbNZ/RrVxJchtqGDpbmS9eusv1X/B3NseAFk="; 25 }; 26 27 build-system = [ setuptools ];
··· 12 13 buildPythonPackage rec { 14 pname = "aioairq"; 15 + version = "0.4.6"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.9"; ··· 21 owner = "CorantGmbH"; 22 repo = "aioairq"; 23 tag = "v${version}"; 24 + hash = "sha256-XlOVCDWbcdh8VjNxlEcVNttRN3mw19AXlIIQJ1II144="; 25 }; 26 27 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/aiohomekit/default.nix
··· 21 22 buildPythonPackage rec { 23 pname = "aiohomekit"; 24 - version = "3.2.14"; 25 pyproject = true; 26 27 disabled = pythonOlder "3.10"; ··· 30 owner = "Jc2k"; 31 repo = "aiohomekit"; 32 tag = version; 33 - hash = "sha256-TP5YW4pIWO0xHV1EY5hDa80MrBOvkZLyQTNP7m0x+AU="; 34 }; 35 36 build-system = [ poetry-core ];
··· 21 22 buildPythonPackage rec { 23 pname = "aiohomekit"; 24 + version = "3.2.15"; 25 pyproject = true; 26 27 disabled = pythonOlder "3.10"; ··· 30 owner = "Jc2k"; 31 repo = "aiohomekit"; 32 tag = version; 33 + hash = "sha256-UAFiYTAz5TZVviwoCFzeSGi9acVytQU9hgVVVVecOBU="; 34 }; 35 36 build-system = [ poetry-core ];
+6 -2
pkgs/development/python-modules/bcrypt/default.nix
··· 33 34 cargoRoot = "src/_bcrypt"; 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 - inherit pname version src; 37 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 38 hash = "sha256-HgHvfMBspPsSYhllnKBg5XZB6zxFIqJj+4//xKG8HwA="; 39 }; 40
··· 33 34 cargoRoot = "src/_bcrypt"; 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 + inherit 37 + pname 38 + version 39 + src 40 + cargoRoot 41 + ; 42 hash = "sha256-HgHvfMBspPsSYhllnKBg5XZB6zxFIqJj+4//xKG8HwA="; 43 }; 44
+2 -1
pkgs/development/python-modules/biliass/default.nix
··· 28 pname 29 version 30 src 31 ; 32 - sourceRoot = "${sourceRoot}/${cargoRoot}"; 33 hash = "sha256-tkHl6z0En+od//fCGJXK/p8Dz5KDOXltHrXhxHmHL6U="; 34 }; 35
··· 28 pname 29 version 30 src 31 + sourceRoot 32 + cargoRoot 33 ; 34 hash = "sha256-tkHl6z0En+od//fCGJXK/p8Dz5KDOXltHrXhxHmHL6U="; 35 }; 36
+2 -2
pkgs/development/python-modules/caldav/default.nix
··· 19 20 buildPythonPackage rec { 21 pname = "caldav"; 22 - version = "1.5.0"; 23 pyproject = true; 24 25 src = fetchFromGitHub { 26 owner = "python-caldav"; 27 repo = "caldav"; 28 tag = "v${version}"; 29 - hash = "sha256-SYjfQG4muuBcnVeu9cl00Zb2fGUhw157LLxA5/N5EJ0="; 30 }; 31 32 build-system = [
··· 19 20 buildPythonPackage rec { 21 pname = "caldav"; 22 + version = "1.6.0"; 23 pyproject = true; 24 25 src = fetchFromGitHub { 26 owner = "python-caldav"; 27 repo = "caldav"; 28 tag = "v${version}"; 29 + hash = "sha256-SWecaXiXp8DSOLVWzgPsbL7UGCtTBfNXYmuDQGdyqbQ="; 30 }; 31 32 build-system = [
+2 -2
pkgs/development/python-modules/command-runner/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "command-runner"; 12 - version = "1.7.3"; 13 pyproject = true; 14 15 disabled = pythonOlder "3.7"; ··· 18 owner = "netinvent"; 19 repo = "command_runner"; 20 tag = "v${version}"; 21 - hash = "sha256-BNjMMs44eDnGmcFXiMydJIU0RpsFOyd2TjH7BOGQP2E="; 22 }; 23 24 build-system = [ setuptools ];
··· 9 10 buildPythonPackage rec { 11 pname = "command-runner"; 12 + version = "1.7.4"; 13 pyproject = true; 14 15 disabled = pythonOlder "3.7"; ··· 18 owner = "netinvent"; 19 repo = "command_runner"; 20 tag = "v${version}"; 21 + hash = "sha256-i5VWoXHCdZtf4tJGgYvBqcMaBSSruCOkIl5ntZoSHio="; 22 }; 23 24 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/curl-cffi/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "curl-cffi"; 15 - version = "0.7.4"; 16 pyproject = true; 17 18 src = fetchFromGitHub { 19 owner = "lexiforest"; 20 repo = "curl_cffi"; 21 tag = "v${version}"; 22 - hash = "sha256-Q1VppzQ1Go+ia1D1BemTf40o9wV0miWyoGy/tY+95qE=="; 23 }; 24 25 patches = [ ./use-system-libs.patch ];
··· 12 13 buildPythonPackage rec { 14 pname = "curl-cffi"; 15 + version = "0.10.0"; 16 pyproject = true; 17 18 src = fetchFromGitHub { 19 owner = "lexiforest"; 20 repo = "curl_cffi"; 21 tag = "v${version}"; 22 + hash = "sha256-h7PPlxjIVT6T9x7gKBSifuWl8wzUNDwRcaUifUS0icM="; 23 }; 24 25 patches = [ ./use-system-libs.patch ];
+2 -2
pkgs/development/python-modules/duckduckgo-search/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "duckduckgo-search"; 16 - version = "8.0.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.8"; ··· 22 owner = "deedy5"; 23 repo = "duckduckgo_search"; 24 tag = "v${version}"; 25 - hash = "sha256-FoGBVHxEXM9Mt0wpy7GctrlqUfhZb8DlK3UhlHld7E0="; 26 }; 27 28 build-system = [ setuptools ];
··· 13 14 buildPythonPackage rec { 15 pname = "duckduckgo-search"; 16 + version = "8.0.2"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.8"; ··· 22 owner = "deedy5"; 23 repo = "duckduckgo_search"; 24 tag = "v${version}"; 25 + hash = "sha256-Hbhrm++F6aVvJ//WAgyLNsJe+KS0cjnQ83I1ba72Ows="; 26 }; 27 28 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/fontparts/default.nix
··· 20 21 buildPythonPackage rec { 22 pname = "fontparts"; 23 - version = "0.12.5"; 24 pyproject = true; 25 26 disabled = pythonOlder "3.7"; 27 28 src = fetchPypi { 29 inherit pname version; 30 - hash = "sha256-cD7ppaYLnKOLyBMlSlF+ham74yid8MBunxgVkyE3I0I="; 31 extension = "zip"; 32 }; 33
··· 20 21 buildPythonPackage rec { 22 pname = "fontparts"; 23 + version = "0.12.7"; 24 pyproject = true; 25 26 disabled = pythonOlder "3.7"; 27 28 src = fetchPypi { 29 inherit pname version; 30 + hash = "sha256-zg8QkiHh4UhhXdTRhDKulB+Q2E6GZyD0fnPIm6fWZGc="; 31 extension = "zip"; 32 }; 33
+2 -2
pkgs/development/python-modules/garth/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "garth"; 16 - version = "0.5.10"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.10"; 20 21 src = fetchPypi { 22 inherit pname version; 23 - hash = "sha256-IGBJNEGD+XgQQJG3sBh6t0CMZH9eRhJIfHE0+4Jx0H0="; 24 }; 25 26 pythonRelaxDeps = [ "requests-oauthlib" ];
··· 13 14 buildPythonPackage rec { 15 pname = "garth"; 16 + version = "0.5.12"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.10"; 20 21 src = fetchPypi { 22 inherit pname version; 23 + hash = "sha256-bzEPHhIg6F/WQOUoXuaVlZGxn9PU8VdevA/DQuQ7fBw="; 24 }; 25 26 pythonRelaxDeps = [ "requests-oauthlib" ];
+2 -2
pkgs/development/python-modules/gflanguages/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "gflanguages"; 17 - version = "0.7.4"; 18 pyproject = true; 19 20 disabled = pythonOlder "3.7"; 21 22 src = fetchPypi { 23 inherit pname version; 24 - hash = "sha256-d/Q5Kh/ApXP0AcNOuATy8GyssLcNUjboQPEj1Q48tuA="; 25 }; 26 27 # Relax the dependency on protobuf 3. Other packages in the Google Fonts
··· 14 15 buildPythonPackage rec { 16 pname = "gflanguages"; 17 + version = "0.7.5"; 18 pyproject = true; 19 20 disabled = pythonOlder "3.7"; 21 22 src = fetchPypi { 23 inherit pname version; 24 + hash = "sha256-jc48DKUp3ai6AxcveyvR7TF80wmVLWfG58W2xR/HIsE="; 25 }; 26 27 # Relax the dependency on protobuf 3. Other packages in the Google Fonts
+3 -3
pkgs/development/python-modules/ghome-foyer-api/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "ghome-foyer-api"; 13 - version = "1.1.1"; 14 pyproject = true; 15 16 src = fetchFromGitHub { 17 owner = "KapJI"; 18 repo = "ghome-foyer-api"; 19 tag = "v${version}"; 20 - hash = "sha256-sup+j9GFGTR+HimpkpvvAqtgYWtJt2qCPZzLvMG8hzI="; 21 }; 22 23 buildInputs = [ ··· 37 meta = { 38 description = "Generated Python protobuf stubs for Google Home internal API"; 39 homepage = "https://github.com/KapJI/ghome-foyer-api"; 40 - changelog = "https://github.com/KapJI/ghome-foyer-api/releases/tag/v${version}"; 41 license = lib.licenses.mit; 42 maintainers = with lib.maintainers; [ 43 hensoko
··· 10 11 buildPythonPackage rec { 12 pname = "ghome-foyer-api"; 13 + version = "1.2.2"; 14 pyproject = true; 15 16 src = fetchFromGitHub { 17 owner = "KapJI"; 18 repo = "ghome-foyer-api"; 19 tag = "v${version}"; 20 + hash = "sha256-Y8TfQ0cvmKyLw0UOoLbkXk2vSj+Qb11fCVfNrC1iYao="; 21 }; 22 23 buildInputs = [ ··· 37 meta = { 38 description = "Generated Python protobuf stubs for Google Home internal API"; 39 homepage = "https://github.com/KapJI/ghome-foyer-api"; 40 + changelog = "https://github.com/KapJI/ghome-foyer-api/releases/tag/${src.tag}"; 41 license = lib.licenses.mit; 42 maintainers = with lib.maintainers; [ 43 hensoko
+19 -10
pkgs/development/python-modules/gphoto2/default.nix
··· 1 { 2 lib, 3 - fetchPypi, 4 buildPythonPackage, 5 pkg-config, 6 libgphoto2, 7 setuptools, 8 toml, 9 }: 10 11 buildPythonPackage rec { 12 pname = "gphoto2"; 13 - version = "2.5.1"; 14 pyproject = true; 15 16 - src = fetchPypi { 17 - inherit pname version; 18 - hash = "sha256-Jgh7ff+iUaeNQtBsXw2Jm+2gj1ctvrY3oahGrbxx3uE="; 19 }; 20 21 nativeBuildInputs = [ 22 pkg-config 23 - setuptools 24 - toml 25 ]; 26 27 buildInputs = [ libgphoto2 ]; 28 29 - doCheck = false; # No tests available 30 31 pythonImportsCheck = [ "gphoto2" ]; 32 33 - meta = with lib; { 34 description = "Python interface to libgphoto2"; 35 homepage = "https://github.com/jim-easterbrook/python-gphoto2"; 36 - license = licenses.gpl3; 37 maintainers = [ ]; 38 }; 39 }
··· 1 { 2 lib, 3 + fetchFromGitHub, 4 buildPythonPackage, 5 pkg-config, 6 libgphoto2, 7 + pytestCheckHook, 8 setuptools, 9 toml, 10 }: 11 12 buildPythonPackage rec { 13 pname = "gphoto2"; 14 + version = "2.6.0"; 15 pyproject = true; 16 17 + src = fetchFromGitHub { 18 + owner = "jim-easterbrook"; 19 + repo = "python-gphoto2"; 20 + tag = "v${version}"; 21 + hash = "sha256-S/uMP2kRXJDetpXT4+MmCvb35xSxEbzhtKJ0PbHIOIU="; 22 }; 23 24 + build-system = [ 25 + setuptools 26 + toml 27 + ]; 28 + 29 nativeBuildInputs = [ 30 pkg-config 31 ]; 32 33 buildInputs = [ libgphoto2 ]; 34 35 + nativeCheckInputs = [ 36 + pytestCheckHook 37 + ]; 38 39 pythonImportsCheck = [ "gphoto2" ]; 40 41 + meta = { 42 + changelog = "https://github.com/jim-easterbrook/python-gphoto2/blob/${src.tag}/CHANGELOG.txt"; 43 description = "Python interface to libgphoto2"; 44 homepage = "https://github.com/jim-easterbrook/python-gphoto2"; 45 + license = lib.licenses.lgpl3Plus; 46 maintainers = [ ]; 47 }; 48 }
+2 -2
pkgs/development/python-modules/ha-mqtt-discoverable/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "ha-mqtt-discoverable"; 15 - version = "0.19.1"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.10"; ··· 21 owner = "unixorn"; 22 repo = "ha-mqtt-discoverable"; 23 tag = "v${version}"; 24 - hash = "sha256-zQ3ABrKhuWBZhRPM5tH8VmYErM+mP26rNweFOpoSeEg="; 25 }; 26 27 pythonRelaxDeps = [
··· 12 13 buildPythonPackage rec { 14 pname = "ha-mqtt-discoverable"; 15 + version = "0.19.2"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.10"; ··· 21 owner = "unixorn"; 22 repo = "ha-mqtt-discoverable"; 23 tag = "v${version}"; 24 + hash = "sha256-LRXgB85jo0Frmdsq5cHQKQ60bYzuVPXsjPeGLj5uyNU="; 25 }; 26 27 pythonRelaxDeps = [
+12 -28
pkgs/development/python-modules/hyperion-py/default.nix
··· 3 aiohttp, 4 buildPythonPackage, 5 fetchFromGitHub, 6 - fetchpatch, 7 - pytestCheckHook, 8 - pythonOlder, 9 poetry-core, 10 pytest-aiohttp, 11 pytest-asyncio, 12 }: 13 14 buildPythonPackage rec { 15 pname = "hyperion-py"; 16 - version = "0.7.5"; 17 - disabled = pythonOlder "3.8"; 18 - format = "pyproject"; 19 20 src = fetchFromGitHub { 21 owner = "dermotduffy"; 22 repo = "hyperion-py"; 23 - rev = "v${version}"; 24 - hash = "sha256-arcnpCQsRuiWCrAz/t4TCjTe8DRDtRuzYp8k7nnjGDk="; 25 }; 26 27 - patches = [ 28 - (fetchpatch { 29 - # python3.10 compat: Drop loop kwarg in asyncio.sleep call 30 - url = "https://github.com/dermotduffy/hyperion-py/commit/f02af52fcce17888984c99bfc03935e372011394.patch"; 31 - hash = "sha256-4nfsQVxd77VV9INwNxTyFRDlAjwdTYqfSGuF487hFCs="; 32 - }) 33 - ]; 34 - 35 - nativeBuildInputs = [ poetry-core ]; 36 37 - propagatedBuildInputs = [ aiohttp ]; 38 39 nativeCheckInputs = [ 40 pytest-asyncio 41 pytest-aiohttp 42 pytestCheckHook 43 ]; 44 45 - pytestFlagsArray = [ 46 - # pytest-asyncio 0.17.0 compat 47 - "--asyncio-mode=auto" 48 - ]; 49 - 50 - postPatch = '' 51 - substituteInPlace pyproject.toml \ 52 - --replace " --timeout=9 --cov=hyperion" "" 53 - ''; 54 - 55 pythonImportsCheck = [ "hyperion" ]; 56 57 meta = with lib; { 58 description = "Python package for Hyperion Ambient Lighting"; 59 homepage = "https://github.com/dermotduffy/hyperion-py"; 60 license = licenses.mit; 61 maintainers = with maintainers; [ fab ]; 62 };
··· 3 aiohttp, 4 buildPythonPackage, 5 fetchFromGitHub, 6 poetry-core, 7 pytest-aiohttp, 8 pytest-asyncio, 9 + pytest-cov-stub, 10 + pytest-timeout, 11 + pytestCheckHook, 12 }: 13 14 buildPythonPackage rec { 15 pname = "hyperion-py"; 16 + version = "0.7.6"; 17 + pyproject = true; 18 19 src = fetchFromGitHub { 20 owner = "dermotduffy"; 21 repo = "hyperion-py"; 22 + tag = "v${version}"; 23 + hash = "sha256-14taFSrtmgTBiie0eY2fSRkZndJSZ4GJNRx3MonrTzs="; 24 }; 25 26 + build-system = [ poetry-core ]; 27 28 + dependencies = [ aiohttp ]; 29 30 nativeCheckInputs = [ 31 pytest-asyncio 32 pytest-aiohttp 33 + pytest-cov-stub 34 + pytest-timeout 35 pytestCheckHook 36 ]; 37 38 pythonImportsCheck = [ "hyperion" ]; 39 40 meta = with lib; { 41 description = "Python package for Hyperion Ambient Lighting"; 42 homepage = "https://github.com/dermotduffy/hyperion-py"; 43 + changelog = "https://github.com/dermotduffy/hyperion-py/releases/tag/${src.tag}"; 44 license = licenses.mit; 45 maintainers = with maintainers; [ fab ]; 46 };
+2 -2
pkgs/development/python-modules/ical/default.nix
··· 17 18 buildPythonPackage rec { 19 pname = "ical"; 20 - version = "9.2.5"; 21 pyproject = true; 22 23 disabled = pythonOlder "3.11"; ··· 26 owner = "allenporter"; 27 repo = "ical"; 28 tag = version; 29 - hash = "sha256-db7xwNN7xAoeqPngZNJxQNM2wLVcr7VpuG2IWswLCEE="; 30 }; 31 32 build-system = [ setuptools ];
··· 17 18 buildPythonPackage rec { 19 pname = "ical"; 20 + version = "10.0.0"; 21 pyproject = true; 22 23 disabled = pythonOlder "3.11"; ··· 26 owner = "allenporter"; 27 repo = "ical"; 28 tag = version; 29 + hash = "sha256-vEVhZ7UBftXsB5xq1LhwitV2Gl6kcR5P0ReJ+71SQFY="; 30 }; 31 32 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/langfuse/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "langfuse"; 21 - version = "2.60.5"; 22 pyproject = true; 23 24 src = fetchFromGitHub { 25 owner = "langfuse"; 26 repo = "langfuse-python"; 27 tag = "v${version}"; 28 - hash = "sha256-DpfbebbONJ8+7mVouvULRbGs9t1cGjOZHhk3KvaY+gM="; 29 }; 30 31 build-system = [ poetry-core ];
··· 18 19 buildPythonPackage rec { 20 pname = "langfuse"; 21 + version = "2.60.7"; 22 pyproject = true; 23 24 src = fetchFromGitHub { 25 owner = "langfuse"; 26 repo = "langfuse-python"; 27 tag = "v${version}"; 28 + hash = "sha256-8IlqHO46Kzz+ifmIu2y5SxshNv/lpZO74b1KTE2Opk4="; 29 }; 30 31 build-system = [ poetry-core ];
+6 -2
pkgs/development/python-modules/libcst/default.nix
··· 33 }; 34 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 - inherit pname version src; 37 - sourceRoot = "${src.name}/${cargoRoot}"; 38 hash = "sha256-K8hug7JeLPIvrqgVaONKfixu8XRvn+pnqS0fHV+nTqg="; 39 }; 40
··· 33 }; 34 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 + inherit 37 + pname 38 + version 39 + src 40 + cargoRoot 41 + ; 42 hash = "sha256-K8hug7JeLPIvrqgVaONKfixu8XRvn+pnqS0fHV+nTqg="; 43 }; 44
+2 -2
pkgs/development/python-modules/mautrix/default.nix
··· 25 26 buildPythonPackage rec { 27 pname = "mautrix"; 28 - version = "0.20.7"; 29 pyproject = true; 30 31 disabled = pythonOlder "3.10"; ··· 34 owner = "mautrix"; 35 repo = "python"; 36 tag = "v${version}"; 37 - hash = "sha256-tOX/KQrECeEV3/0q3tpO4brUdalmw6IincF6pHzsEE8="; 38 }; 39 40 build-system = [ setuptools ];
··· 25 26 buildPythonPackage rec { 27 pname = "mautrix"; 28 + version = "0.20.8"; 29 pyproject = true; 30 31 disabled = pythonOlder "3.10"; ··· 34 owner = "mautrix"; 35 repo = "python"; 36 tag = "v${version}"; 37 + hash = "sha256-giK8JZ6nzsA8SV6CzDNEbJmbwDju9t6fLJr/oXNjvKs="; 38 }; 39 40 build-system = [ setuptools ];
+3 -3
pkgs/development/python-modules/numpy-groupies/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "numpy-groupies"; 15 - version = "0.11.2"; 16 pyproject = true; 17 18 src = fetchFromGitHub { 19 owner = "ml31415"; 20 repo = "numpy-groupies"; 21 tag = "v${version}"; 22 - hash = "sha256-Eu+5SR28jIasKe1p7rvbq2yo3PGZRQWWdG3A5vGhnyM="; 23 }; 24 25 build-system = [ ··· 39 40 meta = { 41 homepage = "https://github.com/ml31415/numpy-groupies"; 42 - changelog = "https://github.com/ml31415/numpy-groupies/releases/tag/v${version}"; 43 description = "Optimised tools for group-indexing operations: aggregated sum and more"; 44 license = lib.licenses.bsd2; 45 maintainers = with lib.maintainers; [ berquist ];
··· 12 13 buildPythonPackage rec { 14 pname = "numpy-groupies"; 15 + version = "0.11.3"; 16 pyproject = true; 17 18 src = fetchFromGitHub { 19 owner = "ml31415"; 20 repo = "numpy-groupies"; 21 tag = "v${version}"; 22 + hash = "sha256-pg9hOtIgS8pB/Y9Xqto9Omsdg8TxaA5ZGE1Qh1DCceU="; 23 }; 24 25 build-system = [ ··· 39 40 meta = { 41 homepage = "https://github.com/ml31415/numpy-groupies"; 42 + changelog = "https://github.com/ml31415/numpy-groupies/releases/tag/${src.tag}"; 43 description = "Optimised tools for group-indexing operations: aggregated sum and more"; 44 license = lib.licenses.bsd2; 45 maintainers = with lib.maintainers; [ berquist ];
+11 -7
pkgs/development/python-modules/primp/default.nix
··· 25 modRoot = "./src"; 26 patches = [ 27 # A patch required to build boringssl compatible with `boring-sys2`. 28 - # See https://github.com/0x676e67/boring2/blob/1a0f1cd24e728aac100df68027c820f858199224/boring-sys/build/main.rs#L486-L489 29 (fetchpatch { 30 name = "boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 31 - url = "https://raw.githubusercontent.com/0x676e67/boring2/4edbff8cade24d5d83cc372c4502b59c5192b5a1/boring-sys/patches/boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 32 - hash = "sha256-lM+2lLvfDHnxLl+OgZ6R8Y4Z6JfA9AiDqboT1mbxmao="; 33 }) 34 ]; 35 ··· 45 oa.env.NIX_CFLAGS_COMPILE 46 + " " 47 + toString ( 48 - lib.optionals stdenv.cc.isGNU [ 49 "-Wno-error=ignored-attributes" 50 ] 51 ); ··· 61 in 62 buildPythonPackage rec { 63 pname = "primp"; 64 - version = "0.14.0"; 65 pyproject = true; 66 67 src = fetchFromGitHub { 68 owner = "deedy5"; 69 repo = "primp"; 70 tag = "v${version}"; 71 - hash = "sha256-LrSygeioJlccOH1oyagw02ankkZK+H6Mzrgy8tB83mo="; 72 }; 73 74 cargoDeps = rustPlatform.fetchCargoVendor { 75 inherit pname version src; 76 - hash = "sha256-iPf25DMGNHrWYByNTylB6bPpLfzs0ADwgkjfhVxiiXA="; 77 }; 78 79 nativeBuildInputs = [
··· 25 modRoot = "./src"; 26 patches = [ 27 # A patch required to build boringssl compatible with `boring-sys2`. 28 + # See https://github.com/0x676e67/boring2/blob/refs/tags/v4.15.11/boring-sys/build/main.rs#L486-L489 29 (fetchpatch { 30 name = "boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 31 + url = "https://raw.githubusercontent.com/0x676e67/boring2/refs/tags/v4.15.11/boring-sys/patches/boringssl-44b3df6f03d85c901767250329c571db405122d5.patch"; 32 + hash = "sha256-JRRATcCXo0HBQTzgCAuLpxC3NEGrTw1cEmC0VHOgO2M="; 33 }) 34 ]; 35 ··· 45 oa.env.NIX_CFLAGS_COMPILE 46 + " " 47 + toString ( 48 + lib.optionals stdenv.cc.isClang [ 49 + "-Wno-error=reorder-ctor" 50 + ] 51 + ++ lib.optionals stdenv.cc.isGNU [ 52 + "-Wno-error=reorder" 53 "-Wno-error=ignored-attributes" 54 ] 55 ); ··· 65 in 66 buildPythonPackage rec { 67 pname = "primp"; 68 + version = "0.15.0"; 69 pyproject = true; 70 71 src = fetchFromGitHub { 72 owner = "deedy5"; 73 repo = "primp"; 74 tag = "v${version}"; 75 + hash = "sha256-13o0Ni0dvZaoKgYy2cFQhebwKAJGm5Z2s+gVAddxYxU="; 76 }; 77 78 cargoDeps = rustPlatform.fetchCargoVendor { 79 inherit pname version src; 80 + hash = "sha256-UBpf9f3wJgbizHERsm83cuKHiMixj/8JX/IGvteySIo="; 81 }; 82 83 nativeBuildInputs = [
+11 -6
pkgs/development/python-modules/py-sucks/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "py-sucks"; 17 - version = "0.9.10"; 18 pyproject = true; 19 20 src = fetchFromGitHub { 21 owner = "mib1185"; 22 repo = "py-sucks"; 23 tag = "v${version}"; 24 - hash = "sha256-MjlE5HdxChAgV/O7cD3foqkmKie7FgRRxvOcW+NAtfA="; 25 }; 26 27 build-system = [ setuptools ]; 28 29 dependencies = [ 30 - click 31 - pycountry-convert 32 pycryptodome 33 requests 34 sleekxmppfs 35 ]; 36 37 pythonImportsCheck = [ "sucks" ]; 38 39 nativeCheckInputs = [ 40 requests-mock 41 pytestCheckHook 42 - ]; 43 44 disabledTests = [ 45 # assumes $HOME is at a specific place ··· 47 ]; 48 49 meta = { 50 - changelog = "https://github.com/mib1185/py-sucks/releases/tag/v${version}"; 51 description = "Library for controlling certain robot vacuums"; 52 homepage = "https://github.com/mib1185/py-sucks"; 53 license = lib.licenses.gpl3Only;
··· 14 15 buildPythonPackage rec { 16 pname = "py-sucks"; 17 + version = "0.9.11"; 18 pyproject = true; 19 20 src = fetchFromGitHub { 21 owner = "mib1185"; 22 repo = "py-sucks"; 23 tag = "v${version}"; 24 + hash = "sha256-srj/3x04R9KgbdC6IgbQdgUz+srAx0OttB6Ndb2+Nh4="; 25 }; 26 27 build-system = [ setuptools ]; 28 29 dependencies = [ 30 pycryptodome 31 requests 32 sleekxmppfs 33 ]; 34 35 + optional-dependencies = { 36 + cli = [ 37 + click 38 + pycountry-convert 39 + ]; 40 + }; 41 + 42 pythonImportsCheck = [ "sucks" ]; 43 44 nativeCheckInputs = [ 45 requests-mock 46 pytestCheckHook 47 + ] ++ lib.flatten (lib.attrValues optional-dependencies); 48 49 disabledTests = [ 50 # assumes $HOME is at a specific place ··· 52 ]; 53 54 meta = { 55 + changelog = "https://github.com/mib1185/py-sucks/releases/tag/${src.tag}"; 56 description = "Library for controlling certain robot vacuums"; 57 homepage = "https://github.com/mib1185/py-sucks"; 58 license = lib.licenses.gpl3Only;
+2 -2
pkgs/development/python-modules/pynitrokey/default.nix
··· 30 31 let 32 pname = "pynitrokey"; 33 - version = "0.8.4"; 34 mainProgram = "nitropy"; 35 in 36 ··· 40 41 src = fetchPypi { 42 inherit pname version; 43 - hash = "sha256-Sr3ecKyIjsemM2G72BQR0S5YzfXA0nK9i29yKNie9Ys="; 44 }; 45 46 nativeBuildInputs = [ installShellFiles ];
··· 30 31 let 32 pname = "pynitrokey"; 33 + version = "0.8.5"; 34 mainProgram = "nitropy"; 35 in 36 ··· 40 41 src = fetchPypi { 42 inherit pname version; 43 + hash = "sha256-mPhH4IdpKKA9d8sJOGMWpGerzki5qZHFHe4u4ao2RgE="; 44 }; 45 46 nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/development/python-modules/python-debian/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "python-debian"; 15 - version = "0.1.52"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.7"; ··· 22 owner = "python-debian-team"; 23 repo = "python-debian"; 24 tag = version; 25 - hash = "sha256-+c+AiUCnpasOLbY6K4cuKUb6Ojwn0py78fL5W24WRwU="; 26 }; 27 28 build-system = [
··· 12 13 buildPythonPackage rec { 14 pname = "python-debian"; 15 + version = "1.0.1"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.7"; ··· 22 owner = "python-debian-team"; 23 repo = "python-debian"; 24 tag = version; 25 + hash = "sha256-lSKtlBqAa8cJZZHMVb90eYIGem4DwVZLldaYSAJBNek="; 26 }; 27 28 build-system = [
+2 -2
pkgs/development/python-modules/pytubefix/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "pytubefix"; 11 - version = "9.0.1"; 12 pyproject = true; 13 14 src = fetchFromGitHub { 15 owner = "JuanBindez"; 16 repo = "pytubefix"; 17 tag = "v${version}"; 18 - hash = "sha256-TIrt20FAQumtDisscY9jcJY+Cuh1zA92hU3HVmwr4Bk="; 19 }; 20 21 build-system = [ setuptools ];
··· 8 9 buildPythonPackage rec { 10 pname = "pytubefix"; 11 + version = "9.1.1"; 12 pyproject = true; 13 14 src = fetchFromGitHub { 15 owner = "JuanBindez"; 16 repo = "pytubefix"; 17 tag = "v${version}"; 18 + hash = "sha256-OKOP1kDPYXMQkVOITSxYqMYQvtVom8VCaLnCBYEhgR8="; 19 }; 20 21 build-system = [ setuptools ];
+1 -1
pkgs/development/python-modules/pyyaml-ft/default.nix
··· 10 }: 11 12 buildPythonPackage rec { 13 - pname = "pyyaml"; 14 version = "7.0.1"; 15 pyproject = true; 16
··· 10 }: 11 12 buildPythonPackage rec { 13 + pname = "pyyaml-ft"; 14 version = "7.0.1"; 15 pyproject = true; 16
+2 -2
pkgs/development/python-modules/redshift-connector/default.nix
··· 16 17 buildPythonPackage rec { 18 pname = "redshift-connector"; 19 - version = "2.1.6"; 20 format = "setuptools"; 21 22 disabled = pythonOlder "3.6"; ··· 25 owner = "aws"; 26 repo = "amazon-redshift-python-driver"; 27 tag = "v${version}"; 28 - hash = "sha256-+tZMg0AmfmAFOqUQhOl+vHQVF1DApZbVNjGV4BkGRTg="; 29 }; 30 31 # remove addops as they add test directory and coverage parameters to pytest
··· 16 17 buildPythonPackage rec { 18 pname = "redshift-connector"; 19 + version = "2.1.7"; 20 format = "setuptools"; 21 22 disabled = pythonOlder "3.6"; ··· 25 owner = "aws"; 26 repo = "amazon-redshift-python-driver"; 27 tag = "v${version}"; 28 + hash = "sha256-OMi8788F2qjMOVDLuJLVReqNv7c/DpXTy1UpqoKRmnQ="; 29 }; 30 31 # remove addops as they add test directory and coverage parameters to pytest
+2 -2
pkgs/development/python-modules/simsimd/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "simsimd"; 14 - version = "6.4.4"; 15 pyproject = true; 16 17 src = fetchFromGitHub { 18 owner = "ashvardanian"; 19 repo = "simsimd"; 20 tag = "v${version}"; 21 - hash = "sha256-lOE8ZQlUZ0Y+3Lpm4H/ps4o0YO9k245lADxrfR3oI1E="; 22 }; 23 24 build-system = [
··· 11 12 buildPythonPackage rec { 13 pname = "simsimd"; 14 + version = "6.4.7"; 15 pyproject = true; 16 17 src = fetchFromGitHub { 18 owner = "ashvardanian"; 19 repo = "simsimd"; 20 tag = "v${version}"; 21 + hash = "sha256-FM1ge3opt0hwVSjNQWOAYeG6tDIwVLSbu9mZOJBxvJY="; 22 }; 23 24 build-system = [
+2 -2
pkgs/development/python-modules/sse-starlette/default.nix
··· 22 23 buildPythonPackage rec { 24 pname = "sse-starlette"; 25 - version = "2.3.5"; 26 pyproject = true; 27 28 disabled = pythonOlder "3.9"; ··· 31 owner = "sysid"; 32 repo = "sse-starlette"; 33 tag = "v${version}"; 34 - hash = "sha256-KTq8NwV4YhyfTLpsaF5jyrD3kyBcJ/xXtOwx4WvDFOo="; 35 }; 36 37 build-system = [ setuptools ];
··· 22 23 buildPythonPackage rec { 24 pname = "sse-starlette"; 25 + version = "2.3.6"; 26 pyproject = true; 27 28 disabled = pythonOlder "3.9"; ··· 31 owner = "sysid"; 32 repo = "sse-starlette"; 33 tag = "v${version}"; 34 + hash = "sha256-7FlyV+TsVKGFsecONPm/Z50cCnyuUsr6pimPdc4Cs6c="; 35 }; 36 37 build-system = [ setuptools ];
+6 -2
pkgs/development/python-modules/temporalio/default.nix
··· 33 }; 34 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 - inherit pname version src; 37 - sourceRoot = "${src.name}/${cargoRoot}"; 38 hash = "sha256-9hP+zN6jcRmRhPmcZ4Zgp61IeS7gDPfsOvweAxKHnHM="; 39 }; 40
··· 33 }; 34 35 cargoDeps = rustPlatform.fetchCargoVendor { 36 + inherit 37 + pname 38 + version 39 + src 40 + cargoRoot 41 + ; 42 hash = "sha256-9hP+zN6jcRmRhPmcZ4Zgp61IeS7gDPfsOvweAxKHnHM="; 43 }; 44
+2 -2
pkgs/development/python-modules/tencentcloud-sdk-python/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "tencentcloud-sdk-python"; 13 - version = "3.0.1390"; 14 pyproject = true; 15 16 disabled = pythonOlder "3.9"; ··· 19 owner = "TencentCloud"; 20 repo = "tencentcloud-sdk-python"; 21 tag = version; 22 - hash = "sha256-UOJ1NCWKFqcrU2uMX4qTy8ooFEy6TIrb1YTIthHspuM="; 23 }; 24 25 build-system = [ setuptools ];
··· 10 11 buildPythonPackage rec { 12 pname = "tencentcloud-sdk-python"; 13 + version = "3.0.1391"; 14 pyproject = true; 15 16 disabled = pythonOlder "3.9"; ··· 19 owner = "TencentCloud"; 20 repo = "tencentcloud-sdk-python"; 21 tag = version; 22 + hash = "sha256-bzxaCN2fXoZT2W8zpTg7DrBTmRfyUi2aVhrg+/Y1YkU="; 23 }; 24 25 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/yara-python/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "yara-python"; 13 - version = "4.5.2"; 14 pyproject = true; 15 16 disabled = pythonOlder "3.7"; ··· 19 owner = "VirusTotal"; 20 repo = "yara-python"; 21 tag = "v${version}"; 22 - hash = "sha256-RXqazMg78eGxA4JPUqSx0PTcNDmrGjBt5m6OJTmshNU="; 23 }; 24 25 # undefined symbol: yr_finalize
··· 10 11 buildPythonPackage rec { 12 pname = "yara-python"; 13 + version = "4.5.4"; 14 pyproject = true; 15 16 disabled = pythonOlder "3.7"; ··· 19 owner = "VirusTotal"; 20 repo = "yara-python"; 21 tag = "v${version}"; 22 + hash = "sha256-2ZwLpkT46KNTQ1ymvMGjnrfHQaIy/rXid0kXoCBixXA="; 23 }; 24 25 # undefined symbol: yr_finalize
+1 -2
pkgs/kde/gear/akonadi-search/default.nix
··· 14 cargoRoot = "agent/rs/htmlparser"; 15 16 cargoDeps = rustPlatform.fetchCargoVendor { 17 - inherit pname version; 18 src = sources.${pname}; 19 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 20 hash = "sha256-hdm4LfQcs4TTfBLzlZYJ0uzqfLxMXuYQExLGJg81W2U="; 21 }; 22
··· 14 cargoRoot = "agent/rs/htmlparser"; 15 16 cargoDeps = rustPlatform.fetchCargoVendor { 17 + inherit pname version cargoRoot; 18 src = sources.${pname}; 19 hash = "sha256-hdm4LfQcs4TTfBLzlZYJ0uzqfLxMXuYQExLGJg81W2U="; 20 }; 21
+1 -2
pkgs/kde/gear/kdepim-addons/default.nix
··· 17 cargoRoot = "plugins/webengineurlinterceptor/adblock"; 18 19 cargoDeps = rustPlatform.fetchCargoVendor { 20 - inherit pname version; 21 src = sources.${pname}; 22 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 23 hash = "sha256-66FqoD3JoPbtg6zc32uaPYaTo4zHxywiN8wPI2jtcjc="; 24 }; 25
··· 17 cargoRoot = "plugins/webengineurlinterceptor/adblock"; 18 19 cargoDeps = rustPlatform.fetchCargoVendor { 20 + inherit pname version cargoRoot; 21 src = sources.${pname}; 22 hash = "sha256-66FqoD3JoPbtg6zc32uaPYaTo4zHxywiN8wPI2jtcjc="; 23 }; 24
+4 -2
pkgs/servers/home-assistant/custom-components/oref_alert/package.nix
··· 2 lib, 3 buildHomeAssistantComponent, 4 fetchFromGitHub, 5 shapely, 6 pytestCheckHook, 7 pytest-homeassistant-custom-component, ··· 11 buildHomeAssistantComponent rec { 12 owner = "amitfin"; 13 domain = "oref_alert"; 14 - version = "2.20.1"; 15 16 src = fetchFromGitHub { 17 owner = "amitfin"; 18 repo = "oref_alert"; 19 tag = "v${version}"; 20 - hash = "sha256-EsDGH7/newjHRYu4Lr5UkJ3qaaNupqlhe5CdffEpIVg="; 21 }; 22 23 dependencies = [ 24 shapely 25 ]; 26
··· 2 lib, 3 buildHomeAssistantComponent, 4 fetchFromGitHub, 5 + aiofiles, 6 shapely, 7 pytestCheckHook, 8 pytest-homeassistant-custom-component, ··· 12 buildHomeAssistantComponent rec { 13 owner = "amitfin"; 14 domain = "oref_alert"; 15 + version = "2.21.1"; 16 17 src = fetchFromGitHub { 18 owner = "amitfin"; 19 repo = "oref_alert"; 20 tag = "v${version}"; 21 + hash = "sha256-ov/smP7rflRfQMqYduTxDAYj5xQkpZJSzIQZrP0YADQ="; 22 }; 23 24 dependencies = [ 25 + aiofiles 26 shapely 27 ]; 28
+3 -3
pkgs/servers/home-assistant/custom-lovelace-modules/universal-remote-card/package.nix
··· 6 7 buildNpmPackage rec { 8 pname = "universal-remote-card"; 9 - version = "4.5.2"; 10 11 src = fetchFromGitHub { 12 owner = "Nerwyn"; 13 repo = "android-tv-card"; 14 rev = version; 15 - hash = "sha256-woplybqlpx+xJdLJ0RWgDp3mR1l8Ntt+JA0SVyFaDQA="; 16 }; 17 18 patches = [ ./dont-call-git.patch ]; 19 20 - npmDepsHash = "sha256-YN+Ftv5gEwXHqoO7KAyijZMS6g6i3bKbEnvoVLakrTQ="; 21 22 installPhase = '' 23 runHook preInstall
··· 6 7 buildNpmPackage rec { 8 pname = "universal-remote-card"; 9 + version = "4.5.3"; 10 11 src = fetchFromGitHub { 12 owner = "Nerwyn"; 13 repo = "android-tv-card"; 14 rev = version; 15 + hash = "sha256-AxPpKp7SjeSB8VqclDJgkArC9zmjIkLQx+RBWQX0sLM="; 16 }; 17 18 patches = [ ./dont-call-git.patch ]; 19 20 + npmDepsHash = "sha256-KFgo1sKwCLmW0Il4tK2L+giF3th+YvVUWG3n+3HkRg4="; 21 22 installPhase = '' 23 runHook preInstall
+2 -2
pkgs/servers/http/tomcat/tomcat-native.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "tomcat-native"; 12 - version = "2.0.8"; 13 14 src = fetchurl { 15 url = "mirror://apache/tomcat/tomcat-connectors/native/${version}/source/${pname}-${version}-src.tar.gz"; 16 - hash = "sha256-x8U4L8taZHpc5v7QuWch6UGY+i9XJc9RJPW2URsF3+8="; 17 }; 18 19 sourceRoot = "${pname}-${version}-src/native";
··· 9 10 stdenv.mkDerivation rec { 11 pname = "tomcat-native"; 12 + version = "2.0.9"; 13 14 src = fetchurl { 15 url = "mirror://apache/tomcat/tomcat-connectors/native/${version}/source/${pname}-${version}-src.tar.gz"; 16 + hash = "sha256-iu0N70FNf0m2iOgmeXUT6VGC7L17b4tvAl5Se4UGXAI="; 17 }; 18 19 sourceRoot = "${pname}-${version}-src/native";
+6 -2
pkgs/tools/filesystems/ceph/default.nix
··· 243 }; 244 cargoRoot = "src/_bcrypt"; 245 cargoDeps = rustPlatform.fetchCargoVendor { 246 - inherit pname version src; 247 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 248 hash = "sha256-8PyCgh/rUO8uynzGdgylAsb5k55dP9fCnf40UOTCR/M="; 249 }; 250 });
··· 243 }; 244 cargoRoot = "src/_bcrypt"; 245 cargoDeps = rustPlatform.fetchCargoVendor { 246 + inherit 247 + pname 248 + version 249 + src 250 + cargoRoot 251 + ; 252 hash = "sha256-8PyCgh/rUO8uynzGdgylAsb5k55dP9fCnf40UOTCR/M="; 253 }; 254 });
+6 -2
pkgs/tools/filesystems/ceph/old-python-packages/cryptography.nix
··· 42 }; 43 44 cargoDeps = rustPlatform.fetchCargoVendor { 45 - inherit pname version src; 46 - sourceRoot = "${pname}-${version}/${cargoRoot}"; 47 hash = "sha256-pZHu3Oo9DWRAtldU0UvrH1FIg0bEvyfizPUhj9IBL58="; 48 }; 49
··· 42 }; 43 44 cargoDeps = rustPlatform.fetchCargoVendor { 45 + inherit 46 + pname 47 + version 48 + src 49 + cargoRoot 50 + ; 51 hash = "sha256-pZHu3Oo9DWRAtldU0UvrH1FIg0bEvyfizPUhj9IBL58="; 52 }; 53
+1
pkgs/top-level/aliases.nix
··· 1391 oauth2_proxy = throw "'oauth2_proxy' has been renamed to/replaced by 'oauth2-proxy'"; # Converted to throw 2024-10-17 1392 ocis-bin = throw "ocis-bin has been renamed to ocis_5-bin'. Future major.minor versions will be made available as separate packages"; # Added 2025-03-30 1393 odoo15 = throw "odoo15 has been removed from nixpkgs as it is unsupported; migrate to a newer version of odoo"; # Added 2025-05-06 1394 oil = lib.warnOnInstantiate "Oil has been replaced with the faster native C++ version and renamed to 'oils-for-unix'. See also https://github.com/oils-for-unix/oils/wiki/Oils-Deployments" oils-for-unix; # Added 2024-10-22 1395 onevpl-intel-gpu = lib.warnOnInstantiate "onevpl-intel-gpu has been renamed to vpl-gpu-rt" vpl-gpu-rt; # Added 2024-06-04 1396 openai-whisper-cpp = whisper-cpp; # Added 2024-12-13
··· 1391 oauth2_proxy = throw "'oauth2_proxy' has been renamed to/replaced by 'oauth2-proxy'"; # Converted to throw 2024-10-17 1392 ocis-bin = throw "ocis-bin has been renamed to ocis_5-bin'. Future major.minor versions will be made available as separate packages"; # Added 2025-03-30 1393 odoo15 = throw "odoo15 has been removed from nixpkgs as it is unsupported; migrate to a newer version of odoo"; # Added 2025-05-06 1394 + offrss = throw "offrss has been removed due to lack of upstream maintenance; consider using another rss reader"; # Added 2025-06-01 1395 oil = lib.warnOnInstantiate "Oil has been replaced with the faster native C++ version and renamed to 'oils-for-unix'. See also https://github.com/oils-for-unix/oils/wiki/Oils-Deployments" oils-for-unix; # Added 2024-10-22 1396 onevpl-intel-gpu = lib.warnOnInstantiate "onevpl-intel-gpu has been renamed to vpl-gpu-rt" vpl-gpu-rt; # Added 2024-06-04 1397 openai-whisper-cpp = whisper-cpp; # Added 2024-12-13
-2
pkgs/top-level/all-packages.nix
··· 16928 16929 yaziPlugins = recurseIntoAttrs (callPackage ../by-name/ya/yazi/plugins { }); 16930 16931 - animdl = python3Packages.callPackage ../applications/video/animdl { }; 16932 - 16933 dillo = callPackage ../by-name/di/dillo/package.nix { 16934 fltk = fltk13; 16935 };
··· 16928 16929 yaziPlugins = recurseIntoAttrs (callPackage ../by-name/ya/yazi/plugins { }); 16930 16931 dillo = callPackage ../by-name/di/dillo/package.nix { 16932 fltk = fltk13; 16933 };