Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
33aa2247 c3115ee2

+327 -260
+1 -1
doc/stdenv/meta.chapter.md
··· 66 67 ### `maintainers` {#var-meta-maintainers} 68 69 - A list of the maintainers of this Nix expression. Maintainers are defined in [`nixpkgs/maintainers/maintainer-list.nix`](https://github.com/NixOS/nixpkgs/blob/master/maintainers/maintainer-list.nix). There is no restriction to becoming a maintainer, just add yourself to that list in a separate commit titled “maintainers: add alice”, and reference maintainers with `maintainers = with lib.maintainers; [ alice bob ]`. 70 71 ### `mainProgram` {#var-meta-mainProgram} 72
··· 66 67 ### `maintainers` {#var-meta-maintainers} 68 69 + A list of the maintainers of this Nix expression. Maintainers are defined in [`nixpkgs/maintainers/maintainer-list.nix`](https://github.com/NixOS/nixpkgs/blob/master/maintainers/maintainer-list.nix). There is no restriction to becoming a maintainer, just add yourself to that list in a separate commit titled “maintainers: add alice” in the same pull request, and reference maintainers with `maintainers = with lib.maintainers; [ alice bob ]`. 70 71 ### `mainProgram` {#var-meta-mainProgram} 72
+3 -2
nixos/modules/installer/tools/nixos-enter.sh
··· 100 # Run the activation script. Set $LOCALE_ARCHIVE to supress some Perl locale warnings. 101 LOCALE_ARCHIVE="$system/sw/lib/locale/locale-archive" IN_NIXOS_ENTER=1 chroot "$mountPoint" "$system/activate" 1>&2 || true 102 103 - # Create /tmp 104 - chroot "$mountPoint" "$system/sw/bin/systemd-tmpfiles" --create --remove --exclude-prefix=/dev 1>&2 || true 105 ) 106 107 unset TMPDIR
··· 100 # Run the activation script. Set $LOCALE_ARCHIVE to supress some Perl locale warnings. 101 LOCALE_ARCHIVE="$system/sw/lib/locale/locale-archive" IN_NIXOS_ENTER=1 chroot "$mountPoint" "$system/activate" 1>&2 || true 102 103 + # Create /tmp. This is needed for nix-build and the NixOS activation script to work. 104 + # Hide the unhelpful "failed to replace specifiers" errors caused by missing /etc/machine-id. 105 + chroot "$mountPoint" "$system/sw/bin/systemd-tmpfiles" --create --remove -E 2> /dev/null || true 106 ) 107 108 unset TMPDIR
+1 -1
nixos/modules/programs/xastir.nix
··· 8 meta.maintainers = with maintainers; [ melling ]; 9 10 options.programs.xastir = { 11 - enable = mkEnableOption (mdDoc "Enable Xastir Graphical APRS client"); 12 }; 13 14 config = mkIf cfg.enable {
··· 8 meta.maintainers = with maintainers; [ melling ]; 9 10 options.programs.xastir = { 11 + enable = mkEnableOption (mdDoc "Xastir Graphical APRS client"); 12 }; 13 14 config = mkIf cfg.enable {
+1 -1
nixos/modules/services/monitoring/grafana.nix
··· 56 provisionConfDir = pkgs.runCommand "grafana-provisioning" { nativeBuildInputs = [ pkgs.xorg.lndir ]; } '' 57 mkdir -p $out/{datasources,dashboards,notifiers,alerting} 58 ${ln { src = datasourceFileOrDir; dir = "datasources"; filename = "datasource"; }} 59 - ${ln { src = dashboardFileOrDir; dir = "dashboards"; filename = "dashbaord"; }} 60 ${ln { src = notifierFileOrDir; dir = "notifiers"; filename = "notifier"; }} 61 ${ln { src = rulesFileOrDir; dir = "alerting"; filename = "rules"; }} 62 ${ln { src = contactPointsFileOrDir; dir = "alerting"; filename = "contactPoints"; }}
··· 56 provisionConfDir = pkgs.runCommand "grafana-provisioning" { nativeBuildInputs = [ pkgs.xorg.lndir ]; } '' 57 mkdir -p $out/{datasources,dashboards,notifiers,alerting} 58 ${ln { src = datasourceFileOrDir; dir = "datasources"; filename = "datasource"; }} 59 + ${ln { src = dashboardFileOrDir; dir = "dashboards"; filename = "dashboard"; }} 60 ${ln { src = notifierFileOrDir; dir = "notifiers"; filename = "notifier"; }} 61 ${ln { src = rulesFileOrDir; dir = "alerting"; filename = "rules"; }} 62 ${ln { src = contactPointsFileOrDir; dir = "alerting"; filename = "contactPoints"; }}
+16
nixos/tests/installer.nix
··· 49 boot.loader.systemd-boot.enable = true; 50 ''} 51 52 users.users.alice = { 53 isNormalUser = true; 54 home = "/home/alice"; ··· 124 }", 125 "/mnt/etc/nixos/configuration.nix", 126 ) 127 128 with subtest("Perform the installation"): 129 machine.succeed("nixos-install < /dev/null >&2") 130 131 with subtest("Do it again to make sure it's idempotent"): 132 machine.succeed("nixos-install < /dev/null >&2") 133 134 with subtest("Shutdown system after installation"): 135 machine.succeed("umount /mnt/boot || true")
··· 49 boot.loader.systemd-boot.enable = true; 50 ''} 51 52 + boot.initrd.secrets."/etc/secret" = /etc/nixos/secret; 53 + 54 users.users.alice = { 55 isNormalUser = true; 56 home = "/home/alice"; ··· 126 }", 127 "/mnt/etc/nixos/configuration.nix", 128 ) 129 + machine.copy_from_host("${pkgs.writeText "secret" "secret"}", "/mnt/etc/nixos/secret") 130 131 with subtest("Perform the installation"): 132 machine.succeed("nixos-install < /dev/null >&2") 133 134 with subtest("Do it again to make sure it's idempotent"): 135 machine.succeed("nixos-install < /dev/null >&2") 136 + 137 + with subtest("Check that we can build things in nixos-enter"): 138 + machine.succeed( 139 + """ 140 + nixos-enter -- nix-build --option substitute false -E 'derivation { 141 + name = "t"; 142 + builder = "/bin/sh"; 143 + args = ["-c" "echo nixos-enter build > $out"]; 144 + system = builtins.currentSystem; 145 + preferLocalBuild = true; 146 + }' 147 + """ 148 + ) 149 150 with subtest("Shutdown system after installation"): 151 machine.succeed("umount /mnt/boot || true")
+3 -2
pkgs/applications/editors/vscode/generic.nix
··· 1 { stdenv, lib, makeDesktopItem 2 - , unzip, libsecret, libXScrnSaver, libxshmfence, wrapGAppsHook, makeWrapper 3 , atomEnv, at-spi2-atk, autoPatchelfHook 4 , systemd, fontconfig, libdbusmenu, glib, buildFHSUserEnvBubblewrap, wayland 5 ··· 72 ++ lib.optionals stdenv.isLinux [ 73 autoPatchelfHook 74 nodePackages.asar 75 - (wrapGAppsHook.override { inherit makeWrapper; }) 76 ]; 77 78 dontBuild = true;
··· 1 { stdenv, lib, makeDesktopItem 2 + , unzip, libsecret, libXScrnSaver, libxshmfence, buildPackages 3 , atomEnv, at-spi2-atk, autoPatchelfHook 4 , systemd, fontconfig, libdbusmenu, glib, buildFHSUserEnvBubblewrap, wayland 5 ··· 72 ++ lib.optionals stdenv.isLinux [ 73 autoPatchelfHook 74 nodePackages.asar 75 + # override doesn't preserve splicing https://github.com/NixOS/nixpkgs/issues/132651 76 + (buildPackages.wrapGAppsHook.override { inherit (buildPackages) makeWrapper; }) 77 ]; 78 79 dontBuild = true;
+2 -2
pkgs/applications/misc/obsidian/default.nix
··· 12 let 13 inherit (stdenv.hostPlatform) system; 14 pname = "obsidian"; 15 - version = "1.0.3"; 16 appname = "Obsidian"; 17 meta = with lib; { 18 description = "A powerful knowledge base that works on top of a local folder of plain text Markdown files"; ··· 25 filename = if stdenv.isDarwin then "Obsidian-${version}-universal.dmg" else "obsidian-${version}.tar.gz"; 26 src = fetchurl { 27 url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/${filename}"; 28 - sha256 = if stdenv.isDarwin then "sha256-DYF9fEpZaP4tD/eeZAegDahR7UZyroqNB9bn2U7sgXs=" else "sha256-MpQk5g4184ZkCAjLU5Ug0ReWgVADskS1QuMcnPdNofs="; 29 }; 30 31 icon = fetchurl {
··· 12 let 13 inherit (stdenv.hostPlatform) system; 14 pname = "obsidian"; 15 + version = "1.1.9"; 16 appname = "Obsidian"; 17 meta = with lib; { 18 description = "A powerful knowledge base that works on top of a local folder of plain text Markdown files"; ··· 25 filename = if stdenv.isDarwin then "Obsidian-${version}-universal.dmg" else "obsidian-${version}.tar.gz"; 26 src = fetchurl { 27 url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/${filename}"; 28 + sha256 = if stdenv.isDarwin then "sha256-x+9WG938YQFP/HF7B9xENOXFSdOrPFOJ1ufxXj3kXps=" else "sha256-dFR7LaDRJwpxrNyPNseGi66gIAHOKf5Au2VXl7SBGSE="; 29 }; 30 31 icon = fetchurl {
+3 -3
pkgs/applications/misc/oxker/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "oxker"; 5 - version = "0.1.10"; 6 7 src = fetchCrate { 8 inherit pname version; 9 - sha256 = "sha256-2NX2iW3cT9027j2gUsDTtdIFDmJKIGPfSzrGGwvK/VA="; 10 }; 11 12 - cargoSha256 = "sha256-//GI+roOsCLkKgMDUDK0YhJWmeIaYCMBt9r14+Rz8UQ="; 13 14 meta = with lib; { 15 description = "A simple tui to view & control docker containers";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "oxker"; 5 + version = "0.1.11"; 6 7 src = fetchCrate { 8 inherit pname version; 9 + sha256 = "sha256-O4fVEYstDkVHn7fBVOGu1ok9K9xiO9uLx0+vb6qMZoA="; 10 }; 11 12 + cargoHash = "sha256-LSMAE24E8Is/ejUE/2vogP0GmpF+9oO2pJoQOZ8OfU8="; 13 14 meta = with lib; { 15 description = "A simple tui to view & control docker containers";
+15 -16
pkgs/applications/misc/waylock/default.nix
··· 1 - { 2 - lib, 3 - stdenv, 4 - fetchFromGitHub, 5 - zig, 6 - wayland, 7 - pkg-config, 8 - scdoc, 9 - wayland-protocols, 10 - libxkbcommon, 11 - pam, 12 }: 13 stdenv.mkDerivation rec { 14 pname = "waylock"; 15 - version = "0.4.2"; 16 17 src = fetchFromGitHub { 18 owner = "ifreund"; 19 repo = pname; 20 rev = "v${version}"; 21 - sha256 = "sha256-yWjWcnGa4a+Dpc82H65yr8H7v88g/tDq0FSguubhbEI="; 22 fetchSubmodules = true; 23 }; 24 25 - nativeBuildInputs = [zig wayland scdoc pkg-config]; 26 27 buildInputs = [ 28 wayland-protocols ··· 38 39 installPhase = '' 40 runHook preInstall 41 - zig build -Drelease-safe -Dman-pages --prefix $out install 42 runHook postInstall 43 ''; 44 ··· 47 description = "A small screenlocker for Wayland compositors"; 48 license = licenses.isc; 49 platforms = platforms.linux; 50 - maintainers = with maintainers; [jordanisaacs]; 51 }; 52 }
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , zig 5 + , wayland 6 + , pkg-config 7 + , scdoc 8 + , wayland-protocols 9 + , libxkbcommon 10 + , pam 11 }: 12 stdenv.mkDerivation rec { 13 pname = "waylock"; 14 + version = "0.6.0"; 15 16 src = fetchFromGitHub { 17 owner = "ifreund"; 18 repo = pname; 19 rev = "v${version}"; 20 + hash = "sha256-AujBvDy10e5HhezCQcXpBUVlktRKNseLxRKdI+gtH6w="; 21 fetchSubmodules = true; 22 }; 23 24 + nativeBuildInputs = [ zig wayland scdoc pkg-config ]; 25 26 buildInputs = [ 27 wayland-protocols ··· 37 38 installPhase = '' 39 runHook preInstall 40 + zig build -Drelease-safe -Dman-pages -Dcpu=baseline --prefix $out install 41 runHook postInstall 42 ''; 43 ··· 46 description = "A small screenlocker for Wayland compositors"; 47 license = licenses.isc; 48 platforms = platforms.linux; 49 + maintainers = with maintainers; [ jordanisaacs ]; 50 }; 51 }
+3 -3
pkgs/applications/networking/cluster/roxctl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "roxctl"; 5 - version = "3.72.2"; 6 7 src = fetchFromGitHub { 8 owner = "stackrox"; 9 repo = "stackrox"; 10 rev = version; 11 - sha256 = "sha256-qw45Ifp8JcJyKaKL1St0HAQGS7JiUestiPGyZcV3gx8="; 12 }; 13 14 - vendorSha256 = "sha256-FmpnRgU3w2zthgUJuAG5AqLl2UxMb0yywN5Sk9WoWBI="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
··· 2 3 buildGoModule rec { 4 pname = "roxctl"; 5 + version = "3.73.1"; 6 7 src = fetchFromGitHub { 8 owner = "stackrox"; 9 repo = "stackrox"; 10 rev = version; 11 + sha256 = "sha256-A/jEw29c2WbBlPZZACjI3NjM7a0JxCEob8GOoGx13Hs="; 12 }; 13 14 + vendorHash = "sha256-YRNOOn/Ei0rHLZrTtQxlBBn48pePDHllnI65Iil160k="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
+2 -2
pkgs/applications/networking/cluster/werf/default.nix
··· 10 11 buildGoModule rec { 12 pname = "werf"; 13 - version = "1.2.193"; 14 15 src = fetchFromGitHub { 16 owner = "werf"; 17 repo = "werf"; 18 rev = "v${version}"; 19 - hash = "sha256-4q+LtPwJa3gioOY90gUfCL4F/8jmtfkBKxBShg2xQas="; 20 }; 21 22 vendorHash = "sha256-GjcmpHyjhjCWE5gQR/oTHfhHYg5WRu8uhgAuWhdxlYk=";
··· 10 11 buildGoModule rec { 12 pname = "werf"; 13 + version = "1.2.195"; 14 15 src = fetchFromGitHub { 16 owner = "werf"; 17 repo = "werf"; 18 rev = "v${version}"; 19 + hash = "sha256-rNhCZO4Axeuc5jEAndjma7/jnst1kDNdtb/h/jD2rtE="; 20 }; 21 22 vendorHash = "sha256-GjcmpHyjhjCWE5gQR/oTHfhHYg5WRu8uhgAuWhdxlYk=";
+1 -1
pkgs/applications/networking/instant-messengers/deltachat-desktop/default.nix
··· 43 rev = "v${version}"; 44 hash = "sha256-qCtpy69ROCspRgPKmCV0YY/EOSWiNU/xwDblU0bQp4w="; 45 }; 46 - vendorSha256 = "sha256-+BfxCyg0KkDQpHt/wycy/8CTG6YBA/VJvJFhhzUnSiQ="; 47 }); 48 }; 49 in buildNpmPackage rec {
··· 43 rev = "v${version}"; 44 hash = "sha256-qCtpy69ROCspRgPKmCV0YY/EOSWiNU/xwDblU0bQp4w="; 45 }; 46 + vendorHash = "sha256-+BfxCyg0KkDQpHt/wycy/8CTG6YBA/VJvJFhhzUnSiQ="; 47 }); 48 }; 49 in buildNpmPackage rec {
+2 -2
pkgs/applications/networking/instant-messengers/gajim/default.nix
··· 22 23 python3.pkgs.buildPythonApplication rec { 24 pname = "gajim"; 25 - version = "1.5.4"; 26 27 src = fetchurl { 28 url = "https://gajim.org/downloads/${lib.versions.majorMinor version}/gajim-${version}.tar.gz"; 29 - sha256 = "sha256-uIzOKiCbHiSVRlXcpE0B/+Ats3cfw4u7eA+KyPriwhk="; 30 }; 31 32 buildInputs = [
··· 22 23 python3.pkgs.buildPythonApplication rec { 24 pname = "gajim"; 25 + version = "1.6.0"; 26 27 src = fetchurl { 28 url = "https://gajim.org/downloads/${lib.versions.majorMinor version}/gajim-${version}.tar.gz"; 29 + hash = "sha256-gHRB3thDH+CKRXTgrD37e2zf0rVDIVl4Zhxf5lsLjyc="; 30 }; 31 32 buildInputs = [
+3 -4
pkgs/applications/networking/instant-messengers/zulip/default.nix
··· 6 let 7 pname = "zulip"; 8 version = "5.9.4"; 9 - name = "${pname}-${version}"; 10 11 src = fetchurl { 12 url = "https://github.com/zulip/zulip-desktop/releases/download/v${version}/Zulip-${version}-x86_64.AppImage"; ··· 15 }; 16 17 appimageContents = appimageTools.extractType2 { 18 - inherit name src; 19 }; 20 21 in appimageTools.wrapType2 { 22 - inherit name src; 23 24 extraInstallCommands = '' 25 - mv $out/bin/${name} $out/bin/${pname} 26 install -m 444 -D ${appimageContents}/zulip.desktop $out/share/applications/zulip.desktop 27 install -m 444 -D ${appimageContents}/usr/share/icons/hicolor/512x512/apps/zulip.png \ 28 $out/share/icons/hicolor/512x512/apps/zulip.png
··· 6 let 7 pname = "zulip"; 8 version = "5.9.4"; 9 10 src = fetchurl { 11 url = "https://github.com/zulip/zulip-desktop/releases/download/v${version}/Zulip-${version}-x86_64.AppImage"; ··· 14 }; 15 16 appimageContents = appimageTools.extractType2 { 17 + inherit pname version src; 18 }; 19 20 in appimageTools.wrapType2 { 21 + inherit pname version src; 22 23 extraInstallCommands = '' 24 + mv "$out/bin/${pname}-${version}" "$out/bin/${pname}" 25 install -m 444 -D ${appimageContents}/zulip.desktop $out/share/applications/zulip.desktop 26 install -m 444 -D ${appimageContents}/usr/share/icons/hicolor/512x512/apps/zulip.png \ 27 $out/share/icons/hicolor/512x512/apps/zulip.png
+2 -2
pkgs/applications/networking/seaweedfs/default.nix
··· 7 8 buildGoModule rec { 9 pname = "seaweedfs"; 10 - version = "3.38"; 11 12 src = fetchFromGitHub { 13 owner = "seaweedfs"; 14 repo = "seaweedfs"; 15 rev = version; 16 - hash = "sha256-LYMGkv1rgUtA/TwulBhgw0w+8kbICtEgr7/K6exalxM="; 17 }; 18 19 vendorHash = "sha256-mwfs/tdq1Qq2auEwz24emf7pjpIJAncI78oxhAn2WkI=";
··· 7 8 buildGoModule rec { 9 pname = "seaweedfs"; 10 + version = "3.39"; 11 12 src = fetchFromGitHub { 13 owner = "seaweedfs"; 14 repo = "seaweedfs"; 15 rev = version; 16 + hash = "sha256-mbeTdrKptPaMw1OA3jFftjJPOmUnJcjbv81yDSlFeaU="; 17 }; 18 19 vendorHash = "sha256-mwfs/tdq1Qq2auEwz24emf7pjpIJAncI78oxhAn2WkI=";
+49 -12
pkgs/applications/office/qownnotes/default.nix
··· 1 - { mkDerivation, lib, stdenv, fetchurl 2 - , qmake, qttools, qtbase, qtsvg, qtdeclarative, qtxmlpatterns, qtwebsockets 3 - , qtx11extras, qtwayland 4 }: 5 6 - mkDerivation rec { 7 pname = "qownnotes"; 8 - version = "22.12.3"; 9 10 src = fetchurl { 11 url = "https://download.tuxfamily.org/${pname}/src/${pname}-${version}.tar.xz"; 12 - # Fetch the checksum of current version with curl: 13 - # curl https://download.tuxfamily.org/qownnotes/src/qownnotes-<version>.tar.xz.sha256 14 - sha256 = "sha256-fpI7RYOGmWwmau6tF8FPmY2/FtN9foWRX8/WgrNU6E8="; 15 }; 16 17 - nativeBuildInputs = [ qmake qttools ]; 18 19 - buildInputs = [ qtbase qtsvg qtdeclarative qtxmlpatterns qtwebsockets qtx11extras ] 20 - ++ lib.optionals stdenv.isLinux [ qtwayland ]; 21 22 meta = with lib; { 23 description = "Plain-text file notepad and todo-list manager with markdown support and Nextcloud/ownCloud integration"; 24 homepage = "https://www.qownnotes.org/"; 25 license = licenses.gpl2Only; 26 maintainers = with maintainers; [ totoroot ]; 27 - platforms = platforms.linux; 28 }; 29 }
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , qmake 5 + , qttools 6 + , qtbase 7 + , qtdeclarative 8 + , qtsvg 9 + , qtwayland 10 + , qtwebsockets 11 + , qtx11extras 12 + , qtxmlpatterns 13 + , makeWrapper 14 + , wrapQtAppsHook 15 }: 16 17 + let 18 pname = "qownnotes"; 19 + appname = "QOwnNotes"; 20 + version = "23.1.0"; 21 + in 22 + stdenv.mkDerivation { 23 + inherit pname appname version; 24 25 src = fetchurl { 26 url = "https://download.tuxfamily.org/${pname}/src/${pname}-${version}.tar.xz"; 27 + sha256 = "sha256-HMs8DTL2BDSDmchadpVvbShjJMPP6W587F38uiixCuQ="; 28 }; 29 30 + nativeBuildInputs = [ 31 + qmake 32 + qttools 33 + wrapQtAppsHook 34 + ] ++ lib.optionals stdenv.isDarwin [ makeWrapper ]; 35 36 + buildInputs = [ 37 + qtbase 38 + qtdeclarative 39 + qtsvg 40 + qtwebsockets 41 + qtx11extras 42 + qtxmlpatterns 43 + ] ++ lib.optionals stdenv.isLinux [ qtwayland ]; 44 + 45 + postInstall = 46 + # Create a lowercase symlink for Linux 47 + lib.optionalString stdenv.isLinux '' 48 + ln -s $out/bin/${appname} $out/bin/${pname} 49 + '' 50 + # Wrap application for macOS as lowercase binary 51 + + lib.optionalString stdenv.isDarwin '' 52 + mkdir -p $out/Applications 53 + mv $out/bin/${appname}.app $out/Applications 54 + makeWrapper $out/Applications/${appname}.app/Contents/MacOS/${appname} $out/bin/${pname} 55 + ''; 56 57 meta = with lib; { 58 description = "Plain-text file notepad and todo-list manager with markdown support and Nextcloud/ownCloud integration"; 59 homepage = "https://www.qownnotes.org/"; 60 + changelog = "https://www.qownnotes.org/changelog.html"; 61 + downloadPage = "https://github.com/pbek/QOwnNotes/releases/tag/v${version}"; 62 license = licenses.gpl2Only; 63 maintainers = with maintainers; [ totoroot ]; 64 + platforms = platforms.unix; 65 }; 66 }
+2 -2
pkgs/applications/science/biology/ants/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "ANTs"; 5 - version = "2.4.2"; 6 7 src = fetchFromGitHub { 8 owner = "ANTsX"; 9 repo = "ANTs"; 10 rev = "v${version}"; 11 - sha256 = "sha256-edkvTkgBNaC87Q0N/Fsebr9nRLMhDo4mrSGoMICdnwU="; 12 }; 13 14 nativeBuildInputs = [ cmake makeWrapper ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "ANTs"; 5 + version = "2.4.3"; 6 7 src = fetchFromGitHub { 8 owner = "ANTsX"; 9 repo = "ANTs"; 10 rev = "v${version}"; 11 + sha256 = "sha256-S4HYhsqof27UXEYjKvbod8N7PkZDmwLdwcEAvJD0W5g="; 12 }; 13 14 nativeBuildInputs = [ cmake makeWrapper ];
+28 -6
pkgs/applications/science/logic/cubicle/default.nix
··· 1 - { lib, stdenv, fetchurl, ocamlPackages }: 2 3 stdenv.mkDerivation rec { 4 pname = "cubicle"; 5 - version = "1.1.2"; 6 src = fetchurl { 7 - url = "http://cubicle.lri.fr/cubicle-${version}.tar.gz"; 8 - sha256 = "10kk80jdmpdvql88sdjsh7vqzlpaphd8vip2lp47aarxjkwjlz1q"; 9 }; 10 11 postPatch = '' 12 - substituteInPlace Makefile.in --replace "\\n" "" 13 ''; 14 15 - buildInputs = with ocamlPackages; [ ocaml findlib functory ]; 16 17 meta = with lib; { 18 description = "An open source model checker for verifying safety properties of array-based systems";
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , autoreconfHook 5 + , which 6 + , ocamlPackages 7 + }: 8 9 stdenv.mkDerivation rec { 10 pname = "cubicle"; 11 + version = "1.2.0"; 12 src = fetchurl { 13 + url = "https://github.com/cubicle-model-checker/cubicle/archive/refs/tags/${version}.tar.gz"; 14 + hash = "sha256-/EtbXpyXqRm0jGcMfGLAEwdr92061edjFys1V7/w6/Y="; 15 }; 16 17 + # https://github.com/cubicle-model-checker/cubicle/issues/1 18 postPatch = '' 19 + substituteInPlace Makefile.in \ 20 + --replace "@OCAMLC@" "ocamlfind ocamlc -package num" \ 21 + --replace "@OCAMLOPT@" "ocamlfind ocamlopt -package num" 22 ''; 23 24 + strictDeps = true; 25 + 26 + nativeBuildInputs = [ 27 + autoreconfHook 28 + which 29 + ] ++ (with ocamlPackages; [ 30 + findlib 31 + ocaml 32 + ]); 33 + 34 + buildInputs = with ocamlPackages; [ 35 + functory 36 + num 37 + ]; 38 39 meta = with lib; { 40 description = "An open source model checker for verifying safety properties of array-based systems";
+2 -2
pkgs/applications/version-management/subgit/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "subgit"; 5 - version = "3.3.15"; 6 7 meta = { 8 description = "A tool for a smooth, stress-free SVN to Git migration"; ··· 22 23 src = fetchurl { 24 url = "https://subgit.com/download/subgit-${version}.zip"; 25 - sha256 = "sha256-2/J/d4GrlLXR/7QBxgIMepzP+xxkeLvrCBwLl7Ke8wI="; 26 }; 27 }
··· 2 3 stdenv.mkDerivation rec { 4 pname = "subgit"; 5 + version = "3.3.16"; 6 7 meta = { 8 description = "A tool for a smooth, stress-free SVN to Git migration"; ··· 22 23 src = fetchurl { 24 url = "https://subgit.com/download/subgit-${version}.zip"; 25 + sha256 = "sha256-p7uBEG43N4Hed+8HYf3I9lQEvmYLV61oIyRrPHuGmUA="; 26 }; 27 }
+3 -3
pkgs/applications/virtualization/pods/default.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "pods"; 20 - version = "1.0.1"; 21 22 src = fetchFromGitHub { 23 owner = "marhkb"; 24 repo = pname; 25 rev = "v${version}"; 26 - sha256 = "sha256-oa7A0RMF7kPQXydysGpzAICgGoIRLWUMRibXdiftYyk="; 27 }; 28 29 cargoDeps = rustPlatform.fetchCargoTarball { 30 inherit src; 31 name = "${pname}-${version}"; 32 - sha256 = "sha256-RMxk7e/z+YneNWI/xsZDmXr7DqB7qHEY8HPvTCeSLjg="; 33 }; 34 35 nativeBuildInputs = [
··· 17 18 stdenv.mkDerivation rec { 19 pname = "pods"; 20 + version = "1.0.2"; 21 22 src = fetchFromGitHub { 23 owner = "marhkb"; 24 repo = pname; 25 rev = "v${version}"; 26 + sha256 = "sha256-Kjonyd0xL0QLjPS+U3xDC6AhOOxQmVAZ3STLXaa8eXc="; 27 }; 28 29 cargoDeps = rustPlatform.fetchCargoTarball { 30 inherit src; 31 name = "${pname}-${version}"; 32 + sha256 = "sha256-K5oOpo3xJiNg7F549JLGs83658MYcoGfuIcNoF88Njc="; 33 }; 34 35 nativeBuildInputs = [
+7 -1
pkgs/build-support/dotnet/build-dotnet-module/default.nix
··· 190 esac 191 done 192 193 - export tmp=$(mktemp -td "${pname}-tmp-XXXXXX") 194 HOME=$tmp/home 195 196 exitTrap() {
··· 190 esac 191 done 192 193 + if [[ ''${TMPDIR:-} == /run/user/* ]]; then 194 + # /run/user is usually a tmpfs in RAM, which may be too small 195 + # to store all downloaded dotnet packages 196 + TMPDIR= 197 + fi 198 + 199 + export tmp=$(mktemp -td "deps-${pname}-XXXXXX") 200 HOME=$tmp/home 201 202 exitTrap() {
+2 -2
pkgs/data/icons/colloid-icon-theme/default.nix
··· 18 19 stdenvNoCC.mkDerivation rec { 20 inherit pname; 21 - version = "2022-10-26"; 22 23 src = fetchFromGitHub { 24 owner = "vinceliuice"; 25 repo = pname; 26 rev = version; 27 - hash = "sha256-eHLfWrtY69S37OPvQdLwI/PRvoKCheF2MRsHG5+5BR0="; 28 }; 29 30 nativeBuildInputs = [
··· 18 19 stdenvNoCC.mkDerivation rec { 20 inherit pname; 21 + version = "2023-01-08"; 22 23 src = fetchFromGitHub { 24 owner = "vinceliuice"; 25 repo = pname; 26 rev = version; 27 + hash = "sha256-n4kMOIp7AD5Ue4qY4G3ja/VTyYF7cqhdI0uuk9b6o5c="; 28 }; 29 30 nativeBuildInputs = [
+2 -2
pkgs/data/misc/v2ray-domain-list-community/default.nix
··· 3 let 4 generator = pkgsBuildBuild.buildGoModule rec { 5 pname = "v2ray-domain-list-community"; 6 - version = "20221223102220"; 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "domain-list-community"; 10 rev = version; 11 - sha256 = "sha256-bvTNxJcogF3KxZbC8jW0PMIiJJZnzubWybDcNK7id8s="; 12 }; 13 vendorSha256 = "sha256-CCY3CgjA1w4svzmkaI2Jt272Rrt5UOt5sbVDAWRRfzk="; 14 meta = with lib; {
··· 3 let 4 generator = pkgsBuildBuild.buildGoModule rec { 5 pname = "v2ray-domain-list-community"; 6 + version = "20230106031328"; 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "domain-list-community"; 10 rev = version; 11 + sha256 = "sha256-17yAIJQdxZAsNZ8W3HaW+EVKcPYy9fBOsSxU/0GEJuU="; 12 }; 13 vendorSha256 = "sha256-CCY3CgjA1w4svzmkaI2Jt272Rrt5UOt5sbVDAWRRfzk="; 14 meta = with lib; {
+3 -3
pkgs/data/misc/v2ray-geoip/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "v2ray-geoip"; 5 - version = "202212220043"; 6 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "geoip"; 10 - rev = "4a54320369805321b90c7c5ca4cdda4f12bdd295"; 11 - sha256 = "sha256-PFbjzzjeCKL9aak45B+R5Y+H3fTBzdXpyEvvEEdInbQ="; 12 }; 13 14 installPhase = ''
··· 2 3 stdenv.mkDerivation rec { 4 pname = "v2ray-geoip"; 5 + version = "202301050046"; 6 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "geoip"; 10 + rev = "6bb07558ac223b3decdff985d5737f4384b34238"; 11 + sha256 = "sha256-KXLIIs1W+8TC2GtW3m/YA5WQ13Pq5kxC5Zc9jDzW/tU="; 12 }; 13 14 installPhase = ''
+4 -9
pkgs/development/libraries/libquotient/default.nix
··· 1 - { mkDerivation, lib, fetchFromGitHub, cmake, qtmultimedia }: 2 3 mkDerivation rec { 4 pname = "libquotient"; 5 - version = "0.6.11"; 6 7 src = fetchFromGitHub { 8 owner = "quotient-im"; 9 repo = "libQuotient"; 10 rev = version; 11 - sha256 = "sha256-FPtxeZOfChIPi4e/h/eZkByH1QL3Fn0OJxe0dnMcTRw="; 12 }; 13 14 - buildInputs = [ qtmultimedia ]; 15 16 nativeBuildInputs = [ cmake ]; 17 - 18 - cmakeFlags = [ 19 - # we need libqtolm for this 20 - "-DQuotient_ENABLE_E2EE=OFF" 21 - ]; 22 23 # https://github.com/quotient-im/libQuotient/issues/551 24 postPatch = ''
··· 1 + { mkDerivation, lib, fetchFromGitHub, cmake, qtmultimedia, qtkeychain }: 2 3 mkDerivation rec { 4 pname = "libquotient"; 5 + version = "0.7.0"; 6 7 src = fetchFromGitHub { 8 owner = "quotient-im"; 9 repo = "libQuotient"; 10 rev = version; 11 + sha256 = "sha256-9NAWphpAI7/qWDMjsx26s+hOaQh0hbzjePfESC7PtXc="; 12 }; 13 14 + buildInputs = [ qtmultimedia qtkeychain ]; 15 16 nativeBuildInputs = [ cmake ]; 17 18 # https://github.com/quotient-im/libQuotient/issues/551 19 postPatch = ''
+2 -11
pkgs/development/libraries/libxlsxwriter/default.nix
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 - , fetchpatch 5 , minizip 6 , python3 7 , zlib ··· 9 10 stdenv.mkDerivation rec { 11 pname = "libxlsxwriter"; 12 - version = "1.1.4"; 13 14 src = fetchFromGitHub { 15 owner = "jmcnamara"; 16 repo = "libxlsxwriter"; 17 rev = "RELEASE_${version}"; 18 - sha256 = "sha256-Ef1CipwUEJW/VYx/q98lN0PSxj8c3DbIuql8qU6mTRs="; 19 }; 20 - 21 - patches = [ 22 - # https://github.com/jmcnamara/libxlsxwriter/pull/357 23 - (fetchpatch { 24 - url = "https://github.com/jmcnamara/libxlsxwriter/commit/723629976ede5e6ec9b03ef970381fed06ef95f0.patch"; 25 - sha256 = "14aw698b5svvbhvadc2vr71isck3k02zdv8xjsa7c33n8331h20g"; 26 - }) 27 - ]; 28 29 nativeBuildInputs = [ 30 python3.pkgs.pytest
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 , minizip 5 , python3 6 , zlib ··· 8 9 stdenv.mkDerivation rec { 10 pname = "libxlsxwriter"; 11 + version = "1.1.5"; 12 13 src = fetchFromGitHub { 14 owner = "jmcnamara"; 15 repo = "libxlsxwriter"; 16 rev = "RELEASE_${version}"; 17 + hash = "sha256-fC03LwZIUkEsAs9TN0n2z0iSOGPAtVCeuW5rxC7Ek7Q="; 18 }; 19 20 nativeBuildInputs = [ 21 python3.pkgs.pytest
+2 -2
pkgs/development/libraries/mapbox-gl-qml/default.nix
··· 11 12 mkDerivation rec { 13 pname = "mapbox-gl-qml"; 14 - version = "2.0.1"; 15 16 src = fetchFromGitHub { 17 owner = "rinigus"; 18 repo = "mapbox-gl-qml"; 19 rev = version; 20 - hash = "sha256-EVZbQXV8pI0QTqFDTTynVglsqX1O5oK0Pl5Y/wp+/q0="; 21 }; 22 23 nativeBuildInputs = [ cmake pkg-config ];
··· 11 12 mkDerivation rec { 13 pname = "mapbox-gl-qml"; 14 + version = "2.1.1"; 15 16 src = fetchFromGitHub { 17 owner = "rinigus"; 18 repo = "mapbox-gl-qml"; 19 rev = version; 20 + hash = "sha256-zZcD85nOZZ067FRvSuzE8lr2gyuVxpcZGp44D4ayc3Q="; 21 }; 22 23 nativeBuildInputs = [ cmake pkg-config ];
+3 -4
pkgs/development/libraries/maplibre-gl-native/default.nix
··· 13 14 mkDerivation rec { 15 pname = "maplibre-gl-native"; 16 - version = "unstable-2022-04-07"; 17 18 src = fetchFromGitHub { 19 owner = "maplibre"; 20 repo = "maplibre-gl-native"; 21 - rev = "225f8a4bfe7ad30fd59d693c1fb3ca0ba70d2806"; 22 fetchSubmodules = true; 23 - hash = "sha256-NLtpi+bDLTHlnzMZ4YFQyF5B1xt9lzHyZPvEQLlBAnY="; 24 }; 25 26 patches = [ ··· 61 license = licenses.bsd2; 62 maintainers = with maintainers; [ dotlambda ]; 63 platforms = platforms.linux; 64 - broken = lib.versionOlder qtbase.version "5.15"; 65 }; 66 }
··· 13 14 mkDerivation rec { 15 pname = "maplibre-gl-native"; 16 + version = "2.0.1"; 17 18 src = fetchFromGitHub { 19 owner = "maplibre"; 20 repo = "maplibre-gl-native"; 21 + rev = "qt-v${version}"; 22 fetchSubmodules = true; 23 + hash = "sha256-g5J873U/6mrl27iquPl3BdEGhMxkOdfP15dHr27wa48="; 24 }; 25 26 patches = [ ··· 61 license = licenses.bsd2; 62 maintainers = with maintainers; [ dotlambda ]; 63 platforms = platforms.linux; 64 }; 65 }
+35 -14
pkgs/development/perl-modules/strip-nondeterminism/default.nix
··· 1 - { lib, stdenv, file, fetchFromGitLab, buildPerlPackage, ArchiveZip, ArchiveCpio, shortenPerlShebang }: 2 3 buildPerlPackage rec { 4 pname = "strip-nondeterminism"; 5 - version = "1.0.0"; 6 7 outputs = [ "out" "dev" ]; # no "devdoc" 8 ··· 11 repo = "strip-nondeterminism"; 12 domain = "salsa.debian.org"; 13 rev = version; 14 - sha256 = "1pwar1fyadqxmvb7x4zyw2iawbi5lsfjcg0ps9n9rdjb6an7vv64"; 15 }; 16 17 - # stray test failure 18 - doCheck = false; 19 20 - nativeBuildInputs = lib.optionals stdenv.isDarwin [ shortenPerlShebang ]; 21 - buildInputs = [ ArchiveZip ArchiveCpio ]; 22 - propagatedNativeBuildInputs = [ file ]; 23 24 - perlPostHook = '' 25 # we don’t need the debhelper script 26 rm $out/bin/dh_strip_nondeterminism 27 - rm $out/share/man/man1/dh_strip_nondeterminism.1.gz 28 ''; 29 30 - postInstall = lib.optionalString stdenv.isDarwin '' 31 - shortenPerlShebang $out/bin/strip-nondeterminism 32 - ''; 33 34 meta = with lib; { 35 description = "A Perl module for stripping bits of non-deterministic information"; 36 homepage = "https://reproducible-builds.org/"; 37 license = licenses.gpl3Only; 38 - maintainers = with maintainers; [ pSub ]; 39 }; 40 }
··· 1 + { lib 2 + , stdenv 3 + , file 4 + , fetchFromGitLab 5 + , buildPerlPackage 6 + , ArchiveZip 7 + , ArchiveCpio 8 + , SubOverride 9 + , shortenPerlShebang 10 + }: 11 12 buildPerlPackage rec { 13 pname = "strip-nondeterminism"; 14 + version = "1.13.0"; 15 16 outputs = [ "out" "dev" ]; # no "devdoc" 17 ··· 20 repo = "strip-nondeterminism"; 21 domain = "salsa.debian.org"; 22 rev = version; 23 + sha256 = "sha256-KZQeoJYBPJzUvz4wlUZbiGODbpCp7/52dsg5OemKDkI="; 24 }; 25 26 + strictDeps = true; 27 + nativeBuildInputs = lib.optionals stdenv.isDarwin [ shortenPerlShebang ]; 28 + buildInputs = [ 29 + ArchiveZip 30 + ArchiveCpio 31 + ]; 32 + 33 + checkInputs = [ SubOverride ]; 34 + 35 + postPatch = '' 36 + substituteInPlace lib/File/StripNondeterminism.pm \ 37 + --replace "exec('file'" "exec('${lib.getExe file}'" 38 + ''; 39 40 41 + postBuild = '' 42 + patchShebangs ./bin 43 + '' + lib.optionalString stdenv.isDarwin '' 44 + shortenPerlShebang bin/strip-nondeterminism 45 + ''; 46 + 47 + postInstall = '' 48 # we don’t need the debhelper script 49 rm $out/bin/dh_strip_nondeterminism 50 + rm $out/share/man/man1/dh_strip_nondeterminism.1 51 ''; 52 53 + doCheck = true; 54 55 meta = with lib; { 56 description = "A Perl module for stripping bits of non-deterministic information"; 57 homepage = "https://reproducible-builds.org/"; 58 license = licenses.gpl3Only; 59 + maintainers = with maintainers; [ pSub artturin ]; 60 }; 61 }
+2 -2
pkgs/development/python-modules/aioesphomeapi/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "aioesphomeapi"; 15 - version = "13.0.3"; 16 format = "setuptools"; 17 18 disabled = pythonOlder "3.9"; ··· 21 owner = "esphome"; 22 repo = pname; 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-gDz0eylyUae8fB+ssMZk8Mot/K9RlIIzn+B0LNdMmPs="; 25 }; 26 27 postPatch = ''
··· 12 13 buildPythonPackage rec { 14 pname = "aioesphomeapi"; 15 + version = "13.0.4"; 16 format = "setuptools"; 17 18 disabled = pythonOlder "3.9"; ··· 21 owner = "esphome"; 22 repo = pname; 23 rev = "refs/tags/v${version}"; 24 + hash = "sha256-pqCg4LAFIr5BEDqRWMaNc3M36bUmou5cZdarQ/0W77Y="; 25 }; 26 27 postPatch = ''
+2 -2
pkgs/development/python-modules/debugpy/default.nix
··· 17 18 buildPythonPackage rec { 19 pname = "debugpy"; 20 - version = "1.6.4"; 21 format = "setuptools"; 22 23 disabled = pythonOlder "3.7"; ··· 26 owner = "Microsoft"; 27 repo = pname; 28 rev = "refs/tags/v${version}"; 29 - sha256 = "sha256-THhu6Oa4x2b0chLFrJR7FF1z8X3/dsHzXosBmSqaDeI="; 30 }; 31 32 patches = [
··· 17 18 buildPythonPackage rec { 19 pname = "debugpy"; 20 + version = "1.6.5"; 21 format = "setuptools"; 22 23 disabled = pythonOlder "3.7"; ··· 26 owner = "Microsoft"; 27 repo = pname; 28 rev = "refs/tags/v${version}"; 29 + sha256 = "sha256-98hyNer2Xtx6D2R3pFhLC3tb/2DFTawXO36xfwhIfEg="; 30 }; 31 32 patches = [
+3 -3
pkgs/development/python-modules/gb-io/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "gb-io"; 12 - version = "0.1.1"; 13 14 src = fetchFromGitHub { 15 owner = "althonos"; 16 repo = "gb-io.py"; 17 rev = "v${version}"; 18 - sha256 = "05fpz11rqqjrb8lc8id6ssv7sni9i1h7x1ra5v5flw9ghpf29ncm"; 19 }; 20 21 cargoDeps = rustPlatform.fetchCargoTarball { 22 inherit src sourceRoot; 23 name = "${pname}-${version}"; 24 - sha256 = "1qh31jysg475f2qc70b3bczmzywmg9987kn2vsmk88h8sx4nnwc5"; 25 }; 26 27 sourceRoot = "source";
··· 9 10 buildPythonPackage rec { 11 pname = "gb-io"; 12 + version = "0.2.1"; 13 14 src = fetchFromGitHub { 15 owner = "althonos"; 16 repo = "gb-io.py"; 17 rev = "v${version}"; 18 + sha256 = "sha256-1B7BUJ8H+pTtmDtazfPfYtlXzL/x4rAHtRIFAAsSoWs="; 19 }; 20 21 cargoDeps = rustPlatform.fetchCargoTarball { 22 inherit src sourceRoot; 23 name = "${pname}-${version}"; 24 + sha256 = "sha256-lPnOFbEJgcaPPl9bTngugubhW//AUFp9RAjyiFHxC70="; 25 }; 26 27 sourceRoot = "source";
+2 -2
pkgs/development/python-modules/imageio/default.nix
··· 16 17 buildPythonPackage rec { 18 pname = "imageio"; 19 - version = "2.23.0"; 20 disabled = pythonOlder "3.7"; 21 22 src = fetchPypi { 23 - sha256 = "sha256-y2NXCXZeUnyUiQtPu2hw5ZIT/hgqHICG0WfrNiYHPL0="; 24 inherit pname version; 25 }; 26
··· 16 17 buildPythonPackage rec { 18 pname = "imageio"; 19 + version = "2.24.0"; 20 disabled = pythonOlder "3.7"; 21 22 src = fetchPypi { 23 + sha256 = "sha256-8kD4Ip9PMpoVRigRlLUtpdZpQUGlJGaP7T+BsNB3gvo="; 24 inherit pname version; 25 }; 26
+2 -16
pkgs/development/python-modules/mat2/default.nix
··· 4 , unittestCheckHook 5 , pythonOlder 6 , fetchFromGitLab 7 - , fetchpatch 8 , substituteAll 9 , bubblewrap 10 , exiftool ··· 24 25 buildPythonPackage rec { 26 pname = "mat2"; 27 - version = "0.13.0"; 28 29 disabled = pythonOlder "3.5"; 30 ··· 33 owner = "jvoisin"; 34 repo = "mat2"; 35 rev = version; 36 - hash = "sha256-H3l8w2F+ZcJ1P/Dg0ZVBJPUK0itLocL7a0jeSrG3Ws8="; 37 }; 38 39 patches = [ ··· 49 ./executable-name.patch 50 # hardcode path to mat2 executable 51 ./tests.patch 52 - # fix gobject-introspection typelib path for Nautilus extension 53 - (substituteAll { 54 - src = ./fix_poppler.patch; 55 - poppler_path = "${poppler_gi}/lib/girepository-1.0"; 56 - }) 57 - # https://0xacab.org/jvoisin/mat2/-/issues/178 58 - (fetchpatch { 59 - url = "https://0xacab.org/jvoisin/mat2/-/commit/618e0a8e3984fd534b95ef3dbdcb8a76502c90b5.patch"; 60 - hash = "sha256-l9UFim3hGj+d2uKITiDG1OnqGeo2McBIiRSmK0Vidg8="; 61 - }) 62 ] ++ lib.optionals (stdenv.hostPlatform.isLinux) [ 63 (substituteAll { 64 src = ./bubblewrap-path.patch; ··· 92 postInstall = '' 93 install -Dm 444 data/mat2.svg -t "$out/share/icons/hicolor/scalable/apps" 94 install -Dm 444 doc/mat2.1 -t "$out/share/man/man1" 95 - install -Dm 444 nautilus/mat2.py -t "$out/share/nautilus-python/extensions" 96 - buildPythonPath "$out $pythonPath $propagatedBuildInputs" 97 - patchPythonScript "$out/share/nautilus-python/extensions/mat2.py" 98 '' + lib.optionalString dolphinIntegration '' 99 install -Dm 444 dolphin/mat2.desktop -t "$out/share/kservices5/ServiceMenus" 100 '';
··· 4 , unittestCheckHook 5 , pythonOlder 6 , fetchFromGitLab 7 , substituteAll 8 , bubblewrap 9 , exiftool ··· 23 24 buildPythonPackage rec { 25 pname = "mat2"; 26 + version = "0.13.1"; 27 28 disabled = pythonOlder "3.5"; 29 ··· 32 owner = "jvoisin"; 33 repo = "mat2"; 34 rev = version; 35 + hash = "sha256-/HcWVXguZf9cCGY0xlC7uMnLkSAqZ0DIAC6JUw2KKDs="; 36 }; 37 38 patches = [ ··· 48 ./executable-name.patch 49 # hardcode path to mat2 executable 50 ./tests.patch 51 ] ++ lib.optionals (stdenv.hostPlatform.isLinux) [ 52 (substituteAll { 53 src = ./bubblewrap-path.patch; ··· 81 postInstall = '' 82 install -Dm 444 data/mat2.svg -t "$out/share/icons/hicolor/scalable/apps" 83 install -Dm 444 doc/mat2.1 -t "$out/share/man/man1" 84 '' + lib.optionalString dolphinIntegration '' 85 install -Dm 444 dolphin/mat2.desktop -t "$out/share/kservices5/ServiceMenus" 86 '';
-14
pkgs/development/python-modules/mat2/fix_poppler.patch
··· 1 - diff --git a/nautilus/mat2.py b/nautilus/mat2.py 2 - index 11e6986..5a0e68f 100644 3 - --- a/nautilus/mat2.py 4 - +++ b/nautilus/mat2.py 5 - @@ -22,6 +22,9 @@ import gi 6 - gi.require_version('Nautilus', '3.0') 7 - gi.require_version('Gtk', '3.0') 8 - gi.require_version('GdkPixbuf', '2.0') 9 - +gi.require_version('GIRepository', '2.0') 10 - +from gi.repository import GIRepository 11 - +GIRepository.Repository.prepend_search_path('@poppler_path@') 12 - from gi.repository import Nautilus, GObject, Gtk, Gio, GLib, GdkPixbuf 13 - 14 - from libmat2 import parser_factory
···
+6 -6
pkgs/development/python-modules/mat2/paths.patch
··· 13 +Exec=@kdialog@ --yesno "$( @mat2@ -s %F )" --title "Clean Metadata?" && @mat2@ %U 14 +Exec[de]=@kdialog@ --yesno "$( @mat2@ -s %F )" --title "Metadaten löschen?" && @mat2@ %U 15 diff --git a/libmat2/exiftool.py b/libmat2/exiftool.py 16 - index eb65b2a..51a0fa1 100644 17 --- a/libmat2/exiftool.py 18 +++ b/libmat2/exiftool.py 19 @@ -1,8 +1,6 @@ ··· 23 import os 24 -import shutil 25 import subprocess 26 - from typing import Dict, Union, Set 27 28 - @@ -70,14 +68,5 @@ class ExiftoolParser(abstract.AbstractParser): 29 return False 30 return True 31 32 - -@functools.lru_cache() 33 def _get_exiftool_path() -> str: # pragma: no cover 34 - which_path = shutil.which('exiftool') 35 - if which_path: ··· 42 - raise RuntimeError("Unable to find exiftool") 43 + return '@exiftool@' 44 diff --git a/libmat2/video.py b/libmat2/video.py 45 - index ae9e463..2acc65c 100644 46 --- a/libmat2/video.py 47 +++ b/libmat2/video.py 48 @@ -1,6 +1,4 @@ ··· 51 -import shutil 52 import logging 53 54 - from typing import Dict, Union 55 @@ -135,10 +133,5 @@ class MP4Parser(AbstractFFmpegParser): 56 } 57
··· 13 +Exec=@kdialog@ --yesno "$( @mat2@ -s %F )" --title "Clean Metadata?" && @mat2@ %U 14 +Exec[de]=@kdialog@ --yesno "$( @mat2@ -s %F )" --title "Metadaten löschen?" && @mat2@ %U 15 diff --git a/libmat2/exiftool.py b/libmat2/exiftool.py 16 + index cdfce3d..1e83520 100644 17 --- a/libmat2/exiftool.py 18 +++ b/libmat2/exiftool.py 19 @@ -1,8 +1,6 @@ ··· 23 import os 24 -import shutil 25 import subprocess 26 + from typing import Union 27 28 + @@ -67,14 +65,5 @@ class ExiftoolParser(abstract.AbstractParser): 29 return False 30 return True 31 32 + -@functools.lru_cache 33 def _get_exiftool_path() -> str: # pragma: no cover 34 - which_path = shutil.which('exiftool') 35 - if which_path: ··· 42 - raise RuntimeError("Unable to find exiftool") 43 + return '@exiftool@' 44 diff --git a/libmat2/video.py b/libmat2/video.py 45 + index 4d33aa4..6388664 100644 46 --- a/libmat2/video.py 47 +++ b/libmat2/video.py 48 @@ -1,6 +1,4 @@ ··· 51 -import shutil 52 import logging 53 54 + from typing import Union 55 @@ -135,10 +133,5 @@ class MP4Parser(AbstractFFmpegParser): 56 } 57
+5 -5
pkgs/development/python-modules/nbxmpp/default.nix
··· 4 , fetchFromGitLab 5 , gobject-introspection 6 , idna 7 - , libsoup 8 , precis-i18n 9 , pygobject3 10 , pyopenssl ··· 13 14 buildPythonPackage rec { 15 pname = "nbxmpp"; 16 - version = "3.2.5"; 17 18 - disabled = pythonOlder "3.7"; 19 20 src = fetchFromGitLab { 21 domain = "dev.gajim.org"; 22 owner = "gajim"; 23 repo = "python-nbxmpp"; 24 rev = version; 25 - sha256 = "sha256-HIPvZu8Zj69k1FCbkrlSeGtur5cT0TNIYfdXcRbYLwQ="; 26 }; 27 28 nativeBuildInputs = [ ··· 37 propagatedBuildInputs = [ 38 gobject-introspection 39 idna 40 - libsoup 41 pygobject3 42 pyopenssl 43 ];
··· 4 , fetchFromGitLab 5 , gobject-introspection 6 , idna 7 + , libsoup_3 8 , precis-i18n 9 , pygobject3 10 , pyopenssl ··· 13 14 buildPythonPackage rec { 15 pname = "nbxmpp"; 16 + version = "4.0.0"; 17 18 + disabled = pythonOlder "3.10"; 19 20 src = fetchFromGitLab { 21 domain = "dev.gajim.org"; 22 owner = "gajim"; 23 repo = "python-nbxmpp"; 24 rev = version; 25 + hash = "sha256-6PYJGlNOZMwHMXwf05IWekJ+haMfg+ooH5On+aYOWSI="; 26 }; 27 28 nativeBuildInputs = [ ··· 37 propagatedBuildInputs = [ 38 gobject-introspection 39 idna 40 + libsoup_3 41 pygobject3 42 pyopenssl 43 ];
+2 -2
pkgs/development/python-modules/oslo-db/default.nix
··· 16 17 buildPythonPackage rec { 18 pname = "oslo-db"; 19 - version = "12.2.0"; 20 21 src = fetchPypi { 22 pname = "oslo.db"; 23 inherit version; 24 - sha256 = "sha256-wAA/+oqFjUfbFYIxSWWC9jgFpgqvIg4AlKhVM3MwGuc="; 25 }; 26 27 nativeBuildInputs = [ pbr ];
··· 16 17 buildPythonPackage rec { 18 pname = "oslo-db"; 19 + version = "12.3.0"; 20 21 src = fetchPypi { 22 pname = "oslo.db"; 23 inherit version; 24 + sha256 = "sha256-egL5k/Y99DLYhGsvC3t0dluwFJRe21sBWI5qG5Gzuck="; 25 }; 26 27 nativeBuildInputs = [ pbr ];
+2 -2
pkgs/development/python-modules/peaqevcore/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "peaqevcore"; 9 - version = "10.1.4"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - hash = "sha256-h3kNmWa9ZOpI0DG49H3n1MPZu753nrdzSIh8V5N3H6I="; 17 }; 18 19 postPatch = ''
··· 6 7 buildPythonPackage rec { 8 pname = "peaqevcore"; 9 + version = "10.2.6"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + hash = "sha256-uQPz7IB14dFrupZIA87jG5P7USaGKs0WWlgbaLAEPp4="; 17 }; 18 19 postPatch = ''
+16 -34
pkgs/development/python-modules/polars/default.nix
··· 5 , rustPlatform 6 , libiconv 7 , fetchzip 8 }: 9 let 10 pname = "polars"; 11 - version = "0.13.19"; 12 rootSource = fetchzip { 13 - url = "https://github.com/pola-rs/${pname}/archive/refs/tags/py-polars-v${version}.tar.gz"; 14 - sha256 = "sha256-JOHjxTTPzS9Dd/ODp4r0ebU9hEonxrbjURJoq0BQCyI="; 15 }; 16 in 17 buildPythonPackage { ··· 19 format = "pyproject"; 20 disabled = pythonOlder "3.6"; 21 src = rootSource; 22 preBuild = '' 23 cd py-polars 24 ''; 25 26 cargoDeps = rustPlatform.fetchCargoTarball { ··· 29 cd py-polars 30 ''; 31 name = "${pname}-${version}"; 32 - sha256 = "sha256-KEt8lITY4El2afuh2cxnrDkXGN3MZgfKQU3Pe2jECF0="; 33 }; 34 cargoRoot = "py-polars"; 35 36 nativeBuildInputs = with rustPlatform; [ cargoSetupHook maturinBuildHook ]; 37 ··· 49 # ]; 50 51 meta = with lib; { 52 - # Adding cmake to nativeBuildInputs and using `dontUseCmakeConfigure = true;` 53 - # The following error still happens 54 - 55 - # Compiling arrow2 v0.10.1 (https://github.com/ritchie46/arrow2?branch=polars#da703ae3) 56 - # error[E0554]: `#![feature]` may not be used on the stable release channel 57 - # --> /build/polars-0.13.19-vendor.tar.gz/arrow2/src/lib.rs:8:39 58 - # | 59 - # 8 | #![cfg_attr(feature = "simd", feature(portable_simd))] 60 - # | ^^^^^^^^^^^^^ 61 - # error: aborting due to previous error 62 - # For more information about this error, try `rustc --explain E0554`. 63 - # error: could not compile `arrow2` due to 2 previous errors 64 - # warning: build failed, waiting for other jobs to finish... 65 - # maturin failed 66 - # Caused by: Failed to build a native library through cargo 67 - # Caused by: Cargo build finished with "exit status: 101": `cargo rustc --message-format json --manifest-path Cargo.toml -j 8 --frozen --target x86_64-unknown-linux-gnu --release --lib -- -C link-arg=-s` 68 - # error: builder for '/nix/store/qfnqi5hs3x4xdb6d4f6rpaf63n1w74yn-python3.10-polars-0.13.19.drv' failed with exit code 1; 69 - # last 10 log lines: 70 - # > error: aborting due to previous error 71 - # > 72 - # > 73 - # > For more information about this error, try `rustc --explain E0554`. 74 - # > 75 - # > error: could not compile `arrow2` due to 2 previous errors 76 - # > warning: build failed, waiting for other jobs to finish... 77 - # > maturin failed 78 - # > Caused by: Failed to build a native library through cargo 79 - # > Caused by: Cargo build finished with "exit status: 101": `cargo rustc --message-format json --manifest-path Cargo.toml -j 8 --frozen --target x86_64-unknown-linux-gnu --release --lib -- -C link-arg=-s` 80 - # For full logs, run 'nix log /nix/store/qfnqi5hs3x4xdb6d4f6rpaf63n1w74yn-python3.10-polars-0.13.19.drv'. 81 - broken = true; 82 description = "Fast multi-threaded DataFrame library in Rust | Python | Node.js "; 83 homepage = "https://github.com/pola-rs/polars"; 84 license = licenses.asl20;
··· 5 , rustPlatform 6 , libiconv 7 , fetchzip 8 + , typing-extensions 9 }: 10 let 11 pname = "polars"; 12 + version = "0.15.13"; 13 rootSource = fetchzip { 14 + url = "https://github.com/pola-rs/${pname}/archive/refs/tags/py-${version}.tar.gz"; 15 + sha256 = "sha256-bk2opNLN3L+fkzXVfUU5O37UmA27ijmnAElCHjsuI+o="; 16 }; 17 in 18 buildPythonPackage { ··· 20 format = "pyproject"; 21 disabled = pythonOlder "3.6"; 22 src = rootSource; 23 + 24 + # Cargo.lock files is sometimes behind actual release which throws an error, 25 + # thus the `sed` command 26 + # Make sure to check that the right substitutions are made when updating the package 27 preBuild = '' 28 cd py-polars 29 + sed -i 's/version = "0.15.11"/version = "${version}"/g' Cargo.lock 30 ''; 31 32 cargoDeps = rustPlatform.fetchCargoTarball { ··· 35 cd py-polars 36 ''; 37 name = "${pname}-${version}"; 38 + sha256 = "sha256-u7ascftUPz8K+gWwjjxdXXFJf++M+8P9QE/KVJkO5DM="; 39 }; 40 cargoRoot = "py-polars"; 41 + 42 + # Revisit this whenever package or Rust is upgraded 43 + RUSTC_BOOTSTRAP = 1; 44 + 45 + propagatedBuildInputs = if pythonOlder "3.10" then [ typing-extensions ] else []; 46 47 nativeBuildInputs = with rustPlatform; [ cargoSetupHook maturinBuildHook ]; 48 ··· 60 # ]; 61 62 meta = with lib; { 63 + broken = (stdenv.isLinux && stdenv.isAarch64) || stdenv.isDarwin; 64 description = "Fast multi-threaded DataFrame library in Rust | Python | Node.js "; 65 homepage = "https://github.com/pola-rs/polars"; 66 license = licenses.asl20;
+2 -2
pkgs/development/python-modules/whois/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "whois"; 10 - version = "0.9.21"; 11 format = "setuptools"; 12 13 disabled = pythonOlder "3.7"; ··· 16 owner = "DannyCork"; 17 repo = "python-whois"; 18 rev = "refs/tags/${version}"; 19 - hash = "sha256-gsWvmAnzlm31UHT//VbXvryKWN8m/+hvLoKxLmQOK5k="; 20 }; 21 22 propagatedBuildInputs = [
··· 7 8 buildPythonPackage rec { 9 pname = "whois"; 10 + version = "0.9.22"; 11 format = "setuptools"; 12 13 disabled = pythonOlder "3.7"; ··· 16 owner = "DannyCork"; 17 repo = "python-whois"; 18 rev = "refs/tags/${version}"; 19 + hash = "sha256-k1pvElqZTWJp8PTvQJCFeJqfzHW/QJQXCd4zBAtU0G4="; 20 }; 21 22 propagatedBuildInputs = [
+1 -1
pkgs/development/tools/icr/default.nix
··· 33 34 postFixup = '' 35 wrapProgram $out/bin/icr \ 36 - --prefix PATH : ${lib.makeBinPath [ crystal shards makeWrapper which ]} 37 ''; 38 39 meta = with lib; {
··· 33 34 postFixup = '' 35 wrapProgram $out/bin/icr \ 36 + --prefix PATH : ${lib.makeBinPath [ crystal shards which ]} 37 ''; 38 39 meta = with lib; {
+3 -3
pkgs/development/tools/rust/cargo-llvm-cov/default.nix
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "cargo-llvm-cov"; 9 - version = "0.5.2"; 10 11 src = fetchzip { 12 url = "https://crates.io/api/v1/crates/${pname}/${version}/download#${pname}-${version}.tar.gz"; 13 - sha256 = "sha256-K6r2YHQq3MEqq9aobJLZBH9COPXpW3TmX1GB1qfnV60="; 14 }; 15 - cargoSha256 = "sha256-oMisrS+fDzSdT6JmkAMk8kztOgw2XUOrkhehmd9gxL0="; 16 17 # skip tests which require llvm-tools-preview 18 checkFlags = [
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "cargo-llvm-cov"; 9 + version = "0.5.4"; 10 11 src = fetchzip { 12 url = "https://crates.io/api/v1/crates/${pname}/${version}/download#${pname}-${version}.tar.gz"; 13 + sha256 = "sha256-xBWp9+Vv1Ho63WWlvbvLU+h0dh5CpUamlRQtmX6rOeY="; 14 }; 15 + cargoSha256 = "sha256-GKrqB6BtRbhtOlD2YeEMh6aqblPNEJjkR+tAsSpOFig="; 16 17 # skip tests which require llvm-tools-preview 18 checkFlags = [
+6 -4
pkgs/development/tools/rust/cargo-public-api/default.nix
··· 4 , pkg-config 5 , openssl 6 , stdenv 7 }: 8 9 rustPlatform.buildRustPackage rec { 10 pname = "cargo-public-api"; 11 - version = "0.24.1"; 12 13 src = fetchCrate { 14 inherit pname version; 15 - sha256 = "sha256-xXwJ6MXnSgqIQ5IuqfDm/TUXgkppKCPG3TB7veza/H8="; 16 }; 17 18 - cargoSha256 = "sha256-1sSvK8oZspIxDcMAl2MyAQzuijAxj1kpiZf1QwwyYDs="; 19 20 nativeBuildInputs = [ pkg-config ]; 21 22 - buildInputs = [ openssl ]; 23 24 # Tests fail 25 doCheck = false;
··· 4 , pkg-config 5 , openssl 6 , stdenv 7 + , darwin 8 }: 9 10 rustPlatform.buildRustPackage rec { 11 pname = "cargo-public-api"; 12 + version = "0.26.0"; 13 14 src = fetchCrate { 15 inherit pname version; 16 + sha256 = "sha256-BiGVdWgDi+g+mxdM3+z5RN1pGJz9NIKVm8sTZf2ObCc="; 17 }; 18 19 + cargoSha256 = "sha256-QvZBWo/u+WtIG5zlDVTC2+5bq/mqZftXU5m8oqN25GM="; 20 21 nativeBuildInputs = [ pkg-config ]; 22 23 + buildInputs = [ openssl ] 24 + ++ lib.optionals stdenv.isDarwin [ darwin.apple_sdk.frameworks.Security ]; 25 26 # Tests fail 27 doCheck = false;
+3 -3
pkgs/development/tools/zed/default.nix
··· 5 6 buildGoModule rec { 7 pname = "zed"; 8 - version = "1.3.0"; 9 10 src = fetchFromGitHub { 11 owner = "brimdata"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-DVQoWam5szELJ3OeIKHYF0CBZ0AJlhuIJRrdhqmyhQM="; 15 }; 16 17 - vendorSha256 = "sha256-2zSSjAoeb+7Nk/dxpvp5P2/bSJXgkA0TieTQHK4ym1Y="; 18 19 subPackages = [ "cmd/zed" "cmd/zq" ]; 20
··· 5 6 buildGoModule rec { 7 pname = "zed"; 8 + version = "1.4.0"; 9 10 src = fetchFromGitHub { 11 owner = "brimdata"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-ias2HKwZo5Q/0M4YZI4wLgzMVWmannruXlhp8IsOuyU="; 15 }; 16 17 + vendorHash = "sha256-h5NYx6xhIh4i/tS5cGHXBomnVZCUn8jJuzL6k1+IdKk="; 18 19 subPackages = [ "cmd/zed" "cmd/zq" ]; 20
+2 -2
pkgs/misc/ananicy-cpp/default.nix
··· 10 11 stdenv.mkDerivation rec { 12 pname = "ananicy-cpp"; 13 - version = "1.0.1"; 14 15 src = fetchFromGitLab { 16 owner = "ananicy-cpp"; 17 repo = "ananicy-cpp"; 18 rev = "v${version}"; 19 fetchSubmodules = true; 20 - sha256 = "sha256-07LWIC2y6b1iiPCVa8mlBYAnSmahm0oJ2d3/uW4rC94="; 21 }; 22 23 nativeBuildInputs = [
··· 10 11 stdenv.mkDerivation rec { 12 pname = "ananicy-cpp"; 13 + version = "1.0.2"; 14 15 src = fetchFromGitLab { 16 owner = "ananicy-cpp"; 17 repo = "ananicy-cpp"; 18 rev = "v${version}"; 19 fetchSubmodules = true; 20 + sha256 = "sha256-iR7yIIGJbRwu62GIEYi70PjtlKXmkPYqSJtMddspBKA="; 21 }; 22 23 nativeBuildInputs = [
+14 -6
pkgs/os-specific/darwin/apple-source-releases/generate-sdk-packages.sh
··· 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p curl 3 4 - # usage: 5 - # generate-sdk-packages.sh macos 11.0.1 6 7 cd $(dirname "$0") 8 ··· 16 {" 17 18 parse_line() { 19 - readarray -t -d$'\t' package <<<$2 20 local pname=${package[0]} version=${package[1]} 21 22 if [ -d $pname ]; then 23 - sha256=$(nix-prefetch-url "https://opensource.apple.com/tarballs/$pname/$pname-$version.tar.gz") 24 >>$outfile echo "$pname = applePackage' \"$pname\" \"$version\" \"$sdkName\" \"$sha256\" {};" 25 fi 26 } 27 - readarray -s1 -c1 -C parse_line < <(curl -sS "https://opensource.apple.com/text/${sdkName//./}.txt") 28 29 >>$outfile echo '}'
··· 1 #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p curl jq 3 4 + usage() { 5 + cat <<EOF 6 + usage: $0 macos 11.0.1 7 + EOF 8 + } 9 + 10 + if [ "$#" != 2 ]; then 11 + usage 12 + exit 1 13 + fi 14 15 cd $(dirname "$0") 16 ··· 24 {" 25 26 parse_line() { 27 + readarray -t -d$'-' package < <(printf "%s" $2) 28 local pname=${package[0]} version=${package[1]} 29 30 if [ -d $pname ]; then 31 + sha256=$(nix-prefetch-url "https://github.com/apple-oss-distributions/$pname/archive/refs/tags/$pname-$version.tar.gz") 32 >>$outfile echo "$pname = applePackage' \"$pname\" \"$version\" \"$sdkName\" \"$sha256\" {};" 33 fi 34 } 35 + readarray -s1 -c1 -C parse_line < <(curl -sSL "https://github.com/apple-oss-distributions/distribution-${1//-/_}/raw/${sdkName//./}/release.json" | jq -r ".projects[].tag") 36 37 >>$outfile echo '}'
+2 -2
pkgs/os-specific/linux/firmware/sof-firmware/default.nix
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "sof-firmware"; 8 - version = "2.2.3"; 9 10 src = fetchurl { 11 url = "https://github.com/thesofproject/sof-bin/releases/download/v${version}/sof-bin-v${version}.tar.gz"; 12 - sha256 = "sha256-WR/9ZvHisycDjJHt88hQK0FywdyFDP5EBQ6t+OT620I="; 13 }; 14 15 dontFixup = true; # binaries must not be stripped or patchelfed
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "sof-firmware"; 8 + version = "2.2.4"; 9 10 src = fetchurl { 11 url = "https://github.com/thesofproject/sof-bin/releases/download/v${version}/sof-bin-v${version}.tar.gz"; 12 + sha256 = "sha256-zoquuhA6pWqCZiVSsPM/M6hZqhAI2L+8LCLwzPyMazo="; 13 }; 14 15 dontFixup = true; # binaries must not be stripped or patchelfed
+3 -3
pkgs/servers/invidious/versions.json
··· 4 "sha256": "sha256-EU6T9yQCdOLx98Io8o01rEsgxDFF/Xoy42LgPopD2/A=" 5 }, 6 "invidious": { 7 - "rev": "5160d8bae39dc5cc5d51abee90571a03c08d0f2b", 8 - "sha256": "sha256-cM/5xnzO5wyzudXHeud9k3M5BsralRUgO4vSoebYRZ8=", 9 - "version": "unstable-2022-11-22" 10 }, 11 "lsquic": { 12 "sha256": "sha256-hG8cUvhbCNeMOsKkaJlgGpzUrIx47E/WhmPIdI5F3qM=",
··· 4 "sha256": "sha256-EU6T9yQCdOLx98Io8o01rEsgxDFF/Xoy42LgPopD2/A=" 5 }, 6 "invidious": { 7 + "rev": "927c37ce3eb306fe6a02c0fdb9e3ee0a837e84d2", 8 + "sha256": "sha256-l5DDSopd4ueA0IoPovIPjGqCm3LZE8802Sh2EduLtuU=", 9 + "version": "unstable-2023-01-08" 10 }, 11 "lsquic": { 12 "sha256": "sha256-hG8cUvhbCNeMOsKkaJlgGpzUrIx47E/WhmPIdI5F3qM=",
+3 -3
pkgs/servers/klipper/default.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "klipper"; 10 - version = "unstable-2022-11-21"; 11 12 src = fetchFromGitHub { 13 owner = "KevinOConnor"; 14 repo = "klipper"; 15 - rev = "c51f169c06921152a2e9c386016660d0bb09f767"; 16 - sha256 = "sha256-l5dOj4cKrKdQ0grmbIdXm5dmkrQv6L+NqCMN1i3z3SE="; 17 }; 18 19 sourceRoot = "source/klippy";
··· 7 8 stdenv.mkDerivation rec { 9 pname = "klipper"; 10 + version = "unstable-2023-01-07"; 11 12 src = fetchFromGitHub { 13 owner = "KevinOConnor"; 14 repo = "klipper"; 15 + rev = "f1203d56f6bc2c84d00605a76525be4c13430324"; 16 + sha256 = "sha256-7FJ+omzXpj49AThcv0xDilIekCyehtvpvck1+nrMS70="; 17 }; 18 19 sourceRoot = "source/klippy";
+3 -3
pkgs/servers/monitoring/karma/default.nix
··· 19 20 buildGoModule rec { 21 pname = "karma"; 22 - version = "0.108"; 23 24 src = fetchFromGitHub { 25 owner = "prymitive"; 26 repo = "karma"; 27 rev = "v${version}"; 28 - hash = "sha256-Hw+6zBBbVw8uGkZQvmS3gB1opZdg8wQ5LydIAWhXUXY="; 29 }; 30 31 - vendorHash = "sha256-gW8q425ZgFL+uJ8UiSVEX7R890LR9jgxfbNIdhNJge4="; 32 33 nativeBuildInputs = [ 34 nodejs-18_x
··· 19 20 buildGoModule rec { 21 pname = "karma"; 22 + version = "0.111"; 23 24 src = fetchFromGitHub { 25 owner = "prymitive"; 26 repo = "karma"; 27 rev = "v${version}"; 28 + hash = "sha256-jcJ8rdggM4kDCVTsEBDtZ9nNnutl+RwABx7zHY39tDs="; 29 }; 30 31 + vendorHash = "sha256-MYHgLKDSB/g/k4i+deBNeaeZ3BbHRnymwsNTTA7qNdU="; 32 33 nativeBuildInputs = [ 34 nodejs-18_x
+2 -2
pkgs/servers/uxplay/default.nix
··· 13 14 stdenv.mkDerivation rec { 15 pname = "uxplay"; 16 - version = "1.60"; 17 18 src = fetchFromGitHub { 19 owner = "FDH2"; 20 repo = "UxPlay"; 21 rev = "v${version}"; 22 - sha256 = "sha256-ERHn6kd/ZAo34iums2dudAqh9CdwUv2dLcn2YC7oBM0="; 23 }; 24 25 postPatch = ''
··· 13 14 stdenv.mkDerivation rec { 15 pname = "uxplay"; 16 + version = "1.61.1"; 17 18 src = fetchFromGitHub { 19 owner = "FDH2"; 20 repo = "UxPlay"; 21 rev = "v${version}"; 22 + sha256 = "sha256-eLTIpRmKewBghUYFot8I3iTeiI6wlU7WNs8/X3w+U80="; 23 }; 24 25 postPatch = ''
+2 -2
pkgs/shells/fish/default.nix
··· 135 136 fish = stdenv.mkDerivation rec { 137 pname = "fish"; 138 - version = "3.5.1"; 139 140 src = fetchurl { 141 # There are differences between the release tarball and the tarball GitHub ··· 145 # --version`), as well as the local documentation for all builtins (and 146 # maybe other things). 147 url = "https://github.com/fish-shell/fish-shell/releases/download/${version}/${pname}-${version}.tar.xz"; 148 - sha256 = "sha256-ptRbPcWkXdMXcuf439/sq8BjmG6PZ9YL18pgzIHbaSg="; 149 }; 150 151 # Fix FHS paths in tests
··· 135 136 fish = stdenv.mkDerivation rec { 137 pname = "fish"; 138 + version = "3.6.0"; 139 140 src = fetchurl { 141 # There are differences between the release tarball and the tarball GitHub ··· 145 # --version`), as well as the local documentation for all builtins (and 146 # maybe other things). 147 url = "https://github.com/fish-shell/fish-shell/releases/download/${version}/${pname}-${version}.tar.xz"; 148 + hash = "sha512-oR6nYa2s4C73+IsliTMoAFzvB/ktNi+8eUVA3KJunPyXCHjQMSyuvRnWRIPp88PiStbCffziZNF3+T1lx+9plg=="; 149 }; 150 151 # Fix FHS paths in tests
+2 -2
pkgs/tools/graphics/gfxreconstruct/default.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "gfxreconstruct"; 20 - version = "0.9.15"; 21 22 src = fetchFromGitHub { 23 owner = "LunarG"; 24 repo = "gfxreconstruct"; 25 rev = "v${version}"; 26 - hash = "sha256-hIzQ5L0Payj8hlyy5UI7RXgnyhQBPqG7nfbvW2VYvTg="; 27 fetchSubmodules = true; 28 }; 29
··· 17 18 stdenv.mkDerivation rec { 19 pname = "gfxreconstruct"; 20 + version = "0.9.16.1"; 21 22 src = fetchFromGitHub { 23 owner = "LunarG"; 24 repo = "gfxreconstruct"; 25 rev = "v${version}"; 26 + hash = "sha256-6yUWXIJlfwaPT1SDVjSfO7Sj10DcpOLAbzASC4dLS1E="; 27 fetchSubmodules = true; 28 }; 29
+2 -2
pkgs/tools/misc/vtm/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "vtm"; 9 - version = "0.9.8g"; 10 11 src = fetchFromGitHub { 12 owner = "netxs-group"; 13 repo = "vtm"; 14 rev = "v${version}"; 15 - sha256 = "sha256-Q+QPRIk7EtcSZBrm9RCxSbz9cgznZQBnPwm9Qm+gH24="; 16 }; 17 18 nativeBuildInputs = [ cmake ];
··· 6 7 stdenv.mkDerivation rec { 8 pname = "vtm"; 9 + version = "0.9.8l"; 10 11 src = fetchFromGitHub { 12 owner = "netxs-group"; 13 repo = "vtm"; 14 rev = "v${version}"; 15 + sha256 = "sha256-6hZvnZXnoS97uQKxBbSJmMN1bGp42p0v4kJH7F+3mjU="; 16 }; 17 18 nativeBuildInputs = [ cmake ];
+24 -7
pkgs/tools/networking/darkstat/default.nix
··· 1 - { lib, stdenv, fetchpatch, fetchurl, libpcap, zlib }: 2 3 stdenv.mkDerivation rec { 4 - version = "3.0.719"; 5 pname = "darkstat"; 6 7 - src = fetchurl { 8 - url = "${meta.homepage}/${pname}-${version}.tar.bz2"; 9 - sha256 = "1mzddlim6dhd7jhr4smh0n2fa511nvyjhlx76b03vx7phnar1bxf"; 10 }; 11 12 patches = [ ··· 18 }) 19 ]; 20 21 - buildInputs = [ libpcap zlib ]; 22 23 enableParallelBuilding = true; 24 ··· 34 - Supports IPv6. 35 ''; 36 homepage = "http://unix4lyfe.org/darkstat"; 37 - license = licenses.gpl2; 38 platforms = with platforms; unix; 39 }; 40 }
··· 1 + { lib 2 + , stdenv 3 + , autoreconfHook 4 + , fetchFromGitHub 5 + , fetchpatch 6 + , libpcap 7 + , zlib 8 + }: 9 10 stdenv.mkDerivation rec { 11 pname = "darkstat"; 12 + version = "3.0.721"; 13 14 + src = fetchFromGitHub { 15 + owner = "emikulic"; 16 + repo = pname; 17 + rev = "refs/tags/${version}"; 18 + hash = "sha256-kKj4fCgphoe3lojJfARwpITxQh7E6ehUew9FVEW63uQ="; 19 }; 20 21 patches = [ ··· 27 }) 28 ]; 29 30 + nativeBuildInputs = [ 31 + autoreconfHook 32 + ]; 33 + 34 + buildInputs = [ 35 + libpcap 36 + zlib 37 + ]; 38 39 enableParallelBuilding = true; 40 ··· 50 - Supports IPv6. 51 ''; 52 homepage = "http://unix4lyfe.org/darkstat"; 53 + changelog = "https://github.com/emikulic/darkstat/releases/tag/${version}"; 54 + license = licenses.gpl2Only; 55 platforms = with platforms; unix; 56 }; 57 }
+2 -2
pkgs/tools/networking/getmail6/default.nix
··· 5 6 python3.pkgs.buildPythonApplication rec { 7 pname = "getmail6"; 8 - version = "6.18.10"; 9 10 src = fetchFromGitHub { 11 owner = pname; 12 repo = pname; 13 rev = "refs/tags/v${version}"; 14 - hash = "sha256-nRi0HUq8jEugFogerFD7Xu9fgn1njfumbwhChz2t4t8="; 15 }; 16 17 # needs a Docker setup
··· 5 6 python3.pkgs.buildPythonApplication rec { 7 pname = "getmail6"; 8 + version = "6.18.11"; 9 10 src = fetchFromGitHub { 11 owner = pname; 12 repo = pname; 13 rev = "refs/tags/v${version}"; 14 + hash = "sha256-EJ1lnSeawWezOYZxAHx3QX9kWGoayWZ2vkFY21l+Ijc="; 15 }; 16 17 # needs a Docker setup
+3 -3
pkgs/tools/networking/pathvector/default.nix
··· 2 3 buildGoModule rec { 4 pname = "pathvector"; 5 - version = "6.0.3"; 6 7 src = fetchFromGitHub { 8 owner = "natesales"; 9 repo = "pathvector"; 10 rev = "v${version}"; 11 - sha256 = "sha256-WY9208bbJOSDJ9WaV8KIr65GZjqhFjdzwTga0u4oQo4="; 12 }; 13 14 - vendorSha256 = "sha256-R3o1L34FXbtRzJ1I2Xj4iWsiFJJWexGWYv2TmvhINe0="; 15 16 CGO_ENABLED = 0; 17
··· 2 3 buildGoModule rec { 4 pname = "pathvector"; 5 + version = "6.1.0"; 6 7 src = fetchFromGitHub { 8 owner = "natesales"; 9 repo = "pathvector"; 10 rev = "v${version}"; 11 + sha256 = "sha256-tMcoL+nvvMBCWSVD+l42e6IlOIj8ERP9pgBHcJBtegY="; 12 }; 13 14 + vendorHash = "sha256-+GML6a9LzHZfByHv7ODp7fHBauExsZTzUccMEeeOFNg="; 15 16 CGO_ENABLED = 0; 17
+4 -5
pkgs/top-level/all-packages.nix
··· 13384 13385 yarn = callPackage ../development/tools/yarn { }; 13386 13387 - yarn2nix-moretea = callPackage ../development/tools/yarn2nix-moretea/yarn2nix { }; 13388 yarn2nix-moretea-openssl_1_1 = callPackage ../development/tools/yarn2nix-moretea/yarn2nix { 13389 nodejs = nodejs.override { openssl = openssl_1_1; }; 13390 }; 13391 ··· 34921 34922 otto-matic = callPackage ../games/otto-matic { }; 34923 34924 - openraPackages = import ../games/openra pkgs; 34925 34926 openra = openraPackages.engines.release; 34927 ··· 36215 36216 crypto-org-wallet = callPackage ../applications/blockchains/crypto-org-wallet { }; 36217 36218 - cubicle = callPackage ../applications/science/logic/cubicle { 36219 - ocamlPackages = ocaml-ng.ocamlPackages_4_05; 36220 - }; 36221 36222 cvc3 = callPackage ../applications/science/logic/cvc3 { 36223 gmp = lib.overrideDerivation gmp (_: { dontDisableStatic = true; });
··· 13384 13385 yarn = callPackage ../development/tools/yarn { }; 13386 13387 + yarn2nix-moretea = callPackage ../development/tools/yarn2nix-moretea/yarn2nix { pkgs = pkgs.__splicedPackages; }; 13388 yarn2nix-moretea-openssl_1_1 = callPackage ../development/tools/yarn2nix-moretea/yarn2nix { 13389 + pkgs = pkgs.__splicedPackages; 13390 nodejs = nodejs.override { openssl = openssl_1_1; }; 13391 }; 13392 ··· 34922 34923 otto-matic = callPackage ../games/otto-matic { }; 34924 34925 + openraPackages = import ../games/openra pkgs.__splicedPackages; 34926 34927 openra = openraPackages.engines.release; 34928 ··· 36216 36217 crypto-org-wallet = callPackage ../applications/blockchains/crypto-org-wallet { }; 36218 36219 + cubicle = callPackage ../applications/science/logic/cubicle { }; 36220 36221 cvc3 = callPackage ../applications/science/logic/cvc3 { 36222 gmp = lib.overrideDerivation gmp (_: { dontDisableStatic = true; });