lol

Merge staging-next into staging

authored by

nixpkgs-ci[bot] and committed by
GitHub
3aa6cc45 c3acc2b5

+953 -263
+11
maintainers/maintainer-list.nix
··· 8408 8408 githubId = 293586; 8409 8409 name = "Adam Gamble"; 8410 8410 }; 8411 + gamedungeon = { 8412 + github = "GameDungeon"; 8413 + githubId = 60719255; 8414 + name = "gamedungeon"; 8415 + }; 8411 8416 gangaram = { 8412 8417 email = "Ganga.Ram@tii.ae"; 8413 8418 github = "gangaram-tii"; ··· 22970 22975 github = "Szczyp"; 22971 22976 githubId = 203195; 22972 22977 name = "Szczyp"; 22978 + }; 22979 + szkiba = { 22980 + email = "iszkiba@gmail.com"; 22981 + github = "szkiba"; 22982 + githubId = 16244553; 22983 + name = "Iván Szkiba"; 22973 22984 }; 22974 22985 szlend = { 22975 22986 email = "pub.nix@zlender.si";
+27 -7
nixos/doc/manual/configuration/x-windows.chapter.md
··· 173 173 supports Glamor (2D graphics acceleration via OpenGL) and is actively 174 174 maintained, it may perform worse in some cases (like in old chipsets). 175 175 176 + There is a second driver, `intel` (provided by the xf86-video-intel package), 177 + specific to older Intel iGPUs from generation 2 to 9. It is not recommended by 178 + most distributions: it lacks several modern features (for example, it doesn't 179 + support Glamor) and the package hasn't been officially updated since 2015. 180 + 181 + Third generation and older iGPUs (15-20+ years old) are not supported by the 182 + `modesetting` driver (X will crash upon startup). Thus, the `intel` driver is 183 + required for these chipsets. 184 + Otherwise, the results vary depending on the hardware, so you may have to try 185 + both drivers. Use the option 186 + [](#opt-services.xserver.videoDrivers) 187 + to set one. The recommended configuration for modern systems is: 188 + 189 + ```nix 190 + { 191 + services.xserver.videoDrivers = [ "modesetting" ]; 192 + } 193 + ``` 176 194 ::: {.note} 177 195 The `modesetting` driver doesn't currently provide a `TearFree` option (this 178 196 will become available in an upcoming X.org release), So, without using a ··· 180 198 experience screen tearing. 181 199 ::: 182 200 183 - There also used to be a second driver, `intel` (provided by the 184 - xf86-video-intel package), specific to older Intel iGPUs from generation 2 to 185 - 9. 186 - This driver hasn't been maintained in years and was removed in NixOS 24.11 187 - after it stopped working. If you chipset is too old to be supported by 188 - `modesetting` and have no other choice you may try an unsupported NixOS version 189 - (reportedly working up to NixOS 24.05) and set 201 + If you experience screen tearing no matter what, this configuration was 202 + reported to resolve the issue: 190 203 191 204 ```nix 192 205 { 193 206 services.xserver.videoDrivers = [ "intel" ]; 207 + services.xserver.deviceSection = '' 208 + Option "DRI" "2" 209 + Option "TearFree" "true" 210 + ''; 194 211 } 195 212 ``` 213 + 214 + Note that this will likely downgrade the performance compared to 215 + `modesetting` or `intel` with DRI 3 (default). 196 216 197 217 ## Proprietary NVIDIA drivers {#sec-x11-graphics-cards-nvidia} 198 218
+4
nixos/doc/manual/release-notes/rl-2505.section.md
··· 37 37 38 38 - `nixos-option` has been rewritten to a Nix expression called by a simple bash script. This lowers our maintenance threshold, makes eval errors less verbose, adds support for flake-based configurations, descending into `attrsOf` and `listOf` submodule options, and `--show-trace`. 39 39 40 + - The `intel` video driver for X.org (from the xf86-video-intel package) which was previously removed because it was non-functional has been fixed and the driver has been re-introduced. 41 + 40 42 - The Mattermost module ({option}`services.mattermost`) and packages (`mattermost` and `mmctl`) have been substantially updated: 41 43 - {option}`services.mattermost.preferNixConfig` now defaults to true if you advance {option}`system.stateVersion` to 25.05. This means that if you have {option}`services.mattermost.mutableConfig` set, NixOS will override your settings to those that you define in the module. It is recommended to leave this at the default, even if you used a mutable config before, because it will ensure that your Mattermost data directories are correct. If you moved your data directories, you may want to review the module changes before upgrading. 42 44 - Mattermost telemetry reporting is now disabled by default, though security update notifications are enabled. Look at {option}`services.mattermost.telemetry` for options to control this behavior. ··· 194 196 - `ast-grep` remove `sg` command to prevent conflict with `sg` command from shadow-utils. If you need legacy sg command compatibility with old code, you can use `ast-grep.override { enableLegacySg = true; }` 195 197 196 198 - rename package `wtf` to `wtfutil`. 199 + 200 + - The udev rules of the libjaylink package require users to be in the `jlink` instead of `plugdev` group now, since the `plugdev` group is very uncommon for NixOS. Alternatively, access is granted to seat sessions. 197 201 198 202 - `python3Packages.beancount` was updated to 3.1.0. Previous major version remains available as `python3Packages.beancount_2`. 199 203
+27
nixos/modules/hardware/libjaylink.nix
··· 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 7 + 8 + let 9 + cfg = config.hardware.libjaylink; 10 + in 11 + { 12 + options.hardware.libjaylink = { 13 + enable = lib.mkEnableOption '' 14 + udev rules for devices supported by libjaylink. 15 + Add users to the `jlink` group in order to grant 16 + them access 17 + ''; 18 + package = lib.mkPackageOption pkgs "libjaylink" { }; 19 + }; 20 + 21 + config = lib.mkIf cfg.enable { 22 + users.groups.jlink = { }; 23 + services.udev.packages = [ cfg.package ]; 24 + }; 25 + 26 + meta.maintainers = with lib.maintainers; [ felixsinger ]; 27 + }
+1
nixos/modules/module-list.nix
··· 80 80 ./hardware/ksm.nix 81 81 ./hardware/ledger.nix 82 82 ./hardware/libftdi.nix 83 + ./hardware/libjaylink.nix 83 84 ./hardware/logitech.nix 84 85 ./hardware/mcelog.nix 85 86 ./hardware/network/ath-user-regd.nix
+16
nixos/modules/programs/direnv.nix
··· 34 34 enableFishIntegration = enabledOption '' 35 35 Fish integration 36 36 ''; 37 + enableXonshIntegration = enabledOption '' 38 + Xonsh integration 39 + ''; 37 40 38 41 direnvrcExtra = lib.mkOption { 39 42 type = lib.types.lines; ··· 94 97 ${lib.getExe cfg.package} hook fish | source 95 98 end 96 99 ''; 100 + 101 + xonsh = lib.mkIf cfg.enableXonshIntegration { 102 + extraPackages = ps: [ ps.xonsh.xontribs.xonsh-direnv ]; 103 + config = '' 104 + if ${ 105 + if cfg.loadInNixShell then 106 + "True" 107 + else 108 + "not any(map(lambda s: s.startswith('/nix/store'), __xonsh__.env.get('PATH')))" 109 + }: 110 + xontrib load direnv 111 + ''; 112 + }; 97 113 }; 98 114 99 115 environment = {
+16 -1
nixos/modules/services/system/kerberos/heimdal.nix
··· 21 21 target, 22 22 ... 23 23 }: 24 - "${principal}\t${lib.concatStringsSep "," (lib.toList access)}\t${target}" 24 + if target != "*" && target != "" then 25 + "${principal}\t${lib.concatStringsSep "," (lib.toList access)}\t${target}" 26 + else 27 + "${principal}\t${lib.concatStringsSep "," (lib.toList access)}" 25 28 ) acl 26 29 )) 27 30 (lib.mapAttrsToList ( ··· 70 73 description = "Kerberos Administration Daemon"; 71 74 partOf = [ "kerberos-server.target" ]; 72 75 wantedBy = [ "kerberos-server.target" ]; 76 + documentation = [ 77 + "man:kadmind(8)" 78 + "info:heimdal" 79 + ]; 73 80 serviceConfig = { 74 81 ExecStart = "${package}/libexec/kadmind --config-file=/etc/heimdal-kdc/kdc.conf"; 75 82 Slice = "system-kerberos-server.slice"; ··· 82 89 description = "Key Distribution Center daemon"; 83 90 partOf = [ "kerberos-server.target" ]; 84 91 wantedBy = [ "kerberos-server.target" ]; 92 + documentation = [ 93 + "man:kdc(8)" 94 + "info:heimdal" 95 + ]; 85 96 serviceConfig = { 86 97 ExecStart = "${package}/libexec/kdc --config-file=/etc/heimdal-kdc/kdc.conf"; 87 98 Slice = "system-kerberos-server.slice"; ··· 94 105 description = "Kerberos Password Changing daemon"; 95 106 partOf = [ "kerberos-server.target" ]; 96 107 wantedBy = [ "kerberos-server.target" ]; 108 + documentation = [ 109 + "man:kpasswdd(8)" 110 + "info:heimdal" 111 + ]; 97 112 serviceConfig = { 98 113 ExecStart = "${package}/libexec/kpasswdd"; 99 114 Slice = "system-kerberos-server.slice";
+241 -47
nixos/tests/kerberos/heimdal.nix
··· 3 3 { 4 4 name = "kerberos_server-heimdal"; 5 5 6 - nodes.machine = 7 - { 8 - config, 9 - libs, 10 - pkgs, 11 - ... 12 - }: 13 - { 14 - services.kerberos_server = { 15 - enable = true; 16 - settings.realms = { 17 - "FOO.BAR".acl = [ 18 - { 19 - principal = "admin"; 20 - access = [ 21 - "add" 22 - "cpw" 23 - ]; 24 - } 25 - ]; 6 + nodes = { 7 + server = 8 + { config, pkgs, ... }: 9 + { 10 + imports = [ ../common/user-account.nix ]; 11 + 12 + users.users.alice.extraGroups = [ "wheel" ]; 13 + 14 + services.getty.autologinUser = "alice"; 15 + 16 + virtualisation.vlans = [ 1 ]; 17 + 18 + time.timeZone = "Etc/UTC"; 19 + 20 + networking = { 21 + domain = "foo.bar"; 22 + useDHCP = false; 23 + firewall.enable = false; 24 + hosts."10.0.0.1" = [ "server.foo.bar" ]; 25 + hosts."10.0.0.2" = [ "client.foo.bar" ]; 26 26 }; 27 - }; 28 - security.krb5 = { 29 - enable = true; 30 - package = pkgs.heimdal; 31 - settings = { 32 - libdefaults = { 33 - default_realm = "FOO.BAR"; 27 + 28 + systemd.network.networks."01-eth1" = { 29 + name = "eth1"; 30 + networkConfig.Address = "10.0.0.1/24"; 31 + }; 32 + 33 + security.krb5 = { 34 + enable = true; 35 + package = pkgs.heimdal; 36 + settings = { 37 + libdefaults.default_realm = "FOO.BAR"; 38 + 39 + # Enable extra debug output 40 + logging = { 41 + admin_server = "SYSLOG:DEBUG:AUTH"; 42 + default = "SYSLOG:DEBUG:AUTH"; 43 + kdc = "SYSLOG:DEBUG:AUTH"; 44 + }; 45 + 46 + realms = { 47 + "FOO.BAR" = { 48 + admin_server = "server.foo.bar"; 49 + kpasswd_server = "server.foo.bar"; 50 + kdc = [ "server.foo.bar" ]; 51 + }; 52 + }; 34 53 }; 35 - realms = { 54 + }; 55 + 56 + services.kerberos_server = { 57 + enable = true; 58 + settings.realms = { 36 59 "FOO.BAR" = { 37 - admin_server = "machine"; 38 - kdc = "machine"; 60 + acl = [ 61 + { 62 + principal = "kadmin/admin@FOO.BAR"; 63 + access = "all"; 64 + } 65 + { 66 + principal = "alice/admin@FOO.BAR"; 67 + access = [ 68 + "add" 69 + "cpw" 70 + "delete" 71 + "get" 72 + "list" 73 + "modify" 74 + ]; 75 + } 76 + ]; 39 77 }; 40 78 }; 41 79 }; 42 80 }; 43 - }; 44 81 45 - testScript = '' 46 - machine.succeed( 47 - "kadmin -l init --realm-max-ticket-life='8 day' --realm-max-renewable-life='10 day' FOO.BAR", 48 - "systemctl restart kadmind.service kdc.service", 49 - ) 82 + client = 83 + { config, pkgs, ... }: 84 + { 85 + imports = [ ../common/user-account.nix ]; 50 86 51 - for unit in ["kadmind", "kdc", "kpasswdd"]: 52 - machine.wait_for_unit(f"{unit}.service") 87 + users.users.alice.extraGroups = [ "wheel" ]; 53 88 54 - machine.succeed( 55 - "kadmin -l add --password=admin_pw --use-defaults admin", 56 - "kadmin -l ext_keytab --keytab=admin.keytab admin", 57 - "kadmin -p admin -K admin.keytab add --password=alice_pw --use-defaults alice", 58 - "kadmin -l ext_keytab --keytab=alice.keytab alice", 59 - "kinit -kt alice.keytab alice", 60 - ) 61 - ''; 89 + services.getty.autologinUser = "alice"; 90 + 91 + virtualisation.vlans = [ 1 ]; 92 + 93 + time.timeZone = "Etc/UTC"; 62 94 63 - meta.maintainers = [ pkgs.lib.maintainers.dblsaiko ]; 95 + networking = { 96 + domain = "foo.bar"; 97 + useDHCP = false; 98 + hosts."10.0.0.1" = [ "server.foo.bar" ]; 99 + hosts."10.0.0.2" = [ "client.foo.bar" ]; 100 + }; 101 + 102 + systemd.network.networks."01-eth1" = { 103 + name = "eth1"; 104 + networkConfig.Address = "10.0.0.2/24"; 105 + }; 106 + 107 + security.krb5 = { 108 + enable = true; 109 + package = pkgs.heimdal; 110 + settings = { 111 + libdefaults.default_realm = "FOO.BAR"; 112 + 113 + logging = { 114 + admin_server = "SYSLOG:DEBUG:AUTH"; 115 + default = "SYSLOG:DEBUG:AUTH"; 116 + kdc = "SYSLOG:DEBUG:AUTH"; 117 + }; 118 + 119 + realms = { 120 + "FOO.BAR" = { 121 + admin_server = "server.foo.bar"; 122 + kpasswd_server = "server.foo.bar"; 123 + kdc = [ "server.foo.bar" ]; 124 + }; 125 + }; 126 + }; 127 + }; 128 + }; 129 + }; 130 + 131 + testScript = 132 + { nodes, ... }: 133 + '' 134 + import string 135 + import random 136 + random.seed(0) 137 + 138 + start_all() 139 + 140 + with subtest("Server: initialize realm"): 141 + # for unit in ["kadmind.service", "kdc.socket", "kpasswdd.socket"]: 142 + for unit in ["kadmind.service", "kdc.service", "kpasswdd.service"]: 143 + server.wait_for_unit(unit) 144 + 145 + server.succeed("kadmin -l init --realm-max-ticket-life='8 day' --realm-max-renewable-life='10 day' FOO.BAR") 146 + 147 + for unit in ["kadmind.service", "kdc.service", "kpasswdd.service"]: 148 + server.systemctl(f"restart {unit}") 149 + 150 + alice_krb_pw = "alice_hunter2" 151 + alice_old_krb_pw = "" 152 + alice_krb_admin_pw = "alice_admin_hunter2" 153 + 154 + def random_password(): 155 + password_chars = string.ascii_letters + string.digits + string.punctuation.replace('"', "") 156 + return "".join(random.choice(password_chars) for _ in range(16)) 157 + 158 + with subtest("Server: initialize user principals and keytabs"): 159 + server.succeed(f'kadmin -l add --password="{alice_krb_admin_pw}" --use-defaults alice/admin') 160 + server.succeed("kadmin -l ext_keytab --keytab=admin.keytab alice/admin") 161 + 162 + server.succeed(f'kadmin -p alice/admin -K admin.keytab add --password="{alice_krb_pw}" --use-defaults alice') 163 + server.succeed("kadmin -l ext_keytab --keytab=alice.keytab alice") 164 + 165 + server.wait_for_unit("getty@tty1.service") 166 + server.wait_until_succeeds("pgrep -f 'agetty.*tty1'") 167 + server.wait_for_unit("default.target") 168 + 169 + with subtest("Server: initialize host principal with keytab"): 170 + server.send_chars("sudo ktutil get -p alice/admin host/server.foo.bar\n") 171 + server.wait_until_tty_matches("1", "password for alice:") 172 + server.send_chars("${nodes.server.config.users.users.alice.password}\n") 173 + server.wait_until_tty_matches("1", "alice/admin@FOO.BAR's Password:") 174 + server.send_chars(f'{alice_krb_admin_pw}\n') 175 + server.wait_for_file("/etc/krb5.keytab") 176 + 177 + ktutil_list = server.succeed("sudo ktutil list") 178 + if not "host/server.foo.bar" in ktutil_list: 179 + exit(1) 180 + 181 + server.send_chars("clear\n") 182 + 183 + client.systemctl("start network-online.target") 184 + client.wait_for_unit("network-online.target") 185 + client.wait_for_unit("getty@tty1.service") 186 + client.wait_until_succeeds("pgrep -f 'agetty.*tty1'") 187 + client.wait_for_unit("default.target") 188 + 189 + with subtest("Client: initialize host principal with keytab"): 190 + client.succeed( 191 + f'echo "{alice_krb_admin_pw}" > pw.txt', 192 + "kinit -p --password-file=pw.txt alice/admin", 193 + ) 194 + 195 + client.send_chars("sudo ktutil get -p alice/admin host/client.foo.bar\n") 196 + client.wait_until_tty_matches("1", "password for alice:") 197 + client.send_chars("${nodes.client.config.users.users.alice.password}\n") 198 + client.wait_until_tty_matches("1", "alice/admin@FOO.BAR's Password:") 199 + client.send_chars(f"{alice_krb_admin_pw}\n") 200 + client.wait_for_file("/etc/krb5.keytab") 201 + 202 + ktutil_list = client.succeed("sudo ktutil list") 203 + if not "host/client.foo.bar" in ktutil_list: 204 + exit(1) 205 + 206 + client.send_chars("clear\n") 207 + 208 + with subtest("Client: kinit alice"): 209 + client.succeed( 210 + f"echo '{alice_krb_pw}' > pw.txt", 211 + "kinit -p --password-file=pw.txt alice", 212 + ) 213 + tickets = client.succeed("klist") 214 + assert "Principal: alice@FOO.BAR" in tickets 215 + client.send_chars("clear\n") 216 + 217 + with subtest("Client: kpasswd alice"): 218 + alice_old_krb_pw = alice_krb_pw 219 + alice_krb_pw = random_password() 220 + client.send_chars("kpasswd\n") 221 + client.wait_until_tty_matches("1", "alice@FOO.BAR's Password:") 222 + client.send_chars(f"{alice_old_krb_pw}\n", 0.1) 223 + client.wait_until_tty_matches("1", "New password:") 224 + client.send_chars(f"{alice_krb_pw}\n", 0.1) 225 + client.wait_until_tty_matches("1", "Verify password - New password:") 226 + client.send_chars(f"{alice_krb_pw}\n", 0.1) 227 + 228 + client.wait_until_tty_matches("1", "Success : Password changed") 229 + 230 + client.send_chars("clear\n") 231 + 232 + with subtest("Server: kinit alice"): 233 + server.succeed( 234 + "echo 'alice_pw_2' > pw.txt" 235 + "kinit -p --password-file=pw.txt alice", 236 + ) 237 + tickets = client.succeed("klist") 238 + assert "Principal: alice@FOO.BAR" in tickets 239 + server.send_chars("clear\n") 240 + 241 + with subtest("Server: kpasswd alice"): 242 + alice_old_krb_pw = alice_krb_pw 243 + alice_krb_pw = random_password() 244 + server.send_chars("kpasswd\n") 245 + server.wait_until_tty_matches("1", "alice@FOO.BAR's Password:") 246 + server.send_chars(f"{alice_old_krb_pw}\n", 0.1) 247 + server.wait_until_tty_matches("1", "New password:") 248 + server.send_chars(f"{alice_krb_pw}\n", 0.1) 249 + server.wait_until_tty_matches("1", "Verify password - New password:") 250 + server.send_chars(f"{alice_krb_pw}\n", 0.1) 251 + 252 + server.wait_until_tty_matches("1", "Success : Password changed") 253 + 254 + server.send_chars("clear\n") 255 + ''; 256 + 257 + meta.maintainers = pkgs.heimdal.meta.maintainers; 64 258 } 65 259 )
-4
pkgs/applications/editors/vim/plugins/overrides.nix
··· 3861 3861 dependencies = [ self.nui-nvim ]; 3862 3862 }; 3863 3863 3864 - YankRing-vim = super.YankRing-vim.overrideAttrs { 3865 - sourceRoot = "."; 3866 - }; 3867 - 3868 3864 yanky-nvim = super.yanky-nvim.overrideAttrs { 3869 3865 nvimSkipModule = [ 3870 3866 # Optional telescope integration
+1 -1
pkgs/applications/editors/vscode/extensions/default.nix
··· 392 392 name = "astro-vscode"; 393 393 publisher = "astro-build"; 394 394 version = "2.15.4"; 395 - hash = "sha256-gpDbEasdrpY9Djd6g9lUYXcMFZRBMn7P4wW0/iU+qz8="; 395 + hash = "sha256-dyv7GTscj57Uc+HgImXETKW8olGcWpL+FyAHoS36rmk="; 396 396 }; 397 397 meta = { 398 398 changelog = "https://marketplace.visualstudio.com/items/astro-build.astro-vscode/changelog";
+6 -6
pkgs/applications/editors/vscode/vscodium.nix
··· 26 26 27 27 hash = 28 28 { 29 - x86_64-linux = "sha256-HzNK7/Y5PrFYNYtlfBqqq3ECRDbQVK83Xq7WnG1WYYI="; 30 - x86_64-darwin = "sha256-w+nUsvlo/rsslw6Mn3npPaCwYW42YZ3Ku5QhXYhaHJ8="; 31 - aarch64-linux = "sha256-0l1i76yPfn/kaj8vvsQ8Pzx77Bxqjm5ZCYMsB6gYrcU="; 32 - aarch64-darwin = "sha256-yDXacWuhhMxfJn6KI51zThet6FUYY7pKfznpeZYg9fw="; 33 - armv7l-linux = "sha256-F1ox+G1fMoLoAcBoydizWjkudg17j8JnQ63RzeWwi6o="; 29 + x86_64-linux = "sha256-+RHzGJ5Y6j93ojnqg9hSe+Zs0sewcSSfWu8qlxJEoWQ="; 30 + x86_64-darwin = "sha256-Yaxb7cB/JADJ4i2PScYb9ovTKiClwd7TdQXbzg9ViSs="; 31 + aarch64-linux = "sha256-CK4geEBeLc1M5z4wuRS3rrqsL9nG1ra5+e3PGEOrYHA="; 32 + aarch64-darwin = "sha256-S1XYikl1FzHvGBcudSD2xyuOH4gfsrYyEfwzL/csfSE="; 33 + armv7l-linux = "sha256-aAgCL6clX/lXWdBmCSin/60krW5Sbn2KZZovmS16CfI="; 34 34 } 35 35 .${system} or throwSystem; 36 36 ··· 41 41 42 42 # Please backport all compatible updates to the stable release. 43 43 # This is important for the extension ecosystem. 44 - version = "1.98.0.25067"; 44 + version = "1.98.1.25070"; 45 45 pname = "vscodium"; 46 46 47 47 executableName = "codium";
+3 -6
pkgs/applications/misc/trenchbroom/default.nix
··· 139 139 "-DCMAKE_PREFIX_PATH=cmake/packages" 140 140 ]; 141 141 142 - ninjaFlags = [ 143 - "TrenchBroom" 144 - ]; 142 + ninjaFlags = [ "TrenchBroom" ]; 145 143 146 144 postInstall = '' 147 - pushd $out/share/TrenchBroom/icons 145 + pushd ../app/resources/linux/icons 148 146 149 147 for F in icon_*.png; do 150 148 SIZE=$(echo $F|sed -e s/icon_// -e s/.png//) 151 149 DIR=$out/share/icons/hicolor/$SIZE"x"$SIZE/apps 152 - mkdir -p $DIR 153 - ln -s ../../../../TrenchBroom/icons/$F $DIR/trenchbroom.png 150 + install -Dm644 $F $DIR/trenchbroom.png 154 151 done 155 152 156 153 popd
+5
pkgs/applications/networking/mailreaders/astroid/default.nix
··· 45 45 url = "https://github.com/astroidmail/astroid/commit/7c2022f06a4146ad62e858bcaacdb4ee817851b9.patch"; 46 46 hash = "sha256-hZHOg1wUR8Kpd6017fWzhMmG+/WQxSOCnsiyIvUcpbU="; 47 47 }) 48 + (fetchpatch { 49 + name = "boost_is_regular.patch"; 50 + url = "https://github.com/astroidmail/astroid/commit/abd84171dc6c4e639f3e86649ddc7ff211077244.patch"; 51 + hash = "sha256-IY60AnWm18ZwrCFsOvBg76UginpMo7gXBf8GT87FqW4="; 52 + }) 48 53 ]; 49 54 50 55 nativeBuildInputs = [
+3 -3
pkgs/applications/networking/syncthing/default.nix
··· 13 13 common = { stname, target, postInstall ? "" }: 14 14 buildGoModule rec { 15 15 pname = stname; 16 - version = "1.29.2"; 16 + version = "1.29.3"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "syncthing"; 20 20 repo = "syncthing"; 21 21 tag = "v${version}"; 22 - hash = "sha256-1IQdwnP4nUcDtSeqrnTF8OtlIZTnPlgP1NLnLJnOAbk="; 22 + hash = "sha256-dTDrKLAUfZ+12JX6P6cWRs1ArWnDRmfhNAh0ZTTWpYU="; 23 23 }; 24 24 25 - vendorHash = "sha256-eLUHYpAjq+viRwNiqC+42FKswdItBA0QriHn3JK1B5M="; 25 + vendorHash = "sha256-/t+TIW66A6jKZvDtp/WcldqdkP5PtC6eP/R4Fspywxc="; 26 26 27 27 nativeBuildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 28 28 # Recent versions of macOS seem to require binaries to be signed when
+19 -5
pkgs/applications/version-management/git-absorb/default.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 + asciidoc, 4 5 fetchFromGitHub, 6 + gitMinimal, 5 7 rustPlatform, 6 8 installShellFiles, 9 + which, 7 10 }: 8 11 9 12 rustPlatform.buildRustPackage rec { 10 13 pname = "git-absorb"; 11 - version = "0.6.17"; 14 + version = "0.7.0"; 12 15 13 16 src = fetchFromGitHub { 14 17 owner = "tummychow"; 15 18 repo = "git-absorb"; 16 19 tag = version; 17 - hash = "sha256-wtXqJfI/I0prPip3AbfFk0OvPja6oytPsl6hFtZ6b50="; 20 + hash = "sha256-fn4xeXlYl8xB/wjpt7By9tATzb5t58jcuwfqw0tNH7M="; 18 21 }; 19 22 20 - nativeBuildInputs = [ installShellFiles ]; 23 + nativeBuildInputs = [ 24 + asciidoc 25 + installShellFiles 26 + which # used by Documentation/Makefile 27 + ]; 21 28 22 29 useFetchCargoVendor = true; 23 - cargoHash = "sha256-QQNGUlEamMPRS5sPi3VYbIU28KWxM4ibIEQnk/1sgNA="; 30 + cargoHash = "sha256-PC040PtMK0OUS4zlLoHPcSzgEw5H3kndnVuyME/jEz4="; 31 + 32 + nativeCheckInputs = [ 33 + gitMinimal 34 + ]; 24 35 25 36 postInstall = 26 37 '' 27 - installManPage Documentation/git-absorb.1 38 + cd Documentation/ 39 + make 40 + installManPage git-absorb.1 41 + cd - 28 42 '' 29 43 + lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 30 44 installShellCompletion --cmd git-absorb \
+4
pkgs/applications/video/mpv/scripts.nix
··· 101 101 autodeint 102 102 autoload 103 103 ; # added 2024-11-28 104 + inherit (self.eisa01) 105 + smart-copy-paste-2 106 + smartskip 107 + ; # added 2025-03-09 104 108 inherit (self.occivink) 105 109 blacklistExtensions 106 110 crop
+65
pkgs/applications/video/mpv/scripts/eisa01.nix
··· 1 + { 2 + lib, 3 + fetchFromGitHub, 4 + unstableGitUpdater, 5 + buildLua, 6 + xclip, 7 + }: 8 + 9 + let 10 + mkScript = 11 + pname: args: 12 + let 13 + self = { 14 + inherit pname; 15 + version = "0-unstable-2023-11-25"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "Eisa01"; 19 + repo = "mpv-scripts"; 20 + rev = "48d68283cea47ff8e904decc9003b3abc3e2123e"; 21 + hash = "sha256-edJfotlC5T8asqPIygR67BEWjP4i54Wx54StLfjpc48="; 22 + # avoid downloading screenshots and videos 23 + sparseCheckout = [ 24 + "scripts/" 25 + "script-opts/" 26 + ]; 27 + }; 28 + passthru.updateScript = unstableGitUpdater { }; 29 + 30 + meta = with lib; { 31 + homepage = "https://github.com/Eisa01/mpv-scripts"; 32 + license = licenses.bsd2; 33 + }; 34 + 35 + # Sadly needed to make `common-updaters` work here 36 + pos = builtins.unsafeGetAttrPos "version" self; 37 + }; 38 + in 39 + buildLua (lib.attrsets.recursiveUpdate self args); 40 + in 41 + lib.recurseIntoAttrs ( 42 + lib.mapAttrs (name: lib.makeOverridable (mkScript name)) { 43 + 44 + # Usage: `pkgs.mpv.override { scripts = [ pkgs.mpvScripts.seekTo ]; }` 45 + smart-copy-paste-2 = { 46 + scriptPath = "scripts/SmartCopyPaste_II.lua"; 47 + prePatch = '' 48 + substituteInPlace $scriptPath --replace-fail 'xclip' "${lib.getExe xclip}" 49 + ''; 50 + 51 + meta = { 52 + description = "Smart copy paste with logging and clipboard support"; 53 + maintainers = with lib.maintainers; [ luftmensch-luftmensch ]; 54 + }; 55 + }; 56 + 57 + smartskip = { 58 + scriptPath = "scripts/SmartSkip.lua"; 59 + meta = { 60 + description = "Automatically or manually skip opening, intro, outro, and preview"; 61 + maintainers = with lib.maintainers; [ iynaix ]; 62 + }; 63 + }; 64 + } 65 + )
-33
pkgs/applications/video/mpv/scripts/smart-copy-paste-2.nix
··· 1 - { 2 - lib, 3 - buildLua, 4 - fetchFromGitHub, 5 - unstableGitUpdater, 6 - xclip, 7 - }: 8 - buildLua (finalAttrs: { 9 - pname = "smart-copy-paste-2"; 10 - version = "0-unstable-2023-11-25"; 11 - 12 - scriptPath = "scripts/SmartCopyPaste_II.lua"; 13 - src = fetchFromGitHub { 14 - owner = "Eisa01"; 15 - repo = "mpv-scripts"; 16 - rev = "48d68283cea47ff8e904decc9003b3abc3e2123e"; 17 - hash = "sha256-95CAKjBRELX2f7oWSHFWJnI0mikAoxhfUphe9k51Qf4="; 18 - }; 19 - 20 - prePatch = '' 21 - substituteInPlace scripts/SmartCopyPaste_II.lua \ 22 - --replace-fail 'xclip' "${lib.getExe xclip}" 23 - ''; 24 - 25 - passthru.updateScript = unstableGitUpdater { }; 26 - 27 - meta = with lib; { 28 - description = "Smart copy paste with logging and clipboard support"; 29 - homepage = "https://github.com/Eisa01/mpv-scripts"; 30 - license = licenses.bsd2; 31 - maintainers = with maintainers; [ luftmensch-luftmensch ]; 32 - }; 33 - })
-28
pkgs/applications/video/mpv/scripts/smartskip.nix
··· 1 - { 2 - lib, 3 - fetchFromGitHub, 4 - unstableGitUpdater, 5 - buildLua, 6 - }: 7 - 8 - buildLua { 9 - pname = "smartskip"; 10 - version = "0-unstable-2023-11-25"; 11 - 12 - scriptPath = "scripts/SmartSkip.lua"; 13 - src = fetchFromGitHub { 14 - owner = "Eisa01"; 15 - repo = "mpv-scripts"; 16 - rev = "48d68283cea47ff8e904decc9003b3abc3e2123e"; 17 - hash = "sha256-95CAKjBRELX2f7oWSHFWJnI0mikAoxhfUphe9k51Qf4="; 18 - }; 19 - 20 - passthru.updateScript = unstableGitUpdater { }; 21 - 22 - meta = { 23 - description = "Automatically or manually skip opening, intro, outro, and preview"; 24 - homepage = "https://github.com/Eisa01/mpv-scripts"; 25 - license = lib.licenses.bsd2; 26 - maintainers = [ lib.maintainers.iynaix ]; 27 - }; 28 - }
+2 -2
pkgs/build-support/node/fetch-yarn-deps/default.nix
··· 18 18 makeSetupHook, 19 19 cacert, 20 20 callPackage, 21 - nix, 21 + nixForLinking, 22 22 }: 23 23 24 24 let ··· 55 55 lib.makeBinPath [ 56 56 coreutils 57 57 nix-prefetch-git 58 - nix 58 + nixForLinking 59 59 ] 60 60 } 61 61
+3 -3
pkgs/by-name/at/attic-client/package.nix
··· 2 2 lib, 3 3 rustPlatform, 4 4 fetchFromGitHub, 5 - nix, 5 + nixForLinking, 6 6 nixosTests, 7 7 boost, 8 8 pkg-config, ··· 29 29 30 30 buildInputs = 31 31 [ 32 - nix 32 + nixForLinking 33 33 boost 34 34 ] 35 35 ++ lib.optionals stdenv.hostPlatform.isDarwin ( ··· 44 44 useFetchCargoVendor = true; 45 45 46 46 ATTIC_DISTRIBUTOR = "nixpkgs"; 47 - NIX_INCLUDE_PATH = "${lib.getDev nix}/include"; 47 + NIX_INCLUDE_PATH = "${lib.getDev nixForLinking}/include"; 48 48 49 49 # Attic interacts with Nix directly and its tests require trusted-user access 50 50 # to nix-daemon to import NARs, which is not possible in the build sandbox.
+2 -2
pkgs/by-name/bo/bosh-cli/package.nix
··· 9 9 buildGoModule rec { 10 10 pname = "bosh-cli"; 11 11 12 - version = "7.9.3"; 12 + version = "7.9.4"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "cloudfoundry"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-ESM0DpCW97ulo5U/RCEaiKz1C5FeXflB7f/OlJaRwIQ="; 18 + sha256 = "sha256-GTxl0lsM1BMWTUAQfNYkJupDUCnXWavTnRZrkaCRpPc="; 19 19 }; 20 20 vendorHash = null; 21 21
+3 -3
pkgs/by-name/ca/cargo-deny/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "cargo-deny"; 13 - version = "0.17.0"; 13 + version = "0.18.2"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "EmbarkStudios"; 17 17 repo = "cargo-deny"; 18 18 rev = version; 19 - hash = "sha256-SEcs6iYVreZXbZl29CY6orjaN440T4oIh95H93RUUxo="; 19 + hash = "sha256-u93x0w6gSPxDCrp9bNJDCxLBZfh8EhXU4qvhklI4GKY="; 20 20 }; 21 21 22 22 useFetchCargoVendor = true; 23 - cargoHash = "sha256-egVM6ESB2CzAe4tw+4LRw1A+a/j7CSI1bUIr1EpurIM="; 23 + cargoHash = "sha256-3fCACetvO9KRjoTh3V41+vhWFjwaNtoHZ/Zh+Zxmxlc="; 24 24 25 25 nativeBuildInputs = [ 26 26 pkg-config
+5 -5
pkgs/by-name/de/deno/librusty_v8.nix
··· 2 2 { fetchLibrustyV8 }: 3 3 4 4 fetchLibrustyV8 { 5 - version = "134.4.0"; 5 + version = "134.5.0"; 6 6 shas = { 7 - x86_64-linux = "sha256-yG9p8b0dQTtoa234eTRBumjQ5GWxWJFsKHbgNFCUUAA="; 8 - aarch64-linux = "sha256-5IrviupPjTUHTeuwmeA3FHuOy2H8qc05WNqRmlE0UJk="; 9 - x86_64-darwin = "sha256-RPEW5a51WjfYyPjvkKvFbs+fPTlsv9/2sFtqUdtz7EY="; 10 - aarch64-darwin = "sha256-PFyJTOYHWw3YOoG85w+y0899vc0+psz0TtCMXORcsHI="; 7 + x86_64-linux = "sha256-Mo7PJoU/GuEIPCIDeLshfwNoYpkpD5NilOljFRgjLgw="; 8 + aarch64-linux = "sha256-h51n1SosveRhKlq47pnOMUMi5Avg23GLdMW24mj//PU="; 9 + x86_64-darwin = "sha256-76AP6aLuPmf6wC3yrfI/dkomOAjqVJjJPkUQxjAgDhI="; 10 + aarch64-darwin = "sha256-IpiLBL51Q06t402bwE8bFQew5dPuHBNvkFC8gsWXvsY="; 11 11 }; 12 12 }
+4 -4
pkgs/by-name/de/deno/package.nix
··· 20 20 in 21 21 rustPlatform.buildRustPackage rec { 22 22 pname = "deno"; 23 - version = "2.2.2"; 23 + version = "2.2.3"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "denoland"; 27 27 repo = "deno"; 28 28 tag = "v${version}"; 29 - hash = "sha256-ogvrDDwiMmsTRRpXwlH5VWhtnrSkRZErfjj2lhirALQ="; 29 + hash = "sha256-eYzDCQVjilm6Olc9Ko+EYlSCNN7UVl/YXuK55xeoOOg="; 30 30 }; 31 31 32 32 useFetchCargoVendor = true; 33 - cargoHash = "sha256-eaB6e6DGWbQKVR+huHBUbXGjzrY/4xGYdu8tXp+6jBM="; 33 + cargoHash = "sha256-Hmxz4bryk6wMbccaXcKg8XuD9H9BF+nuvMkiCNeYMXY="; 34 34 35 35 postPatch = '' 36 36 # Use patched nixpkgs libffi in order to fix https://github.com/libffi/libffi/pull/857 37 - substituteInPlace ext/ffi/Cargo.toml --replace-fail "libffi = \"=3.2.0\"" "libffi = { version = \"3.2.0\", features = [\"system\"] }" 37 + substituteInPlace Cargo.toml --replace-fail "libffi = \"=3.2.0\"" "libffi = { version = \"3.2.0\", features = [\"system\"] }" 38 38 ''; 39 39 40 40 # uses zlib-ng but can't dynamically link yet
+15 -5
pkgs/by-name/dn/dnf5/package.nix
··· 2 2 lib, 3 3 stdenv, 4 4 fetchFromGitHub, 5 + fetchpatch, 5 6 appstream, 6 7 cmake, 7 8 createrepo_c, ··· 21 22 libyaml, 22 23 pcre2, 23 24 rpm, 24 - sdbus-cpp, 25 + sdbus-cpp_2, 25 26 sphinx, 26 27 sqlite, 27 28 systemd, ··· 33 34 34 35 stdenv.mkDerivation (finalAttrs: { 35 36 pname = "dnf5"; 36 - version = "5.2.10.0"; 37 + version = "5.2.11.0"; 37 38 38 39 outputs = [ 39 40 "out" ··· 43 44 src = fetchFromGitHub { 44 45 owner = "rpm-software-management"; 45 46 repo = "dnf5"; 46 - rev = finalAttrs.version; 47 - hash = "sha256-FDC9va2UKnmAHMQeoH7Rwvu/IN+vZCspvupYvo81nkY="; 47 + tag = finalAttrs.version; 48 + hash = "sha256-89zJ2ORHPqy6qgmMdOSyPEcgxtEYE4CPnmRp7FfNj8Y="; 48 49 }; 49 50 51 + patches = [ 52 + # Only define systemd constants when WITH_SYSTEMD is enabled 53 + (fetchpatch { 54 + name = "0001-offline-only-define-systemd-constants.patch"; 55 + url = "https://github.com/rpm-software-management/dnf5/commit/f75894eea0892917d80e8f0bf3f9f6c8db0ac400.patch"; 56 + hash = "sha256-4eBeBTzhOTUDtiOlfiddh7gJ8AoiMty4FSTlLtdymos="; 57 + }) 58 + ]; 59 + 50 60 nativeBuildInputs = 51 61 [ 52 62 cmake ··· 76 86 libyaml 77 87 pcre2.dev 78 88 rpm 79 - sdbus-cpp 89 + sdbus-cpp_2 80 90 sqlite 81 91 systemd 82 92 toml11
+49
pkgs/by-name/ex/excalifont/package.nix
··· 1 + { 2 + lib, 3 + stdenvNoCC, 4 + fetchFromGitHub, 5 + woff2, 6 + }: 7 + 8 + stdenvNoCC.mkDerivation (finalAttrs: { 9 + pname = "excalifont"; 10 + version = "0.18.0"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "excalidraw"; 14 + repo = "excalidraw"; 15 + tag = "v${finalAttrs.version}"; 16 + hash = "sha256-Nfzh5rNvHP7R418PP44FXD7xNenzmzMHu7RLAdJsE/c="; 17 + }; 18 + 19 + nativeBuildInputs = [ 20 + woff2 21 + ]; 22 + 23 + buildPhase = '' 24 + runHook preBuild 25 + 26 + for file in packages/excalidraw/fonts/Excalifont/*.woff2; do 27 + woff2_decompress $file 28 + done 29 + 30 + runHook postBuild 31 + ''; 32 + 33 + installPhase = '' 34 + runHook preInstall 35 + 36 + install -D -m 444 packages/excalidraw/fonts/Excalifont/*.ttf -t $out/share/fonts/ttf 37 + install -D -m 444 packages/excalidraw/fonts/Excalifont/*.woff2 -t $out/share/fonts/woff2 38 + 39 + runHook postInstall 40 + ''; 41 + 42 + meta = { 43 + homepage = "https://plus.excalidraw.com/excalifont"; 44 + description = "Excalifont is based on the original handwritten Virgil font carefully curated to improve legibility while preserving its hand-drawn nature"; 45 + platforms = lib.platforms.all; 46 + maintainers = with lib.maintainers; [ drupol ]; 47 + license = lib.licenses.ofl; 48 + }; 49 + })
+20 -6
pkgs/by-name/fg/fg-virgil/package.nix
··· 2 2 lib, 3 3 stdenvNoCC, 4 4 fetchFromGitHub, 5 + woff2, 5 6 }: 6 7 7 8 stdenvNoCC.mkDerivation (finalAttrs: { 8 9 pname = "fg-virgil"; 9 - version = "0.17.3"; 10 + version = "0.18.0"; 10 11 11 12 src = fetchFromGitHub { 12 13 owner = "excalidraw"; 13 14 repo = "excalidraw"; 14 - rev = "v${finalAttrs.version}"; 15 - hash = "sha256-j8fT17RkgMQAAS4KsC2+uItT8Z300SZWnLkyo4XI1WY="; 15 + tag = "v${finalAttrs.version}"; 16 + hash = "sha256-Nfzh5rNvHP7R418PP44FXD7xNenzmzMHu7RLAdJsE/c="; 16 17 }; 17 18 19 + nativeBuildInputs = [ 20 + woff2 21 + ]; 22 + 23 + buildPhase = '' 24 + runHook preBuild 25 + 26 + for file in packages/excalidraw/fonts/Virgil/*.woff2; do 27 + woff2_decompress $file 28 + done 29 + 30 + runHook postBuild 31 + ''; 32 + 18 33 installPhase = '' 19 34 runHook preInstall 20 35 21 - install -D -m 444 public/Virgil.woff2 -t $out/share/fonts/woff2 22 - install -D -m 444 public/FG_Virgil.woff2 -t $out/share/fonts/woff2 23 - install -D -m 444 public/FG_Virgil.ttf -t $out/share/fonts/ttf 36 + install -D -m 444 packages/excalidraw/fonts/Virgil/*.ttf -t $out/share/fonts/ttf 37 + install -D -m 444 packages/excalidraw/fonts/Virgil/*.woff2 -t $out/share/fonts/woff2 24 38 25 39 runHook postInstall 26 40 '';
+85
pkgs/by-name/gr/grenedalf/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + cmake, 6 + autoconf, 7 + pkg-config, 8 + libz, 9 + bzip2, 10 + xz, 11 + libdeflate, 12 + htslib, 13 + fetchurl, 14 + }: 15 + 16 + let 17 + # Grenedalf is binded to htslib 1.16 and does not link with libcurl 18 + htslib_gr = htslib.overrideDerivation (oldAttrs: rec { 19 + version = "1.16"; 20 + name = "${oldAttrs.pname}-nocurl-${version}"; 21 + src = fetchurl { 22 + url = "https://github.com/samtools/htslib/releases/download/${version}/htslib-${version}.tar.bz2"; 23 + sha256 = "sha256-YGt8ev9zc0zwM+zRVvQFKfpXkvVFJJUqKJOMoIkNeSQ="; 24 + }; 25 + configureFlags = [ 26 + "--disable-libcurl" 27 + "--disable-plugins" 28 + ]; 29 + }); 30 + in 31 + stdenv.mkDerivation (finalAttrs: { 32 + pname = "grenedalf"; 33 + version = "0.6.2"; 34 + 35 + src = fetchFromGitHub { 36 + owner = "lczech"; 37 + repo = "grenedalf"; 38 + rev = "v${finalAttrs.version}"; 39 + hash = "sha256-DJ7nZjOvYFQlN/L+S2QcMVvH/M9Dhla4VXl2nxc22m4="; 40 + fetchSubmodules = true; 41 + }; 42 + 43 + nativeBuildInputs = [ 44 + cmake 45 + pkg-config 46 + autoconf 47 + ]; 48 + 49 + buildInputs = [ 50 + libz 51 + bzip2 52 + xz 53 + libdeflate 54 + htslib_gr 55 + ]; 56 + 57 + cmakeFlags = [ 58 + "-DHTSLIB_DIR=${htslib_gr}" 59 + ]; 60 + 61 + installPhase = '' 62 + runHook preInstall 63 + 64 + mkdir -p $out/bin 65 + cp ../bin/grenedalf $out/bin 66 + 67 + runHook postInstall 68 + ''; 69 + 70 + meta = with lib; { 71 + homepage = "https://github.com/lczech/grenedalf"; 72 + description = "Collection of commands for working with population genetic data"; 73 + longDescription = '' 74 + grenedalf is a collection of commands for working with population genetic 75 + data, in particular from pool sequencing. Its main focus are statistical 76 + analyses such as Tajima's D and Fst. The statistics follow the approaches 77 + of PoPoolation and PoPoolation2, as well as poolfstat and npstat. However, 78 + compared to those, grenedalf is significantly more scalable, more user 79 + friendly, and offers more settings and input file formats. 80 + ''; 81 + platforms = platforms.all; 82 + license = licenses.gpl3Plus; 83 + maintainers = with maintainers; [ bzizou ]; 84 + }; 85 + })
+3 -3
pkgs/by-name/gu/gum/package.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "gum"; 11 - version = "0.15.2"; 11 + version = "0.16.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "charmbracelet"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - hash = "sha256-kQDCgQXI9jTUHM8UEfDSLXMoUUMOt0Iccv3P3RtPOIg="; 17 + hash = "sha256-77102I7pOGfpPBSGelsA/9GJYos05akF0kdmr522RC0="; 18 18 }; 19 19 20 - vendorHash = "sha256-WxM1gCIsxRWNq9IdBux4BJi6r87wY2/6vtMjEDSQnv0="; 20 + vendorHash = "sha256-wrl4Zo5NSaTTMrc95Fs9cevG7ITJtHuV3pGkFd8jpxU="; 21 21 22 22 nativeBuildInputs = [ 23 23 installShellFiles
+5 -5
pkgs/by-name/ko/komac/package.nix
··· 16 16 bzip2, 17 17 }: 18 18 rustPlatform.buildRustPackage (finalAttrs: { 19 - version = "2.10.1"; 19 + pname = "komac"; 20 + version = "2.11.0"; 21 + 20 22 src = fetchFromGitHub { 21 23 owner = "russellbanks"; 22 24 repo = "Komac"; 23 25 tag = "v${finalAttrs.version}"; 24 - hash = "sha256-oqnFenSFWCe3vax5mqstvNNTFWOecLOkuhJzaxv78yE="; 26 + hash = "sha256-iohqtbzebX/1hkAwEe6UT6cw0BOQF5Ec5MS5ycrHoNU="; 25 27 }; 26 - 27 - pname = "komac"; 28 28 29 29 useFetchCargoVendor = true; 30 - cargoHash = "sha256-g7R4Vk6bFaJ5TA4IdeXRiFzZOcj1T4JY3HsOt+Zx2mU="; 30 + cargoHash = "sha256-LvYweWuMytBcke1lKNmIPeFFfjEqzR07vO2MQQ37ASY="; 31 31 32 32 nativeBuildInputs = 33 33 [
+8 -4
pkgs/by-name/li/libjaylink/package.nix
··· 1 1 { 2 - autoreconfHook, 3 2 fetchFromGitLab, 4 3 lib, 5 4 libusb1, 5 + meson, 6 + ninja, 6 7 nix-update-script, 7 8 pkg-config, 8 9 stdenv, ··· 21 22 }; 22 23 23 24 nativeBuildInputs = [ 24 - autoreconfHook 25 + meson 26 + ninja 25 27 pkg-config 26 28 ]; 29 + 27 30 buildInputs = [ libusb1 ]; 28 31 29 32 postPatch = '' 30 - patchShebangs autogen.sh 33 + substituteInPlace contrib/60-libjaylink.rules \ 34 + --replace-fail 'GROUP="plugdev"' 'GROUP="jlink"' 31 35 ''; 32 36 33 37 postInstall = '' 34 - install -Dm644 contrib/60-libjaylink.rules $out/lib/udev/rules.d/60-libjaylink.rules 38 + install -Dm644 ../contrib/60-libjaylink.rules $out/lib/udev/rules.d/60-libjaylink.rules 35 39 ''; 36 40 37 41 passthru.updateScript = nix-update-script { };
+6
pkgs/by-name/lo/localproxy/package.nix
··· 31 31 url = "https://github.com/aws-samples/aws-iot-securetunneling-localproxy/commit/de8779630d14e4f4969c9b171d826acfa847822b.patch"; 32 32 hash = "sha256-11k6mRvCx72+5G/5LZZx2qnx10yfKpcAZofn8t8BD3E="; 33 33 }) 34 + (fetchpatch { 35 + name = "boost187.patch"; 36 + url = "https://github.com/aws-samples/aws-iot-securetunneling-localproxy/commit/12022770e89c6787c3eda4ca01a7cedaf2affa92.patch"; 37 + hash = "sha256-THY+dRkKhpbpK+wLskRjWvqr6uFuT0JMt/VHvgzKTzw="; 38 + excludes = [ ".github/workflows/ci.yml" ]; 39 + }) 34 40 ]; 35 41 36 42 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/by-name/me/mediathekview/package.nix
··· 10 10 }: 11 11 12 12 stdenv.mkDerivation rec { 13 - version = "14.1.0"; 13 + version = "14.2.0"; 14 14 pname = "mediathekview"; 15 15 src = fetchurl { 16 16 url = "https://download.mediathekview.de/stabil/MediathekView-${version}-linux.tar.gz"; 17 - sha256 = "sha256-2dC7y4SbGsjU6UBHbfye1MUNiLvIQjqTcqPX0I11qIk="; 17 + sha256 = "sha256-EWpa6YE9Fk7K14vvsbjadKuGGZGqNhlouDtwj6KpbdE="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+5 -4
pkgs/by-name/ne/neomutt/package.nix
··· 33 33 enableLua ? false, 34 34 enableSmimeKeys ? true, 35 35 withContrib ? true, 36 + withNotmuch ? true, 36 37 }: 37 38 38 39 assert lib.warnIf ( ··· 58 59 libkrb5 59 60 libidn2 60 61 ncurses 61 - notmuch 62 62 openssl 63 63 perl 64 64 lmdb ··· 66 66 sqlite 67 67 ] 68 68 ++ lib.optional enableZstd zstd 69 - ++ lib.optional enableLua lua; 69 + ++ lib.optional enableLua lua 70 + ++ lib.optional withNotmuch notmuch; 70 71 71 72 nativeBuildInputs = [ 72 73 docbook_xsl ··· 108 109 "--gpgme" 109 110 "--gss" 110 111 "--lmdb" 111 - "--notmuch" 112 112 "--ssl" 113 113 "--sasl" 114 114 "--with-homespool=mailbox" ··· 119 119 "--zlib" 120 120 ] 121 121 ++ lib.optional enableZstd "--zstd" 122 - ++ lib.optional enableLua "--lua"; 122 + ++ lib.optional enableLua "--lua" 123 + ++ lib.optional withNotmuch "--notmuch"; 123 124 124 125 postInstall = 125 126 ''
+2 -2
pkgs/by-name/ni/nix-search-tv/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "nix-search-tv"; 10 - version = "2.1.0"; 10 + version = "2.1.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "3timeslazy"; 14 14 repo = "nix-search-tv"; 15 15 tag = "v${version}"; 16 - hash = "sha256-bQrn7tX1Pe1glH84OSO96Ud0bG/aq+HxdzQwyNFB3R4="; 16 + hash = "sha256-ZUc9aphl2+KRGwH7cn3dtcTcC3RxrR6qZC4RqwVddFw="; 17 17 }; 18 18 19 19 vendorHash = "sha256-hgZWppiy+P3BfoKOMClzCot1shKcGTZnsMCJ/ItxckE=";
+2 -2
pkgs/by-name/nu/nurl/package.nix
··· 8 8 darwin, 9 9 gitMinimal, 10 10 mercurial, 11 - nix, 11 + nixForLinking, 12 12 }: 13 13 14 14 rustPlatform.buildRustPackage rec { ··· 43 43 lib.makeBinPath [ 44 44 gitMinimal 45 45 mercurial 46 - nix 46 + nixForLinking 47 47 ] 48 48 } 49 49 installManPage artifacts/nurl.1
+72
pkgs/by-name/re/recon-ng/package.nix
··· 1 + { 2 + lib, 3 + fetchFromGitHub, 4 + python3, 5 + substituteAll, 6 + fetchpatch, 7 + }: 8 + python3.pkgs.buildPythonApplication rec { 9 + pname = "recon-ng"; 10 + version = "5.1.2"; 11 + pyproject = true; 12 + 13 + src = fetchFromGitHub { 14 + owner = "lanmaster53"; 15 + repo = "recon-ng"; 16 + tag = "v${version}"; 17 + hash = "sha256-W7pL4Rl86i881V53SAwECAMp2Qj/azPM3mdvxvt+gjc="; 18 + }; 19 + 20 + build-system = [ 21 + python3.pkgs.setuptools 22 + ]; 23 + 24 + dependencies = with python3.pkgs; [ 25 + pyyaml 26 + dnspython 27 + lxml 28 + mechanize 29 + requests 30 + flask 31 + flask-restful 32 + flasgger 33 + dicttoxml 34 + xlsxwriter 35 + unicodecsv 36 + rq 37 + ]; 38 + 39 + patches = [ 40 + # Support python 3.12 41 + # https://github.com/lanmaster53/recon-ng/pull/218 42 + # This is merged and can be removed when updating 43 + (fetchpatch { 44 + name = "fix_python12.patch"; 45 + url = "https://github.com/lanmaster53/recon-ng/commit/e31c30e5c314cbc5e57a13f9d3ddf29afafc4cb3.patch"; 46 + hash = "sha256-e8BTRkwb42mTTwivZ0sTxVw1hnYCUVInmy91jyVc/tw="; 47 + }) 48 + ]; 49 + 50 + postPatch = 51 + let 52 + setup = substituteAll { 53 + src = ./setup.py; 54 + inherit pname version; 55 + }; 56 + in 57 + '' 58 + ln -s ${setup} setup.py 59 + ''; 60 + 61 + postInstall = '' 62 + cp VERSION $out/${python3.sitePackages}/ 63 + cp -R recon/core/web/{definitions.yaml,static,templates} $out/${python3.sitePackages}/recon/core/web/ 64 + ''; 65 + 66 + meta = { 67 + description = "Full-featured framework providing a powerful environment to conduct web-based reconnaissance"; 68 + license = lib.licenses.gpl3Only; 69 + homepage = "https://github.com/lanmaster53/recon-ng/"; 70 + maintainers = with lib.maintainers; [ gamedungeon ]; 71 + }; 72 + }
+25
pkgs/by-name/re/recon-ng/setup.py
··· 1 + from setuptools import setup 2 + 3 + setup( 4 + name='@pname@', 5 + version='@version@', 6 + install_requires=[ 7 + "pyyaml", 8 + "dnspython", 9 + "lxml", 10 + "mechanize", 11 + "requests", 12 + "flask", 13 + "flask-restful", 14 + "flasgger", 15 + "dicttoxml", 16 + "xlsxwriter", 17 + "unicodecsv", 18 + "rq" 19 + ], 20 + scripts=[ 21 + 'recon-ng', 22 + "recon-cli", 23 + "recon-web" 24 + ], 25 + )
+2 -2
pkgs/by-name/rp/rpiboot/package.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "rpiboot"; 12 - version = "20250129-123632"; 12 + version = "20250227-132106"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "raspberrypi"; 16 16 repo = "usbboot"; 17 17 rev = version; 18 - hash = "sha256-m11SX31GLmb/LGiO7X8P7eL88zvLfoJ/anAVEpg8WL4="; 18 + hash = "sha256-WccnaIUF5M080M4vg5NzBCLpLVcE7ts/oJJE8CLRi8A="; 19 19 fetchSubmodules = true; 20 20 }; 21 21
+2 -2
pkgs/by-name/wg/wgpu-native/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "wgpu-native"; 14 - version = "24.0.0.1"; 14 + version = "24.0.0.2"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "gfx-rs"; 18 18 repo = "wgpu-native"; 19 19 tag = "v${version}"; 20 - hash = "sha256-hCGLOMsX83VxgNIhkBouN551XgH9Vd/ndaIZP0SY+kc="; 20 + hash = "sha256-3Z9LBmFBVZD8e65OwBuzg1S/q/5Qq9Zu0tjiWPm2inc="; 21 21 fetchSubmodules = true; 22 22 }; 23 23
+9 -9
pkgs/by-name/wi/windsurf/info.json
··· 1 1 { 2 2 "aarch64-darwin": { 3 - "version": "1.4.3", 3 + "version": "1.4.6", 4 4 "vscodeVersion": "1.94.0", 5 - "url": "https://windsurf-stable.codeiumdata.com/darwin-arm64/stable/d4fc55fbd0d7b321c4f3b5fb4f56e01c0775d394/Windsurf-darwin-arm64-1.4.3.zip", 6 - "sha256": "06b7ec93c16669e702e3db5da48236dd6fe736637849dc9146559b5b8280a5cb" 5 + "url": "https://windsurf-stable.codeiumdata.com/darwin-arm64/stable/724a915b3b4c73cea3d2c93fc85672d6aa3961e0/Windsurf-darwin-arm64-1.4.6.zip", 6 + "sha256": "156d4d4d54033e15fb0edd0c8f17a30ae26c622692cfcb915fd548a1596ec103" 7 7 }, 8 8 "x86_64-darwin": { 9 - "version": "1.4.3", 9 + "version": "1.4.6", 10 10 "vscodeVersion": "1.94.0", 11 - "url": "https://windsurf-stable.codeiumdata.com/darwin-x64/stable/d4fc55fbd0d7b321c4f3b5fb4f56e01c0775d394/Windsurf-darwin-x64-1.4.3.zip", 12 - "sha256": "01eb6a7b117b5aab3f9b5aeaad23e1b50d8daeb0faaccac391f3a160a7874287" 11 + "url": "https://windsurf-stable.codeiumdata.com/darwin-x64/stable/724a915b3b4c73cea3d2c93fc85672d6aa3961e0/Windsurf-darwin-x64-1.4.6.zip", 12 + "sha256": "f41e4ab9d79062357765064993fdf993a05358aae675fdf511996fa3fdf01e55" 13 13 }, 14 14 "x86_64-linux": { 15 - "version": "1.4.3", 15 + "version": "1.4.6", 16 16 "vscodeVersion": "1.94.0", 17 - "url": "https://windsurf-stable.codeiumdata.com/linux-x64/stable/d4fc55fbd0d7b321c4f3b5fb4f56e01c0775d394/Windsurf-linux-x64-1.4.3.tar.gz", 18 - "sha256": "4a9b9c6cf723db24e830e15cae3c37be4799d0934f92d85d17c8f8ec3430d02e" 17 + "url": "https://windsurf-stable.codeiumdata.com/linux-x64/stable/724a915b3b4c73cea3d2c93fc85672d6aa3961e0/Windsurf-linux-x64-1.4.6.tar.gz", 18 + "sha256": "116e1fcefe98321764f4d6a5e36a8e16282b20d994c385fd3e3826dd9945e8f4" 19 19 } 20 20 }
+4
pkgs/by-name/xb/xbps/package.nix
··· 44 44 --replace 'define _BSD_SOURCE' 'define _DEFAULT_SOURCE' \ 45 45 --replace '# define _BSD_SOURCE' '#define _DEFAULT_SOURCE' 46 46 47 + # fix calloc argument cause a build failure 48 + substituteInPlace bin/xbps-fbulk/main.c \ 49 + --replace-fail 'calloc(sizeof(*depn), 1)' 'calloc(1UL, sizeof(*depn))' 50 + 47 51 # fix unprefixed ranlib (needed on cross) 48 52 substituteInPlace lib/Makefile \ 49 53 --replace 'SILENT}ranlib ' 'SILENT}$(RANLIB) '
+35
pkgs/by-name/xk/xk6/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + buildGoModule, 5 + fetchFromGitHub, 6 + nix-update-script, 7 + installShellFiles, 8 + }: 9 + 10 + buildGoModule rec { 11 + pname = "xk6"; 12 + version = "0.14.3"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "grafana"; 16 + repo = "xk6"; 17 + tag = "v${version}"; 18 + hash = "sha256-pxiZelbAEEtibNdpEuRplPFtJ61YicoiAnAs8oaX6IA="; 19 + }; 20 + 21 + vendorHash = null; 22 + 23 + subPackages = [ "cmd/xk6" ]; 24 + 25 + passthru.updateScript = nix-update-script { }; 26 + 27 + meta = { 28 + description = "Build k6 with extensions"; 29 + mainProgram = "xk6"; 30 + homepage = "https://k6.io/"; 31 + changelog = "https://github.com/grafana/xk6/releases/tag/v${version}"; 32 + license = lib.licenses.asl20; 33 + maintainers = with lib.maintainers; [ szkiba ]; 34 + }; 35 + }
+3 -2
pkgs/by-name/zi/zitadel/console.nix
··· 20 20 let 21 21 protobufGenerated = generateProtobufCode { 22 22 pname = "zitadel-console"; 23 + inherit version; 23 24 nativeBuildInputs = [ 24 25 grpc-gateway 25 26 protoc-gen-grpc-web ··· 28 29 workDir = "console"; 29 30 bufArgs = "../proto --include-imports --include-wkt"; 30 31 outputPath = "src/app/proto"; 31 - hash = "sha256-n6BJ1gSSm66yOGdHcSea/nQbjiHZX2YX2zbFT4o75/4="; 32 + hash = "sha256-3WvfbhLpp03yP7Nb8bmZXYSlGJuEnBkBuyEzNVkIYZg="; 32 33 }; 33 34 in 34 35 stdenv.mkDerivation { ··· 41 42 42 43 offlineCache = fetchYarnDeps { 43 44 yarnLock = "${zitadelRepo}/console/yarn.lock"; 44 - hash = "sha256-MWATjfhIbo3cqpzOdXP52f/0Td60n99OTU1Qk6oWmXU="; 45 + hash = "sha256-+7CFBEKfRsqXbJR+BkLdB+pZ/dEEk4POGwZOVQ1LAUo="; 45 46 }; 46 47 47 48 nativeBuildInputs = [
+8 -5
pkgs/by-name/zi/zitadel/package.nix
··· 16 16 }: 17 17 18 18 let 19 - version = "2.58.3"; 19 + version = "2.71.1"; 20 20 zitadelRepo = fetchFromGitHub { 21 21 owner = "zitadel"; 22 22 repo = "zitadel"; 23 23 rev = "v${version}"; 24 - hash = "sha256-RXcJwGO8OQ38lbuy2uLTSkh6yUbyqY42FpwgMXC3g6c="; 24 + hash = "sha256-izYsf2Cc0jG8Wf82K6HsTVP+kAhmoEJVU7OJXhSzXLo="; 25 25 }; 26 - goModulesHash = "sha256-gp17dP67HX7Tx3Gq+kEu9xCYkfs/rGpqLFiKT7cKlrc="; 26 + goModulesHash = "sha256-mE0vhW1nW16SzqIu0C3q8qCXabJO7fZgkp7GeLWCwog="; 27 27 28 28 buildZitadelProtocGen = 29 29 name: ··· 55 55 generateProtobufCode = 56 56 { 57 57 pname, 58 + version, 58 59 nativeBuildInputs ? [ ], 59 60 bufArgs ? "", 60 61 workDir ? ".", ··· 62 63 hash, 63 64 }: 64 65 stdenv.mkDerivation { 65 - name = "${pname}-buf-generated"; 66 + pname = "${pname}-buf-generated"; 67 + inherit version; 66 68 67 69 src = zitadelRepo; 68 70 patches = [ ./console-use-local-protobuf-plugins.patch ]; ··· 88 90 89 91 protobufGenerated = generateProtobufCode { 90 92 pname = "zitadel"; 93 + inherit version; 91 94 nativeBuildInputs = [ 92 95 grpc-gateway 93 96 protoc-gen-authoption ··· 97 100 protoc-gen-zitadel 98 101 ]; 99 102 outputPath = ".artifacts"; 100 - hash = "sha256-KRf11PNn7LtVFjG3NYUtPEJtLNbnxfzR4B69US07B3k="; 103 + hash = "sha256-11ByEuamYpCUeuqNr8ZVNCo4r3aSfuPXXhIu6mUqlzU="; 101 104 }; 102 105 in 103 106 buildGoModule rec {
+4 -1
pkgs/development/libraries/kerberos/heimdal.nix
··· 202 202 description = "Implementation of Kerberos 5 (and some more stuff)"; 203 203 license = licenses.bsd3; 204 204 platforms = platforms.unix; 205 - maintainers = with maintainers; [ h7x4 ]; 205 + maintainers = with maintainers; [ 206 + h7x4 207 + dblsaiko 208 + ]; 206 209 }; 207 210 }
+2 -2
pkgs/development/php-packages/phalcon/default.nix
··· 9 9 10 10 buildPecl rec { 11 11 pname = "phalcon"; 12 - version = "5.8.0"; 12 + version = "5.9.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "phalcon"; 16 16 repo = "cphalcon"; 17 17 rev = "v${version}"; 18 - hash = "sha256-Jgl/sBWgP4N4rYloaGn78T6XWF/yTYYCsSC9Q6gD6Wg="; 18 + hash = "sha256-S+y0HIAFAVpWfeH2yvbYzbCd1iSyae3x1syuLQL3Ago="; 19 19 }; 20 20 21 21 internalDeps = [
+4 -4
pkgs/development/php-packages/tideways/default.nix
··· 23 23 stdenvNoCC.mkDerivation (finalAttrs: { 24 24 pname = "tideways-php"; 25 25 extensionName = "tideways"; 26 - version = "5.18.2"; 26 + version = "5.19.0"; 27 27 28 28 src = 29 29 finalAttrs.passthru.sources.${stdenvNoCC.hostPlatform.system} ··· 43 43 sources = { 44 44 "x86_64-linux" = fetchurl { 45 45 url = "https://s3-eu-west-1.amazonaws.com/tideways/extension/${finalAttrs.version}/tideways-php-${finalAttrs.version}-x86_64.tar.gz"; 46 - hash = "sha256-JThRW4ghBy2NXe2hNP2Q1VHbocrYmZi7wMTdWYX8QTo="; 46 + hash = "sha256-AaTrbrdi/XLeKlG+//DTjRGQEheLTtfHwx7Ztn+/Nuk="; 47 47 }; 48 48 "aarch64-linux" = fetchurl { 49 49 url = "https://s3-eu-west-1.amazonaws.com/tideways/extension/${finalAttrs.version}/tideways-php-${finalAttrs.version}-arm64.tar.gz"; 50 - hash = "sha256-hz5lzjsfFT61fBFyMlV9ZB99S4jYokzN0lLtxm3G9gc="; 50 + hash = "sha256-BSXKLxh2ex7rU4vsxHWqQIca+yFQlZDbB0TyNcpYmKs="; 51 51 }; 52 52 "aarch64-darwin" = fetchurl { 53 53 url = "https://s3-eu-west-1.amazonaws.com/tideways/extension/${finalAttrs.version}/tideways-php-${finalAttrs.version}-macos-arm.tar.gz"; 54 - hash = "sha256-BmmoHQE0gL1dDhS+WpmAIkEuIOb/EPLT4RMMLkkeMvw="; 54 + hash = "sha256-a63cr/547MxyB7irVlONUpdep3M42YA2C6H9sGbEAI8="; 55 55 }; 56 56 }; 57 57
+2 -2
pkgs/development/php-packages/xdebug/default.nix
··· 5 5 }: 6 6 7 7 let 8 - version = "3.4.1"; 8 + version = "3.4.2"; 9 9 in 10 10 buildPecl { 11 11 inherit version; ··· 16 16 owner = "xdebug"; 17 17 repo = "xdebug"; 18 18 rev = version; 19 - hash = "sha256-yOqVS58bsFXGhdkQ20LK0E80bV7O2r/BE76CfBoeEqA="; 19 + hash = "sha256-LTM2c9DC837y0t4S3m9292x37q4tXg1Poh2dm0KAyJc="; 20 20 }; 21 21 22 22 doCheck = true;
+3 -3
pkgs/development/python-modules/authlib/default.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "authlib"; 23 - version = "1.4.1"; 23 + version = "1.5.0"; 24 24 pyproject = true; 25 25 26 26 disabled = pythonOlder "3.8"; ··· 29 29 owner = "lepture"; 30 30 repo = "authlib"; 31 31 tag = "v${version}"; 32 - hash = "sha256-1Iygc35+Vc1zyn8rjubnSLmpvjckY4TRKOtf2bkrkdI="; 32 + hash = "sha256-RrsQTrOV2v3SzdM7kqdFe1Uj7A+o/Yseq1j7CCG8qtg="; 33 33 }; 34 34 35 35 build-system = [ setuptools ]; ··· 69 69 meta = with lib; { 70 70 description = "Library for building OAuth and OpenID Connect servers"; 71 71 homepage = "https://github.com/lepture/authlib"; 72 - changelog = "https://github.com/lepture/authlib/blob/v${version}/docs/changelog.rst"; 72 + changelog = "https://github.com/lepture/authlib/blob/${src.tag}/docs/changelog.rst"; 73 73 license = licenses.bsd3; 74 74 maintainers = with maintainers; [ flokli ]; 75 75 };
+2 -2
pkgs/development/python-modules/marimo/default.nix
··· 33 33 34 34 buildPythonPackage rec { 35 35 pname = "marimo"; 36 - version = "0.11.13"; 36 + version = "0.11.17"; 37 37 pyproject = true; 38 38 39 39 # The github archive does not include the static assets 40 40 src = fetchPypi { 41 41 inherit pname version; 42 - hash = "sha256-5c74WT2/5XcIi77GWQkM9Mvsp3hSYeuMYlx0NgyCFHc="; 42 + hash = "sha256-jKDNbBhDnQyzaPe1JLXpNZaIhQmt0/1LIurT5WAKiNc="; 43 43 }; 44 44 45 45 build-system = [ hatchling ];
+3 -1
pkgs/development/python-modules/pwntools/default.nix
··· 79 79 doCheck = false; # no setuptools tests for the package 80 80 81 81 postInstall = '' 82 - installShellCompletion --bash extra/bash_completion.d/shellcraft 82 + installShellCompletion --cmd pwn \ 83 + --bash extra/bash_completion.d/pwn \ 84 + --zsh extra/zsh_completion/_pwn 83 85 ''; 84 86 85 87 postFixup = lib.optionalString (!stdenv.hostPlatform.isDarwin) ''
+1 -3
pkgs/development/python2-modules/hypothesis/default.nix
··· 2 2 lib, 3 3 buildPythonPackage, 4 4 fetchFromGitHub, 5 - isPy3k, 6 5 attrs, 7 6 coverage, 8 - enum34, 9 7 pexpect, 10 8 doCheck ? true, 11 9 pytest, ··· 38 36 attrs 39 37 coverage 40 38 sortedcontainers 41 - ] ++ lib.optional (!isPy3k) enum34; 39 + ]; 42 40 43 41 nativeCheckInputs = [ 44 42 pytest
+5 -5
pkgs/development/tools/language-servers/nixd/default.nix
··· 8 8 llvmPackages, 9 9 meson, 10 10 ninja, 11 - nix, 11 + nixForLinking, 12 12 nix-update-script, 13 13 nixd, 14 14 nixf, ··· 101 101 ]; 102 102 103 103 buildInputs = [ 104 - nix 104 + nixForLinking 105 105 gtest 106 106 boost 107 107 ]; 108 108 109 - env.CXXFLAGS = "-include ${nix.dev}/include/nix/config.h"; 109 + env.CXXFLAGS = "-include ${nixForLinking.dev}/include/nix/config.h"; 110 110 111 111 passthru.tests.pkg-config = testers.hasPkgConfigModules { 112 112 package = nixt; ··· 127 127 sourceRoot = "${common.src.name}/nixd"; 128 128 129 129 buildInputs = [ 130 - nix 130 + nixForLinking 131 131 nixf 132 132 nixt 133 133 llvmPackages.llvm ··· 137 137 138 138 nativeBuildInputs = common.nativeBuildInputs ++ [ cmake ]; 139 139 140 - env.CXXFLAGS = "-include ${nix.dev}/include/nix/config.h"; 140 + env.CXXFLAGS = "-include ${nixForLinking.dev}/include/nix/config.h"; 141 141 142 142 # See https://github.com/nix-community/nixd/issues/519 143 143 doCheck = false;
+2 -1
pkgs/kde/lib/mk-kde-derivation.nix
··· 3 3 lib, 4 4 stdenv, 5 5 makeSetupHook, 6 - fetchurl, 7 6 cmake, 7 + ninja, 8 8 qt6, 9 9 }: 10 10 let ··· 121 121 122 122 nativeBuildInputs = [ 123 123 cmake 124 + ninja 124 125 qt6.wrapQtAppsHook 125 126 moveDevHook 126 127 ] ++ extraNativeBuildInputs;
+20 -4
pkgs/servers/x11/xorg/overrides.nix
··· 1008 1008 meta = attrs.meta // { mainProgram = "xinit"; }; 1009 1009 }); 1010 1010 1011 - xf86videointel = throw '' 1012 - xf86videointel has been removed as the package is unmaintained and the driver is no longer functional. 1013 - Please remove "intel" from `services.xserver.videoDrivers` and switch to the "modesetting" driver. 1014 - ''; # Added 2024-12-16; 1011 + xf86videointel = super.xf86videointel.overrideAttrs (attrs: { 1012 + # the update script only works with released tarballs :-/ 1013 + name = "xf86-video-intel-2024-05-06"; 1014 + src = fetchFromGitLab { 1015 + domain = "gitlab.freedesktop.org"; 1016 + group = "xorg"; 1017 + owner = "driver"; 1018 + repo = "xf86-video-intel"; 1019 + rev = "ce811e78882d9f31636351dfe65351f4ded52c74"; 1020 + sha256 = "sha256-PKCxFHMwxgbew0gkxNBKiezWuqlFG6bWLkmtUNyoF8Q="; 1021 + }; 1022 + buildInputs = attrs.buildInputs ++ [ xorg.libXScrnSaver xorg.libXv xorg.pixman ]; 1023 + nativeBuildInputs = attrs.nativeBuildInputs ++ [ autoreconfHook xorg.utilmacros xorg.xorgserver ]; 1024 + configureFlags = [ "--with-default-dri=3" "--enable-tools" ]; 1025 + patches = [ ./use_crocus_and_iris.patch ]; 1026 + 1027 + meta = attrs.meta // { 1028 + platforms = ["i686-linux" "x86_64-linux"]; 1029 + }; 1030 + }); 1015 1031 1016 1032 xf86videoopenchrome = super.xf86videoopenchrome.overrideAttrs (attrs: { 1017 1033 buildInputs = attrs.buildInputs ++ [ xorg.libXv ];
+28
pkgs/servers/x11/xorg/use_crocus_and_iris.patch
··· 1 + --- a/src/uxa/intel_dri.c 2 + +++ b/src/uxa/intel_dri.c 3 + @@ -1540,8 +1540,10 @@ 4 + return has_i830_dri() ? "i830" : "i915"; 5 + else if (INTEL_INFO(intel)->gen < 040) 6 + return "i915"; 7 + + else if (INTEL_INFO(intel)->gen < 0100) 8 + + return "crocus"; 9 + else 10 + - return "i965"; 11 + + return "iris"; 12 + } 13 + 14 + return s; 15 + --- a/src/sna/sna_dri2.c 16 + +++ b/src/sna/sna_dri2.c 17 + @@ -3707,8 +3707,10 @@ 18 + return has_i830_dri() ? "i830" : "i915"; 19 + else if (sna->kgem.gen < 040) 20 + return "i915"; 21 + + else if (sna->kgem.gen < 0100) 22 + + return "crocus"; 23 + else 24 + - return "i965"; 25 + + return "iris"; 26 + } 27 + 28 + return s;
+5 -5
pkgs/tools/misc/ncdu/default.nix
··· 4 4 fetchurl, 5 5 ncurses, 6 6 pkg-config, 7 - zig_0_13, 7 + zig_0_14, 8 8 zstd, 9 9 installShellFiles, 10 10 testers, ··· 13 13 14 14 stdenv.mkDerivation (finalAttrs: { 15 15 pname = "ncdu"; 16 - version = "2.7"; 16 + version = "2.8"; 17 17 18 18 src = fetchurl { 19 19 url = "https://dev.yorhel.nl/download/ncdu-${finalAttrs.version}.tar.gz"; 20 - hash = "sha256-shjMFKK7mFLPlR204hrsiYDnqMOsoJfjqjQX8g65MAA="; 20 + hash = "sha256-qmFXb37J/fUyyxeBQu9bMqrUJWdwWZLPPg0cb+fjjkA="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ 24 - zig_0_13.hook 24 + zig_0_14.hook 25 25 installShellFiles 26 26 pkg-config 27 27 ]; ··· 50 50 pSub 51 51 rodrgz 52 52 ]; 53 - inherit (zig_0_13.meta) platforms; 53 + inherit (zig_0_14.meta) platforms; 54 54 mainProgram = "ncdu"; 55 55 }; 56 56 })
+3 -3
pkgs/tools/package-management/nix-du/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 rustPlatform, 6 - nix, 6 + nixForLinking, 7 7 nlohmann_json, 8 8 boost, 9 9 graphviz, ··· 27 27 28 28 doCheck = true; 29 29 nativeCheckInputs = [ 30 - nix 30 + nixForLinking 31 31 graphviz 32 32 ]; 33 33 34 34 buildInputs = [ 35 35 boost 36 - nix 36 + nixForLinking 37 37 nlohmann_json 38 38 ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ Security ]; 39 39
+15 -2
pkgs/tools/package-management/nix-prefetch-scripts/default.nix
··· 1 1 { lib, stdenv, makeWrapper, buildEnv 2 - , bash, breezy, coreutils, cvs, findutils, gawk, git, git-lfs, gnused, mercurial, nix, subversion 2 + , bash, breezy, coreutils, cvs, findutils, gawk, git, git-lfs, gnused, mercurial 3 + , # FIXME: These scripts should not depend on Nix, they should depend on a 4 + # `.nar` hasher compatible with Nix. 5 + # 6 + # The fact that these scripts depend on Nix means that e.g. Chromium depends 7 + # on Nix. 8 + # 9 + # Also should be fixed: 10 + # - prefetch-yarn-deps 11 + # - nurl, nix-init 12 + # 13 + # Gridlock is one such candidate: https://github.com/lf-/gridlock 14 + nixForLinking 15 + , subversion 3 16 }: 4 17 5 18 let mkPrefetchScript = tool: src: deps: ··· 15 28 installPhase = '' 16 29 install -vD ${src} $out/bin/$name; 17 30 wrapProgram $out/bin/$name \ 18 - --prefix PATH : ${lib.makeBinPath (deps ++ [ coreutils gnused nix ])} \ 31 + --prefix PATH : ${lib.makeBinPath (deps ++ [ coreutils gnused nixForLinking ])} \ 19 32 --set HOME /homeless-shelter 20 33 ''; 21 34
+14 -12
pkgs/tools/system/htop/default.nix
··· 1 1 { 2 2 lib, 3 3 fetchFromGitHub, 4 - fetchpatch2, 5 4 stdenv, 6 5 autoreconfHook, 7 6 pkg-config, ··· 19 18 20 19 stdenv.mkDerivation rec { 21 20 pname = "htop"; 22 - version = "3.3.0"; 21 + version = "3.4.0"; 23 22 24 23 src = fetchFromGitHub { 25 24 owner = "htop-dev"; 26 25 repo = pname; 27 26 rev = version; 28 - hash = "sha256-qDhQkzY2zj2yxbgFUXwE0MGEgAFOsAhnapUuetO9WTw="; 27 + hash = "sha256-4M2Kzy/tTpIZzpyubnXWywQh7Np5InT4sYkVG2v6wWs="; 29 28 }; 30 29 31 - patches = [ 32 - # See https://github.com/htop-dev/htop/pull/1412 33 - # Remove when updating to 3.4.0 34 - (fetchpatch2 { 35 - name = "htop-resolve-configuration-path.patch"; 36 - url = "https://github.com/htop-dev/htop/commit/0dac8e7d38ec3aeae901a987717b5177986197e4.patch"; 37 - hash = "sha256-Er1d/yV1fioYfEmXNlLO5ayAyXkyy+IaGSx1KWXvlv0="; 38 - }) 39 - ]; 30 + # upstream removed pkg-config support and uses dlopen now 31 + postPatch = 32 + let 33 + libnlPath = lib.getLib libnl; 34 + in 35 + '' 36 + substituteInPlace configure.ac \ 37 + --replace-fail /usr/include/libnl3 ${lib.getDev libnl}/include/libnl3 38 + substituteInPlace linux/LibNl.c \ 39 + --replace-fail libnl-3.so ${libnlPath}/lib/libnl-3.so \ 40 + --replace-fail libnl-genl-3.so ${libnlPath}/lib/libnl-genl-3.so 41 + ''; 40 42 41 43 nativeBuildInputs = [ autoreconfHook ] ++ lib.optional stdenv.hostPlatform.isLinux pkg-config; 42 44
+10
pkgs/top-level/all-packages.nix
··· 17517 17517 17518 17518 nix = nixVersions.stable; 17519 17519 17520 + # Overlays for CppNix nightly, Lix, or Tvix want to change the default Nix 17521 + # implementation in Nixpkgs by overriding `pkgs.nix`. However, some packages 17522 + # link against the internal/unstable CppNix APIs directly, and these packages 17523 + # will break if built with different versions or implementations of Nix. 17524 + # 17525 + # If you want to swap out the Nix implementation in your package set, you 17526 + # don't want these packages to break. Therefore, some packages will refer to 17527 + # `nixForLinking` explicitly, at least until these dependencies can be sorted out. 17528 + nixForLinking = nixVersions.stable; 17529 + 17520 17530 nixStatic = pkgsStatic.nix; 17521 17531 17522 17532 lixVersions = recurseIntoAttrs (callPackage ../tools/package-management/lix {