Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 432ead94 1c52b361

+687 -300
+2
nixos/doc/manual/release-notes/rl-2305.section.md
··· 93 93 94 94 - `git-bug` has been updated to at least version 0.8.0, which includes backwards incompatible changes. The `git-bug-migration` package can be used to upgrade existing repositories. 95 95 96 + - `nushell` has been updated to at least version 0.77.0, which includes potential breaking changes in aliases. The old aliases are now available as `old-alias` but it is recommended you migrate to the new format. See [Reworked aliases](https://www.nushell.sh/blog/2023-03-14-nushell_0_77.html#reworked-aliases-breaking-changes-kubouch). 97 + 96 98 - `keepassx` and `keepassx2` have been removed, due to upstream [stopping development](https://www.keepassx.org/index.html%3Fp=636.html). Consider [KeePassXC](https://keepassxc.org) as a maintained alternative. 97 99 98 100 - The `services.kubo.settings` option is now no longer stateful. If you changed any of the options in `services.kubo.settings` in the past and then removed them from your NixOS configuration again, those changes are still in your Kubo configuration file but will now be reset to the default. If you're unsure, you may want to make a backup of your configuration file (probably /var/lib/ipfs/config) and compare after the update.
+125 -103
nixos/modules/services/cluster/hadoop/hbase.nix
··· 5 5 cfg = config.services.hadoop; 6 6 hadoopConf = "${import ./conf.nix { inherit cfg pkgs lib; }}/"; 7 7 mkIfNotNull = x: mkIf (x != null) x; 8 + # generic hbase role options 9 + hbaseRoleOption = name: extraOpts: { 10 + enable = mkEnableOption (mdDoc "HBase ${name}"); 11 + 12 + openFirewall = mkOption { 13 + type = types.bool; 14 + default = false; 15 + description = mdDoc "Open firewall ports for HBase ${name}."; 16 + }; 17 + 18 + restartIfChanged = mkOption { 19 + type = types.bool; 20 + default = false; 21 + description = mdDoc "Restart ${name} con config change."; 22 + }; 23 + 24 + extraFlags = mkOption { 25 + type = with types; listOf str; 26 + default = []; 27 + example = literalExpression ''[ "--backup" ]''; 28 + description = mdDoc "Extra flags for the ${name} service."; 29 + }; 30 + 31 + environment = mkOption { 32 + type = with types; attrsOf str; 33 + default = {}; 34 + example = literalExpression '' 35 + { 36 + HBASE_MASTER_OPTS = "-Dcom.sun.management.jmxremote.ssl=true"; 37 + } 38 + ''; 39 + description = mdDoc "Environment variables passed to ${name}."; 40 + }; 41 + } // extraOpts; 42 + # generic hbase role configs 43 + hbaseRoleConfig = name: ports: (mkIf cfg.hbase."${name}".enable { 44 + services.hadoop.gatewayRole = { 45 + enable = true; 46 + enableHbaseCli = mkDefault true; 47 + }; 48 + 49 + systemd.services."hbase-${toLower name}" = { 50 + description = "HBase ${name}"; 51 + wantedBy = [ "multi-user.target" ]; 52 + path = with cfg; [ hbase.package ] ++ optional 53 + (with cfg.hbase.master; enable && initHDFS) package; 54 + preStart = mkIf (with cfg.hbase.master; enable && initHDFS) 55 + (concatStringsSep "\n" ( 56 + map (x: "HADOOP_USER_NAME=hdfs hdfs --config /etc/hadoop-conf ${x}")[ 57 + "dfsadmin -safemode wait" 58 + "dfs -mkdir -p ${cfg.hbase.rootdir}" 59 + "dfs -chown hbase ${cfg.hbase.rootdir}" 60 + ] 61 + )); 62 + 63 + inherit (cfg.hbase."${name}") environment; 64 + script = concatStringsSep " " ( 65 + [ 66 + "hbase --config /etc/hadoop-conf/" 67 + "${toLower name} start" 68 + ] 69 + ++ cfg.hbase."${name}".extraFlags 70 + ++ map (x: "--${toLower x} ${toString cfg.hbase.${name}.${x}}") 71 + (filter (x: hasAttr x cfg.hbase.${name}) ["port" "infoPort"]) 72 + ); 73 + 74 + serviceConfig = { 75 + User = "hbase"; 76 + SyslogIdentifier = "hbase-${toLower name}"; 77 + Restart = "always"; 78 + }; 79 + }; 80 + 81 + services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 82 + 83 + networking = { 84 + firewall.allowedTCPPorts = mkIf cfg.hbase."${name}".openFirewall ports; 85 + hosts = mkIf (with cfg.hbase.regionServer; enable && overrideHosts) { 86 + "127.0.0.2" = mkForce [ ]; 87 + "::1" = mkForce [ ]; 88 + }; 89 + }; 90 + 91 + }); 8 92 in 9 93 { 10 94 options.services.hadoop = { 11 95 12 - gatewayRole.enableHbaseCli = mkEnableOption (lib.mdDoc "HBase CLI tools"); 96 + gatewayRole.enableHbaseCli = mkEnableOption (mdDoc "HBase CLI tools"); 13 97 14 98 hbaseSiteDefault = mkOption { 15 99 default = { ··· 21 105 "hbase.cluster.distributed" = "true"; 22 106 }; 23 107 type = types.attrsOf types.anything; 24 - description = lib.mdDoc '' 108 + description = mdDoc '' 25 109 Default options for hbase-site.xml 26 110 ''; 27 111 }; ··· 29 113 default = {}; 30 114 type = with types; attrsOf anything; 31 115 example = literalExpression '' 116 + { 117 + "hbase.hregion.max.filesize" = 20*1024*1024*1024; 118 + "hbase.table.normalization.enabled" = "true"; 119 + } 32 120 ''; 33 - description = lib.mdDoc '' 121 + description = mdDoc '' 34 122 Additional options and overrides for hbase-site.xml 35 123 <https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml> 36 124 ''; ··· 39 127 default = {}; 40 128 type = with types; attrsOf anything; 41 129 internal = true; 42 - description = lib.mdDoc '' 130 + description = mdDoc '' 43 131 Internal option to add configs to hbase-site.xml based on module options 44 132 ''; 45 133 }; ··· 50 138 type = types.package; 51 139 default = pkgs.hbase; 52 140 defaultText = literalExpression "pkgs.hbase"; 53 - description = lib.mdDoc "HBase package"; 141 + description = mdDoc "HBase package"; 54 142 }; 55 143 56 144 rootdir = mkOption { 57 - description = lib.mdDoc '' 145 + description = mdDoc '' 58 146 This option will set "hbase.rootdir" in hbase-site.xml and determine 59 147 the directory shared by region servers and into which HBase persists. 60 148 The URL should be 'fully-qualified' to include the filesystem scheme. ··· 68 156 default = "/hbase"; 69 157 }; 70 158 zookeeperQuorum = mkOption { 71 - description = lib.mdDoc '' 159 + description = mdDoc '' 72 160 This option will set "hbase.zookeeper.quorum" in hbase-site.xml. 73 161 Comma separated list of servers in the ZooKeeper ensemble. 74 162 ''; ··· 76 164 example = "zk1.internal,zk2.internal,zk3.internal"; 77 165 default = null; 78 166 }; 79 - master = { 80 - enable = mkEnableOption (lib.mdDoc "HBase Master"); 81 - initHDFS = mkEnableOption (lib.mdDoc "initialization of the hbase directory on HDFS"); 82 - 83 - openFirewall = mkOption { 84 - type = types.bool; 85 - default = false; 86 - description = lib.mdDoc '' 87 - Open firewall ports for HBase master. 88 - ''; 89 - }; 90 - }; 91 - regionServer = { 92 - enable = mkEnableOption (lib.mdDoc "HBase RegionServer"); 93 - 94 - overrideHosts = mkOption { 95 - type = types.bool; 96 - default = true; 97 - description = lib.mdDoc '' 98 - Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix 99 - Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records 100 - or /etc/hosts entries. 101 - 102 - ''; 167 + } // (let 168 + ports = port: infoPort: { 169 + port = mkOption { 170 + type = types.int; 171 + default = port; 172 + description = mdDoc "RPC port"; 103 173 }; 104 - 105 - openFirewall = mkOption { 106 - type = types.bool; 107 - default = false; 108 - description = lib.mdDoc '' 109 - Open firewall ports for HBase master. 110 - ''; 174 + infoPort = mkOption { 175 + type = types.int; 176 + default = infoPort; 177 + description = mdDoc "web UI port"; 111 178 }; 112 179 }; 113 - }; 114 - }; 115 - 116 - config = mkMerge [ 117 - (mkIf cfg.hbase.master.enable { 118 - services.hadoop.gatewayRole = { 119 - enable = true; 120 - enableHbaseCli = mkDefault true; 121 - }; 122 - 123 - systemd.services.hbase-master = { 124 - description = "HBase master"; 125 - wantedBy = [ "multi-user.target" ]; 126 - 127 - preStart = mkIf cfg.hbase.master.initHDFS '' 128 - HADOOP_USER_NAME=hdfs ${cfg.package}/bin/hdfs --config ${hadoopConf} dfsadmin -safemode wait 129 - HADOOP_USER_NAME=hdfs ${cfg.package}/bin/hdfs --config ${hadoopConf} dfs -mkdir -p ${cfg.hbase.rootdir} 130 - HADOOP_USER_NAME=hdfs ${cfg.package}/bin/hdfs --config ${hadoopConf} dfs -chown hbase ${cfg.hbase.rootdir} 180 + in mapAttrs hbaseRoleOption { 181 + master.initHDFS = mkEnableOption (mdDoc "initialization of the hbase directory on HDFS"); 182 + regionServer.overrideHosts = mkOption { 183 + type = types.bool; 184 + default = true; 185 + description = mdDoc '' 186 + Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix 187 + Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records 188 + or /etc/hosts entries. 131 189 ''; 132 - 133 - serviceConfig = { 134 - User = "hbase"; 135 - SyslogIdentifier = "hbase-master"; 136 - ExecStart = "${cfg.hbase.package}/bin/hbase --config ${hadoopConf} " + 137 - "master start"; 138 - Restart = "always"; 139 - }; 140 190 }; 191 + thrift = ports 9090 9095; 192 + rest = ports 8080 8085; 193 + }); 194 + }; 141 195 142 - services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 143 - 144 - networking.firewall.allowedTCPPorts = mkIf cfg.hbase.master.openFirewall [ 145 - 16000 16010 146 - ]; 147 - 148 - }) 149 - 150 - (mkIf cfg.hbase.regionServer.enable { 151 - services.hadoop.gatewayRole = { 152 - enable = true; 153 - enableHbaseCli = mkDefault true; 154 - }; 155 - 156 - systemd.services.hbase-regionserver = { 157 - description = "HBase RegionServer"; 158 - wantedBy = [ "multi-user.target" ]; 159 - serviceConfig = { 160 - User = "hbase"; 161 - SyslogIdentifier = "hbase-regionserver"; 162 - ExecStart = "${cfg.hbase.package}/bin/hbase --config /etc/hadoop-conf/ " + 163 - "regionserver start"; 164 - Restart = "always"; 165 - }; 166 - }; 167 - 168 - services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 169 - 170 - networking = { 171 - firewall.allowedTCPPorts = mkIf cfg.hbase.regionServer.openFirewall [ 172 - 16020 16030 173 - ]; 174 - hosts = mkIf cfg.hbase.regionServer.overrideHosts { 175 - "127.0.0.2" = mkForce [ ]; 176 - "::1" = mkForce [ ]; 177 - }; 178 - }; 179 - }) 196 + config = mkMerge ([ 180 197 181 198 (mkIf cfg.gatewayRole.enable { 182 199 ··· 192 209 isSystemUser = true; 193 210 }; 194 211 }) 195 - ]; 212 + ] ++ (mapAttrsToList hbaseRoleConfig { 213 + master = [ 16000 16010 ]; 214 + regionServer = [ 16020 16030 ]; 215 + thrift = with cfg.hbase.thrift; [ port infoPort ]; 216 + rest = with cfg.hbase.rest; [ port infoPort ]; 217 + })); 196 218 }
+2 -2
nixos/modules/system/boot/binfmt.nix
··· 134 134 mask = ''\xff\xff\xff\xff''; 135 135 }; 136 136 x86_64-windows = { 137 - magicOrExtension = ".exe"; 137 + magicOrExtension = "exe"; 138 138 recognitionType = "extension"; 139 139 }; 140 140 i686-windows = { 141 - magicOrExtension = ".exe"; 141 + magicOrExtension = "exe"; 142 142 recognitionType = "extension"; 143 143 }; 144 144 };
+3 -4
nixos/modules/virtualisation/ec2-metadata-fetcher.sh
··· 55 55 echo "getting EC2 instance metadata..." 56 56 57 57 get_imds() { 58 - # Intentionally no --fail here, so that we proceed even if e.g. a 59 - # 404 was returned (but we still fail if we can't reach the IMDS 60 - # server). 61 - curl --silent --show-error --header "X-aws-ec2-metadata-token: $IMDS_TOKEN" "$@" 58 + # --fail to avoid populating missing files with 404 HTML response body 59 + # || true to allow the script to continue even when encountering a 404 60 + curl --silent --show-error --fail --header "X-aws-ec2-metadata-token: $IMDS_TOKEN" "$@" || true 62 61 } 63 62 64 63 get_imds -o "$metaDir/ami-manifest-path" http://169.254.169.254/1.0/meta-data/ami-manifest-path
+25
nixos/tests/hadoop/hbase.nix
··· 53 53 }; 54 54 }; 55 55 }; 56 + thrift = { ... }:{ 57 + services.hadoop = { 58 + inherit coreSite; 59 + hbase = { 60 + inherit zookeeperQuorum; 61 + thrift = defOpts; 62 + }; 63 + }; 64 + }; 65 + rest = { ... }:{ 66 + services.hadoop = { 67 + inherit coreSite; 68 + hbase = { 69 + inherit zookeeperQuorum; 70 + rest = defOpts; 71 + }; 72 + }; 73 + }; 56 74 }; 57 75 58 76 testScript = '' ··· 80 98 assert "1 active master, 0 backup masters, 1 servers" in master.succeed("echo status | HADOOP_USER_NAME=hbase hbase shell -n") 81 99 regionserver.wait_until_succeeds("echo \"create 't1','f1'\" | HADOOP_USER_NAME=hbase hbase shell -n") 82 100 assert "NAME => 'f1'" in regionserver.succeed("echo \"describe 't1'\" | HADOOP_USER_NAME=hbase hbase shell -n") 101 + 102 + rest.wait_for_open_port(8080) 103 + assert "${hbase.version}" in regionserver.succeed("curl http://rest:8080/version/cluster") 104 + 105 + thrift.wait_for_open_port(9090) 83 106 ''; 107 + 108 + meta.maintainers = with maintainers; [ illustris ]; 84 109 })
+3 -5
nixos/tests/nixops/default.nix
··· 30 30 virtualisation.additionalPaths = [ 31 31 pkgs.hello 32 32 pkgs.figlet 33 - 34 - # This includes build dependencies all the way down. Not efficient, 35 - # but we do need build deps to an *arbitrary* depth, which is hard to 36 - # determine. 37 - (allDrvOutputs nodes.server.config.system.build.toplevel) 38 33 ]; 34 + 35 + # TODO: make this efficient, https://github.com/NixOS/nixpkgs/issues/180529 36 + system.includeBuildDependencies = true; 39 37 }; 40 38 server = { lib, ... }: { 41 39 imports = [ ./legacy/base-configuration.nix ];
+65 -2
pkgs/applications/editors/codeblocks/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, pkg-config, file, zip, wxGTK31, gtk3 1 + { lib, stdenv, fetchurl, fetchpatch, pkg-config, file, zip, wxGTK32, gtk3 2 2 , contribPlugins ? false, hunspell, gamin, boost, wrapGAppsHook 3 3 }: 4 4 ··· 13 13 }; 14 14 15 15 nativeBuildInputs = [ pkg-config file zip wrapGAppsHook ]; 16 - buildInputs = [ wxGTK31 gtk3 ] 16 + buildInputs = [ wxGTK32 gtk3 ] 17 17 ++ lib.optionals contribPlugins [ hunspell gamin boost ]; 18 18 enableParallelBuilding = true; 19 19 patches = [ ··· 48 48 sha256 = "sha256-RRjwZA37RllnG8cJdBEnASpEd8z0+ru96fjntO42OvU="; 49 49 }) 50 50 (fetchpatch { 51 + name = "fix-taskbar-icons.patch"; 52 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/40eb88e3f2b933f19f9933e06c8d0899c54f5e25.patch"; 53 + hash = "sha256-Gj5gtxX5QNYAeF+QrPS/bBHLLEmflSxUHSLUK3GSs0I="; 54 + }) 55 + (fetchpatch { 56 + name = "fix-warnings.patch"; 57 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/56ac0396fad7a5b4bbb40bb8c4b5fe1755078aef.patch"; 58 + excludes = [ "src/src/environmentsettingsdlg.h" ]; 59 + hash = "sha256-tl4rF9iAf1TzCIbKhVFqcxvr1IiPdwqLYZg0SY5BJ7I="; 60 + }) 61 + (fetchpatch { 51 62 name = "fix-getstring.patch"; 52 63 url = "https://github.com/arnholm/codeblocks_sfmirror/commit/dbdf5c5ea9e3161233f0588a7616b7e4fedc7870.patch"; 53 64 sha256 = "sha256-DrEMFluN8vs0LERa7ULGshl7HdejpsuvXAMjIr/K1fQ="; 65 + }) 66 + # Fix build with wxGTK 3.1.6 67 + (fetchpatch { 68 + name = "remove-code-for-old-wx-1.patch"; 69 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/8035dfdff321754819f79e3165401aa59bd8c7f7.patch"; 70 + hash = "sha256-Z8Ap03W/XH5VwKFVudJr7rugb0BgI2dKJgQS4yIWbEM="; 71 + }) 72 + (fetchpatch { 73 + name = "remove-code-for-old-wx-2.patch"; 74 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/9a9c6a9d5e3e0f6eff5594ecd61a2222f073be9c.patch"; 75 + hash = "sha256-SwYixvbRuXQ+jA1ijmClWkzqzzr0viVuFOAsihGc5dM="; 76 + }) 77 + (fetchpatch { 78 + name = "remove-code-for-old-wx-3.patch"; 79 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/c28746f4887f10e6f9f10eeafae0fb22ecdbf9c7.patch"; 80 + hash = "sha256-1lcIiCnY2nBuUsffXC2rdglOE3ccIbogcgTx4M2Ee2I="; 81 + }) 82 + (fetchpatch { 83 + name = "fix-notebookstyles.patch"; 84 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/29315df024251850832583f73e67e515dae10830.patch"; 85 + hash = "sha256-Uc1V0eEbNljnN+1Dqb/35MLSSoLjyuRZMTofgcXRyb8="; 86 + }) 87 + (fetchpatch { 88 + name = "fix-regex.patch"; 89 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/46720043319758cb0e798eb23520063583c40eaa.patch"; 90 + hash = "sha256-Aix58T0JJcX/7VZukU/9i/nXh9GJywXC3yXEyUZK0js="; 91 + }) 92 + (fetchpatch { 93 + name = "fix-build-with-clang.patch"; 94 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/92cb2239662952e3b59b31e03edd653bb8066e64.patch"; 95 + hash = "sha256-XI7JW9Nuueb7muKpaC2icM/CxhrCJtO48cLHK+BVWXI="; 96 + }) 97 + (fetchpatch { 98 + name = "fix-normalize.patch"; 99 + url = "https://github.com/archlinux/svntogit-community/raw/458eacb60bc0e71e3d333943cebbc41e75ed0956/trunk/sc_wxtypes-normalize.patch"; 100 + hash = "sha256-7wEwDLwuNUWHUwHjFyq74sHiuEha1VexRLEX42rPZSs="; 101 + }) 102 + # Fix HiDPI 103 + (fetchpatch { 104 + name = "update-about-dialog.patch"; 105 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/a4aacc92640b587ad049cd6aa68c637e536e9ab5.patch"; 106 + hash = "sha256-2S4sVn+Dq5y9xcxCkzQ+WeR+qWxAOLbQUZEnk060RI0="; 107 + }) 108 + (fetchpatch { 109 + name = "add-display-info.patch"; 110 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/f2f127cf5cd97c7da6a957a3f7764cb25cc9017e.patch"; 111 + hash = "sha256-C0dVfC0NIHMXfWNlOwjzoGz5tmG2dlnU/EE92Jjebbs="; 112 + }) 113 + (fetchpatch { 114 + name = "fix-hidpi.patch"; 115 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/b2e4f1279804e1d11b71bc75eeb37072c3589296.patch"; 116 + hash = "sha256-/Xp6ww9C3V6I67tTA4MrGpSGo3J0MXzFjzQU7RxY84U="; 54 117 }) 55 118 ]; 56 119 preConfigure = "substituteInPlace ./configure --replace /usr/bin/file ${file}/bin/file";
+13 -6
pkgs/applications/emulators/retroarch/cores.nix
··· 49 49 mkLibretroCore = 50 50 { core 51 51 , src ? (getCoreSrc core) 52 - , version ? "unstable-2022-12-20" 52 + , version ? "unstable-2023-03-13" 53 53 , ... 54 54 }@args: 55 55 import ./mkLibretroCore.nix ({ ··· 400 400 core = "flycast"; 401 401 extraBuildInputs = [ libGL libGLU ]; 402 402 makefile = "Makefile"; 403 - makeFlags = lib.optionals stdenv.hostPlatform.isAarch64 [ "platform=arm64" ]; 404 - patches = [ ./fix-flycast-makefile.patch ]; 405 403 meta = { 406 404 description = "Flycast libretro port"; 407 405 license = lib.licenses.gpl2Only; ··· 734 732 735 733 picodrive = mkLibretroCore { 736 734 core = "picodrive"; 737 - version = "unstable-2023-02-15"; 738 735 dontConfigure = true; 739 - makeFlags = lib.optionals stdenv.hostPlatform.isAarch64 [ "platform=aarch64" ]; 740 736 meta = { 741 737 description = "Fast MegaDrive/MegaCD/32X emulator"; 742 738 license = "MAME"; ··· 822 818 }; 823 819 }; 824 820 825 - scummvm = mkLibretroCore { 821 + scummvm = mkLibretroCore rec { 826 822 core = "scummvm"; 823 + version = "unstable-2022-04-06"; 824 + # Commit below introduces libretro platform, that uses libretro-{deps,common} as 825 + # submodules. We will probably need to introduce this as separate derivations, 826 + # but for now let's just use the last known version that does not use it. 827 + # https://github.com/libretro/scummvm/commit/36446fa6eb33e67cc798f56ce1a31070260e2ada 828 + src = fetchFromGitHub { 829 + owner = "libretro"; 830 + repo = core; 831 + rev = "2fb2e4c551c9c1510c56f6e890ee0300b7b3fca3"; 832 + hash = "sha256-wrlFqu+ONbYH4xMFDByOgySobGrkhVc7kYWI4JzA4ew="; 833 + }; 827 834 extraBuildInputs = [ fluidsynth libjpeg libvorbis libGLU libGL ]; 828 835 makefile = "Makefile"; 829 836 preConfigure = "cd backends/platform/libretro/build";
+2 -11
pkgs/applications/emulators/retroarch/default.nix
··· 52 52 in 53 53 stdenv.mkDerivation rec { 54 54 pname = "retroarch-bare"; 55 - version = "1.14.0"; 55 + version = "1.15.0"; 56 56 57 57 src = fetchFromGitHub { 58 58 owner = "libretro"; 59 59 repo = "RetroArch"; 60 - hash = "sha256-oEENGehbzjJq1kTiz6gkXHMMe/rXjWPxxMoe4RqdqK4="; 60 + hash = "sha256-kJOR3p3fKqGM8a5rgDPkz43uuf5AtS5fVnvr3tJgWbc="; 61 61 rev = "v${version}"; 62 62 }; 63 63 64 64 patches = [ 65 65 ./use-default-values-for-libretro_info_path-assets_directory.patch 66 - # TODO: remove those two patches in the next RetroArch release 67 - (fetchpatch { 68 - url = "https://github.com/libretro/RetroArch/commit/894c44c5ea7f1eada9207be3c29e8d5c0a7a9e1f.patch"; 69 - hash = "sha256-ThB6jd9pmsipT8zjehz7znK/s0ofHHCJeEYBKur6sO8="; 70 - }) 71 - (fetchpatch { 72 - url = "https://github.com/libretro/RetroArch/commit/c5bfd52159cf97312bb28fc42203c39418d1bbbd.patch"; 73 - hash = "sha256-rb1maAvCSUgq2VtJ67iqUY+Fz00Fchl8YGG0EPm0+F0="; 74 - }) 75 66 ]; 76 67 77 68 nativeBuildInputs = [ pkg-config wrapQtAppsHook ] ++
-12
pkgs/applications/emulators/retroarch/fix-flycast-makefile.patch
··· 1 - diff --git a/Makefile b/Makefile 2 - index 01d99c30..8c2dd248 100644 3 - --- a/Makefile 4 - +++ b/Makefile 5 - @@ -440,7 +440,6 @@ else ifeq ($(platform), arm64) 6 - CPUFLAGS += -DTARGET_LINUX_ARMv8 -frename-registers 7 - CFLAGS += $(CPUFLAGS) 8 - CXXFLAGS += $(CPUFLAGS) 9 - - ASFLAGS += $(CFLAGS) -c -frename-registers -fno-strict-aliasing -ffast-math -ftree-vectorize 10 - PLATFORM_EXT := unix 11 - WITH_DYNAREC=arm64 12 - HAVE_GENERIC_JIT = 0
+93 -93
pkgs/applications/emulators/retroarch/hashes.json
··· 14 14 "beetle-lynx": { 15 15 "owner": "libretro", 16 16 "repo": "beetle-lynx-libretro", 17 - "rev": "9c48124dc15604b3eb6892e3616dfb77992a6fd6", 18 - "sha256": "ZXFU4QmjVQVU5bE5TVmGm4gepZpuoS8+p60l+Ha4I9s=" 17 + "rev": "3ca44fda26f27418c92ada1b0f38b948af2151ae", 18 + "sha256": "f0A8gA3UT40UDaAkWQcPoDd6vAcM37tNtZ2hCOIyBJA=" 19 19 }, 20 20 "beetle-ngp": { 21 21 "owner": "libretro", 22 22 "repo": "beetle-ngp-libretro", 23 - "rev": "00c7cb8ea97ad9a372307405d8abf34e401fec8a", 24 - "sha256": "MtZMPjgT4dQy+E+4jSDE08PRi0pwa+q48kmTHhfIQMY=" 23 + "rev": "65460e3a9ad529f6901caf669abbda11f437ab55", 24 + "sha256": "+xfD1ZMKtbv5Lp12+5RM7Vl3eEF38kykKW8wj/2EN5w=" 25 25 }, 26 26 "beetle-pce-fast": { 27 27 "owner": "libretro", 28 28 "repo": "beetle-pce-fast-libretro", 29 - "rev": "d4fa4480f17f067c3aba25380717a5aee059f026", 30 - "sha256": "t7OJuqEWec3GvNq9dsmrRhgz+GybBzt1ZO6FwZ9L5yE=" 29 + "rev": "e480f6388375f59fd3e7aeef8ef8531c20e5c73e", 30 + "sha256": "uURt6rB0IngWzEpl0DjbckdaTIjNwVCm3auvy7AwUdA=" 31 31 }, 32 32 "beetle-pcfx": { 33 33 "owner": "libretro", 34 34 "repo": "beetle-pcfx-libretro", 35 - "rev": "af16dfd8353ed6cf76ef381b98a6a9abf59051ec", 36 - "sha256": "snAA5PCU2NRsCiQtBRYEzczPSGG9OT2jDTrGaPZqhic=" 35 + "rev": "724bd21b4524f8cf376dbc29c3e5a12cb674c758", 36 + "sha256": "xeIVZ8FWGbETWYRIBNs3Yum7FDit5fb77hhH+RU45BY=" 37 37 }, 38 38 "beetle-psx": { 39 39 "owner": "libretro", 40 40 "repo": "beetle-psx-libretro", 41 - "rev": "3827fb4bd0d36f0db7b59e0c220524c7daaf0430", 42 - "sha256": "CGNzb6XDPsp+EitkgyvDha9DoZSy+e9JWye0nmCiOns=" 41 + "rev": "fd812d4cf8f65644faef1ea8597f826ddc37c0a0", 42 + "sha256": "yvMgnY2dGUk8TvvfDklN3f6b1ol7vDu6AJcYzdwy9pI=" 43 43 }, 44 44 "beetle-saturn": { 45 45 "owner": "libretro", 46 46 "repo": "beetle-saturn-libretro", 47 - "rev": "19ce186783174b93b90845c3f0e1fa1694904912", 48 - "sha256": "mEuv9lrDi/q2ASV9hxYptievupcv4PfUWPYlDcNzXQg=" 47 + "rev": "9bd31a4a42d06ca0f6d30ee38a569e57c150c414", 48 + "sha256": "RHvH9Jp6c4cgEMTo+p+dU7qgJqjPbRqJLURadjAysrM=" 49 49 }, 50 50 "beetle-snes": { 51 51 "owner": "libretro", ··· 62 62 "beetle-supergrafx": { 63 63 "owner": "libretro", 64 64 "repo": "beetle-supergrafx-libretro", 65 - "rev": "787772dff157c8fe54b2e16bb770f2c344c8932b", 66 - "sha256": "i4SnjIqA0U88FnaT7fz5fqMyp8FyfNvxxhflOaAv1mA=" 65 + "rev": "1ff2daa9377114d5394142f75f1c388b706567ed", 66 + "sha256": "0FCm9kURtUQpyPb8cSmRAxttnUJnhE3EWV8DPvlj8HE=" 67 67 }, 68 68 "beetle-vb": { 69 69 "owner": "libretro", 70 70 "repo": "beetle-vb-libretro", 71 - "rev": "3e845666d7ce235a071eb306e94074f1a72633bf", 72 - "sha256": "ukKzG+O2o6EAF0l7cmMQOkemJ1oweIpRH5rle1gqaFk=" 71 + "rev": "dd6393f76ff781df0f4e8c953f5b053b1e61b313", 72 + "sha256": "C8OtTNdC7GNFsY2EH56in35IX8d6ou/1R04kMvM9674=" 73 73 }, 74 74 "beetle-wswan": { 75 75 "owner": "libretro", 76 76 "repo": "beetle-wswan-libretro", 77 - "rev": "cccee4217e53e164fd70196e56dfb24b967e5fd8", 78 - "sha256": "RpGYQwDWkfYY0qnrTuAMzVuOSfTX5AZph7FD8ijUggc=" 77 + "rev": "81e8b2afd31b7f0f939a3df6d70c8723bcc8a701", 78 + "sha256": "xmDtMC5pId5X4vf9kHO55HmRpp/4ZruOM8QJSl//9R8=" 79 79 }, 80 80 "blastem": { 81 81 "owner": "libretro", ··· 92 92 "bsnes": { 93 93 "owner": "libretro", 94 94 "repo": "bsnes-libretro", 95 - "rev": "dabf6679024124b2f819c79f279dbb85a5263255", 96 - "sha256": "iv8gxC48i8JMzby3vR4eYDViqCwSf8JGlPekQE6AF4c=" 95 + "rev": "4da970a334ba4644cef72e560985ea3f31fa40f7", 96 + "sha256": "Bu5j1wrMNVMmxQULZwTdXyWi2i6F5C6m8wFDxvtjYdI=" 97 97 }, 98 98 "bsnes-hd": { 99 99 "owner": "DerKoun", ··· 110 110 "citra": { 111 111 "owner": "libretro", 112 112 "repo": "citra", 113 - "rev": "f0b09a5c0cb3767d43f5f8ca12a783012298fd44", 114 - "sha256": "v86R5TLmNNMhuTMCwU3mAAtLK5H0sP//soh4x+cFgTQ=", 113 + "rev": "d7e1612c17b1acb5d5eb68bb046820db49aeea5e", 114 + "sha256": "u2XwAudFgI7j/k6Bq5fk874aI6KpZawlBoIs2+M+eZY=", 115 115 "fetchSubmodules": true 116 116 }, 117 117 "desmume": { ··· 153 153 "fbneo": { 154 154 "owner": "libretro", 155 155 "repo": "fbneo", 156 - "rev": "ef17049274a21239e5f21198b026dacbb38d7b90", 157 - "sha256": "2N7c5L9grp+Rkhj25SoB9K9rVHq4H9IzU2KSeb1O7/E=" 156 + "rev": "ffcd114b8ea3f3387b66997263ea5df358675aa5", 157 + "sha256": "a4hXRluHQY5hC5jFU2mlqUAI5GmQk6Rbl1HNRA929CI=" 158 158 }, 159 159 "fceumm": { 160 160 "owner": "libretro", 161 161 "repo": "libretro-fceumm", 162 - "rev": "8c3f690e61a1d65dfb25510426ae88eeae93e1ae", 163 - "sha256": "vzPrAEII8SWj3Ki2OaZb0/9gbQDz04rp2dXf2LE1sXg=" 162 + "rev": "1fa798b220a6df8417dcf7da0ab117533385d9c2", 163 + "sha256": "B1iHZ7BVaM/GBgdD2jNZIEmXcRqKC6YaO9z1ByocMtE=" 164 164 }, 165 165 "flycast": { 166 166 "owner": "libretro", ··· 183 183 "gambatte": { 184 184 "owner": "libretro", 185 185 "repo": "gambatte-libretro", 186 - "rev": "7e02df60048db0898131ea365f387a026e4e648d", 187 - "sha256": "RnFuD8PL+/uPhWe+sSXMPm5+XH8FzCwY+MSquR/AB+o=" 186 + "rev": "ea563fac40e281b29d37f6b56657abef8f1aaf0d", 187 + "sha256": "2jVbEsGkvdH1lA2//mb2Rm3xeh4EyFUcOUXdydSisvk=" 188 188 }, 189 189 "genesis-plus-gx": { 190 190 "owner": "libretro", 191 191 "repo": "Genesis-Plus-GX", 192 - "rev": "74a2f6521aea975a51f99497b57c5db500d61ed9", 193 - "sha256": "qTNbFXg5QFKSzMOWhDdDfc0FinF/D7n2OruG5zv+ANY=" 192 + "rev": "f6a9bd72a56a11c2068be2d15fa52dda3e1e8027", 193 + "sha256": "4siJGPRMpXHfP6mBPoDJArNaISTNjPKT69cvtGldadI=" 194 194 }, 195 195 "gpsp": { 196 196 "owner": "libretro", 197 197 "repo": "gpsp", 198 - "rev": "81649a2c8075201bb823cce8fdf16a31c92a3b6c", 199 - "sha256": "De9Tke+fp6CtXzm0w6Qzts3jj1j/1uB0kYZfaWyNqA0=" 198 + "rev": "541adc9e1c6c9328c07058659594d6300ae0fa19", 199 + "sha256": "2iv/gMOgTZReDgVzEc3WyOdAlYgfANK08CtpZIyPxgA=" 200 200 }, 201 201 "gw": { 202 202 "owner": "libretro", ··· 207 207 "handy": { 208 208 "owner": "libretro", 209 209 "repo": "libretro-handy", 210 - "rev": "517bb2d02909271836604c01c8f09a79ad605297", 211 - "sha256": "Igf/OvmnCzoWjCZBoep7T0pXsoBKq3NJpXlYhE7nr3s=" 210 + "rev": "63db085af671bad2929078c55434623b7d4632a1", 211 + "sha256": "N6M3KSU4NPJCqoG/UMrna9/6H5PsBBMUQLrvqiIdxpE=" 212 212 }, 213 213 "hatari": { 214 214 "owner": "libretro", ··· 219 219 "mame": { 220 220 "owner": "libretro", 221 221 "repo": "mame", 222 - "rev": "85581d60bb24fea14542b154aef2c7b624f5b60f", 223 - "sha256": "AUqJAXJCvddv9vPqXt5EZncKNdeLaXoc6xhYWqOMebY=" 222 + "rev": "f7761a9902d59030882c58d4482446196e748c50", 223 + "sha256": "g37WAMt9iBbAYq4DfeTlHWmdW5/Vl7g90v6vCLmMQ3g=" 224 224 }, 225 225 "mame2000": { 226 226 "owner": "libretro", ··· 237 237 "mame2003-plus": { 238 238 "owner": "libretro", 239 239 "repo": "mame2003-plus-libretro", 240 - "rev": "3249de7ceaaa92ee18e93cbd8c2ace9f1ee34c08", 241 - "sha256": "mBF1j4em4e/fKEmPA8MmAZrXXYQiqFfAloOHdMbVq+k=" 240 + "rev": "0b9309d9d86aea2457df74709e997bea37899475", 241 + "sha256": "US0nkEH4EeKRejuN8UoDeLt5dhafuo7PEVx0FnpeUG0=" 242 242 }, 243 243 "mame2010": { 244 244 "owner": "libretro", ··· 267 267 "mesen": { 268 268 "owner": "libretro", 269 269 "repo": "mesen", 270 - "rev": "c89474c9d87df967d21b7b7d5971dc9475fec028", 270 + "rev": "caa4e6f14373c40bd2805c600d1b476e7616444a", 271 271 "sha256": "cnPNBWXbnCpjgW/wJIboiRBzv3zrHWxpNM1kg09ShLU=" 272 272 }, 273 273 "mesen-s": { ··· 285 285 "mgba": { 286 286 "owner": "libretro", 287 287 "repo": "mgba", 288 - "rev": "ec5ecb26deba8d7ac830fc66ade9fac0eeaeb4ae", 289 - "sha256": "kDDs+M7TPu6UhFnj9+XGI9whQFQ5/+7fSb0YUN7oMsg=" 288 + "rev": "a69c3434afe8b26cb8f9463077794edfa7d5efad", 289 + "sha256": "rmitsZzRWJ0VYzcNz/UtIK8OscQ4lkyuAwgfXOvSTzg=" 290 290 }, 291 291 "mupen64plus": { 292 292 "owner": "libretro", 293 293 "repo": "mupen64plus-libretro-nx", 294 - "rev": "bc241538b9ef85d8b22c392d7699dc73f460e283", 295 - "sha256": "eCosI2yL1HJpHWvZLYZQe6+1rmmyHLFYCY7bX+3hPec=" 294 + "rev": "5a63aadedc29655254d8fc7b4da3a325472e198b", 295 + "sha256": "QNa8WGJFShO4vc4idUntCUaLik4xQXBA+X7z5sjZ2NE=" 296 296 }, 297 297 "neocd": { 298 298 "owner": "libretro", 299 299 "repo": "neocd_libretro", 300 - "rev": "53f5453311a1ac43700fedb2317c810586f9ccf5", 301 - "sha256": "BZBpojShHk+j5wz/d7FnykpX562TgH6PAqTUigE+zUU=" 300 + "rev": "2070f5258c9d3feee15962f9db8c8ef20072ece8", 301 + "sha256": "X+lS1zW5oTzp7wwurM5xjVqIBwEOCIdj/NX/+33K2qg=" 302 302 }, 303 303 "nestopia": { 304 304 "owner": "libretro", 305 305 "repo": "nestopia", 306 - "rev": "d30c55052292826836f6dbaa2adc46fdf1a2d93c", 307 - "sha256": "R2Kbtr2EqNUyx5eGBYyyw/ugSxVRM70TP/IsIsU0EZM=" 306 + "rev": "16b14865caf1effca030630e2fc73d2d4271fc53", 307 + "sha256": "dU9X8sK/qDA/Qj0x1GicmSAzQyRqVmLiTcfCPe8+BjM=" 308 308 }, 309 309 "np2kai": { 310 310 "owner": "AZO234", 311 311 "repo": "NP2kai", 312 - "rev": "606fafa7081b62df5f4727c34560da23927c21cd", 313 - "sha256": "qS7OrY8bFkAmRgbzLCw9PqgxtKuVNKI+tsDVU7PqWIw=", 312 + "rev": "6089943a80a45b6c18d765765f7f31d7a5c0d9c6", 313 + "sha256": "tdF0Qb+smWAVoPmI0dd5s51cnYxMmqM36rQNMiEjU9A=", 314 314 "fetchSubmodules": true 315 315 }, 316 316 "nxengine": { 317 317 "owner": "libretro", 318 318 "repo": "nxengine-libretro", 319 - "rev": "e271c6262d73f07e5d92d285503f1c049801c51a", 320 - "sha256": "PfzHV6/nGUdbnfZ8+aHuoIQhvKcxdbuKnjIMWIIFt7Q=" 319 + "rev": "1f371e51c7a19049e00f4364cbe9c68ca08b303a", 320 + "sha256": "4XBNTzgN8pLyrK9KsVxTRR1I8CQaZCnVR4gMryYpWW0=" 321 321 }, 322 322 "o2em": { 323 323 "owner": "libretro", 324 324 "repo": "libretro-o2em", 325 - "rev": "3303cc15e4323280084471f694f6d34c78199725", 326 - "sha256": "xH8Dlsg84q8awxjObMPXKZcJSwmix1YdRXIpee7rw6o=" 325 + "rev": "a2a12472fde910b6089ac3ca6de805bd58a9c999", 326 + "sha256": "0cZYw3rrnaR+PfwReRXadLV8RVLblYqlZxJue6OZncg=" 327 327 }, 328 328 "opera": { 329 329 "owner": "libretro", ··· 340 340 "pcsx2": { 341 341 "owner": "libretro", 342 342 "repo": "pcsx2", 343 - "rev": "d2e37b80cfe6f6eecfe0356c7537d8e98bee7a8d", 344 - "sha256": "rHXJG2wGoyNGvxxeZVF/I1CpaSBPUwZNERJtkG/z7MU=" 343 + "rev": "f3c8743d6a42fe429f703b476fecfdb5655a98a9", 344 + "sha256": "0piCNWX7QbZ58KyTlWp4h1qLxXpi1z6ML8sBHMTvCY4=" 345 345 }, 346 346 "pcsx_rearmed": { 347 347 "owner": "libretro", 348 348 "repo": "pcsx_rearmed", 349 - "rev": "aced3eb3fcaa0fe13c44c4dd196cdab42555fd98", 350 - "sha256": "RzcrSADagi3AIPINQxc36BfMjWjatP/JL6HY744XnZk=" 349 + "rev": "4373e29de72c917dbcd04ec2a5fb685e69d9def3", 350 + "sha256": "727//NqBNEo6RHNQr1RY5cxMrEvfuJczCo+cUJZVv7U=" 351 351 }, 352 352 "picodrive": { 353 353 "owner": "libretro", 354 354 "repo": "picodrive", 355 - "rev": "b2d43acfbc288038749d8a8fdfbcb0474568e043", 356 - "sha256": "kDSQgF8G/IpZ9NkSwuOjFSkirkum7foRT01qIbNJmJI=", 355 + "rev": "7ab066aab84f15388a53433ea273420bcf917e00", 356 + "sha256": "NK9ASiiIkGZmi2YfCqEzZallVfS7nprLRrBk4dlGyAI=", 357 357 "fetchSubmodules": true 358 358 }, 359 359 "play": { 360 360 "owner": "jpd002", 361 361 "repo": "Play-", 362 - "rev": "0483fc43da01b5b29883acb2cf1d02d33bba1e30", 363 - "sha256": "OxBQFTQP0L8k0lH88Ey6KWybW912Ehsv7XjWrvFivxo=", 362 + "rev": "b33834af08a4954f06be215eee80a72e7a378e91", 363 + "sha256": "IxZk+kSdrkDAabbzdFM8QUrjaJUc1DHjSfAtDuwDJkw=", 364 364 "fetchSubmodules": true 365 365 }, 366 366 "ppsspp": { 367 367 "owner": "hrydgard", 368 368 "repo": "ppsspp", 369 - "rev": "1fa2f7a97191d2a73f243bfc464edef69b26f652", 370 - "sha256": "BDX2eHtFbsloC9XYORHwpix8tbRSQUbcoP7DKFIohW4=", 369 + "rev": "7df51c3d060a780b7383c5c1380e346ad9304bb4", 370 + "sha256": "GK3W0/yWaID3s0W0v6TcgJ0ZU984YspWMS6+XLyThjM=", 371 371 "fetchSubmodules": true 372 372 }, 373 373 "prboom": { 374 374 "owner": "libretro", 375 375 "repo": "libretro-prboom", 376 - "rev": "4e671fa0a4b7b892e17ac4e1803c9d627653a4c1", 377 - "sha256": "d2/cpfhNczZkHzMGQIxO9jw65AMs9Jmh4ItiLLdDYsk=" 376 + "rev": "d9c3975669b4aab5a1397e0174838bcbbc3c1582", 377 + "sha256": "klSJ7QIpNjlfyjhfeEQZ3j8Gnp4agd0qKVp0vr+KHVA=" 378 378 }, 379 379 "prosystem": { 380 380 "owner": "libretro", 381 381 "repo": "prosystem-libretro", 382 - "rev": "cf544d3c8e40ff197ea5bb177a1269db31077803", 383 - "sha256": "A7yQwzM8ewI+UCPQVyO7DNyiQCTw2yG1soi6l7T3pDE=" 382 + "rev": "763ad22c7de51c8f06d6be0d49c554ce6a94a29b", 383 + "sha256": "rE/hxP8hl9lLTNx/WympFDByjZs46ekyxLKRV4V8D9E=" 384 384 }, 385 385 "puae": { 386 386 "owner": "libretro", 387 387 "repo": "libretro-uae", 388 - "rev": "af9e35383c00980aabb38c929e679704b624dee0", 389 - "sha256": "hp4XOQUKktmUfLtRfVv1Oe1vqHUYu+vagxSSef55APs=" 388 + "rev": "ae58c0f226b654d643b9f2dce58f64657f57cb76", 389 + "sha256": "6oMTwCYGdVhh+R853gOQRzZfa7slDwe6aGVCvdm6NDU=" 390 390 }, 391 391 "quicknes": { 392 392 "owner": "libretro", 393 393 "repo": "QuickNES_Core", 394 - "rev": "1b88a09f1c386ff9ee46bb371583ae04c5cb5dd0", 395 - "sha256": "Q7DDufGTdP+R05ND56PxMNR96ZacJFxPi0ETieV2B58=" 394 + "rev": "75d501a87ec2074e8d2f7256fb0359513c263c29", 395 + "sha256": "yAHVTgOt8SGyPXihp4YNKKAvxl9VBBAvHyzLW86zSCw=" 396 396 }, 397 397 "sameboy": { 398 398 "owner": "libretro", ··· 403 403 "scummvm": { 404 404 "owner": "libretro", 405 405 "repo": "scummvm", 406 - "rev": "2fb2e4c551c9c1510c56f6e890ee0300b7b3fca3", 407 - "sha256": "wrlFqu+ONbYH4xMFDByOgySobGrkhVc7kYWI4JzA4ew=" 406 + "rev": "ab2e5d59cd25dfa5943d45c2567e8330d67fad8b", 407 + "sha256": "9IaQR0prbCT70iWA99NMgGAKPobifdWBX17p4zL0fEM=" 408 408 }, 409 409 "smsplus-gx": { 410 410 "owner": "libretro", ··· 415 415 "snes9x": { 416 416 "owner": "snes9xgit", 417 417 "repo": "snes9x", 418 - "rev": "3c4982edddfdba482204ed48cf0b1d41ccae5493", 419 - "sha256": "d4luyBSU/4PdsDd2jLwWSyckBPAqXMJ3C1sNmLO+E6U=" 418 + "rev": "cc0a87711a7a208cabefc9fd1dbb90e31fe51684", 419 + "sha256": "1m6QvYl5Z0WM1XeXCYLvQaXH8A15P3x8ZzwdFeVPeWo=" 420 420 }, 421 421 "snes9x2002": { 422 422 "owner": "libretro", ··· 433 433 "snes9x2010": { 434 434 "owner": "libretro", 435 435 "repo": "snes9x2010", 436 - "rev": "e86e54624a7910a64a9a744e3734d4067c48d240", 437 - "sha256": "U1eeXuhYssAOgiNOZ7fr/8rkPScts3GmWgK6ki39PVA=" 436 + "rev": "d8b10c4cd7606ed58f9c562864c986bc960faaaf", 437 + "sha256": "7FmteYrAYr+pGNXGg9CBC4NFlijGRf7GdtJfiNjmonU=" 438 438 }, 439 439 "stella": { 440 440 "owner": "stella-emu", 441 441 "repo": "stella", 442 - "rev": "82da36dd685c68b09047d7c835175879edb68653", 443 - "sha256": "y7AOSY2VUe4Jv+wteplvA1ul5iXHoeYQhgycD+nfIuc=" 442 + "rev": "93ea39d6155f08c21707a85a0b04b33008a7ab15", 443 + "sha256": "9dCBaLxb1CBbngBd3tJ0x5lT+dnzzhK2DO4Gk/S6WW4=" 444 444 }, 445 445 "stella2014": { 446 446 "owner": "libretro", 447 447 "repo": "stella2014-libretro", 448 - "rev": "1351a4fe2ca6b1f3a66c7db0df2ec268ab002d41", 449 - "sha256": "/sVDOfP5CE8k808lhmH3tT47oZ1ka3pgDG5LglfPmHc=" 448 + "rev": "8ab051edd4816f33a5631d230d54059eeed52c5f", 449 + "sha256": "wqssB8WXXF2Lu9heII8nWLLOvI38cIfHSMA7OOd6jx0=" 450 450 }, 451 451 "swanstation": { 452 452 "owner": "libretro", 453 453 "repo": "swanstation", 454 - "rev": "f2e335bfd4751410dfb24d933f762b9a4fd7fdeb", 455 - "sha256": "l3A1Xb6YD+OOTZEF6whst1Kr8fSRnXuIVIUN1BCa2Bw=" 454 + "rev": "e24f21196cdcd50321475c4366b51af245a6bbe6", 455 + "sha256": "DjAB0Z0yY9IGESeNNkkbdoAO5ItJ/8cZ5ycRofHG978=" 456 456 }, 457 457 "tgbdual": { 458 458 "owner": "libretro", ··· 463 463 "thepowdertoy": { 464 464 "owner": "libretro", 465 465 "repo": "ThePowderToy", 466 - "rev": "ac620c0a89a18774c3ad176a8a1bc596df23ff57", 467 - "sha256": "C/X1DbmnucRddemEYml2zN3qr5yoXY3b+nvqfpboS0M=" 466 + "rev": "f644498193c4c8be689d8a1d2a70e37e4eff4243", 467 + "sha256": "aPUqrrrH2Ia56A3Kx6ClMcZO9nbHGJIcEQ6nFyIMamo=" 468 468 }, 469 469 "tic80": { 470 470 "owner": "libretro", ··· 476 476 "vba-m": { 477 477 "owner": "libretro", 478 478 "repo": "vbam-libretro", 479 - "rev": "7e30b038893de63e674944f75581d57c7685ea3a", 480 - "sha256": "CmmiKiy0mFqAiagUHFV5wRSZ0MkzADrHRAG+h82dWAQ=" 479 + "rev": "640ce45325694d1dc574e90c95c55bc464368d7e", 480 + "sha256": "aiIeleZHt95Y/kigLEbRaCb3KM0ezMB7yzO16FbuBNM=" 481 481 }, 482 482 "vba-next": { 483 483 "owner": "libretro", 484 484 "repo": "vba-next", 485 - "rev": "4191e09e2b0fcf175a15348c1fa8a12bbc6320dd", 486 - "sha256": "IG2oH4F17tlSv1cXYZobggb37tFNE53JOHzan/X0+ws=" 485 + "rev": "0c310082a6345790124e9348861b300bcccbeced", 486 + "sha256": "RQx/WR83EtPcQkx0ft4Y0/5LaKIOST3L/fh4qoPxz78=" 487 487 }, 488 488 "vecx": { 489 489 "owner": "libretro", 490 490 "repo": "libretro-vecx", 491 - "rev": "b5c17bb7fd4a704f58160bc699322a16d0643396", 492 - "sha256": "nICXrVyoMWs2yDcewHd7z6rBt+haY/Dqf5lvF6RLnyg=" 491 + "rev": "8e932c1d585ae9e467186dea9e73ce38fe1490f7", 492 + "sha256": "2Vo30yiP6SfUt3XHCfQTKTKEtCywdRIoUe6d0Or21WM=" 493 493 }, 494 494 "virtualjaguar": { 495 495 "owner": "libretro", ··· 500 500 "yabause": { 501 501 "owner": "libretro", 502 502 "repo": "yabause", 503 - "rev": "c7e02721eddb3de0ec7ae0d61e9e3afa5f586a62", 504 - "sha256": "Y2YsPpgBA021pRDOFqH29zsRSbFIpRo5fq+tkknJbSA=" 503 + "rev": "4c96b96f7fbe07223627c469ff33376b2a634748", 504 + "sha256": "7hEpGh2EcrlUoRiUNntaMZEQtStglYAY1MeCub5p8f8=" 505 505 } 506 506 }
+2 -2
pkgs/applications/emulators/retroarch/libretro-core-info.nix
··· 5 5 6 6 stdenvNoCC.mkDerivation rec { 7 7 pname = "libretro-core-info"; 8 - version = "1.14.0"; 8 + version = "1.15.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "libretro"; 12 12 repo = "libretro-core-info"; 13 - hash = "sha256-3nw8jUxBQJxiKlWS6OjTjwUYWKx3r2E7eHmbj4naWrk="; 13 + hash = "sha256-WIgcHuZgAOrlg+WyOS4TyzWziNzjyQB2sPDM9fR6kwA="; 14 14 rev = "v${version}"; 15 15 }; 16 16
+1
pkgs/applications/emulators/retroarch/mkLibretroCore.nix
··· 53 53 "ARCH=${{ 54 54 armv7l = "arm"; 55 55 armv6l = "arm"; 56 + aarch64 = "arm64"; 56 57 i686 = "x86"; 57 58 }.${stdenv.hostPlatform.parsed.cpu.name} or stdenv.hostPlatform.parsed.cpu.name}" 58 59 ] ++ (args.makeFlags or [ ]);
+15 -23
pkgs/applications/networking/browsers/offpunk/default.nix
··· 3 3 installShellFiles, 4 4 less, 5 5 lib, 6 - makeWrapper, 7 6 offpunk, 8 - python3, 9 - stdenv, 7 + python3Packages, 10 8 testers, 11 9 timg, 12 10 xdg-utils, ··· 14 12 }: 15 13 16 14 let 17 - pythonDependencies = with python3.pkgs; [ 15 + pythonDependencies = with python3Packages; [ 18 16 beautifulsoup4 19 17 cryptography 20 18 feedparser ··· 30 28 xsel 31 29 ]; 32 30 in 33 - stdenv.mkDerivation (finalAttrs: { 31 + python3Packages.buildPythonPackage rec { 34 32 pname = "offpunk"; 35 - version = "1.9"; 33 + version = "1.9.2"; 34 + format = "flit"; 35 + 36 + disabled = python3Packages.pythonOlder "3.7"; 36 37 37 38 src = fetchFromSourcehut { 38 39 owner = "~lioploum"; 39 40 repo = "offpunk"; 40 - rev = "v${finalAttrs.version}"; 41 - sha256 = "sha256-sxX4/7jbNbLwHVfE1lDtjr/luby5zAf6Hy1RcwXZLBA="; 41 + rev = "v${version}"; 42 + sha256 = "sha256-CYsuoj5/BaaboDRtcOrGzJoZDCfOLs7ROVWLVjOAnRU="; 42 43 }; 43 44 44 - nativeBuildInputs = [ makeWrapper installShellFiles ]; 45 - buildInputs = otherDependencies ++ pythonDependencies; 46 - 47 - installPhase = '' 48 - runHook preInstall 49 - 50 - install -D ./offpunk.py $out/bin/offpunk 45 + nativeBuildInputs = [ installShellFiles ]; 46 + propagatedBuildInputs = otherDependencies ++ pythonDependencies; 51 47 52 - wrapProgram $out/bin/offpunk \ 53 - --set PYTHONPATH "$PYTHONPATH" \ 54 - --set PATH ${lib.makeBinPath otherDependencies} 55 - 56 - installManPage man/*.1 57 - runHook postInstall 48 + postInstall = '' 49 + installManPage man/*.1 58 50 ''; 59 51 60 52 passthru.tests.version = testers.testVersion { package = offpunk; }; 61 53 62 54 meta = with lib; { 63 55 description = "An Offline-First browser for the smolnet "; 64 - homepage = finalAttrs.src.meta.homepage; 56 + homepage = src.meta.homepage; 65 57 maintainers = with maintainers; [ DamienCassou ]; 66 58 platforms = platforms.linux; 67 59 license = licenses.bsd2; 68 60 }; 69 - }) 61 + }
+8 -4
pkgs/applications/office/libreoffice/wrapper.nix
··· 89 89 } ('' 90 90 mkdir -p "$out/bin" 91 91 mkdir -p "$out/share" 92 + for dir in ${unwrapped}/share/*; do 93 + dirname="''${dir##*/}" 94 + if [[ $dirname == "applications" ]]; then 95 + cp -r $dir/ $out/share/ 96 + else 97 + ln -s $dir $out/share/ 98 + fi 99 + done 92 100 93 - ln -s ${unwrapped}/share/icons $out/share/icons 94 - ln -s ${unwrapped}/share/templates $out/share/templates 95 101 ln -s ${unwrapped}/lib $out/lib 96 - 97 - cp -r ${unwrapped}/share/applications/ $out/share/ 98 102 for f in $out/share/applications/*.desktop; do 99 103 substituteInPlace "$f" \ 100 104 --replace "Exec=libreoffice${major}.${minor}" "Exec=soffice"
+2 -2
pkgs/applications/version-management/lefthook/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "lefthook"; 5 - version = "1.3.3"; 5 + version = "1.3.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 rev = "v${version}"; 9 9 owner = "evilmartians"; 10 10 repo = "lefthook"; 11 - sha256 = "sha256-9XmLQPkc8we5wRZe5+bhL1b9lxWX6JAQeF4DmRXBgew="; 11 + sha256 = "sha256-v4ES3TbuDRUBK8xH/viP5QOZmp3eWjsy0YRaSxfTZV4="; 12 12 }; 13 13 14 14 vendorHash = "sha256-VeR/lyrQrjXWvHdxpG4H+XPlAud9rrlzX8GqhVzn1sg=";
+3 -3
pkgs/applications/window-managers/i3/status-rust.nix
··· 15 15 16 16 rustPlatform.buildRustPackage rec { 17 17 pname = "i3status-rust"; 18 - version = "0.30.4"; 18 + version = "0.30.5"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "greshake"; 22 22 repo = pname; 23 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-yJFM7+fpG/vnYvHRT+34rqToCfj8pjKpPRKQ49p2mh0="; 24 + hash = "sha256-7Fjz6Q/f6jocMPAcgeodzdImILKuRmF6V0zo00ZPfjI="; 25 25 }; 26 26 27 - cargoHash = "sha256-G2Yveyplq/SdHgc+sipQqQ67YAU/dPteESVJ8My5Hqs="; 27 + cargoHash = "sha256-cHG3wUlk0AotfrQ8pYZNQDualhKSp6aNpY2mbjgnqzU="; 28 28 29 29 nativeBuildInputs = [ pkg-config makeWrapper ]; 30 30
+4
pkgs/development/libraries/keystone/default.nix
··· 3 3 , pkg-config 4 4 , cmake 5 5 , python3 6 + , fixDarwinDylibNames 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 25 26 pkg-config 26 27 cmake 27 28 python3 29 + ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ 30 + # TODO: could be replaced by setting CMAKE_INSTALL_NAME_DIR? 31 + fixDarwinDylibNames 28 32 ]; 29 33 30 34 meta = with lib; {
+2 -2
pkgs/development/nim-packages/cbor/default.nix
··· 2 2 3 3 buildNimPackage rec { 4 4 pname = "cbor"; 5 - version = "20221007"; 5 + version = "20230310"; 6 6 src = fetchFromSourcehut { 7 7 owner = "~ehmry"; 8 8 repo = "nim_${pname}"; 9 9 rev = version; 10 - hash = "sha256-zFkYsXFRAiBrfz3VNML3l+rYrdJmczl0bfZcJSbHHbM="; 10 + hash = "sha256-VmSYWgXDJLB2D2m3/ymrEytT2iW5JE56WmDz2MPHAqQ="; 11 11 }; 12 12 doCheck = true; 13 13 meta = with lib;
+20
pkgs/development/nim-packages/coap/default.nix
··· 1 + { lib, buildNimPackage, fetchFromGitea, taps }: 2 + 3 + buildNimPackage rec { 4 + pname = "coap"; 5 + version = "20230125"; 6 + src = fetchFromGitea { 7 + domain = "codeberg.org"; 8 + owner = "eris"; 9 + repo = "${pname}-nim"; 10 + rev = version; 11 + hash = "sha256-wlDyqRxXTrX+zXDIe2o9FTU2o26LO/6m7H/FGok1JDw="; 12 + }; 13 + propagatedBuildInputs = [ taps ]; 14 + meta = src.meta // { 15 + description = 16 + "Nim implementation of the Constrained Application Protocol (CoAP) over TCP"; 17 + license = lib.licenses.agpl3Plus; 18 + maintainers = with lib.maintainers; [ ehmry ]; 19 + }; 20 + }
+37
pkgs/development/nim-packages/eris/default.nix
··· 1 + { lib, buildNimPackage, fetchFromGitea, pkg-config 2 + , base32, coap, cbor, freedesktop_org, syndicate, tkrzw }: 3 + 4 + buildNimPackage rec { 5 + pname = "eris"; 6 + version = "20230201"; 7 + outputs = [ "bin" "out" ]; 8 + src = fetchFromGitea { 9 + domain = "codeberg.org"; 10 + owner = "eris"; 11 + repo = "nim-${pname}"; 12 + rev = version; 13 + hash = "sha256-6vlD/woqTkbSRWhRtQD/ynk0DG+GrGwh6x+qUmo6YSQ="; 14 + }; 15 + propagatedNativeBuildInputs = [ pkg-config ]; 16 + propagatedBuildInputs = [ 17 + base32 18 + coap 19 + cbor 20 + freedesktop_org 21 + syndicate 22 + tkrzw 23 + ]; 24 + postInstall = '' 25 + mkdir -p "$bin/share/applications" 26 + substitute "eris-open.desktop" "$bin/share/applications/eris-open.desktop"\ 27 + --replace "Exec=eriscmd " "Exec=$bin/bin/eriscmd " 28 + 29 + install -D "eris-link.xml" -t "$bin/share/mime/packages" 30 + install -D "eris48.png" "$bin/share/icons/hicolor/48x48/apps/eris.png" 31 + ''; 32 + meta = src.meta // { 33 + license = lib.licenses.unlicense; 34 + maintainers = with lib.maintainers; [ ehmry ]; 35 + mainProgram = "eriscmd"; 36 + }; 37 + }
+32
pkgs/development/nim-packages/freedesktop_org/default.nix
··· 1 + { lib, buildNimPackage, fetchFromSourcehut, fetchFromGitHub }: 2 + 3 + let 4 + # freedesktop_org requires a fork of configparser 5 + configparser = buildNimPackage rec { 6 + pname = "configparser"; 7 + version = "20230120"; 8 + src = fetchFromGitHub { 9 + repo = "nim-" + pname; 10 + owner = "ehmry"; 11 + rev = "695f1285d63f1954c25eb1f42798d90fa7bcbe14"; 12 + hash = "sha256-Z2Qr14pv2RHzQNfEYIKuXKHfHvvIfaEiGCHHCWJZFyw="; 13 + }; 14 + doCheck = true; 15 + }; 16 + in buildNimPackage rec { 17 + pname = "freedesktop_org"; 18 + version = "20230201"; 19 + src = fetchFromSourcehut { 20 + owner = "~ehmry"; 21 + repo = pname; 22 + rev = version; 23 + hash = "sha256-gEN8kiWYCfC9H7o4UE8Xza5s7OwU3TFno6XnIlEm9Dg="; 24 + }; 25 + propagatedBuildInputs = [ configparser ]; 26 + doCheck = true; 27 + meta = src.meta // { 28 + description = "Some Nim procedures for looking up freedesktop.org data"; 29 + license = lib.licenses.unlicense; 30 + maintainers = with lib.maintainers; [ ehmry ]; 31 + }; 32 + }
+20
pkgs/development/nim-packages/preserves/default.nix
··· 1 + { lib, stdenv, buildNimPackage, fetchFromGitea, npeg }: 2 + 3 + buildNimPackage rec { 4 + pname = "preserves"; 5 + version = "20221102"; 6 + src = fetchFromGitea { 7 + domain = "git.syndicate-lang.org"; 8 + owner = "ehmry"; 9 + repo = "${pname}-nim"; 10 + rev = version; 11 + hash = "sha256-oRsq1ugtrOvTn23596BXRy71TQZ4h/Vv6JGqBTZdoKY="; 12 + }; 13 + propagatedBuildInputs = [ npeg ]; 14 + doCheck = !stdenv.isDarwin; 15 + meta = src.meta // { 16 + description = "Nim implementation of the Preserves data language"; 17 + license = lib.licenses.unlicense; 18 + maintainers = with lib.maintainers; [ ehmry ]; 19 + }; 20 + }
+20
pkgs/development/nim-packages/syndicate/default.nix
··· 1 + { lib, buildNimPackage, fetchFromGitea, nimSHA2, preserves }: 2 + 3 + buildNimPackage rec { 4 + pname = "syndicate"; 5 + version = "20221102"; 6 + src = fetchFromGitea { 7 + domain = "git.syndicate-lang.org"; 8 + owner = "ehmry"; 9 + repo = "${pname}-nim"; 10 + rev = version; 11 + hash = "sha256-yTPbEsBcpEPXfmhykbWzWdnJ2ExEJxdii1L+mqx8VGQ="; 12 + }; 13 + propagatedBuildInputs = [ nimSHA2 preserves ]; 14 + doCheck = true; 15 + meta = src.meta // { 16 + description = "Nim implementation of the Syndicated Actor model"; 17 + license = lib.licenses.unlicense; 18 + maintainers = with lib.maintainers; [ ehmry ]; 19 + }; 20 + }
+62
pkgs/development/python-modules/nianet/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , matplotlib 5 + , niapy 6 + , numpy 7 + , poetry-core 8 + , pytestCheckHook 9 + , pythonOlder 10 + , scikit-learn 11 + , toml-adapt 12 + , torch 13 + }: 14 + 15 + buildPythonPackage rec { 16 + pname = "nianet"; 17 + version = "1.1.4"; 18 + format = "pyproject"; 19 + 20 + disabled = pythonOlder "3.6"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "SasoPavlic"; 24 + repo = pname; 25 + rev = "version_${version}"; 26 + sha256 = "sha256-FZipl6Z9AfiL6WH0kvUn8bVxt8JLdDVlmTSqnyxe0nY="; 27 + }; 28 + 29 + nativeBuildInputs = [ 30 + toml-adapt 31 + poetry-core 32 + ]; 33 + 34 + propagatedBuildInputs = [ 35 + niapy 36 + numpy 37 + scikit-learn 38 + torch 39 + ]; 40 + 41 + # create niapy and torch dep version consistent 42 + preBuild = '' 43 + toml-adapt -path pyproject.toml -a change -dep niapy -ver X 44 + toml-adapt -path pyproject.toml -a change -dep torch -ver X 45 + ''; 46 + 47 + checkInputs = [ 48 + pytestCheckHook 49 + ]; 50 + 51 + pythonImportsCheck = [ 52 + "nianet" 53 + ]; 54 + 55 + meta = with lib; { 56 + description = "Designing and constructing neural network topologies using nature-inspired algorithms"; 57 + homepage = "https://github.com/SasoPavlic/NiaNet"; 58 + changelog = "https://github.com/SasoPavlic/NiaNet/releases/tag/v${version}"; 59 + license = licenses.mit; 60 + maintainers = with maintainers; [ firefly-cpp ]; 61 + }; 62 + }
+48
pkgs/development/python-modules/pytest-pytestrail/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , setuptools-scm 5 + , pytest 6 + , testrail-api 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "pytest-pytestrail"; 11 + version = "0.10.5"; 12 + 13 + SETUPTOOLS_SCM_PRETEND_VERSION = version; 14 + 15 + src = fetchFromGitHub { 16 + owner = "tolstislon"; 17 + repo = "pytest-pytestrail"; 18 + rev = version; 19 + sha256 = "sha256-y34aRxQ8mu6b6GBRMFVzn1shMVc7TumdjRS3daMEZJM="; 20 + }; 21 + 22 + nativeBuildInputs = [ 23 + setuptools-scm 24 + ]; 25 + 26 + buildInputs = [ 27 + pytest 28 + ]; 29 + 30 + propagatedBuildInputs = [ 31 + testrail-api 32 + ]; 33 + 34 + # all tests require network accesss 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ 38 + "pytest_pytestrail" 39 + ]; 40 + 41 + meta = with lib; { 42 + description = "Pytest plugin for interaction with TestRail"; 43 + homepage = "https://github.com/tolstislon/pytest-pytestrail"; 44 + changelog = "https://github.com/tolstislon/pytest-pytestrail/releases/tag/${version}"; 45 + license = with licenses; [ mit ]; 46 + maintainers = with maintainers; [ aanderse ]; 47 + }; 48 + }
+36
pkgs/development/python-modules/testrail-api/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , requests 5 + , pytestCheckHook 6 + , responses 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "testrail-api"; 11 + version = "1.12.0"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "tolstislon"; 15 + repo = "testrail-api"; 16 + rev = version; 17 + sha256 = "sha256-VuAW5Dl3pkA6mtn/mbzxTFoavO5jPoqFSFVlrxc7KRk="; 18 + }; 19 + 20 + nativeCheckInputs = [ 21 + pytestCheckHook 22 + responses 23 + ]; 24 + 25 + propagatedBuildInputs = [ 26 + requests 27 + ]; 28 + 29 + meta = with lib; { 30 + description = "A Python wrapper of the TestRail API"; 31 + homepage = "https://github.com/tolstislon/testrail-api"; 32 + changelog = "https://github.com/tolstislon/ytestrail-api/releases/tag/${version}"; 33 + license = with licenses; [ mit ]; 34 + maintainers = with maintainers; [ aanderse ]; 35 + }; 36 + }
+2 -2
pkgs/development/tools/database/sqlfluff/default.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "sqlfluff"; 8 - version = "1.4.5"; 8 + version = "2.0.0"; 9 9 format = "setuptools"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = pname; 13 13 repo = pname; 14 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-Kc0doBR2iOy54arxOYXH5eHlcM7pXFVUqedopsZH8rE="; 15 + hash = "sha256-2WKRB4mMiML7POCAd9G0IROTKujcsJT591h1bmSX63E="; 16 16 }; 17 17 18 18 propagatedBuildInputs = with python3.pkgs; [
+2 -2
pkgs/development/tools/oh-my-posh/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "oh-my-posh"; 9 - version = "14.12.0"; 9 + version = "14.14.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "jandedobbeleer"; 13 13 repo = pname; 14 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-brwfM/IPgwLdVwMNur4EBCsubbv/DCVhTMJbAn6mbFg="; 15 + hash = "sha256-EdW9LnSYSa8ulXKSJz3LBktVlDev7CLVOZL9qAytjcQ="; 16 16 }; 17 17 18 18 vendorHash = "sha256-JZ5UiL2vGsXy/xmz+NcAKYDmp5hq7bx54/OdUyQHUp0=";
+3 -3
pkgs/development/tools/rust/cargo-binstall/default.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "cargo-binstall"; 14 - version = "0.21.2"; 14 + version = "0.21.3"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "cargo-bins"; 18 18 repo = "cargo-binstall"; 19 19 rev = "v${version}"; 20 - hash = "sha256-8iJOjaOnbvRZWkygkXK0e/BiImpyQ92E0XQDklb4JJQ="; 20 + hash = "sha256-K4NerJSW3ckXMFFnFCMXIqMeevE3Xzr/Wsz9nloolBI="; 21 21 }; 22 22 23 - cargoHash = "sha256-+u1v3XJ+DCXMbMpLcjxUZMKcF0E9LrNv6+9XVo/DduQ="; 23 + cargoHash = "sha256-YSKnfhSZ885evtEK40QTt90RwtH03aO/aJ6A/DddoVU="; 24 24 25 25 nativeBuildInputs = [ 26 26 pkg-config
+4 -4
pkgs/servers/hbase/default.nix
··· 39 39 in 40 40 { 41 41 hbase_2_4 = common { 42 - version = "2.4.15"; 43 - hash = "sha256-KJXpfQ91POVd7ZnKQyIX5qzX4JIZqh3Zn2Pz0chW48g="; 42 + version = "2.4.16"; 43 + hash = "sha256-vMuTqS2bXFRcCsZ7bOaNLVGyOG38HhL8WlCq2MFmAaE="; 44 44 tests.standalone = nixosTests.hbase_2_4; 45 45 }; 46 46 hbase_2_5 = common { 47 - version = "2.5.1"; 48 - hash = "sha256-ddSa4q43PSJv1W4lzzaXfv4LIThs4n8g8wYufHgsZVE="; 47 + version = "2.5.3"; 48 + hash = "sha256-h08jnDQaakpkYFHHn9qeg4JCSBtwRjv42qKLpyOVdsI="; 49 49 tests.standalone = nixosTests.hbase2; 50 50 }; 51 51 hbase_3_0 = common {
+3 -3
pkgs/servers/matrix-synapse/default.nix
··· 12 12 with python3.pkgs; 13 13 buildPythonApplication rec { 14 14 pname = "matrix-synapse"; 15 - version = "1.78.0"; 15 + version = "1.79.0"; 16 16 format = "pyproject"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "matrix-org"; 20 20 repo = "synapse"; 21 21 rev = "v${version}"; 22 - hash = "sha256-UMP/JQ77qGfAQ+adLBLB8NFI2OiuwjILEbEecEDcK1A="; 22 + hash = "sha256-2MHP4Gu+C5yyXObbd7NLYWCy1E0L7fUwpzYsoD7ULDo="; 23 23 }; 24 24 25 25 cargoDeps = rustPlatform.fetchCargoTarball { 26 26 inherit src; 27 27 name = "${pname}-${version}"; 28 - hash = "sha256-UTuMvTWfOlFlL+4qsCEfVljnkeylBKq0wd5FlAOYAFQ="; 28 + hash = "sha256-yDKs6KRStjJMC/48dZcyQ4OmBXY1TombjH/ZDfBJbSc="; 29 29 }; 30 30 31 31 postPatch = ''
+3 -3
pkgs/shells/nushell/default.nix
··· 26 26 27 27 rustPlatform.buildRustPackage ( 28 28 let 29 - version = "0.76.0"; 29 + version = "0.77.0"; 30 30 pname = "nushell"; 31 31 in { 32 32 inherit version pname; ··· 35 35 owner = pname; 36 36 repo = pname; 37 37 rev = version; 38 - sha256 = "sha256-dGsnbKsg0nQFFXZDRDei2uGhGWEQSeSHGpXJp+8QUC8="; 38 + sha256 = "sha256-cffAxuM12wdd7IeLbKSpL6dpvpZVscA8nMOh3jFqY3E="; 39 39 }; 40 40 41 - cargoSha256 = "sha256-9oXMojQA4tSoIxY1lwMPGhQz3WHcxEKtwl+4LsAYbDo="; 41 + cargoSha256 = "sha256-OcYE9d3hO3JtxF3REWev0Rz97Kr9l7P7nUxhIb5fhi0="; 42 42 43 43 nativeBuildInputs = [ pkg-config ] 44 44 ++ lib.optionals (withDefaultFeatures && stdenv.isLinux) [ python3 ]
+3 -3
pkgs/tools/misc/hyperfine/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "hyperfine"; 11 - version = "1.15.0"; 11 + version = "1.16.0"; 12 12 13 13 src = fetchCrate { 14 14 inherit pname version; 15 - sha256 = "sha256-JJ4sEwe2fXOGlofJ9SkXEllMCMhn7MSJ+H3aAF0F0zk="; 15 + sha256 = "sha256-cbox7TAgeb0ZPt0i3SphWClAz/mUUgRlFKCOS/E0MT4="; 16 16 }; 17 17 18 - cargoSha256 = "sha256-3xOh51rUnQcUfQ+asurbfNYTb5dWQO5YY/AbGRV+26w="; 18 + cargoSha256 = "sha256-Bc3twE42iB7NNkI5cPcniEb+JcR1wjc9nx80p6HCDVc="; 19 19 20 20 nativeBuildInputs = [ installShellFiles ]; 21 21 buildInputs = lib.optional stdenv.isDarwin Security;
+3 -3
pkgs/tools/misc/vivid/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "vivid"; 5 - version = "0.8.0"; 5 + version = "0.9.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "sharkdp"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-83ff0T2P5aRQ6cM9z7IEuoi7syvJldIuzzdiTrygckA="; 11 + hash = "sha256-zNsNEXj/SaJaYsYvoOGPopLhJDfLIXSs7eeZDdJrHiQ="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-W1tLQTTMOKB/BR9P3y3goPIdOe12Qdkf4wYPlhbQjzY="; 14 + cargoHash = "sha256-gtqdQuf3Ybt0PDCQw3gGAzIROq39NJKPIat0lyIPGgg="; 15 15 16 16 meta = with lib; { 17 17 description = "A generator for LS_COLORS with support for multiple color themes";
+1 -1
pkgs/tools/networking/netboot/default.nix
··· 20 20 meta = with lib; { 21 21 description = "Mini PXE server"; 22 22 maintainers = [ maintainers.raskin ]; 23 - platforms = ["x86_64-linux"]; 23 + platforms = [ "x86_64-linux" "aarch64-linux" ]; 24 24 license = lib.licenses.free; 25 25 }; 26 26 }
+2 -2
pkgs/tools/virtualization/cri-tools/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "cri-tools"; 9 - version = "1.26.0"; 9 + version = "1.26.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "kubernetes-sigs"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-ALeK51fsGEys9iEHv0C8vCZVD4vx+VYUooj7pH7p7tg="; 15 + sha256 = "sha256-jJhHlqnc7wDsc6nn5CTZMnaZpUJrEDkGzyvQ2EoX4GE="; 16 16 }; 17 17 18 18 vendorSha256 = null;
+10
pkgs/top-level/nim-packages.nix
··· 30 30 31 31 chroma = callPackage ../development/nim-packages/chroma { }; 32 32 33 + coap = callPackage ../development/nim-packages/coap { }; 34 + 33 35 docopt = callPackage ../development/nim-packages/docopt { }; 34 36 37 + eris = callPackage ../development/nim-packages/eris { }; 38 + 35 39 flatty = callPackage ../development/nim-packages/flatty { }; 36 40 41 + freedesktop_org = callPackage ../development/nim-packages/freedesktop_org { }; 42 + 37 43 frosty = callPackage ../development/nim-packages/frosty { }; 38 44 39 45 getdns = callPackage ../development/nim-packages/getdns { ··· 73 79 74 80 pixie = callPackage ../development/nim-packages/pixie { }; 75 81 82 + preserves = callPackage ../development/nim-packages/preserves { }; 83 + 76 84 redis = callPackage ../development/nim-packages/redis { }; 77 85 78 86 redpool = callPackage ../development/nim-packages/redpool { }; ··· 101 109 stew = callPackage ../development/nim-packages/stew { }; 102 110 103 111 supersnappy = callPackage ../development/nim-packages/supersnappy { }; 112 + 113 + syndicate = callPackage ../development/nim-packages/syndicate { }; 104 114 105 115 taps = callPackage ../development/nim-packages/taps { }; 106 116
+6
pkgs/top-level/python-packages.nix
··· 6454 6454 6455 6455 niaaml = callPackage ../development/python-modules/niaaml { }; 6456 6456 6457 + nianet = callPackage ../development/python-modules/nianet { }; 6458 + 6457 6459 niaarm = callPackage ../development/python-modules/niaarm { }; 6458 6460 6459 6461 niapy = callPackage ../development/python-modules/niapy { }; ··· 9252 9254 9253 9255 pytest-pylint = callPackage ../development/python-modules/pytest-pylint { }; 9254 9256 9257 + pytest-pytestrail = callPackage ../development/python-modules/pytest-pytestrail { }; 9258 + 9255 9259 pytest-qt = callPackage ../development/python-modules/pytest-qt { }; 9256 9260 9257 9261 pytest-quickcheck = callPackage ../development/python-modules/pytest-quickcheck { }; ··· 11568 11572 testing-postgresql = callPackage ../development/python-modules/testing-postgresql { }; 11569 11573 11570 11574 testpath = callPackage ../development/python-modules/testpath { }; 11575 + 11576 + testrail-api = callPackage ../development/python-modules/testrail-api { }; 11571 11577 11572 11578 testrepository = callPackage ../development/python-modules/testrepository { }; 11573 11579