Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 432ead94 1c52b361

+687 -300
+2
nixos/doc/manual/release-notes/rl-2305.section.md
··· 93 94 - `git-bug` has been updated to at least version 0.8.0, which includes backwards incompatible changes. The `git-bug-migration` package can be used to upgrade existing repositories. 95 96 - `keepassx` and `keepassx2` have been removed, due to upstream [stopping development](https://www.keepassx.org/index.html%3Fp=636.html). Consider [KeePassXC](https://keepassxc.org) as a maintained alternative. 97 98 - The `services.kubo.settings` option is now no longer stateful. If you changed any of the options in `services.kubo.settings` in the past and then removed them from your NixOS configuration again, those changes are still in your Kubo configuration file but will now be reset to the default. If you're unsure, you may want to make a backup of your configuration file (probably /var/lib/ipfs/config) and compare after the update.
··· 93 94 - `git-bug` has been updated to at least version 0.8.0, which includes backwards incompatible changes. The `git-bug-migration` package can be used to upgrade existing repositories. 95 96 + - `nushell` has been updated to at least version 0.77.0, which includes potential breaking changes in aliases. The old aliases are now available as `old-alias` but it is recommended you migrate to the new format. See [Reworked aliases](https://www.nushell.sh/blog/2023-03-14-nushell_0_77.html#reworked-aliases-breaking-changes-kubouch). 97 + 98 - `keepassx` and `keepassx2` have been removed, due to upstream [stopping development](https://www.keepassx.org/index.html%3Fp=636.html). Consider [KeePassXC](https://keepassxc.org) as a maintained alternative. 99 100 - The `services.kubo.settings` option is now no longer stateful. If you changed any of the options in `services.kubo.settings` in the past and then removed them from your NixOS configuration again, those changes are still in your Kubo configuration file but will now be reset to the default. If you're unsure, you may want to make a backup of your configuration file (probably /var/lib/ipfs/config) and compare after the update.
+125 -103
nixos/modules/services/cluster/hadoop/hbase.nix
··· 5 cfg = config.services.hadoop; 6 hadoopConf = "${import ./conf.nix { inherit cfg pkgs lib; }}/"; 7 mkIfNotNull = x: mkIf (x != null) x; 8 in 9 { 10 options.services.hadoop = { 11 12 - gatewayRole.enableHbaseCli = mkEnableOption (lib.mdDoc "HBase CLI tools"); 13 14 hbaseSiteDefault = mkOption { 15 default = { ··· 21 "hbase.cluster.distributed" = "true"; 22 }; 23 type = types.attrsOf types.anything; 24 - description = lib.mdDoc '' 25 Default options for hbase-site.xml 26 ''; 27 }; ··· 29 default = {}; 30 type = with types; attrsOf anything; 31 example = literalExpression '' 32 ''; 33 - description = lib.mdDoc '' 34 Additional options and overrides for hbase-site.xml 35 <https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml> 36 ''; ··· 39 default = {}; 40 type = with types; attrsOf anything; 41 internal = true; 42 - description = lib.mdDoc '' 43 Internal option to add configs to hbase-site.xml based on module options 44 ''; 45 }; ··· 50 type = types.package; 51 default = pkgs.hbase; 52 defaultText = literalExpression "pkgs.hbase"; 53 - description = lib.mdDoc "HBase package"; 54 }; 55 56 rootdir = mkOption { 57 - description = lib.mdDoc '' 58 This option will set "hbase.rootdir" in hbase-site.xml and determine 59 the directory shared by region servers and into which HBase persists. 60 The URL should be 'fully-qualified' to include the filesystem scheme. ··· 68 default = "/hbase"; 69 }; 70 zookeeperQuorum = mkOption { 71 - description = lib.mdDoc '' 72 This option will set "hbase.zookeeper.quorum" in hbase-site.xml. 73 Comma separated list of servers in the ZooKeeper ensemble. 74 ''; ··· 76 example = "zk1.internal,zk2.internal,zk3.internal"; 77 default = null; 78 }; 79 - master = { 80 - enable = mkEnableOption (lib.mdDoc "HBase Master"); 81 - initHDFS = mkEnableOption (lib.mdDoc "initialization of the hbase directory on HDFS"); 82 - 83 - openFirewall = mkOption { 84 - type = types.bool; 85 - default = false; 86 - description = lib.mdDoc '' 87 - Open firewall ports for HBase master. 88 - ''; 89 - }; 90 - }; 91 - regionServer = { 92 - enable = mkEnableOption (lib.mdDoc "HBase RegionServer"); 93 - 94 - overrideHosts = mkOption { 95 - type = types.bool; 96 - default = true; 97 - description = lib.mdDoc '' 98 - Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix 99 - Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records 100 - or /etc/hosts entries. 101 - 102 - ''; 103 }; 104 - 105 - openFirewall = mkOption { 106 - type = types.bool; 107 - default = false; 108 - description = lib.mdDoc '' 109 - Open firewall ports for HBase master. 110 - ''; 111 }; 112 }; 113 - }; 114 - }; 115 - 116 - config = mkMerge [ 117 - (mkIf cfg.hbase.master.enable { 118 - services.hadoop.gatewayRole = { 119 - enable = true; 120 - enableHbaseCli = mkDefault true; 121 - }; 122 - 123 - systemd.services.hbase-master = { 124 - description = "HBase master"; 125 - wantedBy = [ "multi-user.target" ]; 126 - 127 - preStart = mkIf cfg.hbase.master.initHDFS '' 128 - HADOOP_USER_NAME=hdfs ${cfg.package}/bin/hdfs --config ${hadoopConf} dfsadmin -safemode wait 129 - HADOOP_USER_NAME=hdfs ${cfg.package}/bin/hdfs --config ${hadoopConf} dfs -mkdir -p ${cfg.hbase.rootdir} 130 - HADOOP_USER_NAME=hdfs ${cfg.package}/bin/hdfs --config ${hadoopConf} dfs -chown hbase ${cfg.hbase.rootdir} 131 ''; 132 - 133 - serviceConfig = { 134 - User = "hbase"; 135 - SyslogIdentifier = "hbase-master"; 136 - ExecStart = "${cfg.hbase.package}/bin/hbase --config ${hadoopConf} " + 137 - "master start"; 138 - Restart = "always"; 139 - }; 140 }; 141 142 - services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 143 - 144 - networking.firewall.allowedTCPPorts = mkIf cfg.hbase.master.openFirewall [ 145 - 16000 16010 146 - ]; 147 - 148 - }) 149 - 150 - (mkIf cfg.hbase.regionServer.enable { 151 - services.hadoop.gatewayRole = { 152 - enable = true; 153 - enableHbaseCli = mkDefault true; 154 - }; 155 - 156 - systemd.services.hbase-regionserver = { 157 - description = "HBase RegionServer"; 158 - wantedBy = [ "multi-user.target" ]; 159 - serviceConfig = { 160 - User = "hbase"; 161 - SyslogIdentifier = "hbase-regionserver"; 162 - ExecStart = "${cfg.hbase.package}/bin/hbase --config /etc/hadoop-conf/ " + 163 - "regionserver start"; 164 - Restart = "always"; 165 - }; 166 - }; 167 - 168 - services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 169 - 170 - networking = { 171 - firewall.allowedTCPPorts = mkIf cfg.hbase.regionServer.openFirewall [ 172 - 16020 16030 173 - ]; 174 - hosts = mkIf cfg.hbase.regionServer.overrideHosts { 175 - "127.0.0.2" = mkForce [ ]; 176 - "::1" = mkForce [ ]; 177 - }; 178 - }; 179 - }) 180 181 (mkIf cfg.gatewayRole.enable { 182 ··· 192 isSystemUser = true; 193 }; 194 }) 195 - ]; 196 }
··· 5 cfg = config.services.hadoop; 6 hadoopConf = "${import ./conf.nix { inherit cfg pkgs lib; }}/"; 7 mkIfNotNull = x: mkIf (x != null) x; 8 + # generic hbase role options 9 + hbaseRoleOption = name: extraOpts: { 10 + enable = mkEnableOption (mdDoc "HBase ${name}"); 11 + 12 + openFirewall = mkOption { 13 + type = types.bool; 14 + default = false; 15 + description = mdDoc "Open firewall ports for HBase ${name}."; 16 + }; 17 + 18 + restartIfChanged = mkOption { 19 + type = types.bool; 20 + default = false; 21 + description = mdDoc "Restart ${name} con config change."; 22 + }; 23 + 24 + extraFlags = mkOption { 25 + type = with types; listOf str; 26 + default = []; 27 + example = literalExpression ''[ "--backup" ]''; 28 + description = mdDoc "Extra flags for the ${name} service."; 29 + }; 30 + 31 + environment = mkOption { 32 + type = with types; attrsOf str; 33 + default = {}; 34 + example = literalExpression '' 35 + { 36 + HBASE_MASTER_OPTS = "-Dcom.sun.management.jmxremote.ssl=true"; 37 + } 38 + ''; 39 + description = mdDoc "Environment variables passed to ${name}."; 40 + }; 41 + } // extraOpts; 42 + # generic hbase role configs 43 + hbaseRoleConfig = name: ports: (mkIf cfg.hbase."${name}".enable { 44 + services.hadoop.gatewayRole = { 45 + enable = true; 46 + enableHbaseCli = mkDefault true; 47 + }; 48 + 49 + systemd.services."hbase-${toLower name}" = { 50 + description = "HBase ${name}"; 51 + wantedBy = [ "multi-user.target" ]; 52 + path = with cfg; [ hbase.package ] ++ optional 53 + (with cfg.hbase.master; enable && initHDFS) package; 54 + preStart = mkIf (with cfg.hbase.master; enable && initHDFS) 55 + (concatStringsSep "\n" ( 56 + map (x: "HADOOP_USER_NAME=hdfs hdfs --config /etc/hadoop-conf ${x}")[ 57 + "dfsadmin -safemode wait" 58 + "dfs -mkdir -p ${cfg.hbase.rootdir}" 59 + "dfs -chown hbase ${cfg.hbase.rootdir}" 60 + ] 61 + )); 62 + 63 + inherit (cfg.hbase."${name}") environment; 64 + script = concatStringsSep " " ( 65 + [ 66 + "hbase --config /etc/hadoop-conf/" 67 + "${toLower name} start" 68 + ] 69 + ++ cfg.hbase."${name}".extraFlags 70 + ++ map (x: "--${toLower x} ${toString cfg.hbase.${name}.${x}}") 71 + (filter (x: hasAttr x cfg.hbase.${name}) ["port" "infoPort"]) 72 + ); 73 + 74 + serviceConfig = { 75 + User = "hbase"; 76 + SyslogIdentifier = "hbase-${toLower name}"; 77 + Restart = "always"; 78 + }; 79 + }; 80 + 81 + services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 82 + 83 + networking = { 84 + firewall.allowedTCPPorts = mkIf cfg.hbase."${name}".openFirewall ports; 85 + hosts = mkIf (with cfg.hbase.regionServer; enable && overrideHosts) { 86 + "127.0.0.2" = mkForce [ ]; 87 + "::1" = mkForce [ ]; 88 + }; 89 + }; 90 + 91 + }); 92 in 93 { 94 options.services.hadoop = { 95 96 + gatewayRole.enableHbaseCli = mkEnableOption (mdDoc "HBase CLI tools"); 97 98 hbaseSiteDefault = mkOption { 99 default = { ··· 105 "hbase.cluster.distributed" = "true"; 106 }; 107 type = types.attrsOf types.anything; 108 + description = mdDoc '' 109 Default options for hbase-site.xml 110 ''; 111 }; ··· 113 default = {}; 114 type = with types; attrsOf anything; 115 example = literalExpression '' 116 + { 117 + "hbase.hregion.max.filesize" = 20*1024*1024*1024; 118 + "hbase.table.normalization.enabled" = "true"; 119 + } 120 ''; 121 + description = mdDoc '' 122 Additional options and overrides for hbase-site.xml 123 <https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml> 124 ''; ··· 127 default = {}; 128 type = with types; attrsOf anything; 129 internal = true; 130 + description = mdDoc '' 131 Internal option to add configs to hbase-site.xml based on module options 132 ''; 133 }; ··· 138 type = types.package; 139 default = pkgs.hbase; 140 defaultText = literalExpression "pkgs.hbase"; 141 + description = mdDoc "HBase package"; 142 }; 143 144 rootdir = mkOption { 145 + description = mdDoc '' 146 This option will set "hbase.rootdir" in hbase-site.xml and determine 147 the directory shared by region servers and into which HBase persists. 148 The URL should be 'fully-qualified' to include the filesystem scheme. ··· 156 default = "/hbase"; 157 }; 158 zookeeperQuorum = mkOption { 159 + description = mdDoc '' 160 This option will set "hbase.zookeeper.quorum" in hbase-site.xml. 161 Comma separated list of servers in the ZooKeeper ensemble. 162 ''; ··· 164 example = "zk1.internal,zk2.internal,zk3.internal"; 165 default = null; 166 }; 167 + } // (let 168 + ports = port: infoPort: { 169 + port = mkOption { 170 + type = types.int; 171 + default = port; 172 + description = mdDoc "RPC port"; 173 }; 174 + infoPort = mkOption { 175 + type = types.int; 176 + default = infoPort; 177 + description = mdDoc "web UI port"; 178 }; 179 }; 180 + in mapAttrs hbaseRoleOption { 181 + master.initHDFS = mkEnableOption (mdDoc "initialization of the hbase directory on HDFS"); 182 + regionServer.overrideHosts = mkOption { 183 + type = types.bool; 184 + default = true; 185 + description = mdDoc '' 186 + Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix 187 + Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records 188 + or /etc/hosts entries. 189 ''; 190 }; 191 + thrift = ports 9090 9095; 192 + rest = ports 8080 8085; 193 + }); 194 + }; 195 196 + config = mkMerge ([ 197 198 (mkIf cfg.gatewayRole.enable { 199 ··· 209 isSystemUser = true; 210 }; 211 }) 212 + ] ++ (mapAttrsToList hbaseRoleConfig { 213 + master = [ 16000 16010 ]; 214 + regionServer = [ 16020 16030 ]; 215 + thrift = with cfg.hbase.thrift; [ port infoPort ]; 216 + rest = with cfg.hbase.rest; [ port infoPort ]; 217 + })); 218 }
+2 -2
nixos/modules/system/boot/binfmt.nix
··· 134 mask = ''\xff\xff\xff\xff''; 135 }; 136 x86_64-windows = { 137 - magicOrExtension = ".exe"; 138 recognitionType = "extension"; 139 }; 140 i686-windows = { 141 - magicOrExtension = ".exe"; 142 recognitionType = "extension"; 143 }; 144 };
··· 134 mask = ''\xff\xff\xff\xff''; 135 }; 136 x86_64-windows = { 137 + magicOrExtension = "exe"; 138 recognitionType = "extension"; 139 }; 140 i686-windows = { 141 + magicOrExtension = "exe"; 142 recognitionType = "extension"; 143 }; 144 };
+3 -4
nixos/modules/virtualisation/ec2-metadata-fetcher.sh
··· 55 echo "getting EC2 instance metadata..." 56 57 get_imds() { 58 - # Intentionally no --fail here, so that we proceed even if e.g. a 59 - # 404 was returned (but we still fail if we can't reach the IMDS 60 - # server). 61 - curl --silent --show-error --header "X-aws-ec2-metadata-token: $IMDS_TOKEN" "$@" 62 } 63 64 get_imds -o "$metaDir/ami-manifest-path" http://169.254.169.254/1.0/meta-data/ami-manifest-path
··· 55 echo "getting EC2 instance metadata..." 56 57 get_imds() { 58 + # --fail to avoid populating missing files with 404 HTML response body 59 + # || true to allow the script to continue even when encountering a 404 60 + curl --silent --show-error --fail --header "X-aws-ec2-metadata-token: $IMDS_TOKEN" "$@" || true 61 } 62 63 get_imds -o "$metaDir/ami-manifest-path" http://169.254.169.254/1.0/meta-data/ami-manifest-path
+25
nixos/tests/hadoop/hbase.nix
··· 53 }; 54 }; 55 }; 56 }; 57 58 testScript = '' ··· 80 assert "1 active master, 0 backup masters, 1 servers" in master.succeed("echo status | HADOOP_USER_NAME=hbase hbase shell -n") 81 regionserver.wait_until_succeeds("echo \"create 't1','f1'\" | HADOOP_USER_NAME=hbase hbase shell -n") 82 assert "NAME => 'f1'" in regionserver.succeed("echo \"describe 't1'\" | HADOOP_USER_NAME=hbase hbase shell -n") 83 ''; 84 })
··· 53 }; 54 }; 55 }; 56 + thrift = { ... }:{ 57 + services.hadoop = { 58 + inherit coreSite; 59 + hbase = { 60 + inherit zookeeperQuorum; 61 + thrift = defOpts; 62 + }; 63 + }; 64 + }; 65 + rest = { ... }:{ 66 + services.hadoop = { 67 + inherit coreSite; 68 + hbase = { 69 + inherit zookeeperQuorum; 70 + rest = defOpts; 71 + }; 72 + }; 73 + }; 74 }; 75 76 testScript = '' ··· 98 assert "1 active master, 0 backup masters, 1 servers" in master.succeed("echo status | HADOOP_USER_NAME=hbase hbase shell -n") 99 regionserver.wait_until_succeeds("echo \"create 't1','f1'\" | HADOOP_USER_NAME=hbase hbase shell -n") 100 assert "NAME => 'f1'" in regionserver.succeed("echo \"describe 't1'\" | HADOOP_USER_NAME=hbase hbase shell -n") 101 + 102 + rest.wait_for_open_port(8080) 103 + assert "${hbase.version}" in regionserver.succeed("curl http://rest:8080/version/cluster") 104 + 105 + thrift.wait_for_open_port(9090) 106 ''; 107 + 108 + meta.maintainers = with maintainers; [ illustris ]; 109 })
+3 -5
nixos/tests/nixops/default.nix
··· 30 virtualisation.additionalPaths = [ 31 pkgs.hello 32 pkgs.figlet 33 - 34 - # This includes build dependencies all the way down. Not efficient, 35 - # but we do need build deps to an *arbitrary* depth, which is hard to 36 - # determine. 37 - (allDrvOutputs nodes.server.config.system.build.toplevel) 38 ]; 39 }; 40 server = { lib, ... }: { 41 imports = [ ./legacy/base-configuration.nix ];
··· 30 virtualisation.additionalPaths = [ 31 pkgs.hello 32 pkgs.figlet 33 ]; 34 + 35 + # TODO: make this efficient, https://github.com/NixOS/nixpkgs/issues/180529 36 + system.includeBuildDependencies = true; 37 }; 38 server = { lib, ... }: { 39 imports = [ ./legacy/base-configuration.nix ];
+65 -2
pkgs/applications/editors/codeblocks/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, pkg-config, file, zip, wxGTK31, gtk3 2 , contribPlugins ? false, hunspell, gamin, boost, wrapGAppsHook 3 }: 4 ··· 13 }; 14 15 nativeBuildInputs = [ pkg-config file zip wrapGAppsHook ]; 16 - buildInputs = [ wxGTK31 gtk3 ] 17 ++ lib.optionals contribPlugins [ hunspell gamin boost ]; 18 enableParallelBuilding = true; 19 patches = [ ··· 48 sha256 = "sha256-RRjwZA37RllnG8cJdBEnASpEd8z0+ru96fjntO42OvU="; 49 }) 50 (fetchpatch { 51 name = "fix-getstring.patch"; 52 url = "https://github.com/arnholm/codeblocks_sfmirror/commit/dbdf5c5ea9e3161233f0588a7616b7e4fedc7870.patch"; 53 sha256 = "sha256-DrEMFluN8vs0LERa7ULGshl7HdejpsuvXAMjIr/K1fQ="; 54 }) 55 ]; 56 preConfigure = "substituteInPlace ./configure --replace /usr/bin/file ${file}/bin/file";
··· 1 + { lib, stdenv, fetchurl, fetchpatch, pkg-config, file, zip, wxGTK32, gtk3 2 , contribPlugins ? false, hunspell, gamin, boost, wrapGAppsHook 3 }: 4 ··· 13 }; 14 15 nativeBuildInputs = [ pkg-config file zip wrapGAppsHook ]; 16 + buildInputs = [ wxGTK32 gtk3 ] 17 ++ lib.optionals contribPlugins [ hunspell gamin boost ]; 18 enableParallelBuilding = true; 19 patches = [ ··· 48 sha256 = "sha256-RRjwZA37RllnG8cJdBEnASpEd8z0+ru96fjntO42OvU="; 49 }) 50 (fetchpatch { 51 + name = "fix-taskbar-icons.patch"; 52 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/40eb88e3f2b933f19f9933e06c8d0899c54f5e25.patch"; 53 + hash = "sha256-Gj5gtxX5QNYAeF+QrPS/bBHLLEmflSxUHSLUK3GSs0I="; 54 + }) 55 + (fetchpatch { 56 + name = "fix-warnings.patch"; 57 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/56ac0396fad7a5b4bbb40bb8c4b5fe1755078aef.patch"; 58 + excludes = [ "src/src/environmentsettingsdlg.h" ]; 59 + hash = "sha256-tl4rF9iAf1TzCIbKhVFqcxvr1IiPdwqLYZg0SY5BJ7I="; 60 + }) 61 + (fetchpatch { 62 name = "fix-getstring.patch"; 63 url = "https://github.com/arnholm/codeblocks_sfmirror/commit/dbdf5c5ea9e3161233f0588a7616b7e4fedc7870.patch"; 64 sha256 = "sha256-DrEMFluN8vs0LERa7ULGshl7HdejpsuvXAMjIr/K1fQ="; 65 + }) 66 + # Fix build with wxGTK 3.1.6 67 + (fetchpatch { 68 + name = "remove-code-for-old-wx-1.patch"; 69 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/8035dfdff321754819f79e3165401aa59bd8c7f7.patch"; 70 + hash = "sha256-Z8Ap03W/XH5VwKFVudJr7rugb0BgI2dKJgQS4yIWbEM="; 71 + }) 72 + (fetchpatch { 73 + name = "remove-code-for-old-wx-2.patch"; 74 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/9a9c6a9d5e3e0f6eff5594ecd61a2222f073be9c.patch"; 75 + hash = "sha256-SwYixvbRuXQ+jA1ijmClWkzqzzr0viVuFOAsihGc5dM="; 76 + }) 77 + (fetchpatch { 78 + name = "remove-code-for-old-wx-3.patch"; 79 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/c28746f4887f10e6f9f10eeafae0fb22ecdbf9c7.patch"; 80 + hash = "sha256-1lcIiCnY2nBuUsffXC2rdglOE3ccIbogcgTx4M2Ee2I="; 81 + }) 82 + (fetchpatch { 83 + name = "fix-notebookstyles.patch"; 84 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/29315df024251850832583f73e67e515dae10830.patch"; 85 + hash = "sha256-Uc1V0eEbNljnN+1Dqb/35MLSSoLjyuRZMTofgcXRyb8="; 86 + }) 87 + (fetchpatch { 88 + name = "fix-regex.patch"; 89 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/46720043319758cb0e798eb23520063583c40eaa.patch"; 90 + hash = "sha256-Aix58T0JJcX/7VZukU/9i/nXh9GJywXC3yXEyUZK0js="; 91 + }) 92 + (fetchpatch { 93 + name = "fix-build-with-clang.patch"; 94 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/92cb2239662952e3b59b31e03edd653bb8066e64.patch"; 95 + hash = "sha256-XI7JW9Nuueb7muKpaC2icM/CxhrCJtO48cLHK+BVWXI="; 96 + }) 97 + (fetchpatch { 98 + name = "fix-normalize.patch"; 99 + url = "https://github.com/archlinux/svntogit-community/raw/458eacb60bc0e71e3d333943cebbc41e75ed0956/trunk/sc_wxtypes-normalize.patch"; 100 + hash = "sha256-7wEwDLwuNUWHUwHjFyq74sHiuEha1VexRLEX42rPZSs="; 101 + }) 102 + # Fix HiDPI 103 + (fetchpatch { 104 + name = "update-about-dialog.patch"; 105 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/a4aacc92640b587ad049cd6aa68c637e536e9ab5.patch"; 106 + hash = "sha256-2S4sVn+Dq5y9xcxCkzQ+WeR+qWxAOLbQUZEnk060RI0="; 107 + }) 108 + (fetchpatch { 109 + name = "add-display-info.patch"; 110 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/f2f127cf5cd97c7da6a957a3f7764cb25cc9017e.patch"; 111 + hash = "sha256-C0dVfC0NIHMXfWNlOwjzoGz5tmG2dlnU/EE92Jjebbs="; 112 + }) 113 + (fetchpatch { 114 + name = "fix-hidpi.patch"; 115 + url = "https://github.com/arnholm/codeblocks_sfmirror/commit/b2e4f1279804e1d11b71bc75eeb37072c3589296.patch"; 116 + hash = "sha256-/Xp6ww9C3V6I67tTA4MrGpSGo3J0MXzFjzQU7RxY84U="; 117 }) 118 ]; 119 preConfigure = "substituteInPlace ./configure --replace /usr/bin/file ${file}/bin/file";
+13 -6
pkgs/applications/emulators/retroarch/cores.nix
··· 49 mkLibretroCore = 50 { core 51 , src ? (getCoreSrc core) 52 - , version ? "unstable-2022-12-20" 53 , ... 54 }@args: 55 import ./mkLibretroCore.nix ({ ··· 400 core = "flycast"; 401 extraBuildInputs = [ libGL libGLU ]; 402 makefile = "Makefile"; 403 - makeFlags = lib.optionals stdenv.hostPlatform.isAarch64 [ "platform=arm64" ]; 404 - patches = [ ./fix-flycast-makefile.patch ]; 405 meta = { 406 description = "Flycast libretro port"; 407 license = lib.licenses.gpl2Only; ··· 734 735 picodrive = mkLibretroCore { 736 core = "picodrive"; 737 - version = "unstable-2023-02-15"; 738 dontConfigure = true; 739 - makeFlags = lib.optionals stdenv.hostPlatform.isAarch64 [ "platform=aarch64" ]; 740 meta = { 741 description = "Fast MegaDrive/MegaCD/32X emulator"; 742 license = "MAME"; ··· 822 }; 823 }; 824 825 - scummvm = mkLibretroCore { 826 core = "scummvm"; 827 extraBuildInputs = [ fluidsynth libjpeg libvorbis libGLU libGL ]; 828 makefile = "Makefile"; 829 preConfigure = "cd backends/platform/libretro/build";
··· 49 mkLibretroCore = 50 { core 51 , src ? (getCoreSrc core) 52 + , version ? "unstable-2023-03-13" 53 , ... 54 }@args: 55 import ./mkLibretroCore.nix ({ ··· 400 core = "flycast"; 401 extraBuildInputs = [ libGL libGLU ]; 402 makefile = "Makefile"; 403 meta = { 404 description = "Flycast libretro port"; 405 license = lib.licenses.gpl2Only; ··· 732 733 picodrive = mkLibretroCore { 734 core = "picodrive"; 735 dontConfigure = true; 736 meta = { 737 description = "Fast MegaDrive/MegaCD/32X emulator"; 738 license = "MAME"; ··· 818 }; 819 }; 820 821 + scummvm = mkLibretroCore rec { 822 core = "scummvm"; 823 + version = "unstable-2022-04-06"; 824 + # Commit below introduces libretro platform, that uses libretro-{deps,common} as 825 + # submodules. We will probably need to introduce this as separate derivations, 826 + # but for now let's just use the last known version that does not use it. 827 + # https://github.com/libretro/scummvm/commit/36446fa6eb33e67cc798f56ce1a31070260e2ada 828 + src = fetchFromGitHub { 829 + owner = "libretro"; 830 + repo = core; 831 + rev = "2fb2e4c551c9c1510c56f6e890ee0300b7b3fca3"; 832 + hash = "sha256-wrlFqu+ONbYH4xMFDByOgySobGrkhVc7kYWI4JzA4ew="; 833 + }; 834 extraBuildInputs = [ fluidsynth libjpeg libvorbis libGLU libGL ]; 835 makefile = "Makefile"; 836 preConfigure = "cd backends/platform/libretro/build";
+2 -11
pkgs/applications/emulators/retroarch/default.nix
··· 52 in 53 stdenv.mkDerivation rec { 54 pname = "retroarch-bare"; 55 - version = "1.14.0"; 56 57 src = fetchFromGitHub { 58 owner = "libretro"; 59 repo = "RetroArch"; 60 - hash = "sha256-oEENGehbzjJq1kTiz6gkXHMMe/rXjWPxxMoe4RqdqK4="; 61 rev = "v${version}"; 62 }; 63 64 patches = [ 65 ./use-default-values-for-libretro_info_path-assets_directory.patch 66 - # TODO: remove those two patches in the next RetroArch release 67 - (fetchpatch { 68 - url = "https://github.com/libretro/RetroArch/commit/894c44c5ea7f1eada9207be3c29e8d5c0a7a9e1f.patch"; 69 - hash = "sha256-ThB6jd9pmsipT8zjehz7znK/s0ofHHCJeEYBKur6sO8="; 70 - }) 71 - (fetchpatch { 72 - url = "https://github.com/libretro/RetroArch/commit/c5bfd52159cf97312bb28fc42203c39418d1bbbd.patch"; 73 - hash = "sha256-rb1maAvCSUgq2VtJ67iqUY+Fz00Fchl8YGG0EPm0+F0="; 74 - }) 75 ]; 76 77 nativeBuildInputs = [ pkg-config wrapQtAppsHook ] ++
··· 52 in 53 stdenv.mkDerivation rec { 54 pname = "retroarch-bare"; 55 + version = "1.15.0"; 56 57 src = fetchFromGitHub { 58 owner = "libretro"; 59 repo = "RetroArch"; 60 + hash = "sha256-kJOR3p3fKqGM8a5rgDPkz43uuf5AtS5fVnvr3tJgWbc="; 61 rev = "v${version}"; 62 }; 63 64 patches = [ 65 ./use-default-values-for-libretro_info_path-assets_directory.patch 66 ]; 67 68 nativeBuildInputs = [ pkg-config wrapQtAppsHook ] ++
-12
pkgs/applications/emulators/retroarch/fix-flycast-makefile.patch
··· 1 - diff --git a/Makefile b/Makefile 2 - index 01d99c30..8c2dd248 100644 3 - --- a/Makefile 4 - +++ b/Makefile 5 - @@ -440,7 +440,6 @@ else ifeq ($(platform), arm64) 6 - CPUFLAGS += -DTARGET_LINUX_ARMv8 -frename-registers 7 - CFLAGS += $(CPUFLAGS) 8 - CXXFLAGS += $(CPUFLAGS) 9 - - ASFLAGS += $(CFLAGS) -c -frename-registers -fno-strict-aliasing -ffast-math -ftree-vectorize 10 - PLATFORM_EXT := unix 11 - WITH_DYNAREC=arm64 12 - HAVE_GENERIC_JIT = 0
···
+93 -93
pkgs/applications/emulators/retroarch/hashes.json
··· 14 "beetle-lynx": { 15 "owner": "libretro", 16 "repo": "beetle-lynx-libretro", 17 - "rev": "9c48124dc15604b3eb6892e3616dfb77992a6fd6", 18 - "sha256": "ZXFU4QmjVQVU5bE5TVmGm4gepZpuoS8+p60l+Ha4I9s=" 19 }, 20 "beetle-ngp": { 21 "owner": "libretro", 22 "repo": "beetle-ngp-libretro", 23 - "rev": "00c7cb8ea97ad9a372307405d8abf34e401fec8a", 24 - "sha256": "MtZMPjgT4dQy+E+4jSDE08PRi0pwa+q48kmTHhfIQMY=" 25 }, 26 "beetle-pce-fast": { 27 "owner": "libretro", 28 "repo": "beetle-pce-fast-libretro", 29 - "rev": "d4fa4480f17f067c3aba25380717a5aee059f026", 30 - "sha256": "t7OJuqEWec3GvNq9dsmrRhgz+GybBzt1ZO6FwZ9L5yE=" 31 }, 32 "beetle-pcfx": { 33 "owner": "libretro", 34 "repo": "beetle-pcfx-libretro", 35 - "rev": "af16dfd8353ed6cf76ef381b98a6a9abf59051ec", 36 - "sha256": "snAA5PCU2NRsCiQtBRYEzczPSGG9OT2jDTrGaPZqhic=" 37 }, 38 "beetle-psx": { 39 "owner": "libretro", 40 "repo": "beetle-psx-libretro", 41 - "rev": "3827fb4bd0d36f0db7b59e0c220524c7daaf0430", 42 - "sha256": "CGNzb6XDPsp+EitkgyvDha9DoZSy+e9JWye0nmCiOns=" 43 }, 44 "beetle-saturn": { 45 "owner": "libretro", 46 "repo": "beetle-saturn-libretro", 47 - "rev": "19ce186783174b93b90845c3f0e1fa1694904912", 48 - "sha256": "mEuv9lrDi/q2ASV9hxYptievupcv4PfUWPYlDcNzXQg=" 49 }, 50 "beetle-snes": { 51 "owner": "libretro", ··· 62 "beetle-supergrafx": { 63 "owner": "libretro", 64 "repo": "beetle-supergrafx-libretro", 65 - "rev": "787772dff157c8fe54b2e16bb770f2c344c8932b", 66 - "sha256": "i4SnjIqA0U88FnaT7fz5fqMyp8FyfNvxxhflOaAv1mA=" 67 }, 68 "beetle-vb": { 69 "owner": "libretro", 70 "repo": "beetle-vb-libretro", 71 - "rev": "3e845666d7ce235a071eb306e94074f1a72633bf", 72 - "sha256": "ukKzG+O2o6EAF0l7cmMQOkemJ1oweIpRH5rle1gqaFk=" 73 }, 74 "beetle-wswan": { 75 "owner": "libretro", 76 "repo": "beetle-wswan-libretro", 77 - "rev": "cccee4217e53e164fd70196e56dfb24b967e5fd8", 78 - "sha256": "RpGYQwDWkfYY0qnrTuAMzVuOSfTX5AZph7FD8ijUggc=" 79 }, 80 "blastem": { 81 "owner": "libretro", ··· 92 "bsnes": { 93 "owner": "libretro", 94 "repo": "bsnes-libretro", 95 - "rev": "dabf6679024124b2f819c79f279dbb85a5263255", 96 - "sha256": "iv8gxC48i8JMzby3vR4eYDViqCwSf8JGlPekQE6AF4c=" 97 }, 98 "bsnes-hd": { 99 "owner": "DerKoun", ··· 110 "citra": { 111 "owner": "libretro", 112 "repo": "citra", 113 - "rev": "f0b09a5c0cb3767d43f5f8ca12a783012298fd44", 114 - "sha256": "v86R5TLmNNMhuTMCwU3mAAtLK5H0sP//soh4x+cFgTQ=", 115 "fetchSubmodules": true 116 }, 117 "desmume": { ··· 153 "fbneo": { 154 "owner": "libretro", 155 "repo": "fbneo", 156 - "rev": "ef17049274a21239e5f21198b026dacbb38d7b90", 157 - "sha256": "2N7c5L9grp+Rkhj25SoB9K9rVHq4H9IzU2KSeb1O7/E=" 158 }, 159 "fceumm": { 160 "owner": "libretro", 161 "repo": "libretro-fceumm", 162 - "rev": "8c3f690e61a1d65dfb25510426ae88eeae93e1ae", 163 - "sha256": "vzPrAEII8SWj3Ki2OaZb0/9gbQDz04rp2dXf2LE1sXg=" 164 }, 165 "flycast": { 166 "owner": "libretro", ··· 183 "gambatte": { 184 "owner": "libretro", 185 "repo": "gambatte-libretro", 186 - "rev": "7e02df60048db0898131ea365f387a026e4e648d", 187 - "sha256": "RnFuD8PL+/uPhWe+sSXMPm5+XH8FzCwY+MSquR/AB+o=" 188 }, 189 "genesis-plus-gx": { 190 "owner": "libretro", 191 "repo": "Genesis-Plus-GX", 192 - "rev": "74a2f6521aea975a51f99497b57c5db500d61ed9", 193 - "sha256": "qTNbFXg5QFKSzMOWhDdDfc0FinF/D7n2OruG5zv+ANY=" 194 }, 195 "gpsp": { 196 "owner": "libretro", 197 "repo": "gpsp", 198 - "rev": "81649a2c8075201bb823cce8fdf16a31c92a3b6c", 199 - "sha256": "De9Tke+fp6CtXzm0w6Qzts3jj1j/1uB0kYZfaWyNqA0=" 200 }, 201 "gw": { 202 "owner": "libretro", ··· 207 "handy": { 208 "owner": "libretro", 209 "repo": "libretro-handy", 210 - "rev": "517bb2d02909271836604c01c8f09a79ad605297", 211 - "sha256": "Igf/OvmnCzoWjCZBoep7T0pXsoBKq3NJpXlYhE7nr3s=" 212 }, 213 "hatari": { 214 "owner": "libretro", ··· 219 "mame": { 220 "owner": "libretro", 221 "repo": "mame", 222 - "rev": "85581d60bb24fea14542b154aef2c7b624f5b60f", 223 - "sha256": "AUqJAXJCvddv9vPqXt5EZncKNdeLaXoc6xhYWqOMebY=" 224 }, 225 "mame2000": { 226 "owner": "libretro", ··· 237 "mame2003-plus": { 238 "owner": "libretro", 239 "repo": "mame2003-plus-libretro", 240 - "rev": "3249de7ceaaa92ee18e93cbd8c2ace9f1ee34c08", 241 - "sha256": "mBF1j4em4e/fKEmPA8MmAZrXXYQiqFfAloOHdMbVq+k=" 242 }, 243 "mame2010": { 244 "owner": "libretro", ··· 267 "mesen": { 268 "owner": "libretro", 269 "repo": "mesen", 270 - "rev": "c89474c9d87df967d21b7b7d5971dc9475fec028", 271 "sha256": "cnPNBWXbnCpjgW/wJIboiRBzv3zrHWxpNM1kg09ShLU=" 272 }, 273 "mesen-s": { ··· 285 "mgba": { 286 "owner": "libretro", 287 "repo": "mgba", 288 - "rev": "ec5ecb26deba8d7ac830fc66ade9fac0eeaeb4ae", 289 - "sha256": "kDDs+M7TPu6UhFnj9+XGI9whQFQ5/+7fSb0YUN7oMsg=" 290 }, 291 "mupen64plus": { 292 "owner": "libretro", 293 "repo": "mupen64plus-libretro-nx", 294 - "rev": "bc241538b9ef85d8b22c392d7699dc73f460e283", 295 - "sha256": "eCosI2yL1HJpHWvZLYZQe6+1rmmyHLFYCY7bX+3hPec=" 296 }, 297 "neocd": { 298 "owner": "libretro", 299 "repo": "neocd_libretro", 300 - "rev": "53f5453311a1ac43700fedb2317c810586f9ccf5", 301 - "sha256": "BZBpojShHk+j5wz/d7FnykpX562TgH6PAqTUigE+zUU=" 302 }, 303 "nestopia": { 304 "owner": "libretro", 305 "repo": "nestopia", 306 - "rev": "d30c55052292826836f6dbaa2adc46fdf1a2d93c", 307 - "sha256": "R2Kbtr2EqNUyx5eGBYyyw/ugSxVRM70TP/IsIsU0EZM=" 308 }, 309 "np2kai": { 310 "owner": "AZO234", 311 "repo": "NP2kai", 312 - "rev": "606fafa7081b62df5f4727c34560da23927c21cd", 313 - "sha256": "qS7OrY8bFkAmRgbzLCw9PqgxtKuVNKI+tsDVU7PqWIw=", 314 "fetchSubmodules": true 315 }, 316 "nxengine": { 317 "owner": "libretro", 318 "repo": "nxengine-libretro", 319 - "rev": "e271c6262d73f07e5d92d285503f1c049801c51a", 320 - "sha256": "PfzHV6/nGUdbnfZ8+aHuoIQhvKcxdbuKnjIMWIIFt7Q=" 321 }, 322 "o2em": { 323 "owner": "libretro", 324 "repo": "libretro-o2em", 325 - "rev": "3303cc15e4323280084471f694f6d34c78199725", 326 - "sha256": "xH8Dlsg84q8awxjObMPXKZcJSwmix1YdRXIpee7rw6o=" 327 }, 328 "opera": { 329 "owner": "libretro", ··· 340 "pcsx2": { 341 "owner": "libretro", 342 "repo": "pcsx2", 343 - "rev": "d2e37b80cfe6f6eecfe0356c7537d8e98bee7a8d", 344 - "sha256": "rHXJG2wGoyNGvxxeZVF/I1CpaSBPUwZNERJtkG/z7MU=" 345 }, 346 "pcsx_rearmed": { 347 "owner": "libretro", 348 "repo": "pcsx_rearmed", 349 - "rev": "aced3eb3fcaa0fe13c44c4dd196cdab42555fd98", 350 - "sha256": "RzcrSADagi3AIPINQxc36BfMjWjatP/JL6HY744XnZk=" 351 }, 352 "picodrive": { 353 "owner": "libretro", 354 "repo": "picodrive", 355 - "rev": "b2d43acfbc288038749d8a8fdfbcb0474568e043", 356 - "sha256": "kDSQgF8G/IpZ9NkSwuOjFSkirkum7foRT01qIbNJmJI=", 357 "fetchSubmodules": true 358 }, 359 "play": { 360 "owner": "jpd002", 361 "repo": "Play-", 362 - "rev": "0483fc43da01b5b29883acb2cf1d02d33bba1e30", 363 - "sha256": "OxBQFTQP0L8k0lH88Ey6KWybW912Ehsv7XjWrvFivxo=", 364 "fetchSubmodules": true 365 }, 366 "ppsspp": { 367 "owner": "hrydgard", 368 "repo": "ppsspp", 369 - "rev": "1fa2f7a97191d2a73f243bfc464edef69b26f652", 370 - "sha256": "BDX2eHtFbsloC9XYORHwpix8tbRSQUbcoP7DKFIohW4=", 371 "fetchSubmodules": true 372 }, 373 "prboom": { 374 "owner": "libretro", 375 "repo": "libretro-prboom", 376 - "rev": "4e671fa0a4b7b892e17ac4e1803c9d627653a4c1", 377 - "sha256": "d2/cpfhNczZkHzMGQIxO9jw65AMs9Jmh4ItiLLdDYsk=" 378 }, 379 "prosystem": { 380 "owner": "libretro", 381 "repo": "prosystem-libretro", 382 - "rev": "cf544d3c8e40ff197ea5bb177a1269db31077803", 383 - "sha256": "A7yQwzM8ewI+UCPQVyO7DNyiQCTw2yG1soi6l7T3pDE=" 384 }, 385 "puae": { 386 "owner": "libretro", 387 "repo": "libretro-uae", 388 - "rev": "af9e35383c00980aabb38c929e679704b624dee0", 389 - "sha256": "hp4XOQUKktmUfLtRfVv1Oe1vqHUYu+vagxSSef55APs=" 390 }, 391 "quicknes": { 392 "owner": "libretro", 393 "repo": "QuickNES_Core", 394 - "rev": "1b88a09f1c386ff9ee46bb371583ae04c5cb5dd0", 395 - "sha256": "Q7DDufGTdP+R05ND56PxMNR96ZacJFxPi0ETieV2B58=" 396 }, 397 "sameboy": { 398 "owner": "libretro", ··· 403 "scummvm": { 404 "owner": "libretro", 405 "repo": "scummvm", 406 - "rev": "2fb2e4c551c9c1510c56f6e890ee0300b7b3fca3", 407 - "sha256": "wrlFqu+ONbYH4xMFDByOgySobGrkhVc7kYWI4JzA4ew=" 408 }, 409 "smsplus-gx": { 410 "owner": "libretro", ··· 415 "snes9x": { 416 "owner": "snes9xgit", 417 "repo": "snes9x", 418 - "rev": "3c4982edddfdba482204ed48cf0b1d41ccae5493", 419 - "sha256": "d4luyBSU/4PdsDd2jLwWSyckBPAqXMJ3C1sNmLO+E6U=" 420 }, 421 "snes9x2002": { 422 "owner": "libretro", ··· 433 "snes9x2010": { 434 "owner": "libretro", 435 "repo": "snes9x2010", 436 - "rev": "e86e54624a7910a64a9a744e3734d4067c48d240", 437 - "sha256": "U1eeXuhYssAOgiNOZ7fr/8rkPScts3GmWgK6ki39PVA=" 438 }, 439 "stella": { 440 "owner": "stella-emu", 441 "repo": "stella", 442 - "rev": "82da36dd685c68b09047d7c835175879edb68653", 443 - "sha256": "y7AOSY2VUe4Jv+wteplvA1ul5iXHoeYQhgycD+nfIuc=" 444 }, 445 "stella2014": { 446 "owner": "libretro", 447 "repo": "stella2014-libretro", 448 - "rev": "1351a4fe2ca6b1f3a66c7db0df2ec268ab002d41", 449 - "sha256": "/sVDOfP5CE8k808lhmH3tT47oZ1ka3pgDG5LglfPmHc=" 450 }, 451 "swanstation": { 452 "owner": "libretro", 453 "repo": "swanstation", 454 - "rev": "f2e335bfd4751410dfb24d933f762b9a4fd7fdeb", 455 - "sha256": "l3A1Xb6YD+OOTZEF6whst1Kr8fSRnXuIVIUN1BCa2Bw=" 456 }, 457 "tgbdual": { 458 "owner": "libretro", ··· 463 "thepowdertoy": { 464 "owner": "libretro", 465 "repo": "ThePowderToy", 466 - "rev": "ac620c0a89a18774c3ad176a8a1bc596df23ff57", 467 - "sha256": "C/X1DbmnucRddemEYml2zN3qr5yoXY3b+nvqfpboS0M=" 468 }, 469 "tic80": { 470 "owner": "libretro", ··· 476 "vba-m": { 477 "owner": "libretro", 478 "repo": "vbam-libretro", 479 - "rev": "7e30b038893de63e674944f75581d57c7685ea3a", 480 - "sha256": "CmmiKiy0mFqAiagUHFV5wRSZ0MkzADrHRAG+h82dWAQ=" 481 }, 482 "vba-next": { 483 "owner": "libretro", 484 "repo": "vba-next", 485 - "rev": "4191e09e2b0fcf175a15348c1fa8a12bbc6320dd", 486 - "sha256": "IG2oH4F17tlSv1cXYZobggb37tFNE53JOHzan/X0+ws=" 487 }, 488 "vecx": { 489 "owner": "libretro", 490 "repo": "libretro-vecx", 491 - "rev": "b5c17bb7fd4a704f58160bc699322a16d0643396", 492 - "sha256": "nICXrVyoMWs2yDcewHd7z6rBt+haY/Dqf5lvF6RLnyg=" 493 }, 494 "virtualjaguar": { 495 "owner": "libretro", ··· 500 "yabause": { 501 "owner": "libretro", 502 "repo": "yabause", 503 - "rev": "c7e02721eddb3de0ec7ae0d61e9e3afa5f586a62", 504 - "sha256": "Y2YsPpgBA021pRDOFqH29zsRSbFIpRo5fq+tkknJbSA=" 505 } 506 }
··· 14 "beetle-lynx": { 15 "owner": "libretro", 16 "repo": "beetle-lynx-libretro", 17 + "rev": "3ca44fda26f27418c92ada1b0f38b948af2151ae", 18 + "sha256": "f0A8gA3UT40UDaAkWQcPoDd6vAcM37tNtZ2hCOIyBJA=" 19 }, 20 "beetle-ngp": { 21 "owner": "libretro", 22 "repo": "beetle-ngp-libretro", 23 + "rev": "65460e3a9ad529f6901caf669abbda11f437ab55", 24 + "sha256": "+xfD1ZMKtbv5Lp12+5RM7Vl3eEF38kykKW8wj/2EN5w=" 25 }, 26 "beetle-pce-fast": { 27 "owner": "libretro", 28 "repo": "beetle-pce-fast-libretro", 29 + "rev": "e480f6388375f59fd3e7aeef8ef8531c20e5c73e", 30 + "sha256": "uURt6rB0IngWzEpl0DjbckdaTIjNwVCm3auvy7AwUdA=" 31 }, 32 "beetle-pcfx": { 33 "owner": "libretro", 34 "repo": "beetle-pcfx-libretro", 35 + "rev": "724bd21b4524f8cf376dbc29c3e5a12cb674c758", 36 + "sha256": "xeIVZ8FWGbETWYRIBNs3Yum7FDit5fb77hhH+RU45BY=" 37 }, 38 "beetle-psx": { 39 "owner": "libretro", 40 "repo": "beetle-psx-libretro", 41 + "rev": "fd812d4cf8f65644faef1ea8597f826ddc37c0a0", 42 + "sha256": "yvMgnY2dGUk8TvvfDklN3f6b1ol7vDu6AJcYzdwy9pI=" 43 }, 44 "beetle-saturn": { 45 "owner": "libretro", 46 "repo": "beetle-saturn-libretro", 47 + "rev": "9bd31a4a42d06ca0f6d30ee38a569e57c150c414", 48 + "sha256": "RHvH9Jp6c4cgEMTo+p+dU7qgJqjPbRqJLURadjAysrM=" 49 }, 50 "beetle-snes": { 51 "owner": "libretro", ··· 62 "beetle-supergrafx": { 63 "owner": "libretro", 64 "repo": "beetle-supergrafx-libretro", 65 + "rev": "1ff2daa9377114d5394142f75f1c388b706567ed", 66 + "sha256": "0FCm9kURtUQpyPb8cSmRAxttnUJnhE3EWV8DPvlj8HE=" 67 }, 68 "beetle-vb": { 69 "owner": "libretro", 70 "repo": "beetle-vb-libretro", 71 + "rev": "dd6393f76ff781df0f4e8c953f5b053b1e61b313", 72 + "sha256": "C8OtTNdC7GNFsY2EH56in35IX8d6ou/1R04kMvM9674=" 73 }, 74 "beetle-wswan": { 75 "owner": "libretro", 76 "repo": "beetle-wswan-libretro", 77 + "rev": "81e8b2afd31b7f0f939a3df6d70c8723bcc8a701", 78 + "sha256": "xmDtMC5pId5X4vf9kHO55HmRpp/4ZruOM8QJSl//9R8=" 79 }, 80 "blastem": { 81 "owner": "libretro", ··· 92 "bsnes": { 93 "owner": "libretro", 94 "repo": "bsnes-libretro", 95 + "rev": "4da970a334ba4644cef72e560985ea3f31fa40f7", 96 + "sha256": "Bu5j1wrMNVMmxQULZwTdXyWi2i6F5C6m8wFDxvtjYdI=" 97 }, 98 "bsnes-hd": { 99 "owner": "DerKoun", ··· 110 "citra": { 111 "owner": "libretro", 112 "repo": "citra", 113 + "rev": "d7e1612c17b1acb5d5eb68bb046820db49aeea5e", 114 + "sha256": "u2XwAudFgI7j/k6Bq5fk874aI6KpZawlBoIs2+M+eZY=", 115 "fetchSubmodules": true 116 }, 117 "desmume": { ··· 153 "fbneo": { 154 "owner": "libretro", 155 "repo": "fbneo", 156 + "rev": "ffcd114b8ea3f3387b66997263ea5df358675aa5", 157 + "sha256": "a4hXRluHQY5hC5jFU2mlqUAI5GmQk6Rbl1HNRA929CI=" 158 }, 159 "fceumm": { 160 "owner": "libretro", 161 "repo": "libretro-fceumm", 162 + "rev": "1fa798b220a6df8417dcf7da0ab117533385d9c2", 163 + "sha256": "B1iHZ7BVaM/GBgdD2jNZIEmXcRqKC6YaO9z1ByocMtE=" 164 }, 165 "flycast": { 166 "owner": "libretro", ··· 183 "gambatte": { 184 "owner": "libretro", 185 "repo": "gambatte-libretro", 186 + "rev": "ea563fac40e281b29d37f6b56657abef8f1aaf0d", 187 + "sha256": "2jVbEsGkvdH1lA2//mb2Rm3xeh4EyFUcOUXdydSisvk=" 188 }, 189 "genesis-plus-gx": { 190 "owner": "libretro", 191 "repo": "Genesis-Plus-GX", 192 + "rev": "f6a9bd72a56a11c2068be2d15fa52dda3e1e8027", 193 + "sha256": "4siJGPRMpXHfP6mBPoDJArNaISTNjPKT69cvtGldadI=" 194 }, 195 "gpsp": { 196 "owner": "libretro", 197 "repo": "gpsp", 198 + "rev": "541adc9e1c6c9328c07058659594d6300ae0fa19", 199 + "sha256": "2iv/gMOgTZReDgVzEc3WyOdAlYgfANK08CtpZIyPxgA=" 200 }, 201 "gw": { 202 "owner": "libretro", ··· 207 "handy": { 208 "owner": "libretro", 209 "repo": "libretro-handy", 210 + "rev": "63db085af671bad2929078c55434623b7d4632a1", 211 + "sha256": "N6M3KSU4NPJCqoG/UMrna9/6H5PsBBMUQLrvqiIdxpE=" 212 }, 213 "hatari": { 214 "owner": "libretro", ··· 219 "mame": { 220 "owner": "libretro", 221 "repo": "mame", 222 + "rev": "f7761a9902d59030882c58d4482446196e748c50", 223 + "sha256": "g37WAMt9iBbAYq4DfeTlHWmdW5/Vl7g90v6vCLmMQ3g=" 224 }, 225 "mame2000": { 226 "owner": "libretro", ··· 237 "mame2003-plus": { 238 "owner": "libretro", 239 "repo": "mame2003-plus-libretro", 240 + "rev": "0b9309d9d86aea2457df74709e997bea37899475", 241 + "sha256": "US0nkEH4EeKRejuN8UoDeLt5dhafuo7PEVx0FnpeUG0=" 242 }, 243 "mame2010": { 244 "owner": "libretro", ··· 267 "mesen": { 268 "owner": "libretro", 269 "repo": "mesen", 270 + "rev": "caa4e6f14373c40bd2805c600d1b476e7616444a", 271 "sha256": "cnPNBWXbnCpjgW/wJIboiRBzv3zrHWxpNM1kg09ShLU=" 272 }, 273 "mesen-s": { ··· 285 "mgba": { 286 "owner": "libretro", 287 "repo": "mgba", 288 + "rev": "a69c3434afe8b26cb8f9463077794edfa7d5efad", 289 + "sha256": "rmitsZzRWJ0VYzcNz/UtIK8OscQ4lkyuAwgfXOvSTzg=" 290 }, 291 "mupen64plus": { 292 "owner": "libretro", 293 "repo": "mupen64plus-libretro-nx", 294 + "rev": "5a63aadedc29655254d8fc7b4da3a325472e198b", 295 + "sha256": "QNa8WGJFShO4vc4idUntCUaLik4xQXBA+X7z5sjZ2NE=" 296 }, 297 "neocd": { 298 "owner": "libretro", 299 "repo": "neocd_libretro", 300 + "rev": "2070f5258c9d3feee15962f9db8c8ef20072ece8", 301 + "sha256": "X+lS1zW5oTzp7wwurM5xjVqIBwEOCIdj/NX/+33K2qg=" 302 }, 303 "nestopia": { 304 "owner": "libretro", 305 "repo": "nestopia", 306 + "rev": "16b14865caf1effca030630e2fc73d2d4271fc53", 307 + "sha256": "dU9X8sK/qDA/Qj0x1GicmSAzQyRqVmLiTcfCPe8+BjM=" 308 }, 309 "np2kai": { 310 "owner": "AZO234", 311 "repo": "NP2kai", 312 + "rev": "6089943a80a45b6c18d765765f7f31d7a5c0d9c6", 313 + "sha256": "tdF0Qb+smWAVoPmI0dd5s51cnYxMmqM36rQNMiEjU9A=", 314 "fetchSubmodules": true 315 }, 316 "nxengine": { 317 "owner": "libretro", 318 "repo": "nxengine-libretro", 319 + "rev": "1f371e51c7a19049e00f4364cbe9c68ca08b303a", 320 + "sha256": "4XBNTzgN8pLyrK9KsVxTRR1I8CQaZCnVR4gMryYpWW0=" 321 }, 322 "o2em": { 323 "owner": "libretro", 324 "repo": "libretro-o2em", 325 + "rev": "a2a12472fde910b6089ac3ca6de805bd58a9c999", 326 + "sha256": "0cZYw3rrnaR+PfwReRXadLV8RVLblYqlZxJue6OZncg=" 327 }, 328 "opera": { 329 "owner": "libretro", ··· 340 "pcsx2": { 341 "owner": "libretro", 342 "repo": "pcsx2", 343 + "rev": "f3c8743d6a42fe429f703b476fecfdb5655a98a9", 344 + "sha256": "0piCNWX7QbZ58KyTlWp4h1qLxXpi1z6ML8sBHMTvCY4=" 345 }, 346 "pcsx_rearmed": { 347 "owner": "libretro", 348 "repo": "pcsx_rearmed", 349 + "rev": "4373e29de72c917dbcd04ec2a5fb685e69d9def3", 350 + "sha256": "727//NqBNEo6RHNQr1RY5cxMrEvfuJczCo+cUJZVv7U=" 351 }, 352 "picodrive": { 353 "owner": "libretro", 354 "repo": "picodrive", 355 + "rev": "7ab066aab84f15388a53433ea273420bcf917e00", 356 + "sha256": "NK9ASiiIkGZmi2YfCqEzZallVfS7nprLRrBk4dlGyAI=", 357 "fetchSubmodules": true 358 }, 359 "play": { 360 "owner": "jpd002", 361 "repo": "Play-", 362 + "rev": "b33834af08a4954f06be215eee80a72e7a378e91", 363 + "sha256": "IxZk+kSdrkDAabbzdFM8QUrjaJUc1DHjSfAtDuwDJkw=", 364 "fetchSubmodules": true 365 }, 366 "ppsspp": { 367 "owner": "hrydgard", 368 "repo": "ppsspp", 369 + "rev": "7df51c3d060a780b7383c5c1380e346ad9304bb4", 370 + "sha256": "GK3W0/yWaID3s0W0v6TcgJ0ZU984YspWMS6+XLyThjM=", 371 "fetchSubmodules": true 372 }, 373 "prboom": { 374 "owner": "libretro", 375 "repo": "libretro-prboom", 376 + "rev": "d9c3975669b4aab5a1397e0174838bcbbc3c1582", 377 + "sha256": "klSJ7QIpNjlfyjhfeEQZ3j8Gnp4agd0qKVp0vr+KHVA=" 378 }, 379 "prosystem": { 380 "owner": "libretro", 381 "repo": "prosystem-libretro", 382 + "rev": "763ad22c7de51c8f06d6be0d49c554ce6a94a29b", 383 + "sha256": "rE/hxP8hl9lLTNx/WympFDByjZs46ekyxLKRV4V8D9E=" 384 }, 385 "puae": { 386 "owner": "libretro", 387 "repo": "libretro-uae", 388 + "rev": "ae58c0f226b654d643b9f2dce58f64657f57cb76", 389 + "sha256": "6oMTwCYGdVhh+R853gOQRzZfa7slDwe6aGVCvdm6NDU=" 390 }, 391 "quicknes": { 392 "owner": "libretro", 393 "repo": "QuickNES_Core", 394 + "rev": "75d501a87ec2074e8d2f7256fb0359513c263c29", 395 + "sha256": "yAHVTgOt8SGyPXihp4YNKKAvxl9VBBAvHyzLW86zSCw=" 396 }, 397 "sameboy": { 398 "owner": "libretro", ··· 403 "scummvm": { 404 "owner": "libretro", 405 "repo": "scummvm", 406 + "rev": "ab2e5d59cd25dfa5943d45c2567e8330d67fad8b", 407 + "sha256": "9IaQR0prbCT70iWA99NMgGAKPobifdWBX17p4zL0fEM=" 408 }, 409 "smsplus-gx": { 410 "owner": "libretro", ··· 415 "snes9x": { 416 "owner": "snes9xgit", 417 "repo": "snes9x", 418 + "rev": "cc0a87711a7a208cabefc9fd1dbb90e31fe51684", 419 + "sha256": "1m6QvYl5Z0WM1XeXCYLvQaXH8A15P3x8ZzwdFeVPeWo=" 420 }, 421 "snes9x2002": { 422 "owner": "libretro", ··· 433 "snes9x2010": { 434 "owner": "libretro", 435 "repo": "snes9x2010", 436 + "rev": "d8b10c4cd7606ed58f9c562864c986bc960faaaf", 437 + "sha256": "7FmteYrAYr+pGNXGg9CBC4NFlijGRf7GdtJfiNjmonU=" 438 }, 439 "stella": { 440 "owner": "stella-emu", 441 "repo": "stella", 442 + "rev": "93ea39d6155f08c21707a85a0b04b33008a7ab15", 443 + "sha256": "9dCBaLxb1CBbngBd3tJ0x5lT+dnzzhK2DO4Gk/S6WW4=" 444 }, 445 "stella2014": { 446 "owner": "libretro", 447 "repo": "stella2014-libretro", 448 + "rev": "8ab051edd4816f33a5631d230d54059eeed52c5f", 449 + "sha256": "wqssB8WXXF2Lu9heII8nWLLOvI38cIfHSMA7OOd6jx0=" 450 }, 451 "swanstation": { 452 "owner": "libretro", 453 "repo": "swanstation", 454 + "rev": "e24f21196cdcd50321475c4366b51af245a6bbe6", 455 + "sha256": "DjAB0Z0yY9IGESeNNkkbdoAO5ItJ/8cZ5ycRofHG978=" 456 }, 457 "tgbdual": { 458 "owner": "libretro", ··· 463 "thepowdertoy": { 464 "owner": "libretro", 465 "repo": "ThePowderToy", 466 + "rev": "f644498193c4c8be689d8a1d2a70e37e4eff4243", 467 + "sha256": "aPUqrrrH2Ia56A3Kx6ClMcZO9nbHGJIcEQ6nFyIMamo=" 468 }, 469 "tic80": { 470 "owner": "libretro", ··· 476 "vba-m": { 477 "owner": "libretro", 478 "repo": "vbam-libretro", 479 + "rev": "640ce45325694d1dc574e90c95c55bc464368d7e", 480 + "sha256": "aiIeleZHt95Y/kigLEbRaCb3KM0ezMB7yzO16FbuBNM=" 481 }, 482 "vba-next": { 483 "owner": "libretro", 484 "repo": "vba-next", 485 + "rev": "0c310082a6345790124e9348861b300bcccbeced", 486 + "sha256": "RQx/WR83EtPcQkx0ft4Y0/5LaKIOST3L/fh4qoPxz78=" 487 }, 488 "vecx": { 489 "owner": "libretro", 490 "repo": "libretro-vecx", 491 + "rev": "8e932c1d585ae9e467186dea9e73ce38fe1490f7", 492 + "sha256": "2Vo30yiP6SfUt3XHCfQTKTKEtCywdRIoUe6d0Or21WM=" 493 }, 494 "virtualjaguar": { 495 "owner": "libretro", ··· 500 "yabause": { 501 "owner": "libretro", 502 "repo": "yabause", 503 + "rev": "4c96b96f7fbe07223627c469ff33376b2a634748", 504 + "sha256": "7hEpGh2EcrlUoRiUNntaMZEQtStglYAY1MeCub5p8f8=" 505 } 506 }
+2 -2
pkgs/applications/emulators/retroarch/libretro-core-info.nix
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "libretro-core-info"; 8 - version = "1.14.0"; 9 10 src = fetchFromGitHub { 11 owner = "libretro"; 12 repo = "libretro-core-info"; 13 - hash = "sha256-3nw8jUxBQJxiKlWS6OjTjwUYWKx3r2E7eHmbj4naWrk="; 14 rev = "v${version}"; 15 }; 16
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "libretro-core-info"; 8 + version = "1.15.0"; 9 10 src = fetchFromGitHub { 11 owner = "libretro"; 12 repo = "libretro-core-info"; 13 + hash = "sha256-WIgcHuZgAOrlg+WyOS4TyzWziNzjyQB2sPDM9fR6kwA="; 14 rev = "v${version}"; 15 }; 16
+1
pkgs/applications/emulators/retroarch/mkLibretroCore.nix
··· 53 "ARCH=${{ 54 armv7l = "arm"; 55 armv6l = "arm"; 56 i686 = "x86"; 57 }.${stdenv.hostPlatform.parsed.cpu.name} or stdenv.hostPlatform.parsed.cpu.name}" 58 ] ++ (args.makeFlags or [ ]);
··· 53 "ARCH=${{ 54 armv7l = "arm"; 55 armv6l = "arm"; 56 + aarch64 = "arm64"; 57 i686 = "x86"; 58 }.${stdenv.hostPlatform.parsed.cpu.name} or stdenv.hostPlatform.parsed.cpu.name}" 59 ] ++ (args.makeFlags or [ ]);
+15 -23
pkgs/applications/networking/browsers/offpunk/default.nix
··· 3 installShellFiles, 4 less, 5 lib, 6 - makeWrapper, 7 offpunk, 8 - python3, 9 - stdenv, 10 testers, 11 timg, 12 xdg-utils, ··· 14 }: 15 16 let 17 - pythonDependencies = with python3.pkgs; [ 18 beautifulsoup4 19 cryptography 20 feedparser ··· 30 xsel 31 ]; 32 in 33 - stdenv.mkDerivation (finalAttrs: { 34 pname = "offpunk"; 35 - version = "1.9"; 36 37 src = fetchFromSourcehut { 38 owner = "~lioploum"; 39 repo = "offpunk"; 40 - rev = "v${finalAttrs.version}"; 41 - sha256 = "sha256-sxX4/7jbNbLwHVfE1lDtjr/luby5zAf6Hy1RcwXZLBA="; 42 }; 43 44 - nativeBuildInputs = [ makeWrapper installShellFiles ]; 45 - buildInputs = otherDependencies ++ pythonDependencies; 46 - 47 - installPhase = '' 48 - runHook preInstall 49 - 50 - install -D ./offpunk.py $out/bin/offpunk 51 52 - wrapProgram $out/bin/offpunk \ 53 - --set PYTHONPATH "$PYTHONPATH" \ 54 - --set PATH ${lib.makeBinPath otherDependencies} 55 - 56 - installManPage man/*.1 57 - runHook postInstall 58 ''; 59 60 passthru.tests.version = testers.testVersion { package = offpunk; }; 61 62 meta = with lib; { 63 description = "An Offline-First browser for the smolnet "; 64 - homepage = finalAttrs.src.meta.homepage; 65 maintainers = with maintainers; [ DamienCassou ]; 66 platforms = platforms.linux; 67 license = licenses.bsd2; 68 }; 69 - })
··· 3 installShellFiles, 4 less, 5 lib, 6 offpunk, 7 + python3Packages, 8 testers, 9 timg, 10 xdg-utils, ··· 12 }: 13 14 let 15 + pythonDependencies = with python3Packages; [ 16 beautifulsoup4 17 cryptography 18 feedparser ··· 28 xsel 29 ]; 30 in 31 + python3Packages.buildPythonPackage rec { 32 pname = "offpunk"; 33 + version = "1.9.2"; 34 + format = "flit"; 35 + 36 + disabled = python3Packages.pythonOlder "3.7"; 37 38 src = fetchFromSourcehut { 39 owner = "~lioploum"; 40 repo = "offpunk"; 41 + rev = "v${version}"; 42 + sha256 = "sha256-CYsuoj5/BaaboDRtcOrGzJoZDCfOLs7ROVWLVjOAnRU="; 43 }; 44 45 + nativeBuildInputs = [ installShellFiles ]; 46 + propagatedBuildInputs = otherDependencies ++ pythonDependencies; 47 48 + postInstall = '' 49 + installManPage man/*.1 50 ''; 51 52 passthru.tests.version = testers.testVersion { package = offpunk; }; 53 54 meta = with lib; { 55 description = "An Offline-First browser for the smolnet "; 56 + homepage = src.meta.homepage; 57 maintainers = with maintainers; [ DamienCassou ]; 58 platforms = platforms.linux; 59 license = licenses.bsd2; 60 }; 61 + }
+8 -4
pkgs/applications/office/libreoffice/wrapper.nix
··· 89 } ('' 90 mkdir -p "$out/bin" 91 mkdir -p "$out/share" 92 93 - ln -s ${unwrapped}/share/icons $out/share/icons 94 - ln -s ${unwrapped}/share/templates $out/share/templates 95 ln -s ${unwrapped}/lib $out/lib 96 - 97 - cp -r ${unwrapped}/share/applications/ $out/share/ 98 for f in $out/share/applications/*.desktop; do 99 substituteInPlace "$f" \ 100 --replace "Exec=libreoffice${major}.${minor}" "Exec=soffice"
··· 89 } ('' 90 mkdir -p "$out/bin" 91 mkdir -p "$out/share" 92 + for dir in ${unwrapped}/share/*; do 93 + dirname="''${dir##*/}" 94 + if [[ $dirname == "applications" ]]; then 95 + cp -r $dir/ $out/share/ 96 + else 97 + ln -s $dir $out/share/ 98 + fi 99 + done 100 101 ln -s ${unwrapped}/lib $out/lib 102 for f in $out/share/applications/*.desktop; do 103 substituteInPlace "$f" \ 104 --replace "Exec=libreoffice${major}.${minor}" "Exec=soffice"
+2 -2
pkgs/applications/version-management/lefthook/default.nix
··· 2 3 buildGoModule rec { 4 pname = "lefthook"; 5 - version = "1.3.3"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "evilmartians"; 10 repo = "lefthook"; 11 - sha256 = "sha256-9XmLQPkc8we5wRZe5+bhL1b9lxWX6JAQeF4DmRXBgew="; 12 }; 13 14 vendorHash = "sha256-VeR/lyrQrjXWvHdxpG4H+XPlAud9rrlzX8GqhVzn1sg=";
··· 2 3 buildGoModule rec { 4 pname = "lefthook"; 5 + version = "1.3.5"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "evilmartians"; 10 repo = "lefthook"; 11 + sha256 = "sha256-v4ES3TbuDRUBK8xH/viP5QOZmp3eWjsy0YRaSxfTZV4="; 12 }; 13 14 vendorHash = "sha256-VeR/lyrQrjXWvHdxpG4H+XPlAud9rrlzX8GqhVzn1sg=";
+3 -3
pkgs/applications/window-managers/i3/status-rust.nix
··· 15 16 rustPlatform.buildRustPackage rec { 17 pname = "i3status-rust"; 18 - version = "0.30.4"; 19 20 src = fetchFromGitHub { 21 owner = "greshake"; 22 repo = pname; 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-yJFM7+fpG/vnYvHRT+34rqToCfj8pjKpPRKQ49p2mh0="; 25 }; 26 27 - cargoHash = "sha256-G2Yveyplq/SdHgc+sipQqQ67YAU/dPteESVJ8My5Hqs="; 28 29 nativeBuildInputs = [ pkg-config makeWrapper ]; 30
··· 15 16 rustPlatform.buildRustPackage rec { 17 pname = "i3status-rust"; 18 + version = "0.30.5"; 19 20 src = fetchFromGitHub { 21 owner = "greshake"; 22 repo = pname; 23 rev = "refs/tags/v${version}"; 24 + hash = "sha256-7Fjz6Q/f6jocMPAcgeodzdImILKuRmF6V0zo00ZPfjI="; 25 }; 26 27 + cargoHash = "sha256-cHG3wUlk0AotfrQ8pYZNQDualhKSp6aNpY2mbjgnqzU="; 28 29 nativeBuildInputs = [ pkg-config makeWrapper ]; 30
+4
pkgs/development/libraries/keystone/default.nix
··· 3 , pkg-config 4 , cmake 5 , python3 6 }: 7 8 stdenv.mkDerivation rec { ··· 25 pkg-config 26 cmake 27 python3 28 ]; 29 30 meta = with lib; {
··· 3 , pkg-config 4 , cmake 5 , python3 6 + , fixDarwinDylibNames 7 }: 8 9 stdenv.mkDerivation rec { ··· 26 pkg-config 27 cmake 28 python3 29 + ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ 30 + # TODO: could be replaced by setting CMAKE_INSTALL_NAME_DIR? 31 + fixDarwinDylibNames 32 ]; 33 34 meta = with lib; {
+2 -2
pkgs/development/nim-packages/cbor/default.nix
··· 2 3 buildNimPackage rec { 4 pname = "cbor"; 5 - version = "20221007"; 6 src = fetchFromSourcehut { 7 owner = "~ehmry"; 8 repo = "nim_${pname}"; 9 rev = version; 10 - hash = "sha256-zFkYsXFRAiBrfz3VNML3l+rYrdJmczl0bfZcJSbHHbM="; 11 }; 12 doCheck = true; 13 meta = with lib;
··· 2 3 buildNimPackage rec { 4 pname = "cbor"; 5 + version = "20230310"; 6 src = fetchFromSourcehut { 7 owner = "~ehmry"; 8 repo = "nim_${pname}"; 9 rev = version; 10 + hash = "sha256-VmSYWgXDJLB2D2m3/ymrEytT2iW5JE56WmDz2MPHAqQ="; 11 }; 12 doCheck = true; 13 meta = with lib;
+20
pkgs/development/nim-packages/coap/default.nix
···
··· 1 + { lib, buildNimPackage, fetchFromGitea, taps }: 2 + 3 + buildNimPackage rec { 4 + pname = "coap"; 5 + version = "20230125"; 6 + src = fetchFromGitea { 7 + domain = "codeberg.org"; 8 + owner = "eris"; 9 + repo = "${pname}-nim"; 10 + rev = version; 11 + hash = "sha256-wlDyqRxXTrX+zXDIe2o9FTU2o26LO/6m7H/FGok1JDw="; 12 + }; 13 + propagatedBuildInputs = [ taps ]; 14 + meta = src.meta // { 15 + description = 16 + "Nim implementation of the Constrained Application Protocol (CoAP) over TCP"; 17 + license = lib.licenses.agpl3Plus; 18 + maintainers = with lib.maintainers; [ ehmry ]; 19 + }; 20 + }
+37
pkgs/development/nim-packages/eris/default.nix
···
··· 1 + { lib, buildNimPackage, fetchFromGitea, pkg-config 2 + , base32, coap, cbor, freedesktop_org, syndicate, tkrzw }: 3 + 4 + buildNimPackage rec { 5 + pname = "eris"; 6 + version = "20230201"; 7 + outputs = [ "bin" "out" ]; 8 + src = fetchFromGitea { 9 + domain = "codeberg.org"; 10 + owner = "eris"; 11 + repo = "nim-${pname}"; 12 + rev = version; 13 + hash = "sha256-6vlD/woqTkbSRWhRtQD/ynk0DG+GrGwh6x+qUmo6YSQ="; 14 + }; 15 + propagatedNativeBuildInputs = [ pkg-config ]; 16 + propagatedBuildInputs = [ 17 + base32 18 + coap 19 + cbor 20 + freedesktop_org 21 + syndicate 22 + tkrzw 23 + ]; 24 + postInstall = '' 25 + mkdir -p "$bin/share/applications" 26 + substitute "eris-open.desktop" "$bin/share/applications/eris-open.desktop"\ 27 + --replace "Exec=eriscmd " "Exec=$bin/bin/eriscmd " 28 + 29 + install -D "eris-link.xml" -t "$bin/share/mime/packages" 30 + install -D "eris48.png" "$bin/share/icons/hicolor/48x48/apps/eris.png" 31 + ''; 32 + meta = src.meta // { 33 + license = lib.licenses.unlicense; 34 + maintainers = with lib.maintainers; [ ehmry ]; 35 + mainProgram = "eriscmd"; 36 + }; 37 + }
+32
pkgs/development/nim-packages/freedesktop_org/default.nix
···
··· 1 + { lib, buildNimPackage, fetchFromSourcehut, fetchFromGitHub }: 2 + 3 + let 4 + # freedesktop_org requires a fork of configparser 5 + configparser = buildNimPackage rec { 6 + pname = "configparser"; 7 + version = "20230120"; 8 + src = fetchFromGitHub { 9 + repo = "nim-" + pname; 10 + owner = "ehmry"; 11 + rev = "695f1285d63f1954c25eb1f42798d90fa7bcbe14"; 12 + hash = "sha256-Z2Qr14pv2RHzQNfEYIKuXKHfHvvIfaEiGCHHCWJZFyw="; 13 + }; 14 + doCheck = true; 15 + }; 16 + in buildNimPackage rec { 17 + pname = "freedesktop_org"; 18 + version = "20230201"; 19 + src = fetchFromSourcehut { 20 + owner = "~ehmry"; 21 + repo = pname; 22 + rev = version; 23 + hash = "sha256-gEN8kiWYCfC9H7o4UE8Xza5s7OwU3TFno6XnIlEm9Dg="; 24 + }; 25 + propagatedBuildInputs = [ configparser ]; 26 + doCheck = true; 27 + meta = src.meta // { 28 + description = "Some Nim procedures for looking up freedesktop.org data"; 29 + license = lib.licenses.unlicense; 30 + maintainers = with lib.maintainers; [ ehmry ]; 31 + }; 32 + }
+20
pkgs/development/nim-packages/preserves/default.nix
···
··· 1 + { lib, stdenv, buildNimPackage, fetchFromGitea, npeg }: 2 + 3 + buildNimPackage rec { 4 + pname = "preserves"; 5 + version = "20221102"; 6 + src = fetchFromGitea { 7 + domain = "git.syndicate-lang.org"; 8 + owner = "ehmry"; 9 + repo = "${pname}-nim"; 10 + rev = version; 11 + hash = "sha256-oRsq1ugtrOvTn23596BXRy71TQZ4h/Vv6JGqBTZdoKY="; 12 + }; 13 + propagatedBuildInputs = [ npeg ]; 14 + doCheck = !stdenv.isDarwin; 15 + meta = src.meta // { 16 + description = "Nim implementation of the Preserves data language"; 17 + license = lib.licenses.unlicense; 18 + maintainers = with lib.maintainers; [ ehmry ]; 19 + }; 20 + }
+20
pkgs/development/nim-packages/syndicate/default.nix
···
··· 1 + { lib, buildNimPackage, fetchFromGitea, nimSHA2, preserves }: 2 + 3 + buildNimPackage rec { 4 + pname = "syndicate"; 5 + version = "20221102"; 6 + src = fetchFromGitea { 7 + domain = "git.syndicate-lang.org"; 8 + owner = "ehmry"; 9 + repo = "${pname}-nim"; 10 + rev = version; 11 + hash = "sha256-yTPbEsBcpEPXfmhykbWzWdnJ2ExEJxdii1L+mqx8VGQ="; 12 + }; 13 + propagatedBuildInputs = [ nimSHA2 preserves ]; 14 + doCheck = true; 15 + meta = src.meta // { 16 + description = "Nim implementation of the Syndicated Actor model"; 17 + license = lib.licenses.unlicense; 18 + maintainers = with lib.maintainers; [ ehmry ]; 19 + }; 20 + }
+62
pkgs/development/python-modules/nianet/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , matplotlib 5 + , niapy 6 + , numpy 7 + , poetry-core 8 + , pytestCheckHook 9 + , pythonOlder 10 + , scikit-learn 11 + , toml-adapt 12 + , torch 13 + }: 14 + 15 + buildPythonPackage rec { 16 + pname = "nianet"; 17 + version = "1.1.4"; 18 + format = "pyproject"; 19 + 20 + disabled = pythonOlder "3.6"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "SasoPavlic"; 24 + repo = pname; 25 + rev = "version_${version}"; 26 + sha256 = "sha256-FZipl6Z9AfiL6WH0kvUn8bVxt8JLdDVlmTSqnyxe0nY="; 27 + }; 28 + 29 + nativeBuildInputs = [ 30 + toml-adapt 31 + poetry-core 32 + ]; 33 + 34 + propagatedBuildInputs = [ 35 + niapy 36 + numpy 37 + scikit-learn 38 + torch 39 + ]; 40 + 41 + # create niapy and torch dep version consistent 42 + preBuild = '' 43 + toml-adapt -path pyproject.toml -a change -dep niapy -ver X 44 + toml-adapt -path pyproject.toml -a change -dep torch -ver X 45 + ''; 46 + 47 + checkInputs = [ 48 + pytestCheckHook 49 + ]; 50 + 51 + pythonImportsCheck = [ 52 + "nianet" 53 + ]; 54 + 55 + meta = with lib; { 56 + description = "Designing and constructing neural network topologies using nature-inspired algorithms"; 57 + homepage = "https://github.com/SasoPavlic/NiaNet"; 58 + changelog = "https://github.com/SasoPavlic/NiaNet/releases/tag/v${version}"; 59 + license = licenses.mit; 60 + maintainers = with maintainers; [ firefly-cpp ]; 61 + }; 62 + }
+48
pkgs/development/python-modules/pytest-pytestrail/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , setuptools-scm 5 + , pytest 6 + , testrail-api 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "pytest-pytestrail"; 11 + version = "0.10.5"; 12 + 13 + SETUPTOOLS_SCM_PRETEND_VERSION = version; 14 + 15 + src = fetchFromGitHub { 16 + owner = "tolstislon"; 17 + repo = "pytest-pytestrail"; 18 + rev = version; 19 + sha256 = "sha256-y34aRxQ8mu6b6GBRMFVzn1shMVc7TumdjRS3daMEZJM="; 20 + }; 21 + 22 + nativeBuildInputs = [ 23 + setuptools-scm 24 + ]; 25 + 26 + buildInputs = [ 27 + pytest 28 + ]; 29 + 30 + propagatedBuildInputs = [ 31 + testrail-api 32 + ]; 33 + 34 + # all tests require network accesss 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ 38 + "pytest_pytestrail" 39 + ]; 40 + 41 + meta = with lib; { 42 + description = "Pytest plugin for interaction with TestRail"; 43 + homepage = "https://github.com/tolstislon/pytest-pytestrail"; 44 + changelog = "https://github.com/tolstislon/pytest-pytestrail/releases/tag/${version}"; 45 + license = with licenses; [ mit ]; 46 + maintainers = with maintainers; [ aanderse ]; 47 + }; 48 + }
+36
pkgs/development/python-modules/testrail-api/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , requests 5 + , pytestCheckHook 6 + , responses 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "testrail-api"; 11 + version = "1.12.0"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "tolstislon"; 15 + repo = "testrail-api"; 16 + rev = version; 17 + sha256 = "sha256-VuAW5Dl3pkA6mtn/mbzxTFoavO5jPoqFSFVlrxc7KRk="; 18 + }; 19 + 20 + nativeCheckInputs = [ 21 + pytestCheckHook 22 + responses 23 + ]; 24 + 25 + propagatedBuildInputs = [ 26 + requests 27 + ]; 28 + 29 + meta = with lib; { 30 + description = "A Python wrapper of the TestRail API"; 31 + homepage = "https://github.com/tolstislon/testrail-api"; 32 + changelog = "https://github.com/tolstislon/ytestrail-api/releases/tag/${version}"; 33 + license = with licenses; [ mit ]; 34 + maintainers = with maintainers; [ aanderse ]; 35 + }; 36 + }
+2 -2
pkgs/development/tools/database/sqlfluff/default.nix
··· 5 6 python3.pkgs.buildPythonApplication rec { 7 pname = "sqlfluff"; 8 - version = "1.4.5"; 9 format = "setuptools"; 10 11 src = fetchFromGitHub { 12 owner = pname; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-Kc0doBR2iOy54arxOYXH5eHlcM7pXFVUqedopsZH8rE="; 16 }; 17 18 propagatedBuildInputs = with python3.pkgs; [
··· 5 6 python3.pkgs.buildPythonApplication rec { 7 pname = "sqlfluff"; 8 + version = "2.0.0"; 9 format = "setuptools"; 10 11 src = fetchFromGitHub { 12 owner = pname; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 + hash = "sha256-2WKRB4mMiML7POCAd9G0IROTKujcsJT591h1bmSX63E="; 16 }; 17 18 propagatedBuildInputs = with python3.pkgs; [
+2 -2
pkgs/development/tools/oh-my-posh/default.nix
··· 6 7 buildGoModule rec { 8 pname = "oh-my-posh"; 9 - version = "14.12.0"; 10 11 src = fetchFromGitHub { 12 owner = "jandedobbeleer"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-brwfM/IPgwLdVwMNur4EBCsubbv/DCVhTMJbAn6mbFg="; 16 }; 17 18 vendorHash = "sha256-JZ5UiL2vGsXy/xmz+NcAKYDmp5hq7bx54/OdUyQHUp0=";
··· 6 7 buildGoModule rec { 8 pname = "oh-my-posh"; 9 + version = "14.14.1"; 10 11 src = fetchFromGitHub { 12 owner = "jandedobbeleer"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 + hash = "sha256-EdW9LnSYSa8ulXKSJz3LBktVlDev7CLVOZL9qAytjcQ="; 16 }; 17 18 vendorHash = "sha256-JZ5UiL2vGsXy/xmz+NcAKYDmp5hq7bx54/OdUyQHUp0=";
+3 -3
pkgs/development/tools/rust/cargo-binstall/default.nix
··· 11 12 rustPlatform.buildRustPackage rec { 13 pname = "cargo-binstall"; 14 - version = "0.21.2"; 15 16 src = fetchFromGitHub { 17 owner = "cargo-bins"; 18 repo = "cargo-binstall"; 19 rev = "v${version}"; 20 - hash = "sha256-8iJOjaOnbvRZWkygkXK0e/BiImpyQ92E0XQDklb4JJQ="; 21 }; 22 23 - cargoHash = "sha256-+u1v3XJ+DCXMbMpLcjxUZMKcF0E9LrNv6+9XVo/DduQ="; 24 25 nativeBuildInputs = [ 26 pkg-config
··· 11 12 rustPlatform.buildRustPackage rec { 13 pname = "cargo-binstall"; 14 + version = "0.21.3"; 15 16 src = fetchFromGitHub { 17 owner = "cargo-bins"; 18 repo = "cargo-binstall"; 19 rev = "v${version}"; 20 + hash = "sha256-K4NerJSW3ckXMFFnFCMXIqMeevE3Xzr/Wsz9nloolBI="; 21 }; 22 23 + cargoHash = "sha256-YSKnfhSZ885evtEK40QTt90RwtH03aO/aJ6A/DddoVU="; 24 25 nativeBuildInputs = [ 26 pkg-config
+4 -4
pkgs/servers/hbase/default.nix
··· 39 in 40 { 41 hbase_2_4 = common { 42 - version = "2.4.15"; 43 - hash = "sha256-KJXpfQ91POVd7ZnKQyIX5qzX4JIZqh3Zn2Pz0chW48g="; 44 tests.standalone = nixosTests.hbase_2_4; 45 }; 46 hbase_2_5 = common { 47 - version = "2.5.1"; 48 - hash = "sha256-ddSa4q43PSJv1W4lzzaXfv4LIThs4n8g8wYufHgsZVE="; 49 tests.standalone = nixosTests.hbase2; 50 }; 51 hbase_3_0 = common {
··· 39 in 40 { 41 hbase_2_4 = common { 42 + version = "2.4.16"; 43 + hash = "sha256-vMuTqS2bXFRcCsZ7bOaNLVGyOG38HhL8WlCq2MFmAaE="; 44 tests.standalone = nixosTests.hbase_2_4; 45 }; 46 hbase_2_5 = common { 47 + version = "2.5.3"; 48 + hash = "sha256-h08jnDQaakpkYFHHn9qeg4JCSBtwRjv42qKLpyOVdsI="; 49 tests.standalone = nixosTests.hbase2; 50 }; 51 hbase_3_0 = common {
+3 -3
pkgs/servers/matrix-synapse/default.nix
··· 12 with python3.pkgs; 13 buildPythonApplication rec { 14 pname = "matrix-synapse"; 15 - version = "1.78.0"; 16 format = "pyproject"; 17 18 src = fetchFromGitHub { 19 owner = "matrix-org"; 20 repo = "synapse"; 21 rev = "v${version}"; 22 - hash = "sha256-UMP/JQ77qGfAQ+adLBLB8NFI2OiuwjILEbEecEDcK1A="; 23 }; 24 25 cargoDeps = rustPlatform.fetchCargoTarball { 26 inherit src; 27 name = "${pname}-${version}"; 28 - hash = "sha256-UTuMvTWfOlFlL+4qsCEfVljnkeylBKq0wd5FlAOYAFQ="; 29 }; 30 31 postPatch = ''
··· 12 with python3.pkgs; 13 buildPythonApplication rec { 14 pname = "matrix-synapse"; 15 + version = "1.79.0"; 16 format = "pyproject"; 17 18 src = fetchFromGitHub { 19 owner = "matrix-org"; 20 repo = "synapse"; 21 rev = "v${version}"; 22 + hash = "sha256-2MHP4Gu+C5yyXObbd7NLYWCy1E0L7fUwpzYsoD7ULDo="; 23 }; 24 25 cargoDeps = rustPlatform.fetchCargoTarball { 26 inherit src; 27 name = "${pname}-${version}"; 28 + hash = "sha256-yDKs6KRStjJMC/48dZcyQ4OmBXY1TombjH/ZDfBJbSc="; 29 }; 30 31 postPatch = ''
+3 -3
pkgs/shells/nushell/default.nix
··· 26 27 rustPlatform.buildRustPackage ( 28 let 29 - version = "0.76.0"; 30 pname = "nushell"; 31 in { 32 inherit version pname; ··· 35 owner = pname; 36 repo = pname; 37 rev = version; 38 - sha256 = "sha256-dGsnbKsg0nQFFXZDRDei2uGhGWEQSeSHGpXJp+8QUC8="; 39 }; 40 41 - cargoSha256 = "sha256-9oXMojQA4tSoIxY1lwMPGhQz3WHcxEKtwl+4LsAYbDo="; 42 43 nativeBuildInputs = [ pkg-config ] 44 ++ lib.optionals (withDefaultFeatures && stdenv.isLinux) [ python3 ]
··· 26 27 rustPlatform.buildRustPackage ( 28 let 29 + version = "0.77.0"; 30 pname = "nushell"; 31 in { 32 inherit version pname; ··· 35 owner = pname; 36 repo = pname; 37 rev = version; 38 + sha256 = "sha256-cffAxuM12wdd7IeLbKSpL6dpvpZVscA8nMOh3jFqY3E="; 39 }; 40 41 + cargoSha256 = "sha256-OcYE9d3hO3JtxF3REWev0Rz97Kr9l7P7nUxhIb5fhi0="; 42 43 nativeBuildInputs = [ pkg-config ] 44 ++ lib.optionals (withDefaultFeatures && stdenv.isLinux) [ python3 ]
+3 -3
pkgs/tools/misc/hyperfine/default.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "hyperfine"; 11 - version = "1.15.0"; 12 13 src = fetchCrate { 14 inherit pname version; 15 - sha256 = "sha256-JJ4sEwe2fXOGlofJ9SkXEllMCMhn7MSJ+H3aAF0F0zk="; 16 }; 17 18 - cargoSha256 = "sha256-3xOh51rUnQcUfQ+asurbfNYTb5dWQO5YY/AbGRV+26w="; 19 20 nativeBuildInputs = [ installShellFiles ]; 21 buildInputs = lib.optional stdenv.isDarwin Security;
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "hyperfine"; 11 + version = "1.16.0"; 12 13 src = fetchCrate { 14 inherit pname version; 15 + sha256 = "sha256-cbox7TAgeb0ZPt0i3SphWClAz/mUUgRlFKCOS/E0MT4="; 16 }; 17 18 + cargoSha256 = "sha256-Bc3twE42iB7NNkI5cPcniEb+JcR1wjc9nx80p6HCDVc="; 19 20 nativeBuildInputs = [ installShellFiles ]; 21 buildInputs = lib.optional stdenv.isDarwin Security;
+3 -3
pkgs/tools/misc/vivid/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "vivid"; 5 - version = "0.8.0"; 6 7 src = fetchFromGitHub { 8 owner = "sharkdp"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-83ff0T2P5aRQ6cM9z7IEuoi7syvJldIuzzdiTrygckA="; 12 }; 13 14 - cargoSha256 = "sha256-W1tLQTTMOKB/BR9P3y3goPIdOe12Qdkf4wYPlhbQjzY="; 15 16 meta = with lib; { 17 description = "A generator for LS_COLORS with support for multiple color themes";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "vivid"; 5 + version = "0.9.0"; 6 7 src = fetchFromGitHub { 8 owner = "sharkdp"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-zNsNEXj/SaJaYsYvoOGPopLhJDfLIXSs7eeZDdJrHiQ="; 12 }; 13 14 + cargoHash = "sha256-gtqdQuf3Ybt0PDCQw3gGAzIROq39NJKPIat0lyIPGgg="; 15 16 meta = with lib; { 17 description = "A generator for LS_COLORS with support for multiple color themes";
+1 -1
pkgs/tools/networking/netboot/default.nix
··· 20 meta = with lib; { 21 description = "Mini PXE server"; 22 maintainers = [ maintainers.raskin ]; 23 - platforms = ["x86_64-linux"]; 24 license = lib.licenses.free; 25 }; 26 }
··· 20 meta = with lib; { 21 description = "Mini PXE server"; 22 maintainers = [ maintainers.raskin ]; 23 + platforms = [ "x86_64-linux" "aarch64-linux" ]; 24 license = lib.licenses.free; 25 }; 26 }
+2 -2
pkgs/tools/virtualization/cri-tools/default.nix
··· 6 7 buildGoModule rec { 8 pname = "cri-tools"; 9 - version = "1.26.0"; 10 11 src = fetchFromGitHub { 12 owner = "kubernetes-sigs"; 13 repo = pname; 14 rev = "v${version}"; 15 - sha256 = "sha256-ALeK51fsGEys9iEHv0C8vCZVD4vx+VYUooj7pH7p7tg="; 16 }; 17 18 vendorSha256 = null;
··· 6 7 buildGoModule rec { 8 pname = "cri-tools"; 9 + version = "1.26.1"; 10 11 src = fetchFromGitHub { 12 owner = "kubernetes-sigs"; 13 repo = pname; 14 rev = "v${version}"; 15 + sha256 = "sha256-jJhHlqnc7wDsc6nn5CTZMnaZpUJrEDkGzyvQ2EoX4GE="; 16 }; 17 18 vendorSha256 = null;
+10
pkgs/top-level/nim-packages.nix
··· 30 31 chroma = callPackage ../development/nim-packages/chroma { }; 32 33 docopt = callPackage ../development/nim-packages/docopt { }; 34 35 flatty = callPackage ../development/nim-packages/flatty { }; 36 37 frosty = callPackage ../development/nim-packages/frosty { }; 38 39 getdns = callPackage ../development/nim-packages/getdns { ··· 73 74 pixie = callPackage ../development/nim-packages/pixie { }; 75 76 redis = callPackage ../development/nim-packages/redis { }; 77 78 redpool = callPackage ../development/nim-packages/redpool { }; ··· 101 stew = callPackage ../development/nim-packages/stew { }; 102 103 supersnappy = callPackage ../development/nim-packages/supersnappy { }; 104 105 taps = callPackage ../development/nim-packages/taps { }; 106
··· 30 31 chroma = callPackage ../development/nim-packages/chroma { }; 32 33 + coap = callPackage ../development/nim-packages/coap { }; 34 + 35 docopt = callPackage ../development/nim-packages/docopt { }; 36 37 + eris = callPackage ../development/nim-packages/eris { }; 38 + 39 flatty = callPackage ../development/nim-packages/flatty { }; 40 41 + freedesktop_org = callPackage ../development/nim-packages/freedesktop_org { }; 42 + 43 frosty = callPackage ../development/nim-packages/frosty { }; 44 45 getdns = callPackage ../development/nim-packages/getdns { ··· 79 80 pixie = callPackage ../development/nim-packages/pixie { }; 81 82 + preserves = callPackage ../development/nim-packages/preserves { }; 83 + 84 redis = callPackage ../development/nim-packages/redis { }; 85 86 redpool = callPackage ../development/nim-packages/redpool { }; ··· 109 stew = callPackage ../development/nim-packages/stew { }; 110 111 supersnappy = callPackage ../development/nim-packages/supersnappy { }; 112 + 113 + syndicate = callPackage ../development/nim-packages/syndicate { }; 114 115 taps = callPackage ../development/nim-packages/taps { }; 116
+6
pkgs/top-level/python-packages.nix
··· 6454 6455 niaaml = callPackage ../development/python-modules/niaaml { }; 6456 6457 niaarm = callPackage ../development/python-modules/niaarm { }; 6458 6459 niapy = callPackage ../development/python-modules/niapy { }; ··· 9252 9253 pytest-pylint = callPackage ../development/python-modules/pytest-pylint { }; 9254 9255 pytest-qt = callPackage ../development/python-modules/pytest-qt { }; 9256 9257 pytest-quickcheck = callPackage ../development/python-modules/pytest-quickcheck { }; ··· 11568 testing-postgresql = callPackage ../development/python-modules/testing-postgresql { }; 11569 11570 testpath = callPackage ../development/python-modules/testpath { }; 11571 11572 testrepository = callPackage ../development/python-modules/testrepository { }; 11573
··· 6454 6455 niaaml = callPackage ../development/python-modules/niaaml { }; 6456 6457 + nianet = callPackage ../development/python-modules/nianet { }; 6458 + 6459 niaarm = callPackage ../development/python-modules/niaarm { }; 6460 6461 niapy = callPackage ../development/python-modules/niapy { }; ··· 9254 9255 pytest-pylint = callPackage ../development/python-modules/pytest-pylint { }; 9256 9257 + pytest-pytestrail = callPackage ../development/python-modules/pytest-pytestrail { }; 9258 + 9259 pytest-qt = callPackage ../development/python-modules/pytest-qt { }; 9260 9261 pytest-quickcheck = callPackage ../development/python-modules/pytest-quickcheck { }; ··· 11572 testing-postgresql = callPackage ../development/python-modules/testing-postgresql { }; 11573 11574 testpath = callPackage ../development/python-modules/testpath { }; 11575 + 11576 + testrail-api = callPackage ../development/python-modules/testrail-api { }; 11577 11578 testrepository = callPackage ../development/python-modules/testrepository { }; 11579