lol

Merge master into staging-next

authored by

nixpkgs-ci[bot] and committed by
GitHub
528302da 2aa19964

+910 -440
+1 -1
.github/workflows/backport.yml
··· 19 19 steps: 20 20 # Use a GitHub App to create the PR so that CI gets triggered 21 21 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs 22 - - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7 22 + - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2 23 23 id: app-token 24 24 with: 25 25 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
+2 -2
.github/workflows/codeowners-v2.yml
··· 63 63 - name: Build codeowners validator 64 64 run: nix-build base/ci -A codeownersValidator 65 65 66 - - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7 66 + - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2 67 67 id: app-token 68 68 with: 69 69 app-id: ${{ vars.OWNER_RO_APP_ID }} ··· 96 96 # This is intentional, because we need to request the review of owners as declared in the base branch. 97 97 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 98 98 99 - - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7 99 + - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2 100 100 id: app-token 101 101 with: 102 102 app-id: ${{ vars.OWNER_APP_ID }}
+1 -1
.github/workflows/eval.yml
··· 244 244 steps: 245 245 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions 246 246 # Can't use the token received from permissions above, because it can't get enough permissions 247 - - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7 247 + - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2 248 248 id: app-token 249 249 with: 250 250 app-id: ${{ vars.OWNER_APP_ID }}
+1 -1
.github/workflows/periodic-merge.yml
··· 19 19 steps: 20 20 # Use a GitHub App to create the PR so that CI gets triggered 21 21 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs 22 - - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7 22 + - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2 23 23 id: app-token 24 24 with: 25 25 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
+18
maintainers/maintainer-list.nix
··· 10871 10871 githubId = 6874204; 10872 10872 name = "Jason Carr"; 10873 10873 }; 10874 + jasoncrevier = { 10875 + email = "jason@jasoncrevier.com"; 10876 + github = "jasoncrevier"; 10877 + githubId = 106266438; 10878 + name = "Jason Crevier"; 10879 + }; 10874 10880 jasonodoom = { 10875 10881 email = "jasonodoom@riseup.net"; 10876 10882 github = "jasonodoom"; ··· 11730 11736 githubId = 13087841; 11731 11737 name = "Johan Larsson"; 11732 11738 keys = [ { fingerprint = "F0D6 BDE7 C7D1 6B3F 7883 73E7 2A41 C0FE DD6F F540"; } ]; 11739 + }; 11740 + jolheiser = { 11741 + email = "nixpkgs@jolheiser.com"; 11742 + github = "jolheiser"; 11743 + githubId = 42128690; 11744 + name = "John Olheiser"; 11733 11745 }; 11734 11746 jonaenz = { 11735 11747 name = "Jona Enzinger"; ··· 17853 17865 github = "oluceps"; 17854 17866 githubId = 35628088; 17855 17867 name = "oluceps"; 17868 + }; 17869 + oluchitheanalyst = { 17870 + name = "ndukauba maryjane oluchi"; 17871 + email = "ndukauba.oluchi2000@gmail.com"; 17872 + github = "oluchitheanalyst"; 17873 + githubId = 152318870; 17856 17874 }; 17857 17875 olynch = { 17858 17876 email = "owen@olynch.me";
+3 -3
pkgs/applications/emulators/libretro/cores/fbneo.nix
··· 5 5 }: 6 6 mkLibretroCore { 7 7 core = "fbneo"; 8 - version = "0-unstable-2025-03-26"; 8 + version = "0-unstable-2025-04-05"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "libretro"; 12 12 repo = "fbneo"; 13 - rev = "ad3b6536f57ec189defabc8aa0fe9d854d167d67"; 14 - hash = "sha256-Nyzzr6XFQmtRVWxATIIONn3tnwwS6jLbbwHxoYXUDGU="; 13 + rev = "c21c0a0393a1cc68db7250022d18039a30de51f4"; 14 + hash = "sha256-AZyYUftVHlxR+QHCsIcNI2hTIEDYeInYPdmum++EtpU="; 15 15 }; 16 16 17 17 makefile = "Makefile";
+3 -3
pkgs/applications/emulators/libretro/cores/flycast.nix
··· 8 8 }: 9 9 mkLibretroCore { 10 10 core = "flycast"; 11 - version = "0-unstable-2025-03-22"; 11 + version = "0-unstable-2025-04-05"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "flyinghead"; 15 15 repo = "flycast"; 16 - rev = "305cae496fe009a523e1a43cc6a11141531626ef"; 17 - hash = "sha256-L91RS+GzNA0IpVh1ANkS7V2wWJqdXyioxJuCP+f5SEA="; 16 + rev = "3114394019fc0f772c29d0a1f5493fbdce4745b0"; 17 + hash = "sha256-bp10601cfcsb62Vy88zIjFZ/yBUGVODEt96Me7XX5kY="; 18 18 fetchSubmodules = true; 19 19 }; 20 20
+3 -3
pkgs/applications/emulators/libretro/cores/ppsspp.nix
··· 13 13 }: 14 14 mkLibretroCore { 15 15 core = "ppsspp"; 16 - version = "0-unstable-2025-03-26"; 16 + version = "0-unstable-2025-04-06"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "hrydgard"; 20 20 repo = "ppsspp"; 21 - rev = "e4a492b6a2d72582e0d32ffd05b7f37d3312657c"; 22 - hash = "sha256-2WuKxfOmlNcPIbwVjCbGfvWIwd5/WYb7pFGMnzg3fZQ="; 21 + rev = "031421ba4de8559f8bbdbd9367b29be28f6a45cb"; 22 + hash = "sha256-eaXR/w0Iz9tmTgZKHVcZYXJbXaVPnYudSal0vcsQ9a0="; 23 23 fetchSubmodules = true; 24 24 }; 25 25
+3 -3
pkgs/applications/emulators/libretro/cores/snes9x.nix
··· 5 5 }: 6 6 mkLibretroCore { 7 7 core = "snes9x"; 8 - version = "0-unstable-2025-02-24"; 8 + version = "0-unstable-2025-04-06"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "snes9xgit"; 12 12 repo = "snes9x"; 13 - rev = "0525ea043ea173ec6af1c6c8dade820036376430"; 14 - hash = "sha256-BB65aYfkNqM/Lb3/dGMrPBpuR0tjewA45xnIXHaqWsA="; 13 + rev = "2c78e77617c65025342e1c4da8187ef5ee2cbad4"; 14 + hash = "sha256-95ScIvZeBNrf6hvGWf7XI95pyPzGzlBgfd+CDllcIUQ="; 15 15 }; 16 16 17 17 makefile = "Makefile";
+3 -3
pkgs/applications/emulators/libretro/cores/stella.nix
··· 5 5 }: 6 6 mkLibretroCore { 7 7 core = "stella"; 8 - version = "0-unstable-2025-03-17"; 8 + version = "0-unstable-2025-03-29"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "stella-emu"; 12 12 repo = "stella"; 13 - rev = "aaa6c154750119905190da49569fa9e2de7bb97b"; 14 - hash = "sha256-QephycS6p6KCAR5ryc8Nhx8jnFGHaY7kObT13RNU42Q="; 13 + rev = "b753f6eefa4bf02af20eacae98caab7d5aabc4a8"; 14 + hash = "sha256-uPRNa7Ofaonyp1ErFel12DyKox9ETYGoT1s3aG96VkU="; 15 15 }; 16 16 17 17 makefile = "Makefile";
+3 -3
pkgs/applications/emulators/libretro/cores/vice.nix
··· 6 6 }: 7 7 mkLibretroCore { 8 8 core = "vice-${type}"; 9 - version = "0-unstable-2025-02-23"; 9 + version = "0-unstable-2025-03-28"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "libretro"; 13 13 repo = "vice-libretro"; 14 - rev = "50cd8c29c8abab29e8d55e8fab8e131fadfbe98c"; 15 - hash = "sha256-Vj7clLLkYyesnP9lL0Z4sy2kvxTsatKzuW6XBg21Jrw="; 14 + rev = "9b201cdd612bfb12c8d86696656b79eaf25924ab"; 15 + hash = "sha256-YilHxQLZC8MVnZ9EekCqtU8rgOB/0FH2vKFdn6l3i5Q="; 16 16 }; 17 17 18 18 makefile = "Makefile";
+105 -108
pkgs/applications/networking/cluster/rke2/builder.nix
··· 44 44 nixosTests, 45 45 testers, 46 46 }: 47 - let 48 - rke2 = buildGoModule rec { 49 - pname = "rke2"; 50 - version = rke2Version; 47 + buildGoModule (finalAttrs: { 48 + pname = "rke2"; 49 + version = rke2Version; 51 50 52 - src = fetchzip { 53 - url = "https://github.com/rancher/rke2/archive/refs/tags/v${rke2Version}.tar.gz"; 54 - hash = "${rke2TarballHash}"; 55 - }; 51 + src = fetchzip { 52 + url = "https://github.com/rancher/rke2/archive/refs/tags/v${rke2Version}.tar.gz"; 53 + hash = "${rke2TarballHash}"; 54 + }; 56 55 57 - vendorHash = rke2VendorHash; 56 + vendorHash = rke2VendorHash; 58 57 59 - nativeBuildInputs = [ makeWrapper ]; 58 + nativeBuildInputs = [ makeWrapper ]; 60 59 61 - # Important utilities used by the kubelet. 62 - # See: https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-237202494 63 - # Notice the list in that issue is stale, but as a redundancy reservation. 64 - buildInputs = [ 65 - procps # pidof pkill 66 - coreutils # uname touch env nice du 67 - util-linux # lsblk fsck mkfs nsenter mount umount 68 - ethtool # ethtool 69 - socat # socat 70 - iptables # iptables iptables-restore iptables-save 71 - bridge-utils # brctl 72 - iproute2 # ip tc 73 - kmod # modprobe 74 - lvm2 # dmsetup 75 - ]; 60 + # Important utilities used by the kubelet. 61 + # See: https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-237202494 62 + # Notice the list in that issue is stale, but as a redundancy reservation. 63 + buildInputs = [ 64 + procps # pidof pkill 65 + coreutils # uname touch env nice du 66 + util-linux # lsblk fsck mkfs nsenter mount umount 67 + ethtool # ethtool 68 + socat # socat 69 + iptables # iptables iptables-restore iptables-save 70 + bridge-utils # brctl 71 + iproute2 # ip tc 72 + kmod # modprobe 73 + lvm2 # dmsetup 74 + ]; 76 75 77 - # Passing boringcrypto to GOEXPERIMENT variable to build with goboring library 78 - GOEXPERIMENT = "boringcrypto"; 76 + # Passing boringcrypto to GOEXPERIMENT variable to build with goboring library 77 + GOEXPERIMENT = "boringcrypto"; 79 78 80 - # See: https://github.com/rancher/rke2/blob/e7f87c6dd56fdd76a7dab58900aeea8946b2c008/scripts/build-binary#L27-L38 81 - ldflags = [ 82 - "-w" 83 - "-X github.com/k3s-io/k3s/pkg/version.GitCommit=${lib.substring 0 6 rke2Commit}" 84 - "-X github.com/k3s-io/k3s/pkg/version.Program=${pname}" 85 - "-X github.com/k3s-io/k3s/pkg/version.Version=v${version}" 86 - "-X github.com/k3s-io/k3s/pkg/version.UpstreamGolang=go${go.version}" 87 - "-X github.com/rancher/rke2/pkg/images.DefaultRegistry=docker.io" 88 - "-X github.com/rancher/rke2/pkg/images.DefaultEtcdImage=rancher/hardened-etcd:${etcdVersion}" 89 - "-X github.com/rancher/rke2/pkg/images.DefaultKubernetesImage=rancher/hardened-kubernetes:${k8sImageTag}" 90 - "-X github.com/rancher/rke2/pkg/images.DefaultPauseImage=rancher/mirrored-pause:${pauseVersion}" 91 - "-X github.com/rancher/rke2/pkg/images.DefaultRuntimeImage=rancher/rke2-runtime:${dockerizedVersion}" 92 - "-X github.com/rancher/rke2/pkg/images.DefaultCloudControllerManagerImage=rancher/rke2-cloud-provider:${ccmVersion}" 93 - ]; 79 + # See: https://github.com/rancher/rke2/blob/e7f87c6dd56fdd76a7dab58900aeea8946b2c008/scripts/build-binary#L27-L38 80 + ldflags = [ 81 + "-w" 82 + "-X github.com/k3s-io/k3s/pkg/version.GitCommit=${lib.substring 0 6 rke2Commit}" 83 + "-X github.com/k3s-io/k3s/pkg/version.Program=${finalAttrs.pname}" 84 + "-X github.com/k3s-io/k3s/pkg/version.Version=v${finalAttrs.version}" 85 + "-X github.com/k3s-io/k3s/pkg/version.UpstreamGolang=go${go.version}" 86 + "-X github.com/rancher/rke2/pkg/images.DefaultRegistry=docker.io" 87 + "-X github.com/rancher/rke2/pkg/images.DefaultEtcdImage=rancher/hardened-etcd:${etcdVersion}" 88 + "-X github.com/rancher/rke2/pkg/images.DefaultKubernetesImage=rancher/hardened-kubernetes:${k8sImageTag}" 89 + "-X github.com/rancher/rke2/pkg/images.DefaultPauseImage=rancher/mirrored-pause:${pauseVersion}" 90 + "-X github.com/rancher/rke2/pkg/images.DefaultRuntimeImage=rancher/rke2-runtime:${dockerizedVersion}" 91 + "-X github.com/rancher/rke2/pkg/images.DefaultCloudControllerManagerImage=rancher/rke2-cloud-provider:${ccmVersion}" 92 + ]; 94 93 95 - tags = [ 96 - "no_cri_dockerd" 97 - "no_embedded_executor" 98 - "no_stage" 99 - "sqlite_omit_load_extension" 100 - "selinux" 101 - "netgo" 102 - "osusergo" 103 - ]; 94 + tags = [ 95 + "no_cri_dockerd" 96 + "no_embedded_executor" 97 + "no_stage" 98 + "sqlite_omit_load_extension" 99 + "selinux" 100 + "netgo" 101 + "osusergo" 102 + ]; 104 103 105 - subPackages = [ "." ]; 104 + subPackages = [ "." ]; 106 105 107 - installPhase = '' 108 - install -D $GOPATH/bin/rke2 $out/bin/rke2 109 - wrapProgram $out/bin/rke2 \ 110 - --prefix PATH : ${lib.makeBinPath buildInputs} 106 + installPhase = '' 107 + install -D $GOPATH/bin/rke2 $out/bin/rke2 108 + wrapProgram $out/bin/rke2 \ 109 + --prefix PATH : ${lib.makeBinPath finalAttrs.buildInputs} 111 110 112 - install -D ./bundle/bin/rke2-killall.sh $out/bin/rke2-killall.sh 113 - wrapProgram $out/bin/rke2-killall.sh \ 114 - --prefix PATH : ${ 115 - lib.makeBinPath [ 116 - systemd 117 - gnugrep 118 - gnused 119 - ] 120 - } \ 121 - --prefix PATH : ${lib.makeBinPath buildInputs} 122 - ''; 111 + install -D ./bundle/bin/rke2-killall.sh $out/bin/rke2-killall.sh 112 + wrapProgram $out/bin/rke2-killall.sh \ 113 + --prefix PATH : ${ 114 + lib.makeBinPath [ 115 + systemd 116 + gnugrep 117 + gnused 118 + ] 119 + } \ 120 + --prefix PATH : ${lib.makeBinPath finalAttrs.buildInputs} 121 + ''; 123 122 124 - doCheck = false; 123 + doCheck = false; 125 124 126 - doInstallCheck = true; 127 - installCheckPhase = '' 128 - runHook preInstallCheck 129 - # Verify that the binary uses BoringCrypto 130 - go tool nm $out/bin/.rke2-wrapped | grep '_Cfunc__goboringcrypto_' > /dev/null 131 - runHook postInstallCheck 132 - ''; 125 + doInstallCheck = true; 126 + installCheckPhase = '' 127 + runHook preInstallCheck 128 + # Verify that the binary uses BoringCrypto 129 + go tool nm $out/bin/.rke2-wrapped | grep '_Cfunc__goboringcrypto_' > /dev/null 130 + runHook postInstallCheck 131 + ''; 133 132 134 - passthru = { 135 - inherit updateScript; 136 - tests = 137 - let 138 - moduleTests = 139 - let 140 - package_version = 141 - "rke2_" + lib.replaceStrings [ "." ] [ "_" ] (lib.versions.majorMinor rke2Version); 142 - in 143 - lib.mapAttrs (name: value: nixosTests.rke2.${name}.${package_version}) nixosTests.rke2; 144 - in 145 - { 146 - version = testers.testVersion { 147 - package = rke2; 148 - version = "v${version}"; 149 - }; 150 - } 151 - // moduleTests; 152 - } // (lib.mapAttrs (_: value: fetchurl value) imagesVersions); 133 + passthru = { 134 + inherit updateScript; 135 + tests = 136 + let 137 + moduleTests = 138 + let 139 + package_version = 140 + "rke2_" + lib.replaceStrings [ "." ] [ "_" ] (lib.versions.majorMinor rke2Version); 141 + in 142 + lib.mapAttrs (name: value: nixosTests.rke2.${name}.${package_version}) nixosTests.rke2; 143 + in 144 + { 145 + version = testers.testVersion { 146 + package = finalAttrs.finalPackage; 147 + version = "v${finalAttrs.version}"; 148 + }; 149 + } 150 + // moduleTests; 151 + } // (lib.mapAttrs (_: value: fetchurl value) imagesVersions); 153 152 154 - meta = with lib; { 155 - homepage = "https://github.com/rancher/rke2"; 156 - description = "RKE2, also known as RKE Government, is Rancher's next-generation Kubernetes distribution"; 157 - changelog = "https://github.com/rancher/rke2/releases/tag/v${version}"; 158 - license = licenses.asl20; 159 - maintainers = with maintainers; [ 160 - rorosen 161 - zimbatm 162 - zygot 163 - ]; 164 - mainProgram = "rke2"; 165 - platforms = platforms.linux; 166 - }; 153 + meta = with lib; { 154 + homepage = "https://github.com/rancher/rke2"; 155 + description = "RKE2, also known as RKE Government, is Rancher's next-generation Kubernetes distribution"; 156 + changelog = "https://github.com/rancher/rke2/releases/tag/v${version}"; 157 + license = licenses.asl20; 158 + maintainers = with maintainers; [ 159 + rorosen 160 + zimbatm 161 + zygot 162 + ]; 163 + mainProgram = "rke2"; 164 + platforms = platforms.linux; 167 165 }; 168 - in 169 - rke2 166 + })
+2 -2
pkgs/applications/networking/mailreaders/thunderbird/packages.nix
··· 85 85 thunderbird = thunderbird-latest; 86 86 87 87 thunderbird-latest = common { 88 - version = "136.0.1"; 89 - sha512 = "cc217f3e07620442714337ea396a7146d9d80cc973de862990a9fac7c4343e900419b71ff8c6575e563deda6daff90bec5809a9a94376cbf1019c834f4e1b1e7"; 88 + version = "137.0.1"; 89 + sha512 = "387f04aff9380c7261c574e7ef2e4972d63ebfb2768e25aa41a5ee2f3a755780a84099532cf4c1b5635db3412ab543e9b17b0a0476ec06c547b2dc678f19795f"; 90 90 91 91 updateScript = callPackage ./update.nix { 92 92 attrPath = "thunderbirdPackages.thunderbird-latest";
+2 -2
pkgs/applications/video/memento/default.nix
··· 18 18 }: 19 19 stdenv.mkDerivation (finalAttrs: { 20 20 pname = "memento"; 21 - version = "1.5.0"; 21 + version = "1.6.0"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "ripose-jp"; 25 25 repo = "Memento"; 26 26 rev = "v${finalAttrs.version}"; 27 - hash = "sha256-8kgMEHDLb2EtwmIOs6WQO3a1QSypwN1FX/f2n7uRBFs="; 27 + hash = "sha256-IvzvlToSyA20FWU0x+wgE3rT0dYbuY6xyaGgz1D1f6Q="; 28 28 }; 29 29 30 30 nativeBuildInputs = [
+7 -4
pkgs/by-name/al/alive2/package.nix
··· 8 8 llvm_18, 9 9 cmake, 10 10 ninja, 11 + nix-update-script, 11 12 }: 12 13 13 14 clangStdenv.mkDerivation (finalAttrs: { 14 15 pname = "alive2"; 15 - version = "0-unstable-2024-09-23"; 16 + version = "20.0"; 16 17 17 18 src = fetchFromGitHub { 18 19 owner = "AliveToolkit"; 19 20 repo = "alive2"; 20 - rev = "05a964284056b38a6dc1f807e7acad64a0308328"; 21 - sha256 = "sha256-okKKUU7WLXLD9Hvsfoz+1HQWoyQ/bqRpBk5ogr7kSJA="; 21 + tag = "v${finalAttrs.version}"; 22 + hash = "sha256-4QNrBRGH+rxXwb7zTRYAixxipN3ybcXuWCmO+BLU9r4="; 22 23 }; 23 24 24 25 nativeBuildInputs = [ ··· 56 57 runHook postInstall 57 58 ''; 58 59 60 + passthru.updateScript = nix-update-script { }; 61 + 59 62 meta = { 60 63 description = "Automatic verification of LLVM optimizations"; 61 64 homepage = "https://github.com/AliveToolkit/alive2"; 62 65 license = lib.licenses.mit; 63 66 platforms = lib.platforms.all; 64 - maintainers = with lib.maintainers; [ shogo ]; 67 + maintainers = with lib.maintainers; [ shogo ] ++ lib.teams.ngi.members; 65 68 mainProgram = "alive"; 66 69 }; 67 70 })
+2 -2
pkgs/by-name/an/ansible-navigator/package.nix
··· 7 7 }: 8 8 python3Packages.buildPythonApplication rec { 9 9 pname = "ansible-navigator"; 10 - version = "25.1.0"; 10 + version = "25.4.0"; 11 11 pyproject = true; 12 12 13 13 disabled = python3Packages.pythonOlder "3.10"; ··· 15 15 src = fetchPypi { 16 16 inherit version; 17 17 pname = "ansible_navigator"; 18 - hash = "sha256-WcA14CiUUNXa+yR1IzoyQ7LWBXFI8yzV+xpRj2W8lzQ="; 18 + hash = "sha256-nZmL7AExd7lkg6U3XNZxF5lbP2GMxNhbKf3zuU3kkgc="; 19 19 }; 20 20 21 21 build-system = with python3Packages; [
+12 -6
pkgs/by-name/an/anthy/package.nix
··· 11 11 12 12 postPatch = lib.optionalString (!stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 13 13 # for cross builds, copy build tools from the native package 14 - cp -r "${buildPackages.anthy}"/lib/internals/{mkdepgraph,.libs} depgraph/ 15 - cp -r "${buildPackages.anthy}"/lib/internals/{mkworddic,.libs} mkworddic/ 16 - cp -r "${buildPackages.anthy}"/lib/internals/{calctrans,.libs} calctrans/ 17 - cp -r "${buildPackages.anthy}"/lib/internals/{mkfiledic,.libs} mkanthydic/ 14 + cp -r "${buildPackages.anthy.dev}"/lib/internals/{mkdepgraph,.libs} depgraph/ 15 + cp -r "${buildPackages.anthy.dev}"/lib/internals/{mkworddic,.libs} mkworddic/ 16 + cp -r "${buildPackages.anthy.dev}"/lib/internals/{calctrans,.libs} calctrans/ 17 + cp -r "${buildPackages.anthy.dev}"/lib/internals/{mkfiledic,.libs} mkanthydic/ 18 18 substituteInPlace mkworddic/Makefile.in \ 19 19 --replace-fail 'anthy.wdic : mkworddic' 'anthy.wdic : ' \ 20 20 --replace-fail 'all: ' 'all: anthy.wdic #' ··· 30 30 --replace-fail 'all-am: Makefile $(PROGRAMS) $(SCRIPTS) $(DATA)' 'all-am: $(DATA)' 31 31 ''; 32 32 33 + outputs = [ 34 + "out" 35 + "dev" 36 + ]; 37 + 33 38 meta = with lib; { 34 39 description = "Hiragana text to Kana Kanji mixed text Japanese input method"; 35 40 homepage = "https://anthy.osdn.jp/"; ··· 39 44 }; 40 45 41 46 postFixup = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 42 - mkdir "$out/lib/internals" 43 - cp -r depgraph/{mkdepgraph,.libs} mkworddic/{mkworddic,.libs} calctrans/{calctrans,.libs} mkanthydic/{mkfiledic,.libs} "$out/lib/internals" 47 + # not relevant for installed package 48 + mkdir "$dev/lib/internals" 49 + cp -r depgraph/{mkdepgraph,.libs} mkworddic/{mkworddic,.libs} calctrans/{calctrans,.libs} mkanthydic/{mkfiledic,.libs} "$dev/lib/internals" 44 50 ''; 45 51 46 52 src = fetchurl {
+116
pkgs/by-name/bu/buildstream/package.nix
··· 1 + { 2 + lib, 3 + python3Packages, 4 + fetchFromGitHub, 5 + 6 + # buildInputs 7 + buildbox, 8 + fuse3, 9 + lzip, 10 + patch, 11 + 12 + # tests 13 + addBinToPathHook, 14 + gitMinimal, 15 + versionCheckHook, 16 + }: 17 + 18 + python3Packages.buildPythonApplication rec { 19 + pname = "buildstream"; 20 + version = "2.4.1"; 21 + pyproject = true; 22 + 23 + src = fetchFromGitHub { 24 + owner = "apache"; 25 + repo = "buildstream"; 26 + tag = version; 27 + hash = "sha256-6a0VzYO5yj7EHvAb0xa4xZ0dgBKjFcwKv2F4o93oahY="; 28 + }; 29 + 30 + build-system = with python3Packages; [ 31 + cython 32 + pdm-pep517 33 + setuptools 34 + setuptools-scm 35 + ]; 36 + 37 + dependencies = with python3Packages; [ 38 + click 39 + dulwich 40 + grpcio 41 + jinja2 42 + markupsafe 43 + packaging 44 + pluginbase 45 + protobuf 46 + psutil 47 + pyroaring 48 + requests 49 + ruamel-yaml 50 + ruamel-yaml-clib 51 + tomlkit 52 + ujson 53 + ]; 54 + 55 + buildInputs = [ 56 + buildbox 57 + fuse3 58 + lzip 59 + patch 60 + ]; 61 + 62 + pythonImportsCheck = [ "buildstream" ]; 63 + 64 + nativeCheckInputs = [ 65 + addBinToPathHook 66 + buildbox 67 + gitMinimal 68 + python3Packages.pexpect 69 + python3Packages.pyftpdlib 70 + python3Packages.pytest-datafiles 71 + python3Packages.pytest-env 72 + python3Packages.pytest-timeout 73 + python3Packages.pytest-xdist 74 + python3Packages.pytestCheckHook 75 + versionCheckHook 76 + ]; 77 + 78 + disabledTests = [ 79 + # ValueError: Unexpected comparison between all and '' 80 + "test_help" 81 + 82 + # Error loading project: project.conf [line 37 column 2]: Failed to load source-mirror plugin 'mirror': No package metadata was found for sample-plugins 83 + "test_source_mirror_plugin" 84 + 85 + # AssertionError: assert '1a5528cad211...0bbe5ee314c14' == '2ccfee62a657...52dbc47203a88' 86 + "test_fixed_cas_import" 87 + "test_random_cas_import" 88 + 89 + # Runtime error: The FUSE stager child process unexpectedly died with exit code 2 90 + "test_patch_sources_cached_1" 91 + "test_patch_sources_cached_2" 92 + "test_source_cache_key" 93 + "test_custom_transform_source" 94 + 95 + # Blob not found in the local CAS 96 + "test_source_pull_partial_fallback_fetch" 97 + ]; 98 + 99 + disabledTestPaths = [ 100 + # FileNotFoundError: [Errno 2] No such file or directory: '/build/source/tmp/popen-gw1/test_report_when_cascache_exit0/buildbox-casd' 101 + "tests/internals/cascache.py" 102 + ]; 103 + 104 + versionCheckProgram = "${placeholder "out"}/bin/bst"; 105 + versionCheckProgramArg = "--version"; 106 + 107 + meta = { 108 + description = "Powerful software integration tool"; 109 + downloadPage = "https://buildstream.build/install.html"; 110 + homepage = "https://buildstream.build"; 111 + license = lib.licenses.asl20; 112 + platforms = lib.platforms.linux; 113 + mainProgram = "bst"; 114 + maintainers = with lib.maintainers; [ shymega ]; 115 + }; 116 + }
+3 -3
pkgs/by-name/ca/caido/package.nix
··· 15 15 "cli" 16 16 "desktop" 17 17 ]; 18 - version = "0.45.1"; 18 + version = "0.47.1"; 19 19 cli = fetchurl { 20 20 url = "https://caido.download/releases/v${version}/caido-cli-v${version}-linux-x86_64.tar.gz"; 21 - hash = "sha256-tudXyf9wwWABMGwfsxaLJtkZPKImlgjzfJJYFtimQOE="; 21 + hash = "sha256-T+NOp5UEKcP8slDddQ9vyrrpoZVGEChJ379Da5E7pVw="; 22 22 }; 23 23 desktop = fetchurl { 24 24 url = "https://caido.download/releases/v${version}/caido-desktop-v${version}-linux-x86_64.AppImage"; 25 - hash = "sha256-meNB1KCtxApsP95476ggL2gbCxu2fdold6BQ2dlZqFc="; 25 + hash = "sha256-J2FvEdLy77uO52KNlugZZ+flsraKatXT2n17npMYo9M="; 26 26 }; 27 27 appimageContents = appimageTools.extractType2 { 28 28 inherit pname version;
+3 -3
pkgs/by-name/ca/cargo-temp/package.nix
··· 6 6 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "cargo-temp"; 9 - version = "0.3.2"; 9 + version = "0.3.3"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "yozhgoor"; 13 13 repo = "cargo-temp"; 14 14 rev = "v${version}"; 15 - hash = "sha256-ejcqgfnvIGUhidhJpAh6uJrm8oFb8rS98wRI3iQBP9I="; 15 + hash = "sha256-71kAlZKSBnROZ8wXe4kQa8nNug5/hk6NKsqHoQU5pWc="; 16 16 }; 17 17 18 18 useFetchCargoVendor = true; 19 - cargoHash = "sha256-lfahdQtv35VH9XTApcu/GIR2QOqXKlb8Gpy6X58LmpA="; 19 + cargoHash = "sha256-rHTEWc3JAnsz5z+NmTb84VSXHSR6nNlb5C+n9VxvnUQ="; 20 20 21 21 meta = with lib; { 22 22 description = "CLI tool that allow you to create a temporary new Rust project using cargo with already installed dependencies";
+20 -8
pkgs/by-name/cn/cnsprcy/package.nix
··· 5 5 sqlite, 6 6 }: 7 7 8 - rustPlatform.buildRustPackage { 8 + rustPlatform.buildRustPackage (finalAttrs: { 9 9 pname = "cnsprcy"; 10 - version = "0.2.0"; 10 + version = "0.3.2"; 11 11 12 12 src = fetchFromSourcehut { 13 13 owner = "~xaos"; 14 14 repo = "cnsprcy"; 15 - rev = "v0.2.0"; 16 - hash = "sha256-f+DauSU4bT3EljY8/ig7jLnUgyDPEo2NSBQcPN0iKx0="; 15 + rev = "cnspr/v${finalAttrs.version}"; 16 + hash = "sha256-wwsemwN87YsNRLkr0UNbzSLF2WDaKY6IFXew64g4QoU="; 17 17 }; 18 18 19 + sourceRoot = "${finalAttrs.src.name}/v${finalAttrs.version}"; 20 + 19 21 useFetchCargoVendor = true; 20 - cargoHash = "sha256-lPTufjKOXMvPy+cP1UyVCTfRXkOmzZqDR6yraIgk+Dg="; 21 22 22 - RUSTC_BOOTSTRAP = true; 23 + cargoHash = "sha256-8hNuF5tD1PwdIJB0q3wxDOGDcppo0ac+zol3AHWGv0s="; 23 24 25 + passthru.updateScript = lib.mkUpdateScript { 26 + extraFetchers = [ fetchFromSourcehut ]; 27 + }; 28 + 29 + RUSTC_BOOTSTRAP = true; 24 30 buildInputs = [ sqlite ]; 25 31 26 32 meta = { 27 33 description = "End to end encrypted connections between trusted devices"; 28 34 homepage = "https://git.sr.ht/~xaos/cnsprcy"; 29 35 license = lib.licenses.gpl3; 30 - maintainers = with lib.maintainers; [ supinie ]; 36 + maintainers = 37 + with lib.maintainers; 38 + [ 39 + supinie 40 + oluchitheanalyst 41 + ] 42 + ++ lib.teams.ngi.members; 31 43 mainProgram = "cnspr"; 32 44 platforms = lib.platforms.linux; 33 45 }; 34 - } 46 + })
+28
pkgs/by-name/dm/dmitry/implicit-function-declaration.patch
··· 1 + --- 2 + src/dmitry.c | 1 + 3 + src/file.c | 2 ++ 4 + 2 files changed, 3 insertions(+) 5 + 6 + diff --git a/src/dmitry.c b/src/dmitry.c 7 + index d47f231..567482d 100644 8 + --- a/src/dmitry.c 9 + +++ b/src/dmitry.c 10 + @@ -9,6 +9,7 @@ 11 + #include <ctype.h> 12 + #include <string.h> 13 + #include <signal.h> 14 + +#include <stdlib.h> 15 + #include <sys/types.h> 16 + #include <sys/socket.h> 17 + #include <netinet/in.h> 18 + diff --git a/src/file.c b/src/file.c 19 + index f4ad48b..3714786 100644 20 + --- a/src/file.c 21 + +++ b/src/file.c 22 + @@ -1,4 +1,6 @@ 23 + #include "includes/file.h" 24 + +#include <string.h> 25 + +#include <stdlib.h> 26 + int file_prep() 27 + { 28 + outputfile[strlen(outputfile)] = '\0';
+6 -4
pkgs/by-name/dm/dmitry/package.nix
··· 16 16 hash = "sha256-cYFeBM8xFMaLXYk6Rg+5JvfbbIJI9F3mefzCX3+XbB0="; 17 17 }; 18 18 19 + patches = [ ./implicit-function-declaration.patch ]; 20 + 19 21 nativeBuildInputs = [ autoreconfHook ]; 20 22 21 23 env.NIX_CFLAGS_COMPILE = toString [ "-fcommon" ]; 22 24 23 - meta = with lib; { 25 + meta = { 24 26 description = "Deepmagic Information Gathering Tool"; 25 27 mainProgram = "dmitry"; 26 28 homepage = "https://github.com/jaygreig86/dmitry"; 27 - maintainers = with maintainers; [ d3vil0p3r ]; 28 - platforms = platforms.linux; 29 - license = licenses.gpl2Plus; 29 + maintainers = with lib.maintainers; [ d3vil0p3r ]; 30 + platforms = lib.platforms.linux; 31 + license = lib.licenses.gpl2Plus; 30 32 }; 31 33 }
+6 -2
pkgs/by-name/do/docfd/package.nix
··· 21 21 in 22 22 buildDunePackage' rec { 23 23 pname = "docfd"; 24 - version = "8.0.3"; 24 + version = "10.1.3"; 25 25 26 26 minimalOCamlVersion = "5.1"; 27 27 ··· 29 29 owner = "darrenldl"; 30 30 repo = "docfd"; 31 31 rev = version; 32 - hash = "sha256-890/3iBruaQtWwlcvwuz4ujp7+P+5y1/2Axx4Iuik8Q="; 32 + hash = "sha256-ZD1nKl/hfidlTGdBnNINt2EmlUmFWaJjSvY3wkyJJcg="; 33 33 }; 34 34 35 35 nativeBuildInputs = [ ··· 42 42 cmdliner 43 43 containers-data 44 44 decompress 45 + diet 45 46 digestif 46 47 eio_main 47 48 lwd 48 49 nottui 49 50 notty 51 + ocaml_sqlite3 50 52 ocolor 51 53 oseq 52 54 ppx_deriving 53 55 ppxlib 56 + progress 54 57 re 55 58 spelll 56 59 timedesc 60 + uuseg 57 61 yojson 58 62 ]; 59 63
-104
pkgs/by-name/do/dokieli/package.json
··· 1 - { 2 - "name": "dokieli", 3 - "version": "0.3.1417", 4 - "description": "dokieli is a clientside editor for decentralised article publishing, annotations, and social interactions.", 5 - "main": "./src/dokieli.js", 6 - "type": "module", 7 - "scripts": { 8 - "build-dist": "webpack --progress --color", 9 - "build": "yarn build-dist", 10 - "test": "TZ=UTC node --experimental-vm-modules node_modules/jest/bin/jest.js --silent", 11 - "test:e2e": "playwright test", 12 - "watch": "webpack --progress --color --watch", 13 - "minify": "webpack --progress --color --env minimize", 14 - "postinstall": "patch-package", 15 - "lint": "eslint ." 16 - }, 17 - "repository": "https://github.com/linkeddata/dokieli", 18 - "keywords": [ 19 - "activitystreams", 20 - "activitypub", 21 - "annotations", 22 - "authoring", 23 - "decentralized", 24 - "editor", 25 - "knowledge graph", 26 - "linked data", 27 - "notifications", 28 - "publishing", 29 - "social web", 30 - "web standards" 31 - ], 32 - "author": "dokieli team", 33 - "license": "Apache-2.0", 34 - "bugs": { 35 - "url": "https://github.com/linkeddata/dokieli/issues" 36 - }, 37 - "homepage": "https://dokie.li/", 38 - "engines": { 39 - "node": ">=18.0.0" 40 - }, 41 - "dependencies": { 42 - "buffer": "^6.0.3", 43 - "d3-force": "^3.0.0", 44 - "d3-selection": "^3.0.0", 45 - "diff": "^5.2.0", 46 - "dompurify": "^3.1.5", 47 - "fs": "^0.0.1-security", 48 - "http-link-header": "^1.1.3", 49 - "leaflet": "^1.9.4", 50 - "leaflet-gpx": "^1.7.0", 51 - "medium-editor": "^5.23.3", 52 - "medium-editor-tables": "^0.6.1", 53 - "micromark": "^4.0.0", 54 - "micromark-extension-gfm": "^3.0.0", 55 - "micromark-extension-gfm-tagfilter": "^2.0.0", 56 - "rdf-parser-rdfa": "https://github.com/rdf-ext/rdf-parser-rdfa.git#master", 57 - "rdf-store-ldp": "^0.3.1", 58 - "shower": "https://github.com/shower/core.git#main", 59 - "simplerdf": "^0.2.14", 60 - "simplerdf-parse": "^0.1.3", 61 - "solid-auth-client": "^2.5.6" 62 - }, 63 - "devDependencies": { 64 - "@axe-core/playwright": "^4.9.1", 65 - "@playwright/test": "^1.44.1", 66 - "babel-eslint": "^10.1.0", 67 - "dotenv": "^16.4.5", 68 - "eslint": "^9.10.0", 69 - "eslint-plugin-jest": "^27.9.0", 70 - "husky": "^9.0.11", 71 - "jest": "^29.0.3", 72 - "jest-environment-jsdom": "^29.0.3", 73 - "patch-package": "^8.0.0", 74 - "process": "^0.11.10", 75 - "terser-webpack-plugin": "^5.3.3", 76 - "webpack": "5.94.0", 77 - "webpack-cli": "^5.0.1" 78 - }, 79 - "resolutions": { 80 - "ansi-regex": "^5.0.0", 81 - "xmldom": "https://github.com/xmldom/xmldom.git#master", 82 - "green-turtle": "https://github.com/csarven/green-turtle#master", 83 - "json5": "^1.0.2", 84 - "http-cache-semantics": "^4.1.1", 85 - "jsonld": "^5.0.0", 86 - "xml2js": "^0.6.2", 87 - "semver": "^7.6.2", 88 - "lru-cache": "^8.0.0", 89 - "micromatch": "^4.0.8" 90 - }, 91 - "standard": { 92 - "globals": [ 93 - "DO", 94 - "SimpleRDF", 95 - "ld", 96 - "describe", 97 - "it", 98 - "before", 99 - "beforeEach", 100 - "after", 101 - "afterEach" 102 - ] 103 - } 104 - }
+25 -12
pkgs/by-name/do/dokieli/package.nix
··· 1 1 { 2 2 lib, 3 - mkYarnPackage, 3 + stdenv, 4 4 fetchFromGitHub, 5 5 fetchYarnDeps, 6 + yarnConfigHook, 6 7 makeWrapper, 8 + yarnBuildHook, 9 + yarnInstallHook, 7 10 nodejs, 8 11 xsel, 9 12 }: 10 13 11 - mkYarnPackage rec { 14 + stdenv.mkDerivation (finalAttrs: { 12 15 pname = "dokieli"; 13 - version = "0-unstable-2024-09-23"; 16 + version = "0-unstable-2024-12-12"; 14 17 18 + # Can't update newer versions currently because newer versions require yarn-berry, and it's not in nixpkgs, yet. 15 19 src = fetchFromGitHub { 16 20 owner = "linkeddata"; 17 21 repo = "dokieli"; 18 - rev = "40ebbc60ba48d8b08f763b07befba96382c5f027"; 19 - hash = "sha256-lc96jOR8uXLcZFhN3wpSd9O5cUdKxllB8WWCh2oWuEw="; 22 + rev = "d8dc72c81b84ec12f791892a6377a7f6ec46ed3b"; 23 + hash = "sha256-CzSyQVyeJVOP8NCsa7ST3atG87V1KPSBzTRi0brMFYw="; 20 24 }; 21 25 22 26 offlineCache = fetchYarnDeps { 23 - yarnLock = src + "/yarn.lock"; 24 - hash = "sha256-TEXCCLFhpwHZJ8zRGsC7J6EwNaFpIi+CZ3L5uilebK4="; 27 + yarnLock = "${finalAttrs.src}/yarn.lock"; 28 + hash = 29 + if stdenv.hostPlatform.isDarwin then 30 + "sha256-bw5HszcHZ60qgYgm4qfhZEYXjJAQ2DXhWU0Reqb9VpQ=" 31 + else 32 + "sha256-rwHBDBWZe4cdTyL7lNkB4nlpd5MWzbTU6kzdLBWcq0M="; 25 33 }; 26 - 27 - packageJSON = ./package.json; 28 34 29 35 installPhase = '' 30 36 mkdir -p $out/bin 31 37 cp -r * $out 32 38 ''; 33 39 34 - nativeBuildInputs = [ makeWrapper ]; 40 + nativeBuildInputs = [ 41 + makeWrapper 42 + yarnConfigHook 43 + yarnBuildHook 44 + yarnInstallHook 45 + # Needed for executing package.json scripts 46 + nodejs 47 + ]; 35 48 36 49 postFixup = '' 37 50 makeWrapper ${nodejs}/bin/npx $out/bin/dokieli \ ··· 52 65 homepage = "https://github.com/linkeddata/dokieli"; 53 66 license = lib.licenses.mit; 54 67 platforms = lib.platforms.all; 55 - maintainers = with lib.maintainers; [ shogo ]; 68 + maintainers = with lib.maintainers; [ shogo ] ++ lib.teams.ngi.members; 56 69 mainProgram = "dokieli"; 57 70 }; 58 - } 71 + })
+2 -2
pkgs/by-name/er/erofs-utils/package.nix
··· 19 19 20 20 stdenv.mkDerivation (finalAttrs: { 21 21 pname = "erofs-utils"; 22 - version = "1.8.5"; 22 + version = "1.8.6"; 23 23 outputs = [ 24 24 "out" 25 25 "man" ··· 30 30 31 31 src = fetchurl { 32 32 url = "https://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs-utils.git/snapshot/erofs-utils-${finalAttrs.version}.tar.gz"; 33 - hash = "sha256-zYYRJw6chv4GL2RxA8pq2p7XEORDD91ZYNUUd3kZIA0="; 33 + hash = "sha256-WyIdw/1tFRQlswU07eRvt6kNwjOoZZy6A3J5awoGZUc="; 34 34 }; 35 35 36 36 nativeBuildInputs = [
+1 -1
pkgs/by-name/gc/gclient2nix/gclient2nix.py
··· 23 23 logger = logging.getLogger(__name__) 24 24 click_log.basic_config(logger) 25 25 26 - nixpkgs_path = "@nixpkgs_path@" 26 + nixpkgs_path = "<nixpkgs>" 27 27 28 28 memory: Memory = Memory(user_cache_dir("gclient2nix"), verbose=0) 29 29
-2
pkgs/by-name/gc/gclient2nix/package.nix
··· 3 3 python3, 4 4 runCommand, 5 5 makeWrapper, 6 - path, 7 6 fetchgit, 8 7 nurl, 9 8 writers, ··· 66 65 buildInputs = [ python ]; 67 66 68 67 # substitutions 69 - nixpkgs_path = if builtins.pathExists (path + "/.git") then lib.cleanSource path else path; 70 68 depot_tools_checkout = fetchgit { 71 69 url = "https://chromium.googlesource.com/chromium/tools/depot_tools"; 72 70 rev = "452fe3be37f78fbecefa1b4b0d359531bcd70d0d";
+22 -6
pkgs/by-name/gi/git-pr/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "git-pr"; 9 - version = "0.0.2"; 9 + version = "0.3.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "picosh"; 13 13 repo = "git-pr"; 14 14 rev = "v${version}"; 15 - hash = "sha256-7Ka8p5X8nQBXKiT6QsWOWMQJL8rePKrHz/LZU1W+oQ8="; 15 + hash = "sha256-2A2rP7yr8faVoIYAWprr+t7MwDPerhsuOjWWEl1mhXw="; 16 16 }; 17 17 18 - vendorHash = "sha256-tu5C7hz6UTgn/jCCotXzZHlUmGVNERhA7Osxi31Domk="; 18 + vendorHash = "sha256-7aHr5CWZVmhBiuCXaK49zYJXMufCxZBnS917mF0QJlg="; 19 + 20 + subPackages = [ 21 + "cmd/ssh" 22 + "cmd/web" 23 + ]; 24 + 25 + env.CGO_ENABLED = 0; 26 + 27 + ldflags = [ 28 + "-s" 29 + "-w" 30 + ]; 19 31 20 32 postInstall = '' 21 33 mv $out/bin/ssh $out/bin/git-ssh 34 + mv $out/bin/web $out/bin/git-web 22 35 ''; 23 36 24 37 meta = { 25 38 homepage = "https://pr.pico.sh"; 26 39 description = "Simple git collaboration tool"; 27 - license = lib.licenses.bsd3; 28 - maintainers = with lib.maintainers; [ sigmanificient ]; 29 - mainProgram = "git-pr"; 40 + license = lib.licenses.mit; 41 + maintainers = with lib.maintainers; [ 42 + sigmanificient 43 + jolheiser 44 + ]; 45 + mainProgram = "git-ssh"; 30 46 }; 31 47 }
+66 -43
pkgs/by-name/gi/gitlab-runner/package.nix
··· 1 1 { 2 2 lib, 3 + stdenv, 4 + bash, 3 5 buildGoModule, 4 6 fetchFromGitLab, 5 - bash, 7 + nix-update-script, 8 + versionCheckHook, 6 9 }: 7 10 8 - let 9 - version = "17.2.0"; 10 - in 11 - buildGoModule rec { 12 - inherit version; 11 + buildGoModule (finalAttrs: { 13 12 pname = "gitlab-runner"; 14 - 15 - commonPackagePath = "gitlab.com/gitlab-org/gitlab-runner/common"; 16 - ldflags = [ 17 - "-X ${commonPackagePath}.NAME=gitlab-runner" 18 - "-X ${commonPackagePath}.VERSION=${version}" 19 - "-X ${commonPackagePath}.REVISION=v${version}" 20 - ]; 21 - 22 - # For patchShebangs 23 - buildInputs = [ bash ]; 24 - 25 - vendorHash = "sha256-1MwHss76apA9KoFhEU6lYiUACrPMGYzjhds6nTyNuJI="; 13 + version = "17.2.0"; 26 14 27 15 src = fetchFromGitLab { 28 16 owner = "gitlab-org"; 29 17 repo = "gitlab-runner"; 30 - rev = "v${version}"; 18 + tag = "v${finalAttrs.version}"; 31 19 hash = "sha256-a2Igy4DS3fYTvPW1vvDrH/DjMQ4lG9cm/P3mFr+y9s4="; 32 20 }; 33 21 22 + vendorHash = "sha256-1MwHss76apA9KoFhEU6lYiUACrPMGYzjhds6nTyNuJI="; 23 + 24 + # For patchShebangs 25 + nativeBuildInputs = [ bash ]; 26 + 34 27 patches = [ 35 28 ./fix-shell-path.patch 36 29 ./remove-bash-test.patch 37 30 ]; 38 31 39 - prePatch = '' 40 - # Remove some tests that can't work during a nix build 32 + prePatch = 33 + '' 34 + # Remove some tests that can't work during a nix build 41 35 42 - # Requires to run in a git repo 43 - sed -i "s/func TestCacheArchiverAddingUntrackedFiles/func OFF_TestCacheArchiverAddingUntrackedFiles/" commands/helpers/file_archiver_test.go 44 - sed -i "s/func TestCacheArchiverAddingUntrackedUnicodeFiles/func OFF_TestCacheArchiverAddingUntrackedUnicodeFiles/" commands/helpers/file_archiver_test.go 36 + # Requires to run in a git repo 37 + sed -i "s/func TestCacheArchiverAddingUntrackedFiles/func OFF_TestCacheArchiverAddingUntrackedFiles/" commands/helpers/file_archiver_test.go 38 + sed -i "s/func TestCacheArchiverAddingUntrackedUnicodeFiles/func OFF_TestCacheArchiverAddingUntrackedUnicodeFiles/" commands/helpers/file_archiver_test.go 45 39 46 - # No writable developer environment 47 - rm common/build_test.go 48 - rm common/build_settings_test.go 49 - rm executors/custom/custom_test.go 40 + # No writable developer environment 41 + rm common/build_test.go 42 + rm common/build_settings_test.go 43 + rm executors/custom/custom_test.go 50 44 51 - # No docker during build 52 - rm executors/docker/terminal_test.go 53 - rm executors/docker/docker_test.go 54 - rm helpers/docker/auth/auth_test.go 55 - rm executors/docker/services_test.go 56 - ''; 45 + # No docker during build 46 + rm executors/docker/terminal_test.go 47 + rm executors/docker/docker_test.go 48 + rm helpers/docker/auth/auth_test.go 49 + rm executors/docker/services_test.go 50 + '' 51 + + lib.optionalString stdenv.buildPlatform.isDarwin '' 52 + # No keychain access during build breaks X.509 certificate tests 53 + rm helpers/certificate/x509_test.go 54 + rm network/client_test.go 55 + ''; 57 56 58 57 excludedPackages = [ 59 58 # CI helper script for pushing images to Docker and ECR registries 59 + # 60 60 # https://gitlab.com/gitlab-org/gitlab-runner/-/merge_requests/4139 61 61 "./scripts/sync-docker-images" 62 62 ]; 63 63 64 - postInstall = '' 65 - install packaging/root/usr/share/gitlab-runner/clear-docker-cache $out/bin 66 - ''; 64 + ldflags = 65 + let 66 + ldflagsPackageVariablePrefix = "gitlab.com/gitlab-org/gitlab-runner/common"; 67 + in 68 + [ 69 + "-X ${ldflagsPackageVariablePrefix}.NAME=gitlab-runner" 70 + "-X ${ldflagsPackageVariablePrefix}.VERSION=${finalAttrs.version}" 71 + "-X ${ldflagsPackageVariablePrefix}.REVISION=${finalAttrs.src.tag}" 72 + ]; 67 73 68 74 preCheck = '' 69 75 # Make the tests pass outside of GitLab CI 70 76 export CI=0 71 77 ''; 72 78 73 - meta = with lib; { 79 + # Many tests start servers which bind to ports 80 + __darwinAllowLocalNetworking = true; 81 + 82 + postInstall = '' 83 + install packaging/root/usr/share/gitlab-runner/clear-docker-cache $out/bin 84 + ''; 85 + 86 + doInstallCheck = true; 87 + 88 + nativeInstallCheckInputs = [ versionCheckHook ]; 89 + 90 + versionCheckProgramArg = "--version"; 91 + 92 + passthru = { 93 + updateScript = nix-update-script { }; 94 + }; 95 + 96 + meta = { 74 97 description = "GitLab Runner the continuous integration executor of GitLab"; 75 - license = licenses.mit; 76 - homepage = "https://docs.gitlab.com/runner/"; 77 - platforms = platforms.unix ++ platforms.darwin; 78 - maintainers = with maintainers; [ zimbatm ] ++ teams.gitlab.members; 98 + homepage = "https://docs.gitlab.com/runner"; 99 + license = lib.licenses.mit; 100 + mainProgram = "gitlab-runner"; 101 + maintainers = with lib.maintainers; [ zimbatm ] ++ lib.teams.gitlab.members; 79 102 }; 80 - } 103 + })
+53
pkgs/by-name/he/heynote/package.nix
··· 1 + { 2 + appimageTools, 3 + desktop-file-utils, 4 + fetchurl, 5 + lib, 6 + nix-update-script, 7 + }: 8 + let 9 + pname = "heynote"; 10 + version = "2.1.3"; 11 + 12 + src = fetchurl { 13 + url = "https://github.com/heyman/heynote/releases/download/v${version}/Heynote_${version}_x86_64.AppImage"; 14 + sha256 = "sha256-O8loDE2GzXQofh3iNQeP5OAWh7i0QCSxl4I++ERcjbU="; 15 + }; 16 + 17 + appimageContents = appimageTools.extractType2 { 18 + inherit version pname src; 19 + }; 20 + 21 + in 22 + appimageTools.wrapType2 { 23 + inherit pname version src; 24 + 25 + nativeBuildInputs = [ desktop-file-utils ]; 26 + 27 + extraInstallCommands = '' 28 + mkdir -p $out/share/pixmaps $out/share/licenses/heynote 29 + cp ${appimageContents}/heynote.png $out/share/pixmaps/ 30 + cp ${appimageContents}/heynote.desktop $out 31 + # verify binary is present 32 + stat $out/bin/heynote 33 + desktop-file-install --dir $out/share/applications \ 34 + --set-key Exec --set-value heynote \ 35 + --set-key Comment --set-value "Heynote" \ 36 + --delete-original $out/heynote.desktop 37 + ''; 38 + 39 + passthru.updateScript = nix-update-script { }; 40 + 41 + meta = { 42 + mainProgram = "heynote"; 43 + description = "Dedicated scratchpad for developers"; 44 + homepage = "https://heynote.com/"; 45 + changelog = "https://github.com/heyman/heynote/releases/v${version}"; 46 + license = with lib.licenses; [ 47 + mit 48 + commons-clause 49 + ]; 50 + maintainers = with lib.maintainers; [ jasoncrevier ]; 51 + platforms = lib.platforms.x86_64; 52 + }; 53 + }
+17 -13
pkgs/by-name/hu/hubble/package.nix
··· 3 3 buildGo124Module, 4 4 fetchFromGitHub, 5 5 installShellFiles, 6 + versionCheckHook, 6 7 }: 7 8 8 9 buildGo124Module rec { 9 10 pname = "hubble"; 10 - version = "1.17.1"; 11 + version = "1.17.2"; 11 12 12 13 src = fetchFromGitHub { 13 14 owner = "cilium"; 14 - repo = pname; 15 - rev = "v${version}"; 16 - sha256 = "sha256-ZrLb2dITQPd9g4azlidpTHFWNwop0AMKEIzwMX1Y7Jw="; 15 + repo = "hubble"; 16 + tag = "v${version}"; 17 + hash = "sha256-ZkowUftSEGo+UjYM+kk3tQJc8QJgoJATeIKPwu2ikQ4="; 17 18 }; 19 + 20 + nativeBuildInputs = [ 21 + installShellFiles 22 + versionCheckHook 23 + ]; 18 24 19 25 vendorHash = null; 20 26 21 27 ldflags = [ 22 28 "-s" 23 29 "-w" 24 - "-X github.com/cilium/cilium/hubble/pkg.GitBranch=none" 25 - "-X github.com/cilium/cilium/hubble/pkg.GitHash=none" 26 - "-X github.com/cilium/cilium/hubble/pkg.Version=${version}" 30 + "-X=github.com/cilium/cilium/hubble/pkg.GitBranch=none" 31 + "-X=github.com/cilium/cilium/hubble/pkg.GitHash=none" 32 + "-X=github.com/cilium/cilium/hubble/pkg.Version=${version}" 27 33 ]; 28 34 29 35 # Test fails at Test_getFlowsRequestWithInvalidRawFilters in github.com/cilium/hubble/cmd/observe ··· 31 37 # https://github.com/cilium/hubble/pull/656 32 38 # https://github.com/cilium/hubble/pull/655 33 39 doCheck = false; 40 + 34 41 doInstallCheck = true; 35 - installCheckPhase = '' 36 - $out/bin/hubble version | grep ${version} > /dev/null 37 - ''; 38 42 39 - nativeBuildInputs = [ installShellFiles ]; 40 43 postInstall = '' 41 44 installShellCompletion --cmd hubble \ 42 45 --bash <($out/bin/hubble completion bash) \ ··· 46 49 47 50 meta = with lib; { 48 51 description = "Network, Service & Security Observability for Kubernetes using eBPF"; 49 - mainProgram = "hubble"; 52 + homepage = "https://github.com/cilium/hubble/"; 53 + changelog = "https://github.com/cilium/hubble/releases/tag/${src.tag}"; 50 54 license = licenses.asl20; 51 - homepage = "https://github.com/cilium/hubble/"; 52 55 maintainers = with maintainers; [ 53 56 humancalico 54 57 bryanasdev000 55 58 FKouhai 56 59 ]; 60 + mainProgram = "hubble"; 57 61 }; 58 62 }
+3 -3
pkgs/by-name/mo/mountpoint-s3/package.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "mountpoint-s3"; 12 - version = "1.14.0"; 12 + version = "1.16.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "awslabs"; 16 16 repo = "mountpoint-s3"; 17 17 rev = "v${version}"; 18 - hash = "sha256-QpJYpHow9/vEPrq82XtbDosGz8lqVB0cOPQmY7Dx78Q="; 18 + hash = "sha256-/a9chdeijaGKJ3nDDYYZLdS9JrZiAjC8QFQ6bjdLWT8="; 19 19 fetchSubmodules = true; 20 20 }; 21 21 22 22 useFetchCargoVendor = true; 23 - cargoHash = "sha256-QeRCCu7d4fdRfiw3qdbyFk+N0nT+IYKVJ/NvieejVQg="; 23 + cargoHash = "sha256-qFPvNCRF3eUprj2/88RF+H5O3Kz9QF9SQqPfXb9Yogo="; 24 24 25 25 # thread 'main' panicked at cargo-auditable/src/collect_audit_data.rs:77:9: 26 26 # cargo metadata failure: error: none of the selected packages contains these features: libfuse3
+2 -2
pkgs/by-name/my/mympd/package.nix
··· 18 18 19 19 stdenv.mkDerivation (finalAttrs: { 20 20 pname = "mympd"; 21 - version = "20.1.1"; 21 + version = "20.1.2"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "jcorporation"; 25 25 repo = "myMPD"; 26 26 rev = "v${finalAttrs.version}"; 27 - sha256 = "sha256-A78dT/BervM4rlVlbEYojNsG7wvESvKsm9nYjI9svb4="; 27 + sha256 = "sha256-u4Ne32gKkA1bFOIaa3uFEMxjhERXTVpqnnCBXQktDAs="; 28 28 }; 29 29 30 30 nativeBuildInputs = [
+14 -2
pkgs/by-name/ni/nixos-rebuild-ng/src/nixos_rebuild/__init__.py
··· 396 396 raise NRError( 397 397 "please specify one of the following " 398 398 + "supported image variants via --image-variant:\n" 399 - + "\n".join(f"- {v}" for v in variants.keys()) 399 + + "\n".join(f"- {v}" for v in variants) 400 400 ) 401 401 402 402 match action: ··· 518 518 "Done. The virtual machine can be started by running", vm_path 519 519 ) 520 520 case Action.BUILD_IMAGE: 521 - disk_path = path_to_config / variants[args.image_variant] 521 + if flake: 522 + image_name = nix.get_build_image_name_flake( 523 + flake, 524 + args.image_variant, 525 + eval_flags=flake_common_flags, 526 + ) 527 + else: 528 + image_name = nix.get_build_image_name( 529 + build_attr, 530 + args.image_variant, 531 + instantiate_flags=flake_common_flags, 532 + ) 533 + disk_path = path_to_config / image_name 522 534 print_result("Done. The disk image can be found in", disk_path) 523 535 524 536 case Action.EDIT:
+1 -1
pkgs/by-name/ni/nixos-rebuild-ng/src/nixos_rebuild/models.py
··· 8 8 9 9 from .process import Remote, run_wrapper 10 10 11 - type ImageVariants = dict[str, str] 11 + type ImageVariants = list[str] 12 12 13 13 14 14 class NRError(Exception):
+55 -2
pkgs/by-name/ni/nixos-rebuild-ng/src/nixos_rebuild/nix.py
··· 266 266 return Path(r.stdout.strip()) 267 267 268 268 269 + def get_build_image_name( 270 + build_attr: BuildAttr, 271 + image_variant: str, 272 + instantiate_flags: Args | None = None, 273 + ) -> str: 274 + path = ( 275 + f'"{build_attr.path.resolve()}"' 276 + if isinstance(build_attr.path, Path) 277 + else build_attr.path 278 + ) 279 + r = run_wrapper( 280 + [ 281 + "nix-instantiate", 282 + "--eval", 283 + "--strict", 284 + "--json", 285 + "--expr", 286 + textwrap.dedent(f""" 287 + let 288 + value = import {path}; 289 + set = if builtins.isFunction value then value {{}} else value; 290 + in 291 + set.{build_attr.to_attr("config.system.build.images", image_variant, "passthru", "filePath")} 292 + """), 293 + *dict_to_flags(instantiate_flags), 294 + ], 295 + stdout=PIPE, 296 + ) 297 + j: str = json.loads(r.stdout.strip()) 298 + return j 299 + 300 + 301 + def get_build_image_name_flake( 302 + flake: Flake, 303 + image_variant: str, 304 + eval_flags: Args | None = None, 305 + ) -> str: 306 + r = run_wrapper( 307 + [ 308 + "nix", 309 + "eval", 310 + "--json", 311 + flake.to_attr( 312 + "config.system.build.images", image_variant, "passthru", "filePath" 313 + ), 314 + *dict_to_flags(eval_flags), 315 + ], 316 + stdout=PIPE, 317 + ) 318 + j: str = json.loads(r.stdout.strip()) 319 + return j 320 + 321 + 269 322 def get_build_image_variants( 270 323 build_attr: BuildAttr, 271 324 instantiate_flags: Args | None = None, ··· 287 340 value = import {path}; 288 341 set = if builtins.isFunction value then value {{}} else value; 289 342 in 290 - builtins.mapAttrs (n: v: v.passthru.filePath) set.{build_attr.to_attr("config.system.build.images")} 343 + builtins.attrNames set.{build_attr.to_attr("config.system.build.images")} 291 344 """), 292 345 *dict_to_flags(instantiate_flags), 293 346 ], ··· 308 361 "--json", 309 362 flake.to_attr("config.system.build.images"), 310 363 "--apply", 311 - "builtins.mapAttrs (n: v: v.passthru.filePath)", 364 + "builtins.attrNames", 312 365 *dict_to_flags(eval_flags), 313 366 ], 314 367 stdout=PIPE,
+14 -8
pkgs/by-name/ni/nixos-rebuild-ng/src/tests/test_main.py
··· 347 347 return CompletedProcess( 348 348 [], 349 349 0, 350 - """ 351 - { 352 - "azure": "nixos-image-azure-25.05.20250102.6df2492-x86_64-linux.vhd", 353 - "vmware": "nixos-image-vmware-25.05.20250102.6df2492-x86_64-linux.vmdk" 354 - } 355 - """, 350 + '"nixos-image-azure-25.05.20250102.6df2492-x86_64-linux.vhd"', 356 351 ) 357 352 elif args[0] == "nix": 358 353 return CompletedProcess([], 0, str(config_path)) ··· 372 367 ] 373 368 ) 374 369 375 - assert mock_run.call_count == 2 370 + assert mock_run.call_count == 3 376 371 mock_run.assert_has_calls( 377 372 [ 378 373 call( ··· 382 377 "--json", 383 378 "/path/to/config#nixosConfigurations.hostname.config.system.build.images", 384 379 "--apply", 385 - "builtins.mapAttrs (n: v: v.passthru.filePath)", 380 + "builtins.attrNames", 386 381 ], 387 382 check=True, 388 383 stdout=PIPE, ··· 396 391 "build", 397 392 "--print-out-paths", 398 393 "/path/to/config#nixosConfigurations.hostname.config.system.build.images.azure", 394 + ], 395 + check=True, 396 + stdout=PIPE, 397 + **DEFAULT_RUN_KWARGS, 398 + ), 399 + call( 400 + [ 401 + "nix", 402 + "eval", 403 + "--json", 404 + "/path/to/config#nixosConfigurations.hostname.config.system.build.images.azure.passthru.filePath", 399 405 ], 400 406 check=True, 401 407 stdout=PIPE,
+3 -3
pkgs/by-name/ni/nixos-rebuild-ng/src/tests/test_nix.py
··· 353 353 value = import <nixpkgs/nixos>; 354 354 set = if builtins.isFunction value then value {} else value; 355 355 in 356 - builtins.mapAttrs (n: v: v.passthru.filePath) set.config.system.build.images 356 + builtins.attrNames set.config.system.build.images 357 357 """), 358 358 ], 359 359 stdout=PIPE, ··· 376 376 value = import "{tmp_path}"; 377 377 set = if builtins.isFunction value then value {{}} else value; 378 378 in 379 - builtins.mapAttrs (n: v: v.passthru.filePath) set.preAttr.config.system.build.images 379 + builtins.attrNames set.preAttr.config.system.build.images 380 380 """), 381 381 "--inst-flag", 382 382 ], ··· 411 411 "--json", 412 412 "flake.nix#myAttr.config.system.build.images", 413 413 "--apply", 414 - "builtins.mapAttrs (n: v: v.passthru.filePath)", 414 + "builtins.attrNames", 415 415 "--eval-flag", 416 416 ], 417 417 stdout=PIPE,
+2 -2
pkgs/by-name/no/noto-fonts/package.nix
··· 20 20 21 21 stdenvNoCC.mkDerivation rec { 22 22 pname = "noto-fonts${suffix}"; 23 - version = "2025.03.01"; 23 + version = "2025.04.01"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "notofonts"; 27 27 repo = "notofonts.github.io"; 28 28 rev = "noto-monthly-release-${version}"; 29 - hash = "sha256-49p4LFGywuA6zNZEw0VmtykmDUBtRkzOKYAb4sG4fK4="; 29 + hash = "sha256-xR3P6RWb1pHdOuCbb+kQXqv3Ip3+2yXAVqeZ+f2M3VU="; 30 30 }; 31 31 32 32 outputs = [
+2 -2
pkgs/by-name/op/openvi/package.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "openvi"; 11 - version = "7.6.30"; 11 + version = "7.6.31"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "johnsonjh"; 15 15 repo = "OpenVi"; 16 16 rev = version; 17 - hash = "sha256-P4w/PM9UmHmTzS9+WDK3x3MyZ7OoY2yO/Rx0vRMJuLI="; 17 + hash = "sha256-RqmulYHQFZmTHQAYgZmB8tAG6mSquNODmssfKB8YqDU="; 18 18 }; 19 19 20 20 buildInputs = [
+3 -3
pkgs/by-name/pa/pay-respects/package.nix
··· 8 8 }: 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "pay-respects"; 11 - version = "0.6.14"; 11 + version = "0.7.0"; 12 12 13 13 src = fetchFromGitea { 14 14 domain = "codeberg.org"; 15 15 owner = "iff"; 16 16 repo = "pay-respects"; 17 17 rev = "v${version}"; 18 - hash = "sha256-D6wkLrIzFpCTzOtVD8GcfBAZS48pNAIkTUTw3DRf7ds="; 18 + hash = "sha256-xuZkZXVEXSmRGp1huVpqvjrP5kllq3fGg1Mg7wuyE3E="; 19 19 }; 20 20 21 21 useFetchCargoVendor = true; 22 - cargoHash = "sha256-QdeU+0o68j5Y0IKouyJ8ypZghuS8NKxCUpmZxi+sxuk="; 22 + cargoHash = "sha256-aocFplTvjc3zV6NL6UKzdfdx5ry+jhvi4azceC0KSKA="; 23 23 24 24 nativeBuildInputs = [ 25 25 pkg-config
+11 -4
pkgs/by-name/pe/petidomo/package.nix
··· 5 5 flex, 6 6 bison, 7 7 sendmailPath ? "/run/wrappers/bin/sendmail", 8 + versionCheckHook, 8 9 }: 9 10 10 - stdenv.mkDerivation rec { 11 + stdenv.mkDerivation (finalAttrs: { 11 12 pname = "petidomo"; 12 13 version = "4.3"; 13 14 14 15 src = fetchurl { 15 - url = "mirror://sourceforge/petidomo/${pname}-${version}.tar.gz"; 16 - sha256 = "0x4dbxc4fcfg1rw5ywpcypvylnzn3y4rh0m6fz4h4cdnzb8p1lvm"; 16 + url = "mirror://sourceforge/petidomo/petidomo-${finalAttrs.version}.tar.gz"; 17 + hash = "sha256-ddNw0fq2MQLJd6YCmIkf9lvq9/Xscl94Ds8xR1hfjXQ="; 17 18 }; 18 19 19 20 buildInputs = [ ··· 23 24 24 25 configureFlags = [ "--with-mta=${sendmailPath}" ]; 25 26 27 + # test.c:43:11: error: implicit declaration of function 'gets'; did you mean 'fgets'? 28 + env.NIX_CFLAGS_COMPILE = "-Wno-error=implicit-function-declaration"; 29 + 26 30 enableParallelBuilding = true; 27 31 28 32 doCheck = true; 33 + 34 + doInstallCheck = true; 35 + nativeInstallCheck = [ versionCheckHook ]; 29 36 30 37 meta = { 31 38 homepage = "https://petidomo.sourceforge.net/"; ··· 35 42 platforms = lib.platforms.unix; 36 43 maintainers = [ lib.maintainers.peti ]; 37 44 }; 38 - } 45 + })
+4 -4
pkgs/by-name/po/polarity/package.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "polarity"; 10 - version = "latest-unstable-2025-03-26"; 10 + version = "latest-unstable-2025-04-06"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "polarity-lang"; 14 14 repo = "polarity"; 15 - rev = "73c91061930cf10002aae4f2dd7ac301af20dfdc"; 16 - hash = "sha256-EN4xOBIrIrNBd/YQPc1xRagAvCdvEH83shb2axj9xX0="; 15 + rev = "3d661ea0485a83b0c1065595839cb2d9d594e4e8"; 16 + hash = "sha256-4NeDOGzCq211SVVtfISq/Z901Et1zYhMQ/t7eNEBW9Y="; 17 17 }; 18 18 19 19 useFetchCargoVendor = true; 20 - cargoHash = "sha256-wpO7JYLjuEbKc/a4WO4KeUxdDCI1BswvgvSH+sFh1V0="; 20 + cargoHash = "sha256-S0d64jFKiyGVIFH8HhT4mzBEVUPDIMevvClTeqy0/28="; 21 21 22 22 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch" ]; }; 23 23
+3 -3
pkgs/by-name/pq/pq-cli/package.nix
··· 7 7 8 8 python3Packages.buildPythonApplication rec { 9 9 pname = "pq-cli"; 10 - version = "1.0.2-unstable-2024-07-15"; 10 + version = "1.0.2-unstable-2025-04-04"; 11 11 pyproject = true; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "rr-"; 15 15 repo = "pq-cli"; 16 - rev = "4122e936c87436552f35ff7972d6e543ba6c837b"; 17 - hash = "sha256-PvHkTjPjOubhl9gfPTF7yNaFgg2GLk8y+PtF09fpaII="; 16 + rev = "e6d18352c5874364a7bbb65ad41a198838d907ed"; 17 + hash = "sha256-gT9vxz4oAtoatG8dUDJbr60yyKhglFrxNe1SQMKilb8="; 18 18 }; 19 19 20 20 build-system = with python3Packages; [
+3 -3
pkgs/by-name/pr/protols/package.nix
··· 6 6 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "protols"; 9 - version = "0.11.1"; 9 + version = "0.11.5"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "coder3101"; 13 13 repo = "protols"; 14 14 tag = version; 15 - hash = "sha256-A2fa1rZvxVpJ6X0s0wTDROarGX5Fxp6zKK9cWiag7TQ="; 15 + hash = "sha256-SW7Ef4HRuv1z2QwHqj+S9MO9t4Pi+uDRYFPxb82y4Nc="; 16 16 }; 17 17 18 18 useFetchCargoVendor = true; 19 - cargoHash = "sha256-Pvz15q9yGqcJecOvDWXQQCEDXuSEJbJyZ8Arj8Xbyh4="; 19 + cargoHash = "sha256-bl9N6Kv01QSZAr7BXLNJ2owcwtxP+vhTXUWLAud2npA="; 20 20 21 21 meta = { 22 22 description = "Protocol Buffers language server written in Rust";
+3 -3
pkgs/by-name/ra/rabbitmqadmin-ng/package.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "rabbitmqadmin-ng"; 11 - version = "0.29.0"; 11 + version = "2.0.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "rabbitmq"; 15 15 repo = "rabbitmqadmin-ng"; 16 16 tag = "v${version}"; 17 - hash = "sha256-EWL1MFBBIsjfkx43SFSxsxjM0/XVYS8O3fYkXWkkctc="; 17 + hash = "sha256-M3YaqBwSj/5d936oOVA6JmqWYEU8kDYP+2ImjlOiAqo="; 18 18 }; 19 19 20 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-PShBU5xC9+X1exoIFP64xHWn6oVsID4ZcYMuUq/1vKI="; 21 + cargoHash = "sha256-Ik3G9McsFO+NIEBuB9N1HSXeIpULSPTHx4V2ulpgDio="; 22 22 23 23 buildInputs = [ openssl ]; 24 24 nativeBuildInputs = [ pkg-config ];
+3 -3
pkgs/by-name/ra/radicale/package.nix
··· 7 7 8 8 python3.pkgs.buildPythonApplication rec { 9 9 pname = "radicale"; 10 - version = "3.5.0"; 10 + version = "3.5.1"; 11 11 pyproject = true; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "Kozea"; 15 15 repo = "Radicale"; 16 16 tag = "v${version}"; 17 - hash = "sha256-OWOCwioW0TPVk6vIkfVuAaYJdIWJ6Do4NcYWR/b3sQs="; 17 + hash = "sha256-CM4ljD2fXwQIiJW135G9cIEO0YNmhbS0Cwiv0EU+Bsk="; 18 18 }; 19 19 20 20 build-system = with python3.pkgs; [ ··· 28 28 passlib 29 29 vobject 30 30 pika 31 - python-dateutil 31 + requests 32 32 pytz # https://github.com/Kozea/Radicale/issues/816 33 33 ldap3 34 34 ]
+2 -2
pkgs/by-name/ru/rundeck/package.nix
··· 11 11 12 12 stdenv.mkDerivation (finalAttrs: { 13 13 pname = "rundeck"; 14 - version = "5.9.0-20250205"; 14 + version = "5.10.0-20250312"; 15 15 16 16 src = fetchurl { 17 17 url = "https://packagecloud.io/pagerduty/rundeck/packages/java/org.rundeck/rundeck-${finalAttrs.version}.war/artifacts/rundeck-${finalAttrs.version}.war/download?distro_version_id=167"; 18 - hash = "sha256-3FDZJMw/ix54mSrMZ56CxibTjnI+6NxmjmKn59TAWtI="; 18 + hash = "sha256-BwO7FM1LP0OrjG7opz4qqDuJQdtBmmFtZTtigV99ssE="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ makeWrapper ];
+2
pkgs/by-name/sd/SDL_ttf/package.nix
··· 33 33 (lib.enableFeature enableSdltest "sdltest") 34 34 ]; 35 35 36 + env.NIX_LDFLAGS = lib.optionalString stdenv.hostPlatform.isDarwin "-liconv"; 37 + 36 38 strictDeps = true; 37 39 38 40 passthru.updateScript = unstableGitUpdater {
+63
pkgs/by-name/se/selinux-refpolicy/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + gnum4, 6 + python3, 7 + getopt, 8 + checkpolicy, 9 + policycoreutils, 10 + semodule-utils, 11 + policyVersion ? null, 12 + moduleVersion ? null, 13 + }: 14 + stdenv.mkDerivation (finalAttrs: { 15 + pname = "selinux-refpolicy"; 16 + version = "2.20250213"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "SELinuxProject"; 20 + repo = "refpolicy"; 21 + tag = "RELEASE_${lib.versions.major finalAttrs.version}_${lib.versions.minor finalAttrs.version}"; 22 + hash = "sha256-VsQRqigGwSVJ52uqFj1L2xzQqbWwQ/YaFI5Rsn/HbP8="; 23 + }; 24 + 25 + nativeBuildInputs = [ 26 + gnum4 27 + python3 28 + getopt 29 + ]; 30 + 31 + configurePhase = '' 32 + runHook preConfigure 33 + make conf ''${makeFlags[@]} 34 + runHook postConfigure 35 + ''; 36 + 37 + makeFlags = 38 + [ 39 + "CHECKPOLICY=${lib.getExe checkpolicy}" 40 + "CHECKMODULE=${lib.getExe' checkpolicy "checkmodule"}" 41 + "SEMODULE=${lib.getExe' policycoreutils "semodule"}" 42 + "SEMOD_PKG=${lib.getExe' semodule-utils "semodule_package"}" 43 + "SEMOD_LNK=${lib.getExe' semodule-utils "semodule_link"}" 44 + "SEMOD_EXP=${lib.getExe' semodule-utils "semodule_expand"}" 45 + "DESTDIR=${placeholder "out"}" 46 + "prefix=${placeholder "out"}" 47 + "DISTRO=nixos" 48 + "SYSTEMD=y" 49 + "UBAC=y" 50 + ] 51 + ++ lib.optional (policyVersion != null) "OUTPUT_POLICY=${toString policyVersion}" 52 + ++ lib.optional (moduleVersion != null) "OUTPUT_MODULE=${toString moduleVersion}"; 53 + 54 + installTargets = "all install install-headers install-docs"; 55 + 56 + meta = { 57 + description = "SELinux Reference Policy v2"; 58 + homepage = "http://userspace.selinuxproject.org"; 59 + platforms = lib.platforms.linux; 60 + maintainers = with lib.maintainers; [ RossComputerGuy ]; 61 + license = lib.licenses.gpl2Only; 62 + }; 63 + })
+2 -2
pkgs/by-name/si/simplex-chat-desktop/package.nix
··· 7 7 8 8 let 9 9 pname = "simplex-chat-desktop"; 10 - version = "6.3.0"; 10 + version = "6.3.1"; 11 11 12 12 src = fetchurl { 13 13 url = "https://github.com/simplex-chat/simplex-chat/releases/download/v${version}/simplex-desktop-x86_64.AppImage"; 14 - hash = "sha256-p2NPBJyAfWkpM6Ws0Xm4Vyt3DIbfl+soYfYfqjV4cY0="; 14 + hash = "sha256-jCBCZ5nzA8WxIQFsGpuuyZ1Jmt+PJmqybFHFOUkw9L0="; 15 15 }; 16 16 17 17 appimageContents = appimageTools.extract {
+2 -2
pkgs/by-name/tr/trafficserver/package.nix
··· 48 48 49 49 stdenv.mkDerivation rec { 50 50 pname = "trafficserver"; 51 - version = "9.2.7"; 51 + version = "9.2.9"; 52 52 53 53 src = fetchzip { 54 54 url = "mirror://apache/trafficserver/trafficserver-${version}.tar.bz2"; 55 - hash = "sha256-i3UTqOO3gQezL2HmQllJa+hwy03tJViyOOflW2iXBAM="; 55 + hash = "sha256-itz7LodhVdevidBb8wbInp/ghDgDEZ/KTI3Ksjbg47A="; 56 56 }; 57 57 58 58 # NOTE: The upstream README indicates that flex is needed for some features,
+2 -2
pkgs/by-name/um/umpire/package.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "umpire"; 15 - version = "2024.07.0"; 15 + version = "2025.03.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "LLNL"; 19 19 repo = "umpire"; 20 20 rev = "v${version}"; 21 - hash = "sha256-JbYaJe4bqlB272aZxB3Amw8fX/pmZr/4/7kaukAiK8c="; 21 + hash = "sha256-IL8jfG0qTDjp80E8bniNYUiH77PTtL4QIwMCEkqdwSE="; 22 22 fetchSubmodules = true; 23 23 }; 24 24
+2 -2
pkgs/by-name/wh/whitesur-gtk-theme/package.nix
··· 94 94 stdenv.mkDerivation 95 95 rec { 96 96 pname = "whitesur-gtk-theme"; 97 - version = "2024-11-18"; 97 + version = "2025-04-03"; 98 98 99 99 src = fetchFromGitHub { 100 100 owner = "vinceliuice"; 101 101 repo = pname; 102 102 rev = version; 103 - hash = "sha256-SSGb7EdJN8E4N8b98VO7oFTeOmhKEo/0qhso9410ihg="; 103 + hash = "sha256-XSghDBpxAjdQMB9tyV2NIM6j/AzmzsnybGGDYi7u3BQ="; 104 104 }; 105 105 106 106 nativeBuildInputs = [
+2 -2
pkgs/by-name/za/zabbix-agent2-plugin-postgresql/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "zabbix-agent2-plugin-postgresql"; 9 - version = "7.2.4"; 9 + version = "7.2.5"; 10 10 11 11 src = fetchurl { 12 12 url = "https://cdn.zabbix.com/zabbix-agent2-plugins/sources/postgresql/zabbix-agent2-plugin-postgresql-${version}.tar.gz"; 13 - hash = "sha256-QslDQ45XQ3FjCSRu1cytHVPwJWpIvrxvqC57lCZGMKs="; 13 + hash = "sha256-FJf7rjghYe0paIzjzdkiummzPcBFaH7fcfTJ+pTSZUE="; 14 14 }; 15 15 16 16 vendorHash = null;
-1
pkgs/development/interpreters/erlang/generic-builder.nix
··· 51 51 odbcSupport ? false, 52 52 odbcPackages ? [ unixODBC ], 53 53 opensslPackage ? openssl, 54 - systemdSupport ? lib.meta.availableOn stdenv.hostPlatform systemd, 55 54 wxPackages ? [ 56 55 libGL 57 56 libGLU
-4
pkgs/development/libraries/wlroots/default.nix
··· 15 15 libcap, 16 16 libgbm, 17 17 xorg, 18 - libpng, 19 - ffmpeg, 20 18 hwdata, 21 19 seatd, 22 20 vulkan-loader, ··· 77 75 78 76 buildInputs = 79 77 [ 80 - ffmpeg 81 78 libliftoff 82 79 libdisplay-info 83 80 libGL 84 81 libcap 85 82 libinput 86 - libpng 87 83 libxkbcommon 88 84 libgbm 89 85 pixman
+2 -2
pkgs/development/python-modules/falconpy/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "falconpy"; 11 - version = "1.4.7"; 11 + version = "1.4.8"; 12 12 pyproject = true; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "CrowdStrike"; 16 16 repo = "falconpy"; 17 17 tag = "v${version}"; 18 - hash = "sha256-Ka1QVDXbUJQjCwGMsvMrItPiE88tgVcuz/iaXhjctSQ="; 18 + hash = "sha256-tl/+mYilGFGxq9gJcu9tmm6wenF14gIP0gB+HAXQh0o="; 19 19 }; 20 20 21 21 build-system = [ hatchling ];
+42
pkgs/development/python-modules/pyroaring/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + cython, 6 + setuptools, 7 + hypothesis, 8 + pytestCheckHook, 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "pyroaring"; 13 + version = "1.0.0"; 14 + pyproject = true; 15 + 16 + src = fetchFromGitHub { 17 + owner = "Ezibenroc"; 18 + repo = "PyRoaringBitMap"; 19 + tag = version; 20 + hash = "sha256-pnANvqyQ5DpG4NWSgWkAkXvSNLO67nfa97nEz3fYf1Y="; 21 + }; 22 + 23 + build-system = [ 24 + cython 25 + setuptools 26 + ]; 27 + 28 + pythonImportsCheck = [ "pyroaring" ]; 29 + 30 + nativeCheckInputs = [ 31 + hypothesis 32 + pytestCheckHook 33 + ]; 34 + 35 + meta = { 36 + description = "Python library for handling efficiently sorted integer sets"; 37 + homepage = "https://github.com/Ezibenroc/PyRoaringBitMap"; 38 + changelog = "https://github.com/Ezibenroc/PyRoaringBitMap/releases/tag/${version}"; 39 + license = lib.licenses.mit; 40 + maintainers = with lib.maintainers; [ drupol ]; 41 + }; 42 + }
+48 -3
pkgs/development/python-modules/safetensors/default.nix
··· 5 5 fetchFromGitHub, 6 6 rustPlatform, 7 7 8 - # tests 9 - h5py, 8 + # optional-dependencies 10 9 numpy, 11 - pytestCheckHook, 12 10 torch, 11 + tensorflow, 12 + flax, 13 + jax, 14 + mlx, 15 + paddlepaddle, 16 + h5py, 17 + huggingface-hub, 18 + setuptools-rust, 19 + pytest, 20 + pytest-benchmark, 21 + hypothesis, 22 + 23 + # tests 24 + pytestCheckHook, 13 25 }: 14 26 15 27 buildPythonPackage rec { ··· 35 47 rustPlatform.cargoSetupHook 36 48 rustPlatform.maturinBuildHook 37 49 ]; 50 + 51 + optional-dependencies = lib.fix (self: { 52 + numpy = [ numpy ]; 53 + torch = self.numpy ++ [ 54 + torch 55 + ]; 56 + tensorflow = self.numpy ++ [ 57 + tensorflow 58 + ]; 59 + pinned-tf = self.numpy ++ [ 60 + tensorflow 61 + ]; 62 + jax = self.numpy ++ [ 63 + flax 64 + jax 65 + ]; 66 + mlx = [ 67 + mlx 68 + ]; 69 + paddlepaddle = self.numpy ++ [ 70 + paddlepaddle 71 + ]; 72 + testing = self.numpy ++ [ 73 + h5py 74 + huggingface-hub 75 + setuptools-rust 76 + pytest 77 + pytest-benchmark 78 + hypothesis 79 + ]; 80 + all = self.torch ++ self.numpy ++ self.pinned-tf ++ self.jax ++ self.paddlepaddle ++ self.testing; 81 + dev = self.all; 82 + }); 38 83 39 84 nativeCheckInputs = [ 40 85 h5py
+12 -12
pkgs/os-specific/linux/kernel/kernels-org.json
··· 1 1 { 2 2 "testing": { 3 - "version": "6.14-rc7", 4 - "hash": "sha256:0bw3xip9qg4zr42vx28iai954g5a1wprrrkr81zn7x7vv3ayjvya" 3 + "version": "6.15-rc1", 4 + "hash": "sha256:0kp35q86jihknj5y6f1zspfkhqx0c0npkk3is8p0gf2r3y302cp9" 5 5 }, 6 6 "6.1": { 7 - "version": "6.1.132", 8 - "hash": "sha256:1l5vrc8an6h0fcnfmqb6pmal686imxbllcvlkqah19fg7wnv3dyx" 7 + "version": "6.1.133", 8 + "hash": "sha256:0w5yb9y0jxrqh1wyajs33mpkcix4752acwra8jbg498r7yprzdcp" 9 9 }, 10 10 "5.15": { 11 11 "version": "5.15.179", ··· 20 20 "hash": "sha256:0vpgb3lmhgv5iw9b1z0kqr6vdv44if49marfp5858z3a8yj69bdk" 21 21 }, 22 22 "6.6": { 23 - "version": "6.6.85", 24 - "hash": "sha256:0abmgc5rg7hx18ykwsl6xl72gzaf3wbn5bkvh4kcsa1lrbscrfjy" 23 + "version": "6.6.86", 24 + "hash": "sha256:0s1yy429g70iry559hsfv3plf787bik3kkd0mpx3a1z44dsavqs9" 25 25 }, 26 26 "6.12": { 27 - "version": "6.12.21", 28 - "hash": "sha256:1iyn8qif6xfz04z698ib2dvmam54pyxzsign8sbdj9505sdf66lx" 27 + "version": "6.12.22", 28 + "hash": "sha256:0dkk6d9ml44q2kr7wd8px8iy3lwgyb2qmbhq4f6sg1crnh580j5b" 29 29 }, 30 30 "6.13": { 31 - "version": "6.13.9", 32 - "hash": "sha256:1ci78x5dfjm3nlv4m2j02wl7ax82l47xwnr4k6j9n4dn53qa7rsk" 31 + "version": "6.13.10", 32 + "hash": "sha256:08kpzbysnabyjn76nk8f3zqxlsw45wkhw5vafrgr43vj3v1zrwjp" 33 33 }, 34 34 "6.14": { 35 - "version": "6.14", 36 - "hash": "sha256:0w3nqh02vl8f2wsx3fmsvw1pdsnjs5zfqcmv2w2vnqdiwy1vd552" 35 + "version": "6.14.1", 36 + "hash": "sha256:01z4cf2aivg0bs1i874kqldwxsspg53wvkyfy2nlzmlzhz8j5wav" 37 37 } 38 38 }
+28 -6
pkgs/os-specific/linux/nixos-rebuild/nixos-rebuild.sh
··· 835 835 "let 836 836 value = import \"$(realpath $buildFile)\"; 837 837 set = if builtins.isFunction value then value {} else value; 838 - in builtins.mapAttrs (n: v: v.passthru.filePath) set.${attr:+$attr.}config.system.build.images" \ 838 + in builtins.attrNames set.${attr:+$attr.}config.system.build.images" \ 839 839 "${extraBuildFlags[@]}" 840 840 )" 841 841 elif [[ -z $flake ]]; then 842 842 variants="$( 843 843 runCmd nix-instantiate --eval --strict --json --expr \ 844 - "with import <nixpkgs/nixos> {}; builtins.mapAttrs (n: v: v.passthru.filePath) config.system.build.images" \ 844 + "with import <nixpkgs/nixos> {}; builtins.attrNames config.system.build.images" \ 845 845 "${extraBuildFlags[@]}" 846 846 )" 847 847 else 848 848 variants="$( 849 849 runCmd nix "${flakeFlags[@]}" eval --json \ 850 850 "$flake#$flakeAttr.config.system.build.images" \ 851 - --apply "builtins.mapAttrs (n: v: v.passthru.filePath)" "${evalArgs[@]}" "${extraBuildFlags[@]}" 851 + --apply "builtins.attrNames" "${evalArgs[@]}" "${extraBuildFlags[@]}" 852 852 )" 853 853 fi 854 - if ! echo "$variants" | jq -e --arg variant "$imageVariant" "keys | any(. == \$variant)" > /dev/null; then 854 + if ! echo "$variants" | jq -e --arg variant "$imageVariant" "any(. == \$variant)" > /dev/null; then 855 855 echo -e "Please specify one of the following supported image variants via --image-variant:\n" >&2 856 - echo "$variants" | jq -r '. | keys | join ("\n")' 856 + echo "$variants" | jq -r 'join ("\n")' 857 857 exit 1 858 858 fi 859 - imageName="$(echo "$variants" | jq -r --arg variant "$imageVariant" ".[\$variant]")" 859 + 860 + if [[ -z $buildingAttribute ]]; then 861 + imageName="$( 862 + runCmd nix-instantiate --eval --strict --json --expr \ 863 + "let 864 + value = import \"$(realpath $buildFile)\"; 865 + set = if builtins.isFunction value then value {} else value; 866 + in set.${attr:+$attr.}config.system.build.images.$imageVariant.v.passthru.filePath" \ 867 + "${extraBuildFlags[@]}" 868 + )" 869 + elif [[ -z $flake ]]; then 870 + imageName="$( 871 + runCmd nix-instantiate --eval --strict --json --expr \ 872 + "with import <nixpkgs/nixos> {}; config.system.build.images.$imageVariant.passthru.filePath" \ 873 + "${extraBuildFlags[@]}" 874 + )" 875 + else 876 + imageName="$( 877 + runCmd nix "${flakeFlags[@]}" eval --json \ 878 + "$flake#$flakeAttr.config.system.build.images.$imageVariant.passthru.filePath" \ 879 + "${evalArgs[@]}" "${extraBuildFlags[@]}" 880 + )" 881 + fi 860 882 861 883 if [[ -z $buildingAttribute ]]; then 862 884 pathToConfig="$(nixBuild $buildFile -A "${attr:+$attr.}config.system.build.images.${imageVariant}" "${extraBuildFlags[@]}")"
+2 -2
pkgs/servers/mastodon/source.nix
··· 5 5 patches ? [ ], 6 6 }: 7 7 let 8 - version = "4.3.6"; 8 + version = "4.3.7"; 9 9 in 10 10 (applyPatches { 11 11 src = fetchFromGitHub { 12 12 owner = "mastodon"; 13 13 repo = "mastodon"; 14 14 rev = "v${version}"; 15 - hash = "sha256-cTJmSrQ+xlDfrAyHKeiIvrUOgAh9DQT2NNizN8XT3P0="; 15 + hash = "sha256-KmeWBMuyJ/ZdZnFXAlpvgXV+J8IZrcaTXvvui4l6mjY="; 16 16 }; 17 17 patches = patches ++ [ ]; 18 18 })
+10
pkgs/servers/nextcloud/packages/29.json
··· 369 369 "agpl" 370 370 ] 371 371 }, 372 + "twofactor_admin": { 373 + "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=", 374 + "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz", 375 + "version": "4.8.0", 376 + "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.", 377 + "homepage": "", 378 + "licenses": [ 379 + "agpl" 380 + ] 381 + }, 372 382 "twofactor_nextcloud_notification": { 373 383 "hash": "sha256-4fXWgDeiup5/Gm9hdZDj/u07rp/Nzwly53aLUT/d0IU=", 374 384 "url": "https://github.com/nextcloud-releases/twofactor_nextcloud_notification/releases/download/v3.9.0/twofactor_nextcloud_notification-v3.9.0.tar.gz",
+10
pkgs/servers/nextcloud/packages/30.json
··· 369 369 "agpl" 370 370 ] 371 371 }, 372 + "twofactor_admin": { 373 + "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=", 374 + "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz", 375 + "version": "4.8.0", 376 + "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.", 377 + "homepage": "", 378 + "licenses": [ 379 + "agpl" 380 + ] 381 + }, 372 382 "twofactor_webauthn": { 373 383 "hash": "sha256-16Silofm/alQaKZ2buNqyLEjKK2kR2IpTAxEawHpGjI=", 374 384 "url": "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v2.1.0/twofactor_webauthn-v2.1.0.tar.gz",
+10
pkgs/servers/nextcloud/packages/31.json
··· 359 359 "agpl" 360 360 ] 361 361 }, 362 + "twofactor_admin": { 363 + "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=", 364 + "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz", 365 + "version": "4.8.0", 366 + "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.", 367 + "homepage": "", 368 + "licenses": [ 369 + "agpl" 370 + ] 371 + }, 362 372 "twofactor_webauthn": { 363 373 "hash": "sha256-16Silofm/alQaKZ2buNqyLEjKK2kR2IpTAxEawHpGjI=", 364 374 "url": "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v2.1.0/twofactor_webauthn-v2.1.0.tar.gz",
+1
pkgs/servers/nextcloud/packages/nextcloud-apps.json
··· 38 38 , "sociallogin": "agpl3Only" 39 39 , "spreed": "agpl3Plus" 40 40 , "tasks": "agpl3Plus" 41 + , "twofactor_admin": "agpl3Plus" 41 42 , "twofactor_nextcloud_notification": "agpl3Only" 42 43 , "twofactor_totp": "agpl3Plus" 43 44 , "twofactor_webauthn": "agpl3Plus"
+1
pkgs/top-level/all-packages.nix
··· 7381 7381 beam = callPackage ./beam-packages.nix { }; 7382 7382 beam_minimal = callPackage ./beam-packages.nix { 7383 7383 beam = beam_minimal; 7384 + systemdSupport = false; 7384 7385 wxSupport = false; 7385 7386 }; 7386 7387
+2
pkgs/top-level/python-packages.nix
··· 13107 13107 13108 13108 pyro5 = callPackage ../development/python-modules/pyro5 { }; 13109 13109 13110 + pyroaring = callPackage ../development/python-modules/pyroaring { }; 13111 + 13110 13112 pyrogram = callPackage ../development/python-modules/pyrogram { }; 13111 13113 13112 13114 pyroma = callPackage ../development/python-modules/pyroma { };