Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 5af80acc a4b5a14b

+132 -48
+1 -1
nixos/doc/manual/release-notes/rl-2405.section.md
··· 10 11 - `screen`'s module has been cleaned, and will now require you to set `programs.screen.enable` in order to populate `screenrc` and add the program to the environment. 12 13 - - `linuxPackages_testing_bcachefs` is now fully deprecated by `linuxPackages_testing`, and is therefore no longer available. 14 15 - NixOS now installs a stub ELF loader that prints an informative error message when users attempt to run binaries not made for NixOS. 16 - This can be disabled through the `environment.stub-ld.enable` option.
··· 10 11 - `screen`'s module has been cleaned, and will now require you to set `programs.screen.enable` in order to populate `screenrc` and add the program to the environment. 12 13 + - `linuxPackages_testing_bcachefs` is now fully deprecated by `linuxPackages_latest`, and is therefore no longer available. 14 15 - NixOS now installs a stub ELF loader that prints an informative error message when users attempt to run binaries not made for NixOS. 16 - This can be disabled through the `environment.stub-ld.enable` option.
+1 -1
nixos/modules/module-list.nix
··· 195 ./programs/haguichi.nix 196 ./programs/hamster.nix 197 ./programs/htop.nix 198 - ./programs/hyprland.nix 199 ./programs/iay.nix 200 ./programs/iftop.nix 201 ./programs/i3lock.nix ··· 273 ./programs/wavemon.nix 274 ./programs/wayland/cardboard.nix 275 ./programs/wayland/labwc.nix 276 ./programs/wayland/river.nix 277 ./programs/wayland/sway.nix 278 ./programs/wayland/waybar.nix
··· 195 ./programs/haguichi.nix 196 ./programs/hamster.nix 197 ./programs/htop.nix 198 ./programs/iay.nix 199 ./programs/iftop.nix 200 ./programs/i3lock.nix ··· 272 ./programs/wavemon.nix 273 ./programs/wayland/cardboard.nix 274 ./programs/wayland/labwc.nix 275 + ./programs/wayland/hyprland.nix 276 ./programs/wayland/river.nix 277 ./programs/wayland/sway.nix 278 ./programs/wayland/waybar.nix
nixos/modules/programs/hyprland.nix nixos/modules/programs/wayland/hyprland.nix
+8 -3
nixos/modules/system/boot/stage-1-init.sh
··· 86 # Function for waiting for device(s) to appear. 87 waitDevice() { 88 local device="$1" 89 - # Split device string using ':' as a delimiter as bcachefs 90 - # uses this for multi-device filesystems, i.e. /dev/sda1:/dev/sda2:/dev/sda3 91 - local IFS=':' 92 93 # USB storage devices tend to appear with some delay. It would be 94 # great if we had a way to synchronously wait for them, but
··· 86 # Function for waiting for device(s) to appear. 87 waitDevice() { 88 local device="$1" 89 + # Split device string using ':' as a delimiter, bcachefs uses 90 + # this for multi-device filesystems, i.e. /dev/sda1:/dev/sda2:/dev/sda3 91 + local IFS 92 + 93 + # bcachefs is the only known use for this at the moment 94 + # Preferably, the 'UUID=' syntax should be enforced, but 95 + # this is kept for compatibility reasons 96 + if [ "$fsType" = bcachefs ]; then IFS=':'; fi 97 98 # USB storage devices tend to appear with some delay. It would be 99 # great if we had a way to synchronously wait for them, but
+7 -2
nixos/modules/tasks/filesystems/bcachefs.nix
··· 123 inherit assertions; 124 # needed for systemd-remount-fs 125 system.fsPackages = [ pkgs.bcachefs-tools ]; 126 - # FIXME: Remove this line when the default kernel has bcachefs 127 boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest; 128 - systemd.services = lib.mapAttrs' (mkUnits "") (lib.filterAttrs (n: fs: (fs.fsType == "bcachefs") && (!utils.fsNeededForBoot fs)) config.fileSystems); 129 } 130 131 (lib.mkIf ((lib.elem "bcachefs" config.boot.initrd.supportedFilesystems) || (bootFs != {})) {
··· 123 inherit assertions; 124 # needed for systemd-remount-fs 125 system.fsPackages = [ pkgs.bcachefs-tools ]; 126 + # FIXME: Remove this line when the LTS (default) kernel is at least version 6.7 127 boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest; 128 + services.udev.packages = [ pkgs.bcachefs-tools ]; 129 + 130 + systemd = { 131 + packages = [ pkgs.bcachefs-tools ]; 132 + services = lib.mapAttrs' (mkUnits "") (lib.filterAttrs (n: fs: (fs.fsType == "bcachefs") && (!utils.fsNeededForBoot fs)) config.fileSystems); 133 + }; 134 } 135 136 (lib.mkIf ((lib.elem "bcachefs" config.boot.initrd.supportedFilesystems) || (bootFs != {})) {
+3 -3
pkgs/applications/misc/nwg-displays/default.nix
··· 14 15 python310Packages.buildPythonApplication rec { 16 pname = "nwg-displays"; 17 - version = "0.3.10"; 18 19 src = fetchFromGitHub { 20 owner = "nwg-piotr"; 21 repo = "nwg-displays"; 22 - rev = "v${version}"; 23 - hash = "sha256-clL34Ewzf0sJEWiye4L4e1RrPFIHkmotLpPaibGvVY4="; 24 }; 25 26 nativeBuildInputs = [
··· 14 15 python310Packages.buildPythonApplication rec { 16 pname = "nwg-displays"; 17 + version = "0.3.12"; 18 19 src = fetchFromGitHub { 20 owner = "nwg-piotr"; 21 repo = "nwg-displays"; 22 + rev = "refs/tags/v${version}"; 23 + hash = "sha256-cr+2ejpXEOg0e86tT37o9400J299DQSkOrQUZE5+V2s="; 24 }; 25 26 nativeBuildInputs = [
+39 -11
pkgs/applications/science/electronics/fritzing/default.nix
··· 9 , qtsvg 10 , qttools 11 , qtserialport 12 , boost 13 , libngspice 14 , libgit2 ··· 18 let 19 # SHA256 of the fritzing-parts HEAD on the master branch, 20 # which contains the latest stable parts definitions 21 - partsSha = "4713511c894cb2894eae505b9307c6555afcc32c"; 22 23 parts = fetchFromGitHub { 24 owner = "fritzing"; 25 repo = "fritzing-parts"; 26 rev = partsSha; 27 - sha256 = "sha256-QiOGWc+99MJhOVrXyNOinR8rTVvW/E+wPfoB6QvbhY0="; 28 }; 29 in 30 31 stdenv.mkDerivation rec { 32 pname = "fritzing"; 33 - version = "unstable-2022-07-01"; 34 35 src = fetchFromGitHub { 36 owner = pname; 37 repo = "fritzing-app"; 38 - rev = "40d23c29b0463d5c968c3c4b34ed5ffc05c5a258"; 39 - sha256 = "sha256-smvfuxQWF/LMFFXHOKb3zUZsEet/XoiaxXOR5QMaYzw="; 40 }; 41 42 - buildInputs = [ qtbase qtsvg qtserialport boost libgit2 quazip libngspice ]; 43 - nativeBuildInputs = [ qmake pkg-config qttools wrapQtAppsHook ]; 44 - 45 patches = [ 46 (fetchpatch { 47 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0001-Quick-Dirty-patch-to-allow-finding-quazip-qt5-on-Arc.patch?h=fritzing&id=1ae0dc88464f375a54b156e6761315bcb04bcc1f"; 48 - sha256 = "sha256-iS18EWw920gyeXDoHBRGwXvwMJurJS21H77Erl+fqog="; 49 }) 50 ]; 51 52 postPatch = '' 53 substituteInPlace phoenix.pro \ 54 --replace 'LIBGIT_STATIC = true' 'LIBGIT_STATIC = false' 55 ··· 61 cp -a ${parts}/* parts/ 62 ''; 63 64 - env.NIX_CFLAGS_COMPILE = "-I${lib.getDev quazip}/include/QuaZip-Qt${lib.versions.major qtbase.version}-${quazip.version}/quazip"; 65 66 qmakeFlags = [ 67 "phoenix.pro"
··· 9 , qtsvg 10 , qttools 11 , qtserialport 12 + , qtwayland 13 + , qt5compat 14 , boost 15 , libngspice 16 , libgit2 ··· 20 let 21 # SHA256 of the fritzing-parts HEAD on the master branch, 22 # which contains the latest stable parts definitions 23 + partsSha = "015626e6cafb1fc7831c2e536d97ca2275a83d32"; 24 25 parts = fetchFromGitHub { 26 owner = "fritzing"; 27 repo = "fritzing-parts"; 28 rev = partsSha; 29 + hash = "sha256-5jw56cqxpT/8bf1q551WG53J6Lw5pH0HEtRUoNNMc+A="; 30 + }; 31 + 32 + # Header-only library 33 + svgpp = fetchFromGitHub { 34 + owner = "svgpp"; 35 + repo = "svgpp"; 36 + rev = "v1.3.0"; 37 + hash = "sha256-kJEVnMYnDF7bThDB60bGXalYgpn9c5/JCZkRSK5GoE4="; 38 }; 39 in 40 41 stdenv.mkDerivation rec { 42 pname = "fritzing"; 43 + version = "1.0.1"; 44 45 src = fetchFromGitHub { 46 owner = pname; 47 repo = "fritzing-app"; 48 + rev = "8f5f1373835050ce014299c78d91c24beea9b633"; 49 + hash = "sha256-jLVNzSh2KwXpi3begtp/53sdBmQQbCnKMCm2p770etg="; 50 }; 51 52 patches = [ 53 + # Fix error caused by implicit call 54 (fetchpatch { 55 + url = "https://aur.archlinux.org/cgit/aur.git/plain/0003-ParseResult-operator-bool-in-explicit.patch?h=fritzing&id=b2c79b55f0a2811e80bb1136b1e021fbc56937c9"; 56 + hash = "sha256-9HdcNqLHEB0HQbF7AaTdUIJUbafwsRKPA+wfF4g8veU="; 57 }) 58 ]; 59 60 + nativeBuildInputs = [ qmake pkg-config qttools wrapQtAppsHook ]; 61 + buildInputs = [ 62 + qtbase 63 + qtsvg 64 + qtserialport 65 + qtwayland 66 + qt5compat 67 + boost 68 + libgit2 69 + quazip 70 + libngspice 71 + ]; 72 + 73 postPatch = '' 74 + # Use packaged quazip, libgit and ngspice 75 + sed -i "/pri\/quazipdetect.pri/d" phoenix.pro 76 + sed -i "/pri\/spicedetect.pri/d" phoenix.pro 77 substituteInPlace phoenix.pro \ 78 --replace 'LIBGIT_STATIC = true' 'LIBGIT_STATIC = false' 79 ··· 85 cp -a ${parts}/* parts/ 86 ''; 87 88 + env.NIX_CFLAGS_COMPILE = lib.concatStringsSep " " [ 89 + "-I${lib.getDev quazip}/include/QuaZip-Qt${lib.versions.major qtbase.version}-${quazip.version}/quazip" 90 + "-I${svgpp}/include" 91 + ]; 92 + env.NIX_LDFLAGS = "-lquazip1-qt${lib.versions.major qtbase.version}"; 93 94 qmakeFlags = [ 95 "phoenix.pro"
+19 -8
pkgs/by-name/su/sudachi-rs/package.nix
··· 4 , sudachidict 5 , runCommand 6 , sudachi-rs 7 }: 8 9 rustPlatform.buildRustPackage rec { 10 pname = "sudachi-rs"; 11 - version = "0.6.7"; 12 13 src = fetchFromGitHub { 14 owner = "WorksApplications"; 15 repo = "sudachi.rs"; 16 rev = "refs/tags/v${version}"; 17 - hash = "sha256-VzNOI6PP9sKBsNfB5yIxAI8jI8TEdM4tD49Jl/2tkSE="; 18 }; 19 20 postPatch = '' ··· 22 --replace '"resources"' '"${placeholder "out"}/share/resources"' 23 ''; 24 25 - cargoHash = "sha256-b2NtgHcMkimzFFuqohAo9KdSaIq6oi3qo/k8/VugyFs="; 26 27 # prepare the resources before the build so that the binary can find sudachidict 28 preBuild = '' ··· 30 install -Dm644 resources/* -t $out/share/resources 31 ''; 32 33 - passthru.tests = { 34 - # detects an error that sudachidict is not found 35 - cli = runCommand "${pname}-cli-test" { } '' 36 - mkdir $out 37 - echo "高輪ゲートウェイ駅" | ${lib.getExe sudachi-rs} > $out/result 38 ''; 39 }; 40 41 meta = with lib; {
··· 4 , sudachidict 5 , runCommand 6 , sudachi-rs 7 + , writeScript 8 }: 9 10 rustPlatform.buildRustPackage rec { 11 pname = "sudachi-rs"; 12 + version = "0.6.8"; 13 14 src = fetchFromGitHub { 15 owner = "WorksApplications"; 16 repo = "sudachi.rs"; 17 rev = "refs/tags/v${version}"; 18 + hash = "sha256-9GXU+YDPuQ+roqQfUE5q17Hl6AopsvGhRPjZ+Ui+n24="; 19 }; 20 21 postPatch = '' ··· 23 --replace '"resources"' '"${placeholder "out"}/share/resources"' 24 ''; 25 26 + cargoHash = "sha256-Ufo3dB2KGDDNiebp7hLhQrUMLsefO8wRpJQDz57Yb8Y="; 27 28 # prepare the resources before the build so that the binary can find sudachidict 29 preBuild = '' ··· 31 install -Dm644 resources/* -t $out/share/resources 32 ''; 33 34 + passthru = { 35 + updateScript = writeScript "update.sh" '' 36 + #!/usr/bin/env nix-shell 37 + #!nix-shell -i bash -p nix-update 38 + 39 + set -eu -o pipefail 40 + nix-update sudachi-rs 41 + nix-update --version=skip python3Packages.sudachipy 42 ''; 43 + tests = { 44 + # detects an error that sudachidict is not found 45 + cli = runCommand "${pname}-cli-test" { } '' 46 + mkdir $out 47 + echo "高輪ゲートウェイ駅" | ${lib.getExe sudachi-rs} > $out/result 48 + ''; 49 + }; 50 }; 51 52 meta = with lib; {
+3 -3
pkgs/by-name/sw/swaylock-fancy/package.nix
··· 31 32 stdenv.mkDerivation { 33 pname = "swaylock-fancy"; 34 - version = "unstable-2023-11-21"; 35 36 src = fetchFromGitHub { 37 owner = "Big-B"; 38 repo = "swaylock-fancy"; 39 - rev = "ff37ae3c6d0f100f81ff64fdb9d422c37de2f4f6"; 40 - hash = "sha256-oS4YCbZOIrMP4QSM5eHWzTn18k3w2OnJ2k+64x/DnuM="; 41 }; 42 43 postPatch = ''
··· 31 32 stdenv.mkDerivation { 33 pname = "swaylock-fancy"; 34 + version = "unstable-2023-12-22"; 35 36 src = fetchFromGitHub { 37 owner = "Big-B"; 38 repo = "swaylock-fancy"; 39 + rev = "0b93740e1dfc39883c125c212a1adc16b01c14f1"; 40 + hash = "sha256-ko4SeHGNBiPMvxFXhD+U2r0Mwc14C2IN5CaJYI0V8u8="; 41 }; 42 43 postPatch = ''
+5
pkgs/development/python-modules/sudachidict/default.nix
··· 2 , fetchFromGitHub 3 , sudachidict 4 , setuptools 5 }: 6 7 buildPythonPackage rec { ··· 31 32 nativeBuildInputs = [ 33 setuptools 34 ]; 35 36 # we need to prepare some files before the build
··· 2 , fetchFromGitHub 3 , sudachidict 4 , setuptools 5 + , sudachipy 6 }: 7 8 buildPythonPackage rec { ··· 32 33 nativeBuildInputs = [ 34 setuptools 35 + ]; 36 + 37 + propagatedBuildInputs = [ 38 + sudachipy 39 ]; 40 41 # we need to prepare some files before the build
+19 -1
pkgs/development/python-modules/sudachipy/default.nix
··· 10 , pytestCheckHook 11 , sudachidict-core 12 , tokenizers 13 }: 14 15 buildPythonPackage rec { ··· 19 cargoDeps = rustPlatform.fetchCargoTarball { 20 inherit src; 21 name = "${pname}-${version}"; 22 - hash = "sha256-Am+ae2lgnndSDzf0GF8R1i6OPLdIlm2dLThqYqXbscA="; 23 }; 24 25 nativeBuildInputs = [ ··· 37 cd python 38 ''; 39 40 nativeCheckInputs = [ 41 pytestCheckHook 42 sudachidict-core ··· 46 pythonImportsCheck = [ 47 "sudachipy" 48 ]; 49 50 meta = sudachi-rs.meta // { 51 homepage = "https://github.com/WorksApplications/sudachi.rs/tree/develop/python";
··· 10 , pytestCheckHook 11 , sudachidict-core 12 , tokenizers 13 + , sudachipy 14 }: 15 16 buildPythonPackage rec { ··· 20 cargoDeps = rustPlatform.fetchCargoTarball { 21 inherit src; 22 name = "${pname}-${version}"; 23 + hash = "sha256-ARwvThfATDdzBTjPFr9yjbE/0eYvp/TCZOEGbUupJmU="; 24 }; 25 26 nativeBuildInputs = [ ··· 38 cd python 39 ''; 40 41 + # avoid infinite recursion due to sudachidict 42 + doCheck = false; 43 + 44 nativeCheckInputs = [ 45 pytestCheckHook 46 sudachidict-core ··· 50 pythonImportsCheck = [ 51 "sudachipy" 52 ]; 53 + 54 + passthru = { 55 + inherit (sudachi-rs) updateScript; 56 + tests = { 57 + pytest = sudachipy.overridePythonAttrs ( 58 + _: { 59 + doCheck = true; 60 + # avoid catchConflicts of sudachipy 61 + # we don't need to install this package since it is just a test 62 + dontInstall = true; 63 + } 64 + ); 65 + }; 66 + }; 67 68 meta = sudachi-rs.meta // { 69 homepage = "https://github.com/WorksApplications/sudachi.rs/tree/develop/python";
+3 -3
pkgs/development/tools/kdash/default.nix
··· 12 13 rustPlatform.buildRustPackage rec { 14 pname = "kdash"; 15 - version = "0.4.7"; 16 17 src = fetchFromGitHub { 18 owner = "kdash-rs"; 19 repo = pname; 20 rev = "v${version}"; 21 - sha256 = "sha256-KQ1SLnXtox/bIV32guEfC2LSt8LDWGSG5b9i0gqS2Yc="; 22 }; 23 24 nativeBuildInputs = [ perl python3 pkg-config ]; ··· 26 buildInputs = [ openssl xorg.xcbutil ] 27 ++ lib.optional stdenv.isDarwin AppKit; 28 29 - cargoHash = "sha256-bgS93o654xDVz2OMFy1mwxCKQESV8MPZ4Mjb0IdypLU="; 30 31 meta = with lib; { 32 description = "A simple and fast dashboard for Kubernetes";
··· 12 13 rustPlatform.buildRustPackage rec { 14 pname = "kdash"; 15 + version = "0.5.0"; 16 17 src = fetchFromGitHub { 18 owner = "kdash-rs"; 19 repo = pname; 20 rev = "v${version}"; 21 + sha256 = "sha256-Vk0Pf5uF9AANv/vf32ZrICJJTp6QRsR/nFW40xnkImo="; 22 }; 23 24 nativeBuildInputs = [ perl python3 pkg-config ]; ··· 26 buildInputs = [ openssl xorg.xcbutil ] 27 ++ lib.optional stdenv.isDarwin AppKit; 28 29 + cargoHash = "sha256-gY4ywjTokEc5Uv4InARH2s3WYiPGYSDDWk2kltyQa+0="; 30 31 meta = with lib; { 32 description = "A simple and fast dashboard for Kubernetes";
+1
pkgs/development/tools/rust/cargo-deny/default.nix
··· 28 zstd 29 ] ++ lib.optionals stdenv.isDarwin [ 30 darwin.apple_sdk.frameworks.Security 31 ]; 32 33 env = {
··· 28 zstd 29 ] ++ lib.optionals stdenv.isDarwin [ 30 darwin.apple_sdk.frameworks.Security 31 + darwin.apple_sdk.frameworks.SystemConfiguration 32 ]; 33 34 env = {
+3 -3
pkgs/development/tools/rust/cargo-show-asm/default.nix
··· 9 10 rustPlatform.buildRustPackage rec { 11 pname = "cargo-show-asm"; 12 - version = "0.2.28"; 13 14 src = fetchCrate { 15 inherit pname version; 16 - hash = "sha256-DZKl3FRgBzrgKDl/eVOFRW2jZXT8ul+ZgZbBxZcmgss="; 17 }; 18 19 - cargoHash = "sha256-QaRqrd4wHuMfAYy/vqkwdoWB1BDGx0YyjvFNqjSOM2I="; 20 21 nativeBuildInputs = [ 22 installShellFiles
··· 9 10 rustPlatform.buildRustPackage rec { 11 pname = "cargo-show-asm"; 12 + version = "0.2.29"; 13 14 src = fetchCrate { 15 inherit pname version; 16 + hash = "sha256-9Q+BnzgoD95eKkMZrQF6+khbx5wqnER83PK3vbRrRv8="; 17 }; 18 19 + cargoHash = "sha256-cyFAilqpaO6TDtJUmweUHYEpWxUAhHDYgCUGSz5EBFU="; 20 21 nativeBuildInputs = [ 22 installShellFiles
+14 -3
pkgs/tools/filesystems/bcachefs-tools/default.nix
··· 19 , rustPlatform 20 , makeWrapper 21 , writeScript 22 , fuseSupport ? false 23 }: 24 25 stdenv.mkDerivation (finalAttrs: { 26 pname = "bcachefs-tools"; 27 version = "1.4.1"; 28 - 29 30 src = fetchFromGitHub { 31 owner = "koverstreet"; ··· 65 udev 66 ] ++ lib.optional fuseSupport fuse3; 67 68 doCheck = false; # needs bcachefs module loaded on builder 69 checkFlags = [ "BCACHEFS_TEST_USE_VALGRIND=no" ]; 70 71 makeFlags = [ 72 - "DESTDIR=${placeholder "out"}" 73 - "PREFIX=" 74 "VERSION=${finalAttrs.version}" 75 "INITRAMFS_DIR=${placeholder "out"}/etc/initramfs-tools" 76 ]; 77 78 preCheck = lib.optionalString (!fuseSupport) '' 79 rm tests/test_fuse.py 80 ''; 81 82 passthru = {
··· 19 , rustPlatform 20 , makeWrapper 21 , writeScript 22 + , python3 23 , fuseSupport ? false 24 }: 25 26 stdenv.mkDerivation (finalAttrs: { 27 pname = "bcachefs-tools"; 28 version = "1.4.1"; 29 30 src = fetchFromGitHub { 31 owner = "koverstreet"; ··· 65 udev 66 ] ++ lib.optional fuseSupport fuse3; 67 68 + # FIXME: Try enabling this once the default linux kernel is at least 6.7 69 doCheck = false; # needs bcachefs module loaded on builder 70 checkFlags = [ "BCACHEFS_TEST_USE_VALGRIND=no" ]; 71 72 makeFlags = [ 73 + "PREFIX=${placeholder "out"}" 74 "VERSION=${finalAttrs.version}" 75 "INITRAMFS_DIR=${placeholder "out"}/etc/initramfs-tools" 76 ]; 77 78 preCheck = lib.optionalString (!fuseSupport) '' 79 rm tests/test_fuse.py 80 + ''; 81 + 82 + # Tries to install to the 'systemd-minimal' and 'udev' nix installation paths 83 + installFlags = [ 84 + "PKGCONFIG_SERVICEDIR=$(out)/lib/systemd/system" 85 + "PKGCONFIG_UDEVDIR=$(out)/lib/udev" 86 + ]; 87 + 88 + postInstall = '' 89 + substituteInPlace $out/libexec/bcachefsck_all \ 90 + --replace "/usr/bin/python3" "${python3}/bin/python3" 91 ''; 92 93 passthru = {
+2 -2
pkgs/tools/package-management/pdm/default.nix
··· 32 with python.pkgs; 33 buildPythonApplication rec { 34 pname = "pdm"; 35 - version = "2.12.1"; 36 pyproject = true; 37 38 disabled = pythonOlder "3.8"; 39 40 src = fetchPypi { 41 inherit pname version; 42 - hash = "sha256-OaKroZmGyUWnm/WEw3dSheJOnH+O2KYDgVthxfrF20w="; 43 }; 44 45 nativeBuildInputs = [
··· 32 with python.pkgs; 33 buildPythonApplication rec { 34 pname = "pdm"; 35 + version = "2.12.2"; 36 pyproject = true; 37 38 disabled = pythonOlder "3.8"; 39 40 src = fetchPypi { 41 inherit pname version; 42 + hash = "sha256-s8pKsQetZbV/4TEuQ2Dh97PXxe2BqEG27Uizd3hi7Vc="; 43 }; 44 45 nativeBuildInputs = [
+3 -3
pkgs/top-level/aliases.nix
··· 616 ''; 617 linux_latest_hardened = linuxPackages_latest_hardened; 618 619 - # Added 2023-11-18 620 - linuxPackages_testing_bcachefs = throw "'linuxPackages_testing_bcachefs' has been removed, please use 'linuxPackages_testing', or any other linux kernel with bcachefs support"; 621 - linux_testing_bcachefs = throw "'linux_testing_bcachefs' has been removed, please use 'linux_testing', or any other linux kernel with bcachefs support"; 622 623 lld_6 = throw "lld_6 has been removed from nixpkgs"; # Added 2024-01-08 624 lld_7 = throw "lld_7 has been removed from nixpkgs"; # Added 2023-11-19
··· 616 ''; 617 linux_latest_hardened = linuxPackages_latest_hardened; 618 619 + # Added 2023-11-18, modified 2024-01-09 620 + linuxPackages_testing_bcachefs = throw "'linuxPackages_testing_bcachefs' has been removed, please use 'linuxPackages_latest', any kernel version at least 6.7, or any other linux kernel with bcachefs support"; 621 + linux_testing_bcachefs = throw "'linux_testing_bcachefs' has been removed, please use 'linux_latest', any kernel version at least 6.7, or any other linux kernel with bcachefs support"; 622 623 lld_6 = throw "lld_6 has been removed from nixpkgs"; # Added 2024-01-08 624 lld_7 = throw "lld_7 has been removed from nixpkgs"; # Added 2023-11-19
+1 -1
pkgs/top-level/all-packages.nix
··· 31575 31576 freewheeling = callPackage ../applications/audio/freewheeling { }; 31577 31578 - fritzing = libsForQt5.callPackage ../applications/science/electronics/fritzing { }; 31579 31580 fsv = callPackage ../applications/misc/fsv { }; 31581
··· 31575 31576 freewheeling = callPackage ../applications/audio/freewheeling { }; 31577 31578 + fritzing = qt6Packages.callPackage ../applications/science/electronics/fritzing { }; 31579 31580 fsv = callPackage ../applications/misc/fsv { }; 31581