lol

Merge master into staging-next

authored by

nixpkgs-ci[bot] and committed by
GitHub
5df98c0e b6f676fb

+1228 -444
+6
maintainers/maintainer-list.nix
··· 1843 1843 githubId = 53097078; 1844 1844 name = "AJ Reifsnyder"; 1845 1845 }; 1846 + arexon = { 1847 + email = "arexonreal@gmail.com"; 1848 + github = "arexon"; 1849 + githubId = 65680034; 1850 + name = "arexon"; 1851 + }; 1846 1852 arezvov = { 1847 1853 email = "alex@rezvov.ru"; 1848 1854 github = "arezvov";
+2
nixos/doc/manual/release-notes/rl-2505.section.md
··· 123 123 124 124 - [Fider](https://fider.io/), an open platform to collect and prioritize feedback. Available as [services.fider](#opt-services.fider.enable). 125 125 126 + - [PDS](https://github.com/bluesky-social/pds), Personal Data Server for [bsky](https://bsky.social/). Available as [services.pds](option.html#opt-services.pds). 127 + 126 128 - [mqtt-exporter](https://github.com/kpetremann/mqtt-exporter/), a Prometheus exporter for exposing messages from MQTT. Available as [services.prometheus.exporters.mqtt](#opt-services.prometheus.exporters.mqtt.enable). 127 129 128 130 - [nvidia-gpu](https://github.com/utkuozdemir/nvidia_gpu_exporter), a Prometheus exporter that scrapes `nvidia-smi` for GPU metrics. Available as [services.prometheus.exporters.nvidia-gpu](#opt-services.prometheus.exporters.nvidia-gpu.enable).
+2 -2
nixos/modules/config/ldap.nix
··· 135 135 type = types.lines; 136 136 description = '' 137 137 Extra configuration options that will be added verbatim at 138 - the end of the nslcd configuration file (`nslcd.conf(5)`). 138 + the end of the nslcd configuration file ({manpage}`nslcd.conf(5)`). 139 139 ''; 140 140 }; 141 141 ··· 219 219 type = types.lines; 220 220 description = '' 221 221 Extra configuration options that will be added verbatim at 222 - the end of the ldap configuration file (`ldap.conf(5)`). 222 + the end of the ldap configuration file ({manpage}`ldap.conf(5)`). 223 223 If {option}`users.ldap.daemon` is enabled, this 224 224 configuration will not be used. In that case, use 225 225 {option}`users.ldap.daemon.extraConfig` instead.
+1 -1
nixos/modules/config/mysql.nix
··· 111 111 - `0` (or `"plain"`): 112 112 No encryption. Passwords are stored in plaintext. HIGHLY DISCOURAGED. 113 113 - `1` (or `"Y"`): 114 - Use crypt(3) function. 114 + Use {manpage}`crypt(3)` function. 115 115 - `2` (or `"mysql"`): 116 116 Use the MySQL PASSWORD() function. It is possible that the encryption function used 117 117 by `pam_mysql` is different from that of the MySQL server, as
+3 -3
nixos/modules/config/swap.nix
··· 46 46 If not specified, the amount of data to read from `source` will be 47 47 determined by cryptsetup. 48 48 49 - See `cryptsetup-open(8)` for details. 49 + See `{manpage}`cryptsetup-open(8)`` for details. 50 50 ''; 51 51 }; 52 52 ··· 60 60 If not specified, the default sector size is determined from the 61 61 underlying block device. 62 62 63 - See `cryptsetup-open(8)` for details. 63 + See `{manpage}`cryptsetup-open(8)`` for details. 64 64 ''; 65 65 }; 66 66 ··· 158 158 whole swap space is discarded at swapon invocation. If "pages", 159 159 asynchronous discard on freed pages is performed, before returning to 160 160 the available pages pool. With "both", both policies are activated. 161 - See swapon(8) for more information. 161 + See {manpage}`swapon(8)` for more information. 162 162 ''; 163 163 }; 164 164
+1 -1
nixos/modules/config/users-groups.nix
··· 204 204 homeMode = mkOption { 205 205 type = types.strMatching "[0-7]{1,5}"; 206 206 default = "700"; 207 - description = "The user's home directory mode in numeric format. See chmod(1). The mode is only applied if {option}`users.users.<name>.createHome` is true."; 207 + description = "The user's home directory mode in numeric format. See {manpage}`chmod(1)`. The mode is only applied if {option}`users.users.<name>.createHome` is true."; 208 208 }; 209 209 210 210 cryptHomeLuks = mkOption {
+1 -1
nixos/modules/config/xdg/portals/wlr.nix
··· 28 28 description = '' 29 29 Configuration for `xdg-desktop-portal-wlr`. 30 30 31 - See `xdg-desktop-portal-wlr(5)` for supported 31 + See {manpage}`xdg-desktop-portal-wlr(5)` for supported 32 32 values. 33 33 ''; 34 34
+1
nixos/modules/module-list.nix
··· 1547 1547 ./services/web-apps/mobilizon.nix 1548 1548 ./services/web-apps/openwebrx.nix 1549 1549 ./services/web-apps/outline.nix 1550 + ./services/web-apps/pds.nix 1550 1551 ./services/web-apps/peering-manager.nix 1551 1552 ./services/web-apps/peertube.nix 1552 1553 ./services/web-apps/pgpkeyserver-lite.nix
+1 -1
nixos/modules/programs/gamemode.nix
··· 26 26 default = { }; 27 27 description = '' 28 28 System-wide configuration for GameMode (/etc/gamemode.ini). 29 - See gamemoded(8) man page for available settings. 29 + See {manpage}`gamemoded(8)` man page for available settings. 30 30 ''; 31 31 example = lib.literalExpression '' 32 32 {
+1 -1
nixos/modules/programs/git.nix
··· 47 47 `config` to `[ { foo.x = 42; } { bar.y = 42; }]` will put the `foo` 48 48 section before the `bar` section unlike the default alphabetical 49 49 order, which can be helpful for sections such as `include` and 50 - `includeIf`. See the CONFIGURATION FILE section of git-config(1) for 50 + `includeIf`. See the CONFIGURATION FILE section of {manpage}`git-config(1)` for 51 51 more information. 52 52 ''; 53 53 };
+3 -3
nixos/modules/programs/msmtp.nix
··· 34 34 }; 35 35 description = '' 36 36 Default values applied to all accounts. 37 - See msmtp(1) for the available options. 37 + See {manpage}`msmtp(1)` for the available options. 38 38 ''; 39 39 }; 40 40 ··· 52 52 description = '' 53 53 Named accounts and their respective configurations. 54 54 The special name "default" allows a default account to be defined. 55 - See msmtp(1) for the available options. 55 + See {manpage}`msmtp(1)` for the available options. 56 56 57 57 Use `programs.msmtp.extraConfig` instead of this attribute set-based 58 58 option if ordered account inheritance is needed. ··· 68 68 default = ""; 69 69 description = '' 70 70 Extra lines to add to the msmtp configuration verbatim. 71 - See msmtp(1) for the syntax and available options. 71 + See {manpage}`msmtp(1)` for the syntax and available options. 72 72 ''; 73 73 }; 74 74 };
+1 -1
nixos/modules/programs/shadow.nix
··· 31 31 description = '' 32 32 Config options for the /etc/login.defs file, that defines 33 33 the site-specific configuration for the shadow password suite. 34 - See login.defs(5) man page for available options. 34 + See {manpage}`login.defs(5)` man page for available options. 35 35 ''; 36 36 type = lib.types.submodule { 37 37 freeformType = (pkgs.formats.keyValue { }).type;
+1 -1
nixos/modules/security/pam.nix
··· 1483 1483 the YubiCloud. 1484 1484 1485 1485 Use "challenge-response" for offline validation using YubiKeys with HMAC-SHA-1 1486 - Challenge-Response configurations. See the man-page ykpamcfg(1) for further 1486 + Challenge-Response configurations. See the man-page {manpage}`ykpamcfg(1)` for further 1487 1487 details on how to configure offline Challenge-Response validation. 1488 1488 1489 1489 More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+1 -1
nixos/modules/security/wrappers/default.nix
··· 214 214 example = "10G"; 215 215 type = lib.types.str; 216 216 description = '' 217 - Size limit for the /run/wrappers tmpfs. Look at mount(8), tmpfs size option, 217 + Size limit for the /run/wrappers tmpfs. Look at {manpage}`mount(8)`, tmpfs size option, 218 218 for the accepted syntax. WARNING: don't set to less than 64MB. 219 219 ''; 220 220 };
+2 -2
nixos/modules/services/backup/btrbk.nix
··· 163 163 default = 10; 164 164 }; 165 165 ioSchedulingClass = mkOption { 166 - description = "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle."; 166 + description = "IO scheduling class for btrbk (see {manpage}`ionice(1)` for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle."; 167 167 type = types.enum [ 168 168 "idle" 169 169 "best-effort" ··· 181 181 type = types.nullOr types.str; 182 182 default = "daily"; 183 183 description = '' 184 - How often this btrbk instance is started. See systemd.time(7) for more information about the format. 184 + How often this btrbk instance is started. See {manpage}`systemd.time(7)` for more information about the format. 185 185 Setting it to null disables the timer, thus this instance can only be started manually. 186 186 ''; 187 187 };
+1 -1
nixos/modules/services/backup/restic.nix
··· 23 23 default = null; 24 24 description = '' 25 25 file containing the credentials to access the repository, in the 26 - format of an EnvironmentFile as described by systemd.exec(5) 26 + format of an EnvironmentFile as described by {manpage}`systemd.exec(5)` 27 27 ''; 28 28 }; 29 29
+4 -4
nixos/modules/services/backup/tarsnap.nix
··· 60 60 `"/root/tarsnap.key"`. 61 61 62 62 It's recommended for backups that you generate a key for every archive 63 - using `tarsnap-keygen(1)`, and then generate a 64 - write-only tarsnap key using `tarsnap-keymgmt(1)`, 63 + using {manpage}`tarsnap-keygen(1)`, and then generate a 64 + write-only tarsnap key using {manpage}`tarsnap-keymgmt(1)`, 65 65 and keep your master key(s) for a particular machine off-site. 66 66 67 67 The keyfile name should be given as a string and not a path, to ··· 86 86 Use this option if you want to run multiple backups 87 87 concurrently - each archive must have a unique key. You can 88 88 generate a write-only key derived from your master key (which 89 - is recommended) using `tarsnap-keymgmt(1)`. 89 + is recommended) using {manpage}`tarsnap-keymgmt(1)`. 90 90 91 91 Note: every archive must have an individual master key. You 92 92 must generate multiple keys with 93 - `tarsnap-keygen(1)`, and then generate write 93 + {manpage}`tarsnap-keygen(1)`, and then generate write 94 94 only keys from those. 95 95 96 96 The keyfile name should be given as a string and not a path, to
+1 -1
nixos/modules/services/cluster/k3s/default.nix
··· 227 227 environmentFile = lib.mkOption { 228 228 type = lib.types.nullOr lib.types.path; 229 229 description = '' 230 - File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See systemd.exec(5). 230 + File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See {manpage}`systemd.exec(5)`. 231 231 ''; 232 232 default = null; 233 233 };
+1 -1
nixos/modules/services/hardware/libinput.nix
··· 136 136 default = null; 137 137 example = "1 6 3 4 5 0 7"; 138 138 description = '' 139 - Sets the logical button mapping for this device, see XSetPointerMapping(3). The string must 139 + Sets the logical button mapping for this device, see {manpage}`XSetPointerMapping(3)`. The string must 140 140 be a space-separated list of button mappings in the order of the logical buttons on the 141 141 device, starting with button 1. The default mapping is "1 2 3 ... 32". A mapping of 0 deac‐ 142 142 tivates the button. Multiple buttons can have the same mapping. Invalid mapping strings are
+2 -2
nixos/modules/services/hardware/thinkfan.nix
··· 249 249 ]; 250 250 description = '' 251 251 A list of extra command line arguments to pass to thinkfan. 252 - Check the thinkfan(1) manpage for available arguments. 252 + Check the {manpage}`thinkfan(1)` manpage for available arguments. 253 253 ''; 254 254 }; 255 255 ··· 259 259 description = '' 260 260 Thinkfan settings. Use this option to configure thinkfan 261 261 settings not exposed in a NixOS option or to bypass one. 262 - Before changing this, read the `thinkfan.conf(5)` 262 + Before changing this, read the `{manpage}`thinkfan.conf(5)`` 263 263 manpage and take a look at the example config file at 264 264 <https://github.com/vmatare/thinkfan/blob/master/examples/thinkfan.yaml> 265 265 '';
+1 -1
nixos/modules/services/hardware/upower.nix
··· 65 65 on or off. We can't do much to fix these problems, but this is a way 66 66 for users to make the laptop panel vanish, a state that might be used 67 67 by a couple of user-space daemons. On Linux systems, see also 68 - logind.conf(5). 68 + {manpage}`logind.conf(5)`. 69 69 ''; 70 70 }; 71 71
+1 -1
nixos/modules/services/home-automation/esphome.nix
··· 67 67 ]; 68 68 description = '' 69 69 A list of device nodes to which {command}`esphome` has access to. 70 - Refer to DeviceAllow in systemd.resource-control(5) for more information. 70 + Refer to DeviceAllow in {manpage}`systemd.resource-control(5)` for more information. 71 71 Beware that if a device is referred to by an absolute path instead of a device category, 72 72 it will only allow devices that already are plugged in when the service is started. 73 73 '';
+3 -3
nixos/modules/services/logging/journalwatch.nix
··· 135 135 this patternBlock's {option}`filters` are applied. 136 136 If `value` starts and ends with a slash, it is interpreted as 137 137 an extended python regular expression, if not, it's an exact match. 138 - The journal fields are explained in systemd.journal-fields(7). 138 + The journal fields are explained in {manpage}`systemd.journal-fields(7)`. 139 139 ''; 140 140 }; 141 141 ··· 210 210 description = '' 211 211 How often to run journalwatch. 212 212 213 - The format is described in systemd.time(7). 213 + The format is described in {manpage}`systemd.time(7)`. 214 214 ''; 215 215 }; 216 216 accuracy = lib.mkOption { ··· 219 219 description = '' 220 220 The time window around the interval in which the journalwatch run will be scheduled. 221 221 222 - The format is described in systemd.time(7). 222 + The format is described in {manpage}`systemd.time(7)`. 223 223 ''; 224 224 }; 225 225 };
+1 -1
nixos/modules/services/logging/syslogd.nix
··· 70 70 type = lib.types.bool; 71 71 default = false; 72 72 description = '' 73 - Accept logging through UDP. Option -r of syslogd(8). 73 + Accept logging through UDP. Option -r of {manpage}`syslogd(8)`. 74 74 ''; 75 75 }; 76 76
+3 -3
nixos/modules/services/mail/clamsmtp.nix
··· 43 43 default = ""; 44 44 example = "X-Virus-Scanned: ClamAV using ClamSMTP"; 45 45 description = '' 46 - A header to add to scanned messages. See clamsmtpd.conf(5) for 46 + A header to add to scanned messages. See {manpage}`clamsmtpd.conf(5)` for 47 47 more details. Empty means no header. 48 48 ''; 49 49 }; ··· 65 65 example = "127.0.0.1:10025"; 66 66 description = '' 67 67 Address to wait for incoming SMTP connections on. See 68 - clamsmtpd.conf(5) for more details. 68 + {manpage}`clamsmtpd.conf(5)` for more details. 69 69 ''; 70 70 }; 71 71 ··· 118 118 default = null; 119 119 description = '' 120 120 Command to run when a virus is found. Please see VIRUS ACTION in 121 - clamsmtpd(8) for a discussion of this option and its safe use. 121 + {manpage}`clamsmtpd(8)` for a discussion of this option and its safe use. 122 122 ''; 123 123 }; 124 124
+3 -3
nixos/modules/services/mail/cyrus-imap.nix
··· 80 80 type = int; 81 81 default = 32; 82 82 description = '' 83 - Socket listen queue backlog size. See listen(2) for more information about a backlog. 83 + Socket listen queue backlog size. See {manpage}`listen(2)` for more information about a backlog. 84 84 Default is 32, which may be increased if you have a very high connection rate. 85 85 ''; 86 86 }; ··· 194 194 DAEMON = mkOption { 195 195 default = { }; 196 196 description = '' 197 - This section lists long running daemons to start before any SERVICES are spawned. master(8) will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when master(8) is exiting. 197 + This section lists long running daemons to start before any SERVICES are spawned. {manpage}`master(8)` will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when {manpage}`master(8)` is exiting. 198 198 ''; 199 199 }; 200 200 }; ··· 221 221 type = path; 222 222 default = "/run/cyrus/lmtp"; 223 223 description = '' 224 - Unix socket that lmtpd listens on, used by deliver(8). This should match the path specified in cyrus.conf(5). 224 + Unix socket that lmtpd listens on, used by {manpage}`deliver(8)`. This should match the path specified in {manpage}`cyrus.conf(5)`. 225 225 ''; 226 226 }; 227 227 idlesocket = mkOption {
+2 -2
nixos/modules/services/mail/offlineimap.nix
··· 37 37 onCalendar = lib.mkOption { 38 38 type = lib.types.str; 39 39 default = "*:0/3"; # every 3 minutes 40 - description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See systemd.time(7) for more information about the format."; 40 + description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See {manpage}`systemd.time(7)` for more information about the format."; 41 41 }; 42 42 43 43 timeoutStartSec = lib.mkOption { 44 44 type = lib.types.str; 45 45 default = "120sec"; # Kill if still alive after 2 minutes 46 - description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See systemd.time(7) for more information about the format."; 46 + description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See {manpage}`systemd.time(7)` for more information about the format."; 47 47 }; 48 48 }; 49 49 config = lib.mkIf (cfg.enable || cfg.install) {
+1 -1
nixos/modules/services/mail/opendkim.nix
··· 65 65 defaultText = lib.literalExpression ''"csl:''${config.networking.hostName}"''; 66 66 example = "csl:example.com,mydomain.net"; 67 67 description = '' 68 - Local domains set (see `opendkim(8)` for more information on datasets). 68 + Local domains set (see {manpage}`opendkim(8)` for more information on datasets). 69 69 Messages from them are signed, not verified. 70 70 ''; 71 71 };
+4 -4
nixos/modules/services/mail/postfix.nix
··· 546 546 type = lib.types.lines; 547 547 default = ""; 548 548 description = '' 549 - Additional entries to put verbatim into aliases file, cf. man-page aliases(8). 549 + Additional entries to put verbatim into aliases file, cf. man-page {manpage}`aliases(8)`. 550 550 ''; 551 551 }; 552 552 ··· 631 631 type = lib.types.lines; 632 632 default = ""; 633 633 description = '' 634 - Entries for the virtual alias map, cf. man-page virtual(5). 634 + Entries for the virtual alias map, cf. man-page {manpage}`virtual(5)`. 635 635 ''; 636 636 }; 637 637 ··· 654 654 List of accepted local users. Specify a bare username, an 655 655 `"@domain.tld"` wild-card, or a complete 656 656 `"user@domain.tld"` address. If set, these names end 657 - up in the local recipient map -- see the local(8) man-page -- and 657 + up in the local recipient map -- see the {manpage}`local(8)` man-page -- and 658 658 effectively replace the system user database lookup that's otherwise 659 659 used by default. 660 660 ''; ··· 664 664 default = ""; 665 665 type = lib.types.lines; 666 666 description = '' 667 - Entries for the transport map, cf. man-page transport(8). 667 + Entries for the transport map, cf. man-page {manpage}`transport(8)`. 668 668 ''; 669 669 }; 670 670
+3 -3
nixos/modules/services/mail/postgrey.nix
··· 119 119 greylistAction = mkOption { 120 120 type = str; 121 121 default = "DEFER_IF_PERMIT"; 122 - description = "Response status for greylisted messages (see access(5))"; 122 + description = "Response status for greylisted messages (see {manpage}`access(5)`)"; 123 123 }; 124 124 greylistHeader = mkOption { 125 125 type = str; ··· 170 170 whitelistClients = mkOption { 171 171 type = listOf path; 172 172 default = [ ]; 173 - description = "Client address whitelist files (see postgrey(8))"; 173 + description = "Client address whitelist files (see {manpage}`postgrey(8)`)"; 174 174 }; 175 175 whitelistRecipients = mkOption { 176 176 type = listOf path; 177 177 default = [ ]; 178 - description = "Recipient address whitelist files (see postgrey(8))"; 178 + description = "Recipient address whitelist files (see {manpage}`postgrey(8)`)"; 179 179 }; 180 180 }; 181 181 };
+1 -1
nixos/modules/services/misc/autofs.nix
··· 49 49 ''' 50 50 ''; 51 51 description = '' 52 - Contents of `/etc/auto.master` file. See {command}`auto.master(5)` and {command}`autofs(5)`. 52 + Contents of `/etc/auto.master` file. See {manpage}`auto.master(5)` and {manpage}`autofs(5)`. 53 53 ''; 54 54 }; 55 55
+1 -1
nixos/modules/services/misc/gpsd.nix
··· 105 105 ]; 106 106 description = '' 107 107 A list of extra command line arguments to pass to gpsd. 108 - Check gpsd(8) mangpage for possible arguments. 108 + Check {manpage}`gpsd(8)` mangpage for possible arguments. 109 109 ''; 110 110 }; 111 111
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/restic.nix
··· 54 54 default = null; 55 55 description = '' 56 56 File containing the credentials to access the repository, in the 57 - format of an EnvironmentFile as described by systemd.exec(5) 57 + format of an EnvironmentFile as described by {manpage}`systemd.exec(5)` 58 58 ''; 59 59 }; 60 60
+1 -1
nixos/modules/services/network-filesystems/cachefilesd.nix
··· 35 35 type = lib.types.lines; 36 36 default = ""; 37 37 example = "brun 10%"; 38 - description = "Additional configuration file entries. See cachefilesd.conf(5) for more information."; 38 + description = "Additional configuration file entries. See {manpage}`cachefilesd.conf(5)` for more information."; 39 39 }; 40 40 41 41 };
+1 -1
nixos/modules/services/network-filesystems/openafs/client.nix
··· 73 73 }); 74 74 description = '' 75 75 This cell's database server records, added to the global 76 - CellServDB. See CellServDB(5) man page for syntax. Ignored when 76 + CellServDB. See {manpage}`CellServDB(5)` man page for syntax. Ignored when 77 77 `afsdb` is set to `true`. 78 78 ''; 79 79 example = [
+1 -1
nixos/modules/services/network-filesystems/openafs/server.nix
··· 117 117 advertisedAddresses = mkOption { 118 118 type = types.listOf types.str; 119 119 default = [ ]; 120 - description = "List of IP addresses this server is advertised under. See NetInfo(5)"; 120 + description = "List of IP addresses this server is advertised under. See {manpage}`NetInfo(5)`"; 121 121 }; 122 122 123 123 cellName = mkOption {
+2 -2
nixos/modules/services/networking/cgit.nix
··· 146 146 }; 147 147 148 148 repos = lib.mkOption { 149 - description = "cgit repository settings, see cgitrc(5)"; 149 + description = "cgit repository settings, see {manpage}`cgitrc(5)`"; 150 150 type = with lib.types; attrsOf (attrsOf settingType); 151 151 default = { }; 152 152 example = { ··· 165 165 }; 166 166 167 167 settings = lib.mkOption { 168 - description = "cgit configuration, see cgitrc(5)"; 168 + description = "cgit configuration, see {manpage}`cgitrc(5)`"; 169 169 type = lib.types.attrsOf repeatedSettingType; 170 170 default = { }; 171 171 example = lib.literalExpression ''
+4 -4
nixos/modules/services/networking/hylafax/options.nix
··· 194 194 will be symlinked to the location given here. 195 195 This file must exist and be 196 196 readable only by the `uucp` user. 197 - See hosts.hfaxd(5) for details. 197 + See {manpage}`hosts.hfaxd(5)` for details. 198 198 This configuration permits access for all users: 199 199 ``` 200 200 environment.etc."hosts.hfaxd" = { ··· 299 299 description = '' 300 300 purging old files from the spooling area with 301 301 {file}`faxcron` with the given frequency 302 - (see systemd.time(7)) 302 + (see {manpage}`systemd.time(7)`) 303 303 ''; 304 304 }; 305 305 faxcron.infoDays = mkOption { ··· 339 339 description = '' 340 340 Purge old files from the spooling area with 341 341 {file}`faxcron` with the given frequency 342 - (see systemd.time(7)). 342 + (see {manpage}`systemd.time(7)`). 343 343 ''; 344 344 }; 345 345 faxqclean.archiving = mkOption { ··· 356 356 `as-flagged` archives jobs that 357 357 have been flagged for archiving by sendfax, 358 358 `always` forces archiving of all jobs. 359 - See also sendfax(1) and faxqclean(8). 359 + See also {manpage}`sendfax(1)` and {manpage}`faxqclean(8)`. 360 360 ''; 361 361 }; 362 362 faxqclean.doneqMinutes = mkOption {
+1 -1
nixos/modules/services/networking/minidlna.nix
··· 12 12 13 13 options.services.minidlna.settings = lib.mkOption { 14 14 default = {}; 15 - description = "Configuration for `minidlna.conf(5)`."; 15 + description = "Configuration for {manpage}`minidlna.conf(5)`."; 16 16 type = lib.types.submodule { 17 17 freeformType = format.type; 18 18
+1 -1
nixos/modules/services/networking/ngircd.nix
··· 29 29 enable = mkEnableOption "the ngircd IRC server"; 30 30 31 31 config = mkOption { 32 - description = "The ngircd configuration (see ngircd.conf(5))."; 32 + description = "The ngircd configuration (see {manpage}`ngircd.conf(5)`)."; 33 33 34 34 type = types.lines; 35 35 };
+1 -1
nixos/modules/services/networking/ntopng.nix
··· 58 58 interfaces and displays its findings at http://localhost:''${toString 59 59 config.${opt.http-port}}. Default username and password is admin/admin. 60 60 61 - See the ntopng(8) manual page and http://www.ntop.org/products/ntop/ 61 + See the {manpage}`ntopng(8)` manual page and http://www.ntop.org/products/ntop/ 62 62 for more info. 63 63 64 64 Note that enabling ntopng will also enable redis (key-value
+1 -1
nixos/modules/services/networking/pppd.nix
··· 53 53 config = mkOption { 54 54 type = types.lines; 55 55 default = ""; 56 - description = "pppd configuration for this peer, see the pppd(8) man page."; 56 + description = "pppd configuration for this peer, see the {manpage}`pppd(8)` man page."; 57 57 }; 58 58 }; 59 59 }
+1 -1
nixos/modules/services/networking/privoxy.nix
··· 114 114 the disk usage, since Privoxy itself never deletes the certificates. 115 115 116 116 ::: {.note} 117 - The format is that of the `tmpfiles.d(5)` 117 + The format is that of the {manpage}`tmpfiles.d(5)` 118 118 Age parameter. 119 119 ::: 120 120 '';
+1 -1
nixos/modules/services/networking/r53-ddns.nix
··· 45 45 type = types.str; 46 46 description = '' 47 47 File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY 48 - in the format of an EnvironmentFile as described by systemd.exec(5) 48 + in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)` 49 49 ''; 50 50 }; 51 51
+1 -1
nixos/modules/services/networking/robustirc-bridge.nix
··· 13 13 extraFlags = mkOption { 14 14 type = types.listOf types.str; 15 15 default = []; 16 - description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or robustirc-bridge(1) for details.''; 16 + description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or {manpage}`robustirc-bridge(1)` for details.''; 17 17 example = [ 18 18 "-network robustirc.net" 19 19 ];
+1 -1
nixos/modules/services/networking/rpcbind.nix
··· 16 16 description = '' 17 17 Whether to enable `rpcbind`, an ONC RPC directory service 18 18 notably used by NFS and NIS, and which can be queried 19 - using the rpcinfo(1) command. `rpcbind` is a replacement for 19 + using the {manpage}`rpcinfo(1)` command. `rpcbind` is a replacement for 20 20 `portmap`. 21 21 ''; 22 22 };
+1 -1
nixos/modules/services/networking/searx.nix
··· 56 56 type = types.nullOr types.path; 57 57 default = null; 58 58 description = '' 59 - Environment file (see `systemd.exec(5)` 59 + Environment file (see {manpage}`systemd.exec(5)` 60 60 "EnvironmentFile=" section for the syntax) to define variables for 61 61 Searx. This option can be used to safely include secret keys into the 62 62 Searx configuration.
+1 -1
nixos/modules/services/networking/spacecookie.nix
··· 53 53 description = '' 54 54 Address to listen on. Must be in the 55 55 `ListenStream=` syntax of 56 - [systemd.socket(5)](https://www.freedesktop.org/software/systemd/man/systemd.socket.html). 56 + {manpage}`systemd.socket(5)`. 57 57 ''; 58 58 }; 59 59
+2 -2
nixos/modules/services/networking/ssh/sshd.nix
··· 357 357 type = lib.types.nullOr (lib.types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]); 358 358 default = "INFO"; # upstream default 359 359 description = '' 360 - Gives the verbosity level that is used when logging messages from sshd(8). Logging with a DEBUG level 360 + Gives the verbosity level that is used when logging messages from {manpage}`sshd(8)`. Logging with a DEBUG level 361 361 violates the privacy of users and is not recommended. 362 362 ''; 363 363 }; ··· 369 369 # apply if cfg.useDns then "yes" else "no" 370 370 default = false; 371 371 description = '' 372 - Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for 372 + Specifies whether {manpage}`sshd(8)` should look up the remote host name, and to check that the resolved host name for 373 373 the remote IP address maps back to the very same IP address. 374 374 If this option is set to no (the default) then only addresses and not host names may be used in 375 375 ~/.ssh/authorized_keys from and sshd_config Match Host directives.
+1 -1
nixos/modules/services/networking/tinydns.nix
··· 16 16 data = mkOption { 17 17 type = types.lines; 18 18 default = ""; 19 - description = "The DNS data to serve, in the format described by tinydns-data(8)"; 19 + description = "The DNS data to serve, in the format described by {manpage}`tinydns-data(8)`"; 20 20 }; 21 21 22 22 ip = mkOption {
+3 -3
nixos/modules/services/security/clamav.nix
··· 53 53 type = lib.types.str; 54 54 default = "hourly"; 55 55 description = '' 56 - How often freshclam is invoked. See systemd.time(7) for more 56 + How often freshclam is invoked. See {manpage}`systemd.time(7)` for more 57 57 information about the format. 58 58 ''; 59 59 }; ··· 74 74 type = lib.types.str; 75 75 default = "hourly"; 76 76 description = '' 77 - How often freshclam is invoked. See systemd.time(7) for more 77 + How often freshclam is invoked. See {manpage}`systemd.time(7)` for more 78 78 information about the format. 79 79 ''; 80 80 }; ··· 105 105 type = lib.types.str; 106 106 default = "*-*-* 04:00:00"; 107 107 description = '' 108 - How often clamdscan is invoked. See systemd.time(7) for more 108 + How often clamdscan is invoked. See {manpage}`systemd.time(7)` for more 109 109 information about the format. 110 110 By default this runs using 10 cores at most, be sure to run it at a time of low traffic. 111 111 '';
+1 -1
nixos/modules/services/torrent/transmission.nix
··· 181 181 defaultText = literalExpression "if cfg.package == pkgs.transmission_3 then 18 else \"022\""; 182 182 description = '' 183 183 Sets transmission's file mode creation mask. 184 - See the umask(2) manpage for more information. 184 + See the {manpage}`umask(2)` manpage for more information. 185 185 Users who want their saved torrents to be world-writable 186 186 may want to set this value to 0/`"000"`. 187 187
+8 -8
nixos/modules/services/web-apps/cloudlog.nix
··· 173 173 type = str; 174 174 default = "daily"; 175 175 description = '' 176 - Specification (in the format described by systemd.time(7)) of the 176 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 177 177 time at which the LoTW upload will occur. 178 178 ''; 179 179 }; ··· 191 191 type = str; 192 192 default = "daily"; 193 193 description = '' 194 - Specification (in the format described by systemd.time(7)) of the time 194 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 195 195 at which the Clublog upload will occur. 196 196 ''; 197 197 }; ··· 210 210 type = str; 211 211 default = "weekly"; 212 212 description = '' 213 - Specification (in the format described by systemd.time(7)) of the 213 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 214 214 time at which the LoTW user update will occur. 215 215 ''; 216 216 }; ··· 228 228 type = str; 229 229 default = "monthly"; 230 230 description = '' 231 - Specification (in the format described by systemd.time(7)) of the 231 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 232 232 time at which the DOK update will occur. 233 233 ''; 234 234 }; ··· 247 247 type = str; 248 248 default = "monthly"; 249 249 description = '' 250 - Specification (in the format described by systemd.time(7)) of the time 250 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 251 251 at which the Clublog SCP update will occur. 252 252 ''; 253 253 }; ··· 266 266 type = str; 267 267 default = "monthly"; 268 268 description = '' 269 - Specification (in the format described by systemd.time(7)) of the time 269 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 270 270 at which the WWFF update will occur. 271 271 ''; 272 272 }; ··· 284 284 type = str; 285 285 default = "daily"; 286 286 description = '' 287 - Specification (in the format described by systemd.time(7)) of the 287 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 288 288 time at which the QRZ upload will occur. 289 289 ''; 290 290 }; ··· 302 302 type = str; 303 303 default = "monthly"; 304 304 description = '' 305 - Specification (in the format described by systemd.time(7)) of the time 305 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 306 306 at which the SOTA update will occur. 307 307 ''; 308 308 };
+1 -1
nixos/modules/services/web-apps/dex.nix
··· 51 51 type = types.nullOr types.path; 52 52 default = null; 53 53 description = '' 54 - Environment file (see `systemd.exec(5)` 54 + Environment file (see {manpage}`systemd.exec(5)` 55 55 "EnvironmentFile=" section for the syntax) to define variables for dex. 56 56 This option can be used to safely include secret keys into the dex configuration. 57 57 '';
+1 -1
nixos/modules/services/web-apps/gotosocial.nix
··· 80 80 type = lib.types.nullOr lib.types.path; 81 81 description = '' 82 82 File path containing environment variables for configuring the GoToSocial service 83 - in the format of an EnvironmentFile as described by systemd.exec(5). 83 + in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`. 84 84 85 85 This option could be used to pass sensitive configuration to the GoToSocial daemon. 86 86
+1 -1
nixos/modules/services/web-apps/miniflux.nix
··· 72 72 description = '' 73 73 File containing the ADMIN_USERNAME and 74 74 ADMIN_PASSWORD (length >= 6) in the format of 75 - an EnvironmentFile=, as described by systemd.exec(5). 75 + an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`. 76 76 ''; 77 77 example = "/etc/nixos/miniflux-admin-credentials"; 78 78 };
+233
nixos/modules/services/web-apps/pds.nix
··· 1 + { 2 + lib, 3 + pkgs, 4 + config, 5 + ... 6 + }: 7 + let 8 + cfg = config.services.pds; 9 + 10 + inherit (lib) 11 + getExe 12 + mkEnableOption 13 + mkIf 14 + mkOption 15 + mkPackageOption 16 + escapeShellArgs 17 + concatMapStringsSep 18 + types 19 + literalExpression 20 + ; 21 + 22 + pdsadminWrapper = 23 + let 24 + cfgSystemd = config.systemd.services.pds.serviceConfig; 25 + in 26 + pkgs.writeShellScriptBin "pdsadmin" '' 27 + DUMMY_PDS_ENV_FILE="$(mktemp)" 28 + trap 'rm -f "$DUMMY_PDS_ENV_FILE"' EXIT 29 + env "PDS_ENV_FILE=$DUMMY_PDS_ENV_FILE" \ 30 + ${escapeShellArgs cfgSystemd.Environment} \ 31 + ${concatMapStringsSep " " (envFile: "$(cat ${envFile})") cfgSystemd.EnvironmentFile} \ 32 + ${getExe pkgs.pdsadmin} "$@" 33 + ''; 34 + in 35 + # All defaults are from https://github.com/bluesky-social/pds/blob/8b9fc24cec5f30066b0d0b86d2b0ba3d66c2b532/installer.sh 36 + { 37 + options.services.pds = { 38 + enable = mkEnableOption "pds"; 39 + 40 + package = mkPackageOption pkgs "pds" { }; 41 + 42 + settings = mkOption { 43 + type = types.submodule { 44 + freeformType = types.attrsOf ( 45 + types.oneOf [ 46 + (types.nullOr types.str) 47 + types.port 48 + ] 49 + ); 50 + options = { 51 + PDS_PORT = mkOption { 52 + type = types.port; 53 + default = 3000; 54 + description = "Port to listen on"; 55 + }; 56 + 57 + PDS_HOSTNAME = mkOption { 58 + type = types.str; 59 + example = "pds.example.com"; 60 + description = "Instance hostname (base domain name)"; 61 + }; 62 + 63 + PDS_BLOB_UPLOAD_LIMIT = mkOption { 64 + type = types.str; 65 + default = "52428800"; 66 + description = "Size limit of uploaded blobs in bytes"; 67 + }; 68 + 69 + PDS_DID_PLC_URL = mkOption { 70 + type = types.str; 71 + default = "https://plc.directory"; 72 + description = "URL of DID PLC directory"; 73 + }; 74 + 75 + PDS_BSKY_APP_VIEW_URL = mkOption { 76 + type = types.str; 77 + default = "https://api.bsky.app"; 78 + description = "URL of bsky frontend"; 79 + }; 80 + 81 + PDS_BSKY_APP_VIEW_DID = mkOption { 82 + type = types.str; 83 + default = "did:web:api.bsky.app"; 84 + description = "DID of bsky frontend"; 85 + }; 86 + 87 + PDS_REPORT_SERVICE_URL = mkOption { 88 + type = types.str; 89 + default = "https://mod.bsky.app"; 90 + description = "URL of mod service"; 91 + }; 92 + 93 + PDS_REPORT_SERVICE_DID = mkOption { 94 + type = types.str; 95 + default = "did:plc:ar7c4by46qjdydhdevvrndac"; 96 + description = "DID of mod service"; 97 + }; 98 + 99 + PDS_CRAWLERS = mkOption { 100 + type = types.str; 101 + default = "https://bsky.network"; 102 + description = "URL of crawlers"; 103 + }; 104 + 105 + PDS_DATA_DIRECTORY = mkOption { 106 + type = types.str; 107 + default = "/var/lib/pds"; 108 + description = "Directory to store state"; 109 + }; 110 + 111 + PDS_BLOBSTORE_DISK_LOCATION = mkOption { 112 + type = types.nullOr types.str; 113 + default = "/var/lib/pds/blocks"; 114 + description = "Store blobs at this location, set to null to use e.g. S3"; 115 + }; 116 + 117 + LOG_ENABLED = mkOption { 118 + type = types.nullOr types.str; 119 + default = "true"; 120 + description = "Enable logging"; 121 + }; 122 + }; 123 + }; 124 + 125 + description = '' 126 + Environment variables to set for the service. Secrets should be 127 + specified using {option}`environmentFile`. 128 + 129 + Refer to <https://github.com/bluesky-social/atproto/blob/main/packages/pds/src/config/env.ts> for available environment variables. 130 + ''; 131 + }; 132 + 133 + environmentFiles = mkOption { 134 + type = types.listOf types.path; 135 + default = [ ]; 136 + description = '' 137 + File to load environment variables from. Loaded variables override 138 + values set in {option}`environment`. 139 + 140 + Use it to set values of `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, 141 + and `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX` secrets. 142 + `PDS_JWT_SECRET` and `PDS_ADMIN_PASSWORD` can be generated with 143 + ``` 144 + openssl rand --hex 16 145 + ``` 146 + `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX` can be generated with 147 + ``` 148 + openssl ecparam --name secp256k1 --genkey --noout --outform DER | tail --bytes=+8 | head --bytes=32 | xxd --plain --cols 32 149 + ``` 150 + ''; 151 + }; 152 + 153 + pdsadmin = { 154 + enable = mkOption { 155 + type = types.bool; 156 + default = cfg.enable; 157 + defaultText = literalExpression "config.services.pds.enable"; 158 + description = "Add pdsadmin script to PATH"; 159 + }; 160 + }; 161 + }; 162 + 163 + config = mkIf cfg.enable { 164 + environment = mkIf cfg.pdsadmin.enable { 165 + systemPackages = [ pdsadminWrapper ]; 166 + }; 167 + 168 + systemd.services.pds = { 169 + description = "pds"; 170 + 171 + after = [ "network-online.target" ]; 172 + wants = [ "network-online.target" ]; 173 + wantedBy = [ "multi-user.target" ]; 174 + 175 + serviceConfig = { 176 + ExecStart = getExe cfg.package; 177 + Environment = lib.mapAttrsToList (k: v: "${k}=${if builtins.isInt v then toString v else v}") ( 178 + lib.filterAttrs (_: v: v != null) cfg.settings 179 + ); 180 + 181 + EnvironmentFile = cfg.environmentFiles; 182 + User = "pds"; 183 + Group = "pds"; 184 + StateDirectory = "pds"; 185 + StateDirectoryMode = "0755"; 186 + Restart = "always"; 187 + 188 + # Hardening 189 + RemoveIPC = true; 190 + CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; 191 + NoNewPrivileges = true; 192 + PrivateDevices = true; 193 + ProtectClock = true; 194 + ProtectKernelLogs = true; 195 + ProtectControlGroups = true; 196 + ProtectKernelModules = true; 197 + PrivateMounts = true; 198 + SystemCallArchitectures = [ "native" ]; 199 + MemoryDenyWriteExecute = false; # required by V8 JIT 200 + RestrictNamespaces = true; 201 + RestrictSUIDSGID = true; 202 + ProtectHostname = true; 203 + LockPersonality = true; 204 + ProtectKernelTunables = true; 205 + RestrictAddressFamilies = [ 206 + "AF_UNIX" 207 + "AF_INET" 208 + "AF_INET6" 209 + ]; 210 + RestrictRealtime = true; 211 + DeviceAllow = [ "" ]; 212 + ProtectSystem = "strict"; 213 + ProtectProc = "invisible"; 214 + ProcSubset = "pid"; 215 + ProtectHome = true; 216 + PrivateUsers = true; 217 + PrivateTmp = true; 218 + UMask = "0077"; 219 + }; 220 + }; 221 + 222 + users = { 223 + users.pds = { 224 + group = "pds"; 225 + isSystemUser = true; 226 + }; 227 + groups.pds = { }; 228 + }; 229 + 230 + }; 231 + 232 + meta.maintainers = with lib.maintainers; [ t4ccer ]; 233 + }
+1 -1
nixos/modules/services/web-servers/merecat.nix
··· 30 30 inherit (format) type; 31 31 default = { }; 32 32 description = '' 33 - Merecat configuration. Refer to merecat(8) for details on supported values. 33 + Merecat configuration. Refer to {manpage}`merecat(8)` for details on supported values. 34 34 ''; 35 35 example = { 36 36 hostname = "localhost";
+1 -1
nixos/modules/services/web-servers/minio.nix
··· 72 72 description = '' 73 73 File containing the MINIO_ROOT_USER, default is "minioadmin", and 74 74 MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of 75 - an EnvironmentFile=, as described by systemd.exec(5). 75 + an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`. 76 76 ''; 77 77 example = "/etc/nixos/minio-root-credentials"; 78 78 };
+1 -1
nixos/modules/services/web-servers/pomerium.nix
··· 50 50 default = null; 51 51 description = '' 52 52 Path to file containing secrets for Pomerium, in systemd 53 - EnvironmentFile format. See the systemd.exec(5) man page. 53 + EnvironmentFile format. See the {manpage}`systemd.exec(5)` man page. 54 54 ''; 55 55 }; 56 56 };
+1 -1
nixos/modules/services/web-servers/uwsgi.nix
··· 200 200 ''; 201 201 description = '' 202 202 Grant capabilities to the uWSGI instance. See the 203 - `capabilities(7)` for available values. 203 + {manpage}`capabilities(7)` for available values. 204 204 205 205 ::: {.note} 206 206 uWSGI runs as an unprivileged user (even as Emperor) with the minimal
+1 -1
nixos/modules/services/x11/display-managers/startx.nix
··· 27 27 which allows users to start X manually via the "startx" command 28 28 from a vt shell. The X server runs under the user's id, not as root. 29 29 The user must provide a ~/.xinitrc file containing session startup 30 - commands, see startx(1). This is not automatically generated 30 + commands, see {manpage}`startx(1)`. This is not automatically generated 31 31 from the desktopManager and windowManager settings. 32 32 ''; 33 33 };
+1 -1
nixos/modules/services/x11/display-managers/sx.nix
··· 18 18 to start manually via the "sx" command from a vt shell. The X server 19 19 runs under the user's id, not as root. The user must provide a 20 20 ~/.config/sx/sxrc file containing session startup commands, see 21 - sx(1). This is not automatically generated from the desktopManager 21 + {manpage}`sx(1)`. This is not automatically generated from the desktopManager 22 22 and windowManager settings. sx doesn't have a way to directly set 23 23 X server flags, but it can be done by overriding its xorgserver 24 24 dependency.
+3 -3
nixos/modules/services/x11/picom.nix
··· 126 126 ]; 127 127 description = '' 128 128 List of conditions of windows that should not be faded. 129 - See `picom(1)` man page for more examples. 129 + See {manpage}`picom(1)` man page for more examples. 130 130 ''; 131 131 }; 132 132 ··· 172 172 ]; 173 173 description = '' 174 174 List of conditions of windows that should have no shadow. 175 - See `picom(1)` man page for more examples. 175 + See {manpage}`picom(1)` man page for more examples. 176 176 ''; 177 177 }; 178 178 ··· 326 326 description = '' 327 327 Picom settings. Use this option to configure Picom settings not exposed 328 328 in a NixOS option or to bypass one. For the available options see the 329 - CONFIGURATION FILES section at `picom(1)`. 329 + CONFIGURATION FILES section at {manpage}`picom(1)`. 330 330 ''; 331 331 }; 332 332 };
+1 -1
nixos/modules/system/activation/activation-script.nix
··· 203 203 type = types.nullOr types.path; 204 204 visible = false; 205 205 description = '' 206 - The env(1) executable that is linked system-wide to 206 + The {manpage}`env(1)` executable that is linked system-wide to 207 207 `/usr/bin/env`. 208 208 ''; 209 209 };
+1 -1
nixos/modules/system/boot/systemd/coredump.nix
··· 29 29 type = types.lines; 30 30 example = "Storage=journal"; 31 31 description = '' 32 - Extra config options for systemd-coredump. See coredump.conf(5) man page 32 + Extra config options for systemd-coredump. See {manpage}`coredump.conf(5)` man page 33 33 for available options. 34 34 ''; 35 35 };
+1 -1
nixos/modules/system/boot/systemd/initrd.nix
··· 163 163 type = types.lines; 164 164 example = "DefaultLimitCORE=infinity"; 165 165 description = '' 166 - Extra config options for systemd. See systemd-system.conf(5) man page 166 + Extra config options for systemd. See {manpage}`systemd-system.conf(5)` man page 167 167 for available options. 168 168 ''; 169 169 };
+1 -1
nixos/modules/system/boot/systemd/logind.nix
··· 29 29 example = "IdleAction=lock"; 30 30 description = '' 31 31 Extra config options for systemd-logind. 32 - See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html) 32 + See {manpage}`logind.conf(5)` 33 33 for available options. 34 34 ''; 35 35 };
+2 -2
nixos/modules/system/boot/timesyncd.nix
··· 28 28 `timesyncd.conf` file as opposed to setting this option to null which 29 29 will remove `NTP=` entirely. 30 30 31 - See man:timesyncd.conf(5) for details. 31 + See {manpage}`timesyncd.conf(5)` for details. 32 32 ''; 33 33 }; 34 34 fallbackServers = mkOption { ··· 42 42 `timesyncd.conf` file as opposed to setting this option to null which 43 43 will remove `FallbackNTP=` entirely. 44 44 45 - See man:timesyncd.conf(5) for details. 45 + See {manpage}`timesyncd.conf(5)` for details. 46 46 ''; 47 47 }; 48 48 extraConfig = mkOption {
+1 -1
nixos/modules/tasks/filesystems/nfs.nix
··· 99 99 default = { }; 100 100 description = '' 101 101 General configuration for NFS daemons and tools. 102 - See nfs.conf(5) and related man pages for details. 102 + See {manpage}`nfs.conf(5)` and related man pages for details. 103 103 ''; 104 104 example = lib.literalExpression '' 105 105 {
+2 -2
nixos/modules/tasks/network-interfaces.nix
··· 97 97 default = null; 98 98 description = '' 99 99 Type of the route. See the `Route types` section 100 - in the `ip-route(8)` manual page for the details. 100 + in the {manpage}`ip-route(8)` manual page for the details. 101 101 102 102 Note that `prohibit`, `blackhole`, 103 103 `unreachable`, and `throw` cannot ··· 118 118 example = { mtu = "1492"; window = "524288"; }; 119 119 description = '' 120 120 Other route options. See the symbol `OPTIONS` 121 - in the `ip-route(8)` manual page for the details. 121 + in the {manpage}`ip-route(8)` manual page for the details. 122 122 You may also specify `metric`, 123 123 `src`, `protocol`, 124 124 `scope`, `from`
+1 -1
nixos/modules/virtualisation/docker.nix
··· 34 34 default = ["/run/docker.sock"]; 35 35 description = '' 36 36 A list of unix and tcp docker should listen to. The format follows 37 - ListenStream as described in systemd.socket(5). 37 + ListenStream as described in {manpage}`systemd.socket(5)`. 38 38 ''; 39 39 }; 40 40
+5 -5
nixos/modules/virtualisation/nixos-containers.nix
··· 349 349 Device node access modifier. Takes a combination 350 350 `r` (read), `w` (write), and 351 351 `m` (mknod). See the 352 - `systemd.resource-control(5)` man page for more 352 + {manpage}`systemd.resource-control(5)` man page for more 353 353 information.''; 354 354 }; 355 355 }; ··· 563 563 example = [ "CAP_NET_ADMIN" "CAP_MKNOD" ]; 564 564 description = '' 565 565 Grant additional capabilities to the container. See the 566 - capabilities(7) and systemd-nspawn(1) man pages for more 566 + {manpage}`capabilities(7)` and {manpage}`systemd-nspawn(1)` man pages for more 567 567 information. 568 568 ''; 569 569 }; ··· 644 644 shall run in. The specified path should refer to a (possibly bind-mounted) network 645 645 namespace file, as exposed by the kernel below /proc/<PID>/ns/net. This makes the 646 646 container enter the given network namespace. One of the typical use cases is to give 647 - a network namespace under /run/netns created by ip-netns(8). 647 + a network namespace under /run/netns created by {manpage}`ip-netns(8)`. 648 648 Note that this option cannot be used together with other network-related options, 649 649 such as --private-network or --network-interface=. 650 650 ''; ··· 737 737 Mounts a set of tmpfs file systems into the container. 738 738 Multiple paths can be specified. 739 739 Valid items must conform to the --tmpfs argument 740 - of systemd-nspawn. See systemd-nspawn(1) for details. 740 + of systemd-nspawn. See {manpage}`systemd-nspawn(1)` for details. 741 741 ''; 742 742 }; 743 743 ··· 747 747 example = [ "--drop-capability=CAP_SYS_CHROOT" ]; 748 748 description = '' 749 749 Extra flags passed to the systemd-nspawn command. 750 - See systemd-nspawn(1) for details. 750 + See {manpage}`systemd-nspawn(1)` for details. 751 751 ''; 752 752 }; 753 753
+1 -1
nixos/modules/virtualisation/oci-containers.nix
··· 155 155 [Docker engine documentation](https://docs.docker.com/engine/logging/configure/) 156 156 157 157 For Podman: 158 - Refer to the docker-run(1) man page. 158 + Refer to the {manpage}`docker-run(1)` man page. 159 159 ''; 160 160 }; 161 161
+1 -1
nixos/modules/virtualisation/waagent.nix
··· 151 151 ]; 152 152 description = '' 153 153 This option specifies disk mount options to be passed to the `mount -o` command. 154 - For more information, see the `mount(8)` manual page. 154 + For more information, see the {manpage}`mount(8)` manual page. 155 155 ''; 156 156 }; 157 157
+1
nixos/tests/all-tests.nix
··· 810 810 parsedmarc = handleTest ./parsedmarc {}; 811 811 password-option-override-ordering = handleTest ./password-option-override-ordering.nix {}; 812 812 pdns-recursor = handleTest ./pdns-recursor.nix {}; 813 + pds = handleTest ./pds.nix {}; 813 814 peerflix = handleTest ./peerflix.nix {}; 814 815 peering-manager = handleTest ./web-apps/peering-manager.nix {}; 815 816 peertube = handleTestOn ["x86_64-linux"] ./web-apps/peertube.nix {};
+29
nixos/tests/pds.nix
··· 1 + import ./make-test-python.nix ( 2 + { lib, ... }: 3 + { 4 + name = "PDS"; 5 + 6 + nodes.machine = { 7 + services.pds = { 8 + enable = true; 9 + settings = { 10 + PDS_PORT = 3000; 11 + PDS_HOSTNAME = "example.com"; 12 + 13 + # Snake oil testing credentials 14 + PDS_JWT_SECRET = "7b93fee53be046bf59c27a32a0fb2069"; 15 + PDS_ADMIN_PASSWORD = "3a4077bc0d5f04eca945ef0509f7e809"; 16 + PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX = "ae4f5028d04c833ba630f29debd5ff80b7700e43e9f4bf70f729a88cd6a6ce35"; 17 + }; 18 + }; 19 + }; 20 + 21 + testScript = '' 22 + machine.wait_for_unit("pds.service") 23 + machine.wait_for_open_port(3000) 24 + machine.succeed("curl --fail http://localhost:3000") 25 + ''; 26 + 27 + meta.maintainers = with lib.maintainers; [ t4ccer ]; 28 + } 29 + )
+12
pkgs/applications/editors/vim/plugins/generated.nix
··· 1302 1302 meta.homepage = "https://github.com/Saghen/blink.compat/"; 1303 1303 }; 1304 1304 1305 + blink-copilot = buildVimPlugin { 1306 + pname = "blink-copilot"; 1307 + version = "2025-01-27"; 1308 + src = fetchFromGitHub { 1309 + owner = "fang2hou"; 1310 + repo = "blink-copilot"; 1311 + rev = "7e63f20b8e96191e5c87bf96fc35da3547993be2"; 1312 + sha256 = "10lm90xa7w3ww94acivshnzkp4q2bfrq9zff2z5amrp3cxlga0rf"; 1313 + }; 1314 + meta.homepage = "https://github.com/fang2hou/blink-copilot/"; 1315 + }; 1316 + 1305 1317 blink-emoji-nvim = buildVimPlugin { 1306 1318 pname = "blink-emoji.nvim"; 1307 1319 version = "2025-01-04";
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 105 105 https://github.com/LunarVim/bigfile.nvim/,, 106 106 https://github.com/APZelos/blamer.nvim/,HEAD, 107 107 https://github.com/giuxtaposition/blink-cmp-copilot/,HEAD, 108 + https://github.com/fang2hou/blink-copilot/,HEAD, 108 109 https://github.com/moyiz/blink-emoji.nvim/,HEAD, 109 110 https://github.com/mikavilpas/blink-ripgrep.nvim/,HEAD, 110 111 https://github.com/Saghen/blink.compat/,HEAD,
+2 -1
pkgs/applications/emulators/cdemu/vhba.nix
··· 3 3 stdenv, 4 4 fetchurl, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 14 15 hash = "sha256-zjTLriw2zvjX0Jxfa9QtaHG5tTC7cLTKEA+WSCP+Dpg="; 15 16 }; 16 17 17 - makeFlags = kernel.moduleMakeFlags ++ [ 18 + makeFlags = kernelModuleMakeFlags ++ [ 18 19 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 19 20 "INSTALL_MOD_PATH=$(out)" 20 21 ];
+2 -2
pkgs/applications/misc/ArchiSteamFarm/default.nix
··· 11 11 buildDotnetModule rec { 12 12 pname = "ArchiSteamFarm"; 13 13 # nixpkgs-update: no auto update 14 - version = "6.1.0.3"; 14 + version = "6.1.1.3"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "JustArchiNET"; 18 18 repo = "ArchiSteamFarm"; 19 19 rev = version; 20 - hash = "sha256-3NOeKdXb1tz4qx+tCs6QKfze2KLfyodKwt/aNx6tLvI="; 20 + hash = "sha256-e0LzM0N5N7BHyQDRQIPziQrAilJN1aUttKyLod/T8rU="; 21 21 }; 22 22 23 23 dotnet-runtime = dotnetCorePackages.aspnetcore_9_0;
+44 -54
pkgs/applications/misc/ArchiSteamFarm/deps.json
··· 281 281 }, 282 282 { 283 283 "pname": "Markdig.Signed", 284 - "version": "0.38.0", 285 - "hash": "sha256-yhO/GFoKdE/Z9SZPyGFe7DlnSd8dcAohqJNFqSqKLnk=" 284 + "version": "0.39.1", 285 + "hash": "sha256-jofkP6JUp4xuUjJ6B6+HDfBJ3+V2vgECt2CWmFq62k4=" 286 286 }, 287 287 { 288 288 "pname": "Microsoft.ApplicationInsights", ··· 296 296 }, 297 297 { 298 298 "pname": "Microsoft.CodeAnalysis.ResxSourceGenerator", 299 - "version": "3.11.0-beta1.24508.2", 300 - "hash": "sha256-TpqR8oedeRXdPxwhesXwWU+FimbVcj1+WThE3iQe+zo=" 299 + "version": "3.11.0-beta1.24527.2", 300 + "hash": "sha256-NVqJ5cRa9G+ilWKazOTA8Xfm6ExOPpst8HMIFBC1/BU=" 301 301 }, 302 302 { 303 303 "pname": "Microsoft.CodeCoverage", 304 - "version": "17.11.1", 305 - "hash": "sha256-1dLlK3NGh88PuFYZiYpT+izA96etxhU3BSgixDgdtGA=" 304 + "version": "17.12.0", 305 + "hash": "sha256-lGjifppD0OBMBp28pjUfPipaeXg739n8cPhtHWoo5RE=" 306 306 }, 307 307 { 308 308 "pname": "Microsoft.Extensions.ApiDescription.Server", ··· 446 446 }, 447 447 { 448 448 "pname": "Microsoft.NET.Test.Sdk", 449 - "version": "17.11.1", 450 - "hash": "sha256-0JUEucQ2lzaPgkrjm/NFLBTbqU1dfhvhN3Tl3moE6mI=" 449 + "version": "17.12.0", 450 + "hash": "sha256-DKFEbhh2wPzahNeHdEoFig8tZh/LEVrFc5+zpT43Btg=" 451 451 }, 452 452 { 453 453 "pname": "Microsoft.NETCore.Platforms", ··· 461 461 }, 462 462 { 463 463 "pname": "Microsoft.Testing.Extensions.Telemetry", 464 - "version": "1.4.3", 465 - "hash": "sha256-oZ+AsyGdjWDoYx+nkveuniU4yB1DZ3bjgOgnucEtbnc=" 464 + "version": "1.5.0", 465 + "hash": "sha256-aKKGFpsp88Yy29GLbWRWnEil2M2WEHjRXZ62Q8x5QRQ=" 466 466 }, 467 467 { 468 468 "pname": "Microsoft.Testing.Extensions.TrxReport.Abstractions", 469 - "version": "1.4.3", 470 - "hash": "sha256-Q3E2sfTL6VvuK1X2JQsNqUTS9AtpnH9mf2aXMj09bz8=" 469 + "version": "1.5.0", 470 + "hash": "sha256-oiePvWpZMkT2AnEpfzWgvaXJai6crgHdoUSMZct3JB0=" 471 471 }, 472 472 { 473 473 "pname": "Microsoft.Testing.Extensions.VSTestBridge", 474 - "version": "1.4.3", 475 - "hash": "sha256-Sjx7GBgLYtX0nmjmViZHWVHwIZnL8aj+ivDK58GbA8k=" 474 + "version": "1.5.0", 475 + "hash": "sha256-XauIF+r05RDgORsnxEp6Cq0WZjLycJ1hPH79QUi/SgM=" 476 476 }, 477 477 { 478 478 "pname": "Microsoft.Testing.Platform", 479 - "version": "1.4.3", 480 - "hash": "sha256-KqB3+uBGl0edpaGl6Qykubb3OrVTs6IcPWc59UQ/Iww=" 479 + "version": "1.5.0", 480 + "hash": "sha256-67ZNhvMifCIM7SFnwDN25EanRNKsjAFQWugrrYWAkrM=" 481 481 }, 482 482 { 483 483 "pname": "Microsoft.Testing.Platform.MSBuild", 484 - "version": "1.4.3", 485 - "hash": "sha256-289hhblU55kDvzbiSQAFSxOyht1MlXT4e+bEQyQqils=" 484 + "version": "1.5.0", 485 + "hash": "sha256-nJ5fv8MwFw2PeJIZA9qKLfGPWYKmHww1CtVFICz6S00=" 486 486 }, 487 487 { 488 488 "pname": "Microsoft.TestPlatform.ObjectModel", 489 - "version": "17.11.1", 490 - "hash": "sha256-5vX+vCzFY3S7xfMVIv8OlMMFtdedW9UIJzc0WEc+vm4=" 489 + "version": "17.12.0", 490 + "hash": "sha256-3XBHBSuCxggAIlHXmKNQNlPqMqwFlM952Av6RrLw1/w=" 491 491 }, 492 492 { 493 493 "pname": "Microsoft.TestPlatform.TestHost", 494 - "version": "17.11.1", 495 - "hash": "sha256-wSkY0H1fQAq0H3LcKT4u7Y5RzhAAPa6yueVN84g8HxU=" 494 + "version": "17.12.0", 495 + "hash": "sha256-rf8Sh0fQq44Sneuvs64unkkIHg8kOjDGWE35j9iLx5I=" 496 496 }, 497 497 { 498 498 "pname": "Microsoft.Win32.Registry", ··· 501 501 }, 502 502 { 503 503 "pname": "MSTest", 504 - "version": "3.6.4", 505 - "hash": "sha256-G7I371Rq+AQ+QmHbZ9/wOduj0Yfoa6rFxmvygf7Kol4=" 504 + "version": "3.7.0", 505 + "hash": "sha256-z302okYPT36ebQhReEihire5fyig5pLkrx09nLyVuME=" 506 506 }, 507 507 { 508 508 "pname": "MSTest.Analyzers", 509 - "version": "3.6.4", 510 - "hash": "sha256-jlr8GVhTw32ErLq6YEMA4+EpWL5UO/q9I/BT9TDixK4=" 509 + "version": "3.7.0", 510 + "hash": "sha256-TVMFle7oE2ZU6U+VkJ0G9iNjJxnRU4rDIJCtZFwDhz0=" 511 511 }, 512 512 { 513 513 "pname": "MSTest.TestAdapter", 514 - "version": "3.6.4", 515 - "hash": "sha256-ymaeH9pYE8O1ChlfJ4hvpV9KP9eVJCEm4xhGHngapQY=" 514 + "version": "3.7.0", 515 + "hash": "sha256-b6JCu2yyZmTZwZVd4MHaIwa01eQGWpFd8mNzHUBS6Tg=" 516 516 }, 517 517 { 518 518 "pname": "MSTest.TestFramework", 519 - "version": "3.6.4", 520 - "hash": "sha256-paCBVA5XtiAB8OwkbJSbw7v+HvTFLN9qHRgvQaeJKC0=" 519 + "version": "3.7.0", 520 + "hash": "sha256-fIHwuc/zimd8oxvTiA3gmUzmJAj7JsQYh9IOb8NRJ/Y=" 521 521 }, 522 522 { 523 523 "pname": "Newtonsoft.Json", ··· 575 575 "hash": "sha256-ZSpQFnNgkk3dO8Q7yokJ/VSl4wp5PuIv9nduxgC6UxU=" 576 576 }, 577 577 { 578 - "pname": "OpenTelemetry.Api", 579 - "version": "1.9.0", 580 - "hash": "sha256-raXpHi2DZ3mSLn9dnJYF64XaP23epdfu8zgagSpm8+4=" 581 - }, 582 - { 583 578 "pname": "OpenTelemetry.Api.ProviderBuilderExtensions", 584 579 "version": "1.10.0", 585 580 "hash": "sha256-hLw3Sf1fviAlVJYhaMudVJEdG5pjX5JvVrqv9DgYAk8=" ··· 601 596 }, 602 597 { 603 598 "pname": "OpenTelemetry.Instrumentation.AspNetCore", 604 - "version": "1.9.0", 605 - "hash": "sha256-XYqa7kV4rhHPCgHsjQtMvyKCemW1OvQd/23QhjquYR4=" 599 + "version": "1.10.1", 600 + "hash": "sha256-HqMFDpFsMaPlgyFt1MU3Un+BysEoj5qPc8HVxTlt0mE=" 606 601 }, 607 602 { 608 603 "pname": "OpenTelemetry.Instrumentation.Http", ··· 611 606 }, 612 607 { 613 608 "pname": "OpenTelemetry.Instrumentation.Runtime", 614 - "version": "1.9.0", 615 - "hash": "sha256-Xov89h4Py7MCz6SAOjV0tjtZvvjHbx7NyPXZsY1PZhk=" 609 + "version": "1.10.0", 610 + "hash": "sha256-cCTYKxHh1Qzu8X51B8gGsrxwKhVSqJfiql/+o4TWrwg=" 616 611 }, 617 612 { 618 613 "pname": "protobuf-net", ··· 631 626 }, 632 627 { 633 628 "pname": "Swashbuckle.AspNetCore", 634 - "version": "7.1.0", 635 - "hash": "sha256-4puaFKTRLJtqy/bjcxr5JJuZ/Ko7MDw7MrxISHl002A=" 629 + "version": "7.2.0", 630 + "hash": "sha256-u1eg4GmYjaJAZdstRVvaTfGKnFRFLaxONhbOyiBKn5Y=" 636 631 }, 637 632 { 638 633 "pname": "Swashbuckle.AspNetCore.Annotations", 639 - "version": "7.1.0", 640 - "hash": "sha256-4hD7FqfXeVySSRzLhZ2RSGEUdLjJRc4fqZIgAl5xjIA=" 634 + "version": "7.2.0", 635 + "hash": "sha256-zsg29If2aWbFK8tIpu60YBbD1i8vvGPupiAjcXCq0l0=" 641 636 }, 642 637 { 643 638 "pname": "Swashbuckle.AspNetCore.Swagger", 644 - "version": "7.1.0", 645 - "hash": "sha256-xxekkBO9brFYO0oId6OQVXdv5nXGjpwR3ZEcGe6rr0Q=" 639 + "version": "7.2.0", 640 + "hash": "sha256-v0wp8/2prWFZhHm+T7onPh2sZNY+YjnLik1b1MLaaos=" 646 641 }, 647 642 { 648 643 "pname": "Swashbuckle.AspNetCore.SwaggerGen", 649 - "version": "7.1.0", 650 - "hash": "sha256-4Gm9yxjueSeGFaedV8ncy+jtDwjFBVChpqCCK8E+qfY=" 644 + "version": "7.2.0", 645 + "hash": "sha256-zxxaHyHFPj3T8756QyaH9h+BkuUoV0xxKnbZUxnI8WU=" 651 646 }, 652 647 { 653 648 "pname": "Swashbuckle.AspNetCore.SwaggerUI", 654 - "version": "7.1.0", 655 - "hash": "sha256-br975EeG6O2fwyk8cFcjU/JkYrI35ZkqHm94j3qM5Cg=" 649 + "version": "7.2.0", 650 + "hash": "sha256-EwJsqa4JBJhMzq+zgND3STyoZi1+6GaVQqXz3ZVP7p8=" 656 651 }, 657 652 { 658 653 "pname": "System.Collections.Immutable", ··· 698 693 "pname": "System.Diagnostics.DiagnosticSource", 699 694 "version": "5.0.0", 700 695 "hash": "sha256-6mW3N6FvcdNH/pB58pl+pFSCGWgyaP4hfVtC/SMWDV4=" 701 - }, 702 - { 703 - "pname": "System.Diagnostics.DiagnosticSource", 704 - "version": "8.0.0", 705 - "hash": "sha256-+aODaDEQMqla5RYZeq0Lh66j+xkPYxykrVvSCmJQ+Vs=" 706 696 }, 707 697 { 708 698 "pname": "System.Diagnostics.DiagnosticSource",
+3 -3
pkgs/applications/misc/ArchiSteamFarm/web-ui/default.nix
··· 7 7 8 8 buildNpmPackage rec { 9 9 pname = "asf-ui"; 10 - version = "c316254ddaf7837e7d43145268b53f91f23027dc"; 10 + version = "6be24065cd4904389d94140f4ed1f6738b1f7fbb"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "JustArchiNET"; ··· 15 15 # updated by the update script 16 16 # this is always the commit that should be used with asf-ui from the latest asf version 17 17 rev = version; 18 - hash = "sha256-teM8x1/O5QFO7bMGc474Dp9ssOLfdmYkDt7PIuvJ4Ss="; 18 + hash = "sha256-DFl+DCNj4JFKZG1awX5rlsHzj+67OFyBj9d16zDiKRA="; 19 19 }; 20 20 21 - npmDepsHash = "sha256-8KqIUSWaeu5Tk8lw8F1O6KkXUfNqvjgxRNCePEMeLDo="; 21 + npmDepsHash = "sha256-jZSiWZDckfGfgrBMHTX/sm7Pcl5ap3lfmwGi8SHXqu8="; 22 22 23 23 installPhase = '' 24 24 runHook preInstall
pkgs/applications/misc/golden-cheetah/0001-Fix-building-with-bison-3.7.patch pkgs/by-name/go/golden-cheetah/0001-Fix-building-with-bison-3.7.patch
-113
pkgs/applications/misc/golden-cheetah/default.nix
··· 1 - { 2 - lib, 3 - fetchFromGitHub, 4 - nix-update-script, 5 - mkDerivation, 6 - qtbase, 7 - qtsvg, 8 - qtserialport, 9 - qtwebengine, 10 - qtmultimedia, 11 - qttools, 12 - qtconnectivity, 13 - qtcharts, 14 - libusb-compat-0_1, 15 - gsl, 16 - blas, 17 - bison, 18 - flex, 19 - zlib, 20 - qmake, 21 - makeDesktopItem, 22 - wrapQtAppsHook, 23 - }: 24 - 25 - let 26 - desktopItem = makeDesktopItem { 27 - name = "goldencheetah"; 28 - exec = "GoldenCheetah"; 29 - icon = "goldencheetah"; 30 - desktopName = "GoldenCheetah"; 31 - genericName = "GoldenCheetah"; 32 - comment = "Performance software for cyclists, runners and triathletes"; 33 - categories = [ "Utility" ]; 34 - }; 35 - in 36 - mkDerivation rec { 37 - pname = "golden-cheetah"; 38 - version = "3.7-DEV2408"; 39 - 40 - src = fetchFromGitHub { 41 - owner = "GoldenCheetah"; 42 - repo = "GoldenCheetah"; 43 - tag = "v${version}"; 44 - hash = "sha256-6JAdnYaKULJsc/zdcTMbCkbOCbiVtnJivEazDKL721c="; 45 - }; 46 - 47 - buildInputs = [ 48 - qtbase 49 - qtsvg 50 - qtserialport 51 - qtwebengine 52 - qtmultimedia 53 - qttools 54 - zlib 55 - qtconnectivity 56 - qtcharts 57 - libusb-compat-0_1 58 - gsl 59 - blas 60 - ]; 61 - nativeBuildInputs = [ 62 - flex 63 - wrapQtAppsHook 64 - qmake 65 - bison 66 - ]; 67 - 68 - patches = [ 69 - # allow building with bison 3.7 70 - # Included in https://github.com/GoldenCheetah/GoldenCheetah/pull/3590, 71 - # which is periodically rebased but pre 3.6 release, as it'll break other CI systems 72 - ./0001-Fix-building-with-bison-3.7.patch 73 - ]; 74 - 75 - NIX_LDFLAGS = "-lz -lgsl -lblas"; 76 - 77 - qtWrapperArgs = [ 78 - "--prefix" 79 - "LD_LIBRARY_PATH" 80 - ":" 81 - "${zlib.out}/lib" 82 - ]; 83 - 84 - preConfigure = '' 85 - cp src/gcconfig.pri.in src/gcconfig.pri 86 - cp qwt/qwtconfig.pri.in qwt/qwtconfig.pri 87 - sed -i 's,^#QMAKE_LRELEASE.*,QMAKE_LRELEASE = ${qttools.dev}/bin/lrelease,' src/gcconfig.pri 88 - sed -i 's,^#LIBUSB_INSTALL.*,LIBUSB_INSTALL = ${libusb-compat-0_1},' src/gcconfig.pri 89 - sed -i 's,^#LIBUSB_INCLUDE.*,LIBUSB_INCLUDE = ${libusb-compat-0_1.dev}/include,' src/gcconfig.pri 90 - sed -i 's,^#LIBUSB_LIBS.*,LIBUSB_LIBS = -L${libusb-compat-0_1}/lib -lusb,' src/gcconfig.pri 91 - ''; 92 - 93 - installPhase = '' 94 - runHook preInstall 95 - 96 - mkdir -p $out/bin 97 - cp src/GoldenCheetah $out/bin 98 - install -Dm644 "${desktopItem}/share/applications/"* -t $out/share/applications/ 99 - install -Dm644 src/Resources/images/gc.png $out/share/pixmaps/goldencheetah.png 100 - 101 - runHook postInstall 102 - ''; 103 - 104 - passthru.updateScript = nix-update-script { }; 105 - 106 - meta = { 107 - description = "Performance software for cyclists, runners and triathletes. Built from source and without API tokens"; 108 - mainProgram = "GoldenCheetah"; 109 - platforms = lib.platforms.linux; 110 - maintainers = with lib.maintainers; [ adamcstephens ]; 111 - license = lib.licenses.gpl2Plus; 112 - }; 113 - }
+2
pkgs/build-support/fetchurl/builder.sh
··· 11 11 --location 12 12 --max-redirs 20 13 13 --retry 3 14 + --retry-all-errors 15 + --continue-at - 14 16 --disable-epsv 15 17 --cookie-jar cookies 16 18 --user-agent "curl/$curlVersion Nixpkgs/$nixpkgsVersion"
+2 -2
pkgs/by-name/ch/checkstyle/package.nix
··· 1 1 { lib, stdenvNoCC, fetchurl, makeBinaryWrapper, jre }: 2 2 3 3 stdenvNoCC.mkDerivation rec { 4 - version = "10.21.1"; 4 + version = "10.21.2"; 5 5 pname = "checkstyle"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/checkstyle/checkstyle/releases/download/checkstyle-${version}/checkstyle-${version}-all.jar"; 9 - sha256 = "sha256-u8248qMMHRBxWk7VpFripdLQSbcAL3ApLtCQa6TyMJ4="; 9 + sha256 = "sha256-r8uiXoaQFkQpcuxFE6jAbIEu32j1EciO9JfeAMM4ORc="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeBinaryWrapper ];
+3 -3
pkgs/by-name/da/davinci-resolve/package.nix
··· 35 35 davinci = ( 36 36 stdenv.mkDerivation rec { 37 37 pname = "davinci-resolve${lib.optionalString studioVariant "-studio"}"; 38 - version = "19.1.2"; 38 + version = "19.1.3"; 39 39 40 40 nativeBuildInputs = [ 41 41 (appimage-run.override { buildFHSEnv = buildFHSEnvChroot; }) ··· 57 57 outputHashAlgo = "sha256"; 58 58 outputHash = 59 59 if studioVariant then 60 - "sha256-yLlvl/zm/epNs1e4sSDrfHNApcpPQV2fMF3Y09ml7is=" 60 + "sha256-aAKE+AY/a2XjVzdU0VXT3ekFrTp3rO6zUd7pRTTDc9E=" 61 61 else 62 - "sha256-ssX1ffB7ZSJObETQa2r5R4oHddAccC4GB14jaLs8bGg="; 62 + "sha256-CCr4/h0W1fhzUT4o6WyX2hBodzy9iqVLZwzdplzq9SI="; 63 63 64 64 impureEnvVars = lib.fetchers.proxyImpureEnvVars; 65 65
+2 -2
pkgs/by-name/fa/factoriolab/package.nix
··· 10 10 }: 11 11 buildNpmPackage rec { 12 12 pname = "factoriolab"; 13 - version = "3.9.2"; 13 + version = "3.10.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "factoriolab"; 17 17 repo = "factoriolab"; 18 18 tag = "v${version}"; 19 - hash = "sha256-ogmez21QwFdRYVsMxeFmNnEerXbH4rQXmOwKuKbpuGs="; 19 + hash = "sha256-MSiwtFd9u8IFrHDy++jO//P7Yn4Arip1DwBufR8KIRU="; 20 20 }; 21 21 buildInputs = [ vips ]; 22 22 nativeBuildInputs = [
+1 -1
pkgs/by-name/fi/filebeat8/package.nix
··· 29 29 doInstallCheck = true; 30 30 31 31 passthru = { 32 - updateScript = nix-update-script { }; 32 + updateScript = nix-update-script { extraArgs = [ "--version-regex=v(8\..*)" ]; }; 33 33 }; 34 34 35 35 meta = {
+123
pkgs/by-name/go/golden-cheetah/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + nix-update-script, 6 + qt6, 7 + libusb-compat-0_1, 8 + gsl, 9 + blas, 10 + bison, 11 + flex, 12 + zlib, 13 + makeDesktopItem, 14 + }: 15 + 16 + let 17 + desktopItem = makeDesktopItem { 18 + name = "goldencheetah"; 19 + exec = "GoldenCheetah"; 20 + icon = "goldencheetah"; 21 + desktopName = "GoldenCheetah"; 22 + genericName = "GoldenCheetah"; 23 + comment = "Performance software for cyclists, runners and triathletes"; 24 + categories = [ "Utility" ]; 25 + }; 26 + in 27 + stdenv.mkDerivation (finalAttrs: { 28 + pname = "golden-cheetah"; 29 + version = "3.7-DEV2408"; 30 + 31 + src = fetchFromGitHub { 32 + owner = "GoldenCheetah"; 33 + repo = "GoldenCheetah"; 34 + tag = "v${finalAttrs.version}"; 35 + hash = "sha256-6JAdnYaKULJsc/zdcTMbCkbOCbiVtnJivEazDKL721c="; 36 + }; 37 + 38 + buildInputs = 39 + with qt6; 40 + [ 41 + qt5compat 42 + qtbase 43 + qtcharts 44 + qtconnectivity 45 + qtmultimedia 46 + qtserialport 47 + qtsvg 48 + qttools 49 + qtwebengine 50 + ] 51 + ++ [ 52 + blas 53 + gsl 54 + libusb-compat-0_1 55 + zlib 56 + ]; 57 + nativeBuildInputs = 58 + [ 59 + bison 60 + flex 61 + ] 62 + ++ (with qt6; [ 63 + qmake 64 + wrapQtAppsHook 65 + ]); 66 + 67 + patches = [ 68 + # allow building with bison 3.7 69 + # Included in https://github.com/GoldenCheetah/GoldenCheetah/pull/3590, 70 + # which is periodically rebased but pre 3.6 release, as it'll break other CI systems 71 + ./0001-Fix-building-with-bison-3.7.patch 72 + ]; 73 + 74 + NIX_LDFLAGS = "-lz -lgsl -lblas"; 75 + 76 + qtWrapperArgs = [ 77 + "--prefix" 78 + "LD_LIBRARY_PATH" 79 + ":" 80 + "${zlib.out}/lib" 81 + ]; 82 + 83 + preConfigure = '' 84 + cp src/gcconfig.pri.in src/gcconfig.pri 85 + cp qwt/qwtconfig.pri.in qwt/qwtconfig.pri 86 + sed -i 's,^#QMAKE_LRELEASE.*,QMAKE_LRELEASE = ${qt6.qttools.dev}/bin/lrelease,' src/gcconfig.pri 87 + sed -i 's,^#LIBUSB_INSTALL.*,LIBUSB_INSTALL = ${libusb-compat-0_1},' src/gcconfig.pri 88 + sed -i 's,^#LIBUSB_INCLUDE.*,LIBUSB_INCLUDE = ${libusb-compat-0_1.dev}/include,' src/gcconfig.pri 89 + sed -i 's,^#LIBUSB_LIBS.*,LIBUSB_LIBS = -L${libusb-compat-0_1}/lib -lusb,' src/gcconfig.pri 90 + ''; 91 + 92 + installPhase = 93 + if stdenv.isLinux then 94 + '' 95 + runHook preInstall 96 + 97 + mkdir -p $out/bin 98 + cp src/GoldenCheetah $out/bin 99 + install -Dm644 "${desktopItem}/share/applications/"* -t $out/share/applications/ 100 + install -Dm644 src/Resources/images/gc.png $out/share/pixmaps/goldencheetah.png 101 + 102 + runHook postInstall 103 + '' 104 + else if stdenv.isDarwin then 105 + '' 106 + runHook preInstall 107 + mkdir -p $out/Applications 108 + cp -r src/GoldenCheetah.app $out/Applications 109 + runHook postInstall 110 + '' 111 + else 112 + abort "unsupported platform"; 113 + 114 + passthru.updateScript = nix-update-script { }; 115 + 116 + meta = { 117 + description = "Performance software for cyclists, runners and triathletes. Built from source and without API tokens"; 118 + mainProgram = "GoldenCheetah"; 119 + platforms = with lib.platforms; darwin ++ linux; 120 + maintainers = with lib.maintainers; [ adamcstephens ]; 121 + license = lib.licenses.gpl2Plus; 122 + }; 123 + })
+2 -2
pkgs/by-name/na/narsil/package.nix
··· 14 14 }: 15 15 stdenv.mkDerivation rec { 16 16 pname = "narsil"; 17 - version = "bbc8fc5efd779ec885045f9b8d903d0df1bec1b2"; 17 + version = "f5ec6bd6b8013f2a2b74fc45b6f4c53744590ec5"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "NickMcConnell"; 21 21 repo = "NarSil"; 22 22 rev = version; 23 - hash = "sha256-keN1IJao80Pr8SpHe0tYXg14l9rBfboyNoDaivzWsyM="; 23 + hash = "sha256-xMY9XmFsjcucLPfwTXiC0oQ2UkWIkWCehvycesqbWn0="; 24 24 }; 25 25 26 26 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch=main" ]; };
+3
pkgs/by-name/ne/netrw/package.nix
··· 15 15 version = "1.3.2"; 16 16 17 17 configureFlags = [ 18 + # This is to add "#include" directives for stdlib.h, stdio.h and string.h. 19 + "ac_cv_header_stdc=yes" 20 + 18 21 "--with-checksum=${checksumType}" 19 22 ]; 20 23
+97
pkgs/by-name/pd/pds/package.nix
··· 1 + { 2 + stdenv, 3 + makeBinaryWrapper, 4 + removeReferencesTo, 5 + srcOnly, 6 + python3, 7 + pnpm_9, 8 + fetchFromGitHub, 9 + nodejs, 10 + vips, 11 + pkg-config, 12 + nixosTests, 13 + lib, 14 + }: 15 + 16 + let 17 + nodeSources = srcOnly nodejs; 18 + pythonEnv = python3.withPackages (p: [ p.setuptools ]); 19 + in 20 + 21 + stdenv.mkDerivation (finalAttrs: { 22 + pname = "pds"; 23 + version = "0.4.74"; 24 + 25 + src = fetchFromGitHub { 26 + owner = "bluesky-social"; 27 + repo = "pds"; 28 + rev = "v${finalAttrs.version}"; 29 + hash = "sha256-kNHsQ6funmo8bnkFBNWHQ0Fmd5nf/uh+x9buaRJMZnM="; 30 + }; 31 + 32 + sourceRoot = "${finalAttrs.src.name}/service"; 33 + 34 + nativeBuildInputs = [ 35 + makeBinaryWrapper 36 + nodejs 37 + pythonEnv 38 + pkg-config 39 + pnpm_9.configHook 40 + removeReferencesTo 41 + ]; 42 + 43 + # Required for `sharp` NPM dependency 44 + buildInputs = [ vips ]; 45 + 46 + pnpmDeps = pnpm_9.fetchDeps { 47 + inherit (finalAttrs) 48 + pname 49 + version 50 + src 51 + sourceRoot 52 + ; 53 + hash = "sha256-oU4dwlBdsMmgAUv1ICaOqaqucmg/TjKOZxjnxpm0qL8="; 54 + }; 55 + 56 + buildPhase = '' 57 + runHook preBuild 58 + 59 + pushd ./node_modules/.pnpm/better-sqlite3@*/node_modules/better-sqlite3 60 + npm run build-release --offline --nodedir="${nodeSources}" 61 + find build -type f -exec remove-references-to -t "${nodeSources}" {} \; 62 + popd 63 + 64 + makeWrapper "${lib.getExe nodejs}" "$out/bin/pds" \ 65 + --add-flags --enable-source-maps \ 66 + --add-flags "$out/lib/pds/index.js" \ 67 + --set-default NODE_ENV production 68 + 69 + runHook postBuild 70 + ''; 71 + 72 + installPhase = '' 73 + runHook preInstall 74 + 75 + mkdir -p $out/{bin,lib/pds} 76 + mv node_modules $out/lib/pds 77 + mv index.js $out/lib/pds 78 + 79 + runHook postInstall 80 + ''; 81 + 82 + passthru.tests = { 83 + inherit (nixosTests) pds; 84 + }; 85 + 86 + meta = { 87 + description = "Bluesky Personal Data Server (PDS)"; 88 + homepage = "https://github.com/bluesky-social/pds"; 89 + license = with lib.licenses; [ 90 + mit 91 + asl20 92 + ]; 93 + maintainers = with lib.maintainers; [ t4ccer ]; 94 + platforms = lib.platforms.unix; 95 + mainProgram = "pds"; 96 + }; 97 + })
+58
pkgs/by-name/pd/pdsadmin/package.nix
··· 1 + { 2 + stdenvNoCC, 3 + fetchFromGitHub, 4 + bash, 5 + pds, 6 + makeBinaryWrapper, 7 + jq, 8 + curl, 9 + openssl, 10 + lib, 11 + }: 12 + 13 + stdenvNoCC.mkDerivation (finalAttrs: { 14 + pname = "pdsadmin"; 15 + inherit (pds) version src; 16 + 17 + patches = [ ./pdsadmin-offline.patch ]; 18 + 19 + nativeBuildInputs = [ makeBinaryWrapper ]; 20 + 21 + buildInputs = [ bash ]; 22 + 23 + strictDeps = true; 24 + 25 + buildPhase = '' 26 + runHook preBuild 27 + 28 + substituteInPlace pdsadmin.sh \ 29 + --replace-fail NIXPKGS_PDSADMIN_ROOT $out 30 + 31 + runHook postBuild 32 + ''; 33 + 34 + installPhase = '' 35 + runHook preInstall 36 + 37 + install -Dm755 pdsadmin.sh $out/lib/pds/pdsadmin.sh 38 + install -Dm755 pdsadmin/*.sh $out/lib/pds 39 + makeWrapper "$out/lib/pds/pdsadmin.sh" "$out/bin/pdsadmin" \ 40 + --prefix PATH : "${ 41 + lib.makeBinPath [ 42 + jq 43 + curl 44 + openssl 45 + ] 46 + }" 47 + 48 + runHook postInstall 49 + ''; 50 + 51 + meta = { 52 + description = "Admin scripts for Bluesky Personal Data Server (PDS)"; 53 + inherit (pds.meta) homepage license; 54 + maintainers = with lib.maintainers; [ t4ccer ]; 55 + platforms = lib.platforms.unix; 56 + mainProgram = "pdsadmin"; 57 + }; 58 + })
+24
pkgs/by-name/pd/pdsadmin/pdsadmin-offline.patch
··· 1 + diff --git a/pdsadmin.sh b/pdsadmin.sh 2 + index 913d2b4..b09c20c 100644 3 + --- a/pdsadmin.sh 4 + +++ b/pdsadmin.sh 5 + @@ -15,16 +15,11 @@ if [[ "${EUID}" -ne 0 ]]; then 6 + exit 1 7 + fi 8 + 9 + -# Download the script, if it exists. 10 + -SCRIPT_URL="${PDSADMIN_BASE_URL}/${COMMAND}.sh" 11 + -SCRIPT_FILE="$(mktemp /tmp/pdsadmin.${COMMAND}.XXXXXX)" 12 + +SCRIPT_FILE="NIXPKGS_PDSADMIN_ROOT/lib/pds/${COMMAND}.sh" 13 + 14 + -if ! curl --fail --silent --show-error --location --output "${SCRIPT_FILE}" "${SCRIPT_URL}"; then 15 + +if ! [ -f "${SCRIPT_FILE}" ]; then 16 + echo "ERROR: ${COMMAND} not found" 17 + exit 2 18 + fi 19 + 20 + -chmod +x "${SCRIPT_FILE}" 21 + -if "${SCRIPT_FILE}" "$@"; then 22 + - rm --force "${SCRIPT_FILE}" 23 + -fi 24 + +"${SCRIPT_FILE}" "$@"
+2 -2
pkgs/by-name/ph/photoqt/package.nix
··· 17 17 18 18 stdenv.mkDerivation rec { 19 19 pname = "photoqt"; 20 - version = "4.7"; 20 + version = "4.8"; 21 21 22 22 src = fetchurl { 23 23 url = "https://photoqt.org/pkgs/photoqt-${version}.tar.gz"; 24 - hash = "sha256-uZCeJJsQoIDZ6nf+JbFhbXE4ZHL8pCY0pJOG5w6v4vs="; 24 + hash = "sha256-ccSbG5MTIyVJFqNHstaW53BfsGmN/I4ObCZfY0h22QE="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+2 -2
pkgs/by-name/pl/plasma-panel-colorizer/package.nix
··· 9 9 10 10 stdenv.mkDerivation (finalAttrs: { 11 11 pname = "plasma-panel-colorizer"; 12 - version = "1.2.0"; 12 + version = "2.1.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "luisbocanegra"; 16 16 repo = "plasma-panel-colorizer"; 17 17 tag = "v${finalAttrs.version}"; 18 - hash = "sha256-yeUicFoafKqj6suVJSaaNjmT+g+ZYb8QsguYyKNBYFA="; 18 + hash = "sha256-Xv1yGIGIWqfxukJub0X2sH0XwtRTr13p+vDi+Wdgnkg="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+38
pkgs/by-name/ra/rastertoezpl/package.nix
··· 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + cups, 6 + }: 7 + 8 + stdenv.mkDerivation (finalAttrs: { 9 + pname = "rastertoezpl"; 10 + version = "1.1.12"; 11 + 12 + src = fetchurl { 13 + url = "https://godex.s3-accelerate.amazonaws.com/tWHDYruxWFM98frjWNTE,g.file?v01"; 14 + name = "${finalAttrs.pname}-${finalAttrs.version}-source.tar.gz"; 15 + hash = "sha256-iBhM8Mht/XncWU75cd485WK5GZtJNv78yMsFsD0eKWQ="; 16 + }; 17 + 18 + buildInputs = [ cups ]; 19 + 20 + configureFlags = [ 21 + "--datarootdir=${placeholder "out"}/share" 22 + "PPDDIR=${placeholder "out"}/share/cups/model" 23 + ]; 24 + 25 + postInstall = '' 26 + mkdir -p $out/lib/cups/filter 27 + ln -s $out/libexec/rastertoezpl/rastertoezpl $out/lib/cups/filter/rastertoezpl 28 + gzip -9n $out/share/cups/model/godex/*.ppd 29 + ''; 30 + 31 + meta = { 32 + description = "CUPS driver for GODEX printers"; 33 + homepage = "https://www.godexintl.com/downloads"; 34 + license = lib.licenses.gpl2Plus; 35 + maintainers = with lib.maintainers; [ stargate01 ]; 36 + platforms = lib.platforms.linux; 37 + }; 38 + })
+43
pkgs/by-name/re/regolith/package.nix
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + nix-update-script, 6 + versionCheckHook, 7 + }: 8 + buildGoModule rec { 9 + pname = "regolith"; 10 + version = "1.5.1"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "Bedrock-OSS"; 14 + repo = "regolith"; 15 + tag = version; 16 + hash = "sha256-gTEQ2hu581tD1I/3iLHzE/2nekAG49/M6V6QeqPhYsA="; 17 + }; 18 + 19 + # Requires network access. 20 + doCheck = false; 21 + 22 + vendorHash = "sha256-+4J4Z7lhbAphi6WUEJN9pzNXf6ROUKqN4NdKI2sQSW0="; 23 + 24 + ldflags = [ 25 + "-X main.buildSource=nix" 26 + "-X main.version=${version}" 27 + ]; 28 + 29 + nativeInstallCheckInputs = [ versionCheckHook ]; 30 + versionCheckProgramArg = "--version"; 31 + doInstallCheck = true; 32 + 33 + passthru.updateScript = nix-update-script { }; 34 + 35 + meta = { 36 + description = "Add-on Compiler for the Bedrock Edition of Minecraft"; 37 + homepage = "https://github.com/Bedrock-OSS/regolith"; 38 + changelog = "https://github.com/Bedrock-OSS/regolith/releases/tag/${version}"; 39 + license = lib.licenses.mit; 40 + maintainers = with lib.maintainers; [ arexon ]; 41 + mainProgram = "regolith"; 42 + }; 43 + }
+36 -23
pkgs/by-name/ut/ut1999/package.nix
··· 7 7 fetchurl, 8 8 makeDesktopItem, 9 9 copyDesktopItems, 10 + libarchive, 10 11 imagemagick, 11 12 runCommand, 12 13 libgcc, 13 14 wxGTK32, 14 - innoextract, 15 15 libGL, 16 16 SDL2, 17 17 openal, ··· 39 39 hash = "sha256-TbhJbOH4E5WOb6XR9dmqLkXziK3/CzhNjd1ypBkkmvw="; 40 40 }; 41 41 }; 42 - unpackGog = 43 - runCommand "ut1999-gog" 42 + unpackIso = 43 + runCommand "ut1999-iso" 44 44 { 45 - src = requireFile rec { 46 - name = "setup_ut_goty_2.0.0.5.exe"; 47 - hash = "sha256-TMJX1U2XZZxQYvK/GG0KjGlZVh0R5C2Pzy6sB/GSaAM="; 48 - message = '' 49 - Unreal Tournament 1999 requires the official GOG package, version 2.0.0.5. 50 - 51 - Once you download the file, run the following command: 52 - 53 - nix-prefetch-url file://\$PWD/${name} 54 - ''; 45 + # This upload of the game is officially sanctioned by OldUnreal (who has received permission from Epic Games to link to archive.org) and the UT99.org community 46 + # This is a copy of the original Unreal Tournament: Game of the Year Edition (also known as UT or UT99). 47 + src = fetchurl { 48 + url = "https://archive.org/download/ut-goty/UT_GOTY_CD1.iso"; 49 + hash = "sha256-4YSYTKiPABxd3VIDXXbNZOJm4mx0l1Fhte1yNmx0cE8="; 55 50 }; 56 - 57 - nativeBuildInputs = [ innoextract ]; 51 + nativeBuildInputs = [ libarchive ]; 58 52 } 59 53 '' 60 - innoextract --extract --exclude-temp "$src" 54 + bsdtar -xvf "$src" 61 55 mkdir $out 62 - cp -r app/* $out 56 + cp -r Music Sounds Textures Maps $out 63 57 ''; 64 58 systemDir = 65 59 { ··· 92 86 lib.optionals stdenv.hostPlatform.isLinux [ 93 87 copyDesktopItems 94 88 autoPatchelfHook 95 - imagemagick 96 89 ] 97 90 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 98 91 undmg ··· 111 104 chmod -R 755 $out 112 105 cd ${outPrefix} 113 106 107 + # NOTE: OldUnreal patch doesn't include these folders but could in the future 114 108 rm -rf ./{Music,Sounds,Maps} 115 - ln -s ${unpackGog}/{Music,Sounds,Maps} . 109 + ln -s ${unpackIso}/{Music,Sounds,Maps} . 116 110 117 - cp -n ${unpackGog}/Textures/* ./Textures || true 118 - cp -n ${unpackGog}/System/*.{u,int} ./System || true 111 + # TODO: unpack compressed maps with ucc 112 + 113 + cp -n ${unpackIso}/Textures/* ./Textures || true 114 + cp -n ${unpackIso}/System/*.{u,int} ./System || true 119 115 '' 120 116 + lib.optionalString (stdenv.hostPlatform.isLinux) '' 121 117 ln -s "$out/${systemDir}/ut-bin" "$out/bin/ut1999" 122 118 ln -s "$out/${systemDir}/ucc-bin" "$out/bin/ut1999-ucc" 123 119 124 - convert "${unpackGog}/gfw_high.ico" "ut1999.png" 125 - install -D ut1999-5.png "$out/share/icons/hicolor/256x256/apps/ut1999.png" 120 + install -D "${./ut1999.svg}" "$out/share/pixmaps/ut1999.svg" 121 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 16x16 ut1999_16x16.png 122 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 24x24 ut1999_24x24.png 123 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 32x32 ut1999_32x32.png 124 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 48x48 ut1999_48x48.png 125 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 64x64 ut1999_64x64.png 126 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 128x128 ut1999_128x128.png 127 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 192x192 ut1999_192x192.png 128 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 256x256 ut1999_256x256.png 129 + install -D "ut1999_16x16.png" "$out/share/icons/hicolor/16x16/apps/ut1999.png" 130 + install -D "ut1999_24x24.png" "$out/share/icons/hicolor/24x24/apps/ut1999.png" 131 + install -D "ut1999_32x32.png" "$out/share/icons/hicolor/32x32/apps/ut1999.png" 132 + install -D "ut1999_48x48.png" "$out/share/icons/hicolor/48x48/apps/ut1999.png" 133 + install -D "ut1999_64x64.png" "$out/share/icons/hicolor/64x64/apps/ut1999.png" 134 + install -D "ut1999_128x128.png" "$out/share/icons/hicolor/128x128/apps/ut1999.png" 135 + install -D "ut1999_192x192.png" "$out/share/icons/hicolor/192x192/apps/ut1999.png" 136 + install -D "ut1999_256x256.png" "$out/share/icons/hicolor/256x256/apps/ut1999.png" 126 137 127 138 # Remove bundled libraries to use native versions instead 128 139 rm $out/${systemDir}/libmpg123.so* \ 129 140 $out/${systemDir}/libopenal.so* \ 130 141 $out/${systemDir}/libSDL2* \ 131 142 $out/${systemDir}/libxmp.so* 143 + # NOTE: what about fmod? 144 + #$out/${systemDir}/libfmod.so* 132 145 '' 133 146 + '' 134 147 runHook postInstall
+148
pkgs/by-name/ut/ut1999/ut1999.svg
··· 1 + <?xml version="1.0" encoding="UTF-8" standalone="no"?> 2 + <svg 3 + width="512" 4 + height="512" 5 + viewBox="0 0 39.476429 39.476429" 6 + version="1.1" 7 + id="svg109" 8 + xmlns:xlink="http://www.w3.org/1999/xlink" 9 + xmlns="http://www.w3.org/2000/svg" 10 + xmlns:svg="http://www.w3.org/2000/svg"> 11 + <defs 12 + id="defs113"> 13 + <linearGradient 14 + id="linearGradient28292"> 15 + <stop 16 + style="stop-color:#ffffff;stop-opacity:1;" 17 + offset="0" 18 + id="stop28288" /> 19 + <stop 20 + style="stop-color:#ffffff;stop-opacity:0;" 21 + offset="1" 22 + id="stop28290" /> 23 + </linearGradient> 24 + <linearGradient 25 + id="linearGradient1749"> 26 + <stop 27 + style="stop-color:#f5be39;stop-opacity:1;" 28 + offset="0" 29 + id="stop1745" /> 30 + <stop 31 + style="stop-color:#ffd699;stop-opacity:1;" 32 + offset="0.44286996" 33 + id="stop5511" /> 34 + <stop 35 + style="stop-color:#9a5f00;stop-opacity:1;" 36 + offset="0.58172649" 37 + id="stop5507" /> 38 + <stop 39 + style="stop-color:#cfa344;stop-opacity:1;" 40 + offset="0.85889333" 41 + id="stop5509" /> 42 + <stop 43 + style="stop-color:#ffd587;stop-opacity:1;" 44 + offset="1" 45 + id="stop1747" /> 46 + </linearGradient> 47 + <linearGradient 48 + xlink:href="#linearGradient1749" 49 + id="linearGradient1751" 50 + x1="-45.682671" 51 + y1="18.414253" 52 + x2="-45.682671" 53 + y2="-21.00696" 54 + gradientUnits="userSpaceOnUse" /> 55 + <linearGradient 56 + xlink:href="#linearGradient1749" 57 + id="linearGradient18718" 58 + x1="-6.2713218" 59 + y1="-20.88386" 60 + x2="-6.2713218" 61 + y2="18.420364" 62 + gradientUnits="userSpaceOnUse" /> 63 + <linearGradient 64 + xlink:href="#linearGradient28292" 65 + id="linearGradient28294" 66 + x1="-24.591709" 67 + y1="0.21153279" 68 + x2="-24.591709" 69 + y2="-18.75918" 70 + gradientUnits="userSpaceOnUse" /> 71 + <linearGradient 72 + xlink:href="#linearGradient1749" 73 + id="linearGradient37018" 74 + gradientUnits="userSpaceOnUse" 75 + x1="-45.682671" 76 + y1="18.414253" 77 + x2="-45.682671" 78 + y2="-21.00696" /> 79 + <linearGradient 80 + xlink:href="#linearGradient1749" 81 + id="linearGradient37020" 82 + gradientUnits="userSpaceOnUse" 83 + x1="-6.2713218" 84 + y1="-20.88386" 85 + x2="-6.2713218" 86 + y2="18.420364" /> 87 + <linearGradient 88 + xlink:href="#linearGradient1749" 89 + id="linearGradient37022" 90 + gradientUnits="userSpaceOnUse" 91 + x1="-45.682671" 92 + y1="18.414253" 93 + x2="-45.682671" 94 + y2="-21.00696" /> 95 + <linearGradient 96 + xlink:href="#linearGradient1749" 97 + id="linearGradient37024" 98 + gradientUnits="userSpaceOnUse" 99 + x1="-45.682671" 100 + y1="18.414253" 101 + x2="-45.682671" 102 + y2="-21.00696" /> 103 + </defs> 104 + <g 105 + fill-rule="evenodd" 106 + clip-rule="evenodd" 107 + id="g107" 108 + transform="matrix(0.99032725,0,0,0.99032725,45.431715,21.024607)"> 109 + <circle 110 + style="opacity:1;fill:#000000;fill-opacity:1;stroke-width:0.305415" 111 + id="path9973" 112 + cx="-25.944456" 113 + cy="-1.2989572" 114 + r="19.738214" /> 115 + <path 116 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 117 + id="path12879" 118 + style="fill:url(#linearGradient37024);fill-opacity:1;stroke:url(#linearGradient18718);stroke-width:0.385512;stroke-dasharray:none" /> 119 + <path 120 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 121 + id="path105" 122 + style="fill:url(#linearGradient1751);fill-opacity:1;stroke-width:0.224611" /> 123 + </g> 124 + <g 125 + fill-rule="evenodd" 126 + clip-rule="evenodd" 127 + id="g21630" 128 + transform="matrix(0.99032725,0,0,0.99032725,45.431715,21.024607)"> 129 + <circle 130 + style="opacity:1;fill:#000000;fill-opacity:1;stroke-width:0.305415" 131 + id="circle21624" 132 + cx="-25.944456" 133 + cy="-1.2989572" 134 + r="19.738214" /> 135 + <path 136 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 137 + id="path21626" 138 + style="fill:url(#linearGradient37018);fill-opacity:1;stroke:url(#linearGradient37020);stroke-width:0.385512;stroke-dasharray:none" /> 139 + <path 140 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 141 + id="path21628" 142 + style="fill:url(#linearGradient37022);fill-opacity:1;stroke-width:0.224611" /> 143 + <path 144 + id="path23092" 145 + style="fill:url(#linearGradient28294);fill-opacity:1;stroke-width:0.224611" 146 + d="m -25.805762,-20.69277 c -0.473953,-0.0033 -0.948507,0.01071 -1.42278,0.04232 -1.26469,0.08428 -2.527642,0.29308 -3.769434,0.629017 -4.964981,1.336993 -9.192635,4.59465 -11.75405,9.052755 -0.818765,1.4212894 -1.446154,2.9278069 -1.878016,4.4815773 a 32.997555,12.991727 0 0 0 1.016337,0.282508 c 2.144166,-7.7443653 9.240277,-13.4281663 17.668346,-13.4281663 8.575261,-2e-6 15.773207,5.884158 17.7781269,13.8358151 a 32.997555,12.991727 0 0 0 1.023715,-0.2510346 c -0.025651,-0.1013013 -0.051879,-0.2025527 -0.079211,-0.3035907 -1.3370968,-4.9650198 -4.5945139,-9.1944868 -9.0526049,-11.7558568 -2.926257,-1.685736 -6.212755,-2.562011 -9.530429,-2.58534 z m -0.392439,3.281068 c -0.315168,10e-4 -0.629998,0.01309 -0.944354,0.03674 -4.901415,0.368776 -9.523879,3.000923 -12.347678,7.4140287 1.69084,0.7738331 3.203378,1.5417462 4.353575,2.3320464 0.965845,0.6635889 1.777805,1.379284 2.132815,2.3124697 0.121158,0.3186123 0.186893,0.6600124 0.212333,0.9949523 a 32.997555,12.991727 0 0 0 5.381356,0.3290405 v -0.6443773 l 0.699192,-2.0917038 -2.10345,1.3495932 -9.8164,-5.0449367 0.24998,-0.328137 c 1.722821,-2.266828 4.030876,-4.01882 6.67764,-5.068278 l 0.228597,-0.0899 2.290935,2.658226 c 1.700941,-1.345359 3.465567,-2.071066 5.218869,-2.441375 1.321534,-0.279144 2.809888,-0.261758 4.322252,-0.277388 -2.130497,-0.912593 -4.349481,-1.448123 -6.555662,-1.441002 z m 13.405277,6.837417 c -1.204493,0.08068 -2.438519,0.322655 -3.515689,0.7714759 -1.073715,0.4475077 -2.008833,1.0752856 -2.906249,1.7852518 -0.891251,0.7051681 -1.728121,1.4773958 -2.464867,2.3300888 l -0.117159,0.138694 -2.400415,-0.2734726 1.308783,1.8328385 a 32.997555,12.991727 0 0 0 5.482252,-0.3287394 v -1.156536 l 0.01175,-0.044876 c 0.334785,-1.2002751 1.126171,-2.4441515 1.98629,-3.1913165 0.720737,-0.6263985 1.48247,-0.9085104 2.271509,-1.1152742 l 0.244108,-0.062495 0.134778,0.2109775 c 0.640923,1.0064672 1.161188,2.0847697 1.554698,3.2108933 l 0.0762,0.2166999 -1.493408,1.3273058 a 32.997555,12.991727 0 0 0 2.231001,-0.3965051 c -0.460072,-1.8497566 -1.259524,-3.6315218 -2.403577,-5.2550107 z" /> 147 + </g> 148 + </svg>
+2 -2
pkgs/by-name/vi/victoriametrics/package.nix
··· 14 14 15 15 buildGoModule rec { 16 16 pname = "VictoriaMetrics"; 17 - version = "1.109.0"; 17 + version = "1.110.0"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "VictoriaMetrics"; 21 21 repo = "VictoriaMetrics"; 22 22 rev = "v${version}"; 23 - hash = "sha256-ZeHQxJtUZSFwWeQgHcEXdq9GR26HH4NOuLnO8S4u21o="; 23 + hash = "sha256-TrM2YyxZZZw+wGMIFACJExtQb6aJwDe1xe63OQqCjDo="; 24 24 }; 25 25 26 26 vendorHash = null;
+2 -2
pkgs/by-name/wo/wownero/package.nix
··· 5 5 fetchFromGitea, 6 6 cmake, 7 7 python3, 8 - boost, 8 + boost186, 9 9 libsodium, 10 10 openssl, 11 11 rapidjson, ··· 62 62 63 63 buildInputs = 64 64 [ 65 - boost 65 + boost186 66 66 libsodium 67 67 openssl 68 68 rapidjson
+7 -3
pkgs/development/php-packages/box/default.nix
··· 2 2 lib, 3 3 php82, 4 4 fetchFromGitHub, 5 + versionCheckHook, 5 6 }: 6 7 7 - php82.buildComposerProject (finalAttrs: { 8 + php82.buildComposerProject2 (finalAttrs: { 8 9 pname = "box"; 9 10 version = "4.6.2"; 10 11 11 12 src = fetchFromGitHub { 12 13 owner = "box-project"; 13 14 repo = "box"; 14 - rev = finalAttrs.version; 15 + tag = finalAttrs.version; 15 16 hash = "sha256-gYIAP9pTjahNkpNNXx0c8sQm+9Kaq6/IAo/xI5bNy7Y="; 16 17 }; 17 18 18 - vendorHash = "sha256-HCbjW4HdyQNWDEHXj9U1t3S3EKcrPV1z/9I1ClFsMsc="; 19 + vendorHash = "sha256-TAubvl+rsdQdqKz+lRg1oX/ENuRyHoJQVmL1ELz24fg="; 20 + 21 + nativeInstallCheckInputs = [ versionCheckHook ]; 22 + doInstallCheck = true; 19 23 20 24 meta = { 21 25 changelog = "https://github.com/box-project/box/releases/tag/${finalAttrs.version}";
+8 -3
pkgs/development/php-packages/phpmd/default.nix
··· 2 2 lib, 3 3 fetchFromGitHub, 4 4 php, 5 + versionCheckHook, 5 6 }: 6 7 7 - php.buildComposerProject (finalAttrs: { 8 + php.buildComposerProject2 (finalAttrs: { 8 9 pname = "phpmd"; 9 10 version = "2.15.0"; 10 11 11 12 src = fetchFromGitHub { 12 13 owner = "phpmd"; 13 14 repo = "phpmd"; 14 - rev = finalAttrs.version; 15 + tag = finalAttrs.version; 15 16 hash = "sha256-nTuJGzOZnkqrfE9R9Vujz/zGJRLlj8+yRZmmnxWrieQ="; 16 17 }; 17 18 18 19 # Missing `composer.lock` from the repository. 19 20 # Issue open at https://github.com/phpmd/phpmd/issues/1056 20 21 composerLock = ./composer.lock; 21 - vendorHash = "sha256-vr0wQkfhXHLEz8Q5nEq5Bocu1U1nDhXUlaHBsysvuRQ="; 22 + vendorHash = "sha256-AahAs3Gq1OQ+CW3+rU8NnWcR3hKzVNq7s3llsO4mQ38="; 23 + 24 + nativeInstallCheckInputs = [ versionCheckHook ]; 25 + versionCheckProgramArg = "--version"; 26 + doInstallCheck = true; 22 27 23 28 meta = { 24 29 changelog = "https://github.com/phpmd/phpmd/releases/tag/${finalAttrs.version}";
+6 -1
pkgs/development/python-modules/altair/default.nix
··· 25 25 version = "5.5.0"; 26 26 pyproject = true; 27 27 28 - disabled = pythonOlder "3.8"; 28 + disabled = pythonOlder "3.9"; 29 29 30 30 src = fetchFromGitHub { 31 31 owner = "altair-viz"; ··· 60 60 disabledTests = [ 61 61 # ValueError: Saving charts in 'svg' format requires the vl-convert-python or altair_saver package: see http://github.com/altair-viz/altair_saver/ 62 62 "test_renderer_with_none_embed_options" 63 + # Sometimes conflict due to parallelism 64 + "test_dataframe_to_csv[polars]" 65 + "test_dataframe_to_csv[pandas]" 66 + # Network access 67 + "test_theme_remote_lambda" 63 68 ]; 64 69 65 70 disabledTestPaths = [
+2 -2
pkgs/development/python-modules/databricks-sdk/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "databricks-sdk"; 25 - version = "0.40.0"; 25 + version = "0.41.0"; 26 26 pyproject = true; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "databricks"; 30 30 repo = "databricks-sdk-py"; 31 31 tag = "v${version}"; 32 - hash = "sha256-x8CbjWdholuIGVr3TxbFjEszu0owjSIm7+G3Sh+cHEk="; 32 + hash = "sha256-mKytUMPipee/sg5VWBTfCg0sZwNg69pI+Uuqu1EhNIc="; 33 33 }; 34 34 35 35 build-system = [
+3
pkgs/development/python-modules/jax/default.nix
··· 95 95 ] 96 96 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 97 97 # SystemError: nanobind::detail::nb_func_error_except(): exception could not be translated! 98 + # reported at: https://github.com/jax-ml/jax/issues/26106 99 + "--deselect tests/pjit_test.py::PJitErrorTest::testAxisResourcesMismatch" 98 100 "--deselect tests/shape_poly_test.py::ShapePolyTest" 99 101 "--deselect tests/tree_util_test.py::TreeTest" 100 102 ]; ··· 150 152 ] 151 153 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 152 154 # SystemError: nanobind::detail::nb_func_error_except(): exception could not be translated! 155 + # reported at: https://github.com/jax-ml/jax/issues/26106 153 156 "testInAxesPyTreePrefixMismatchError" 154 157 "testInAxesPyTreePrefixMismatchErrorKwargs" 155 158 "testOutAxesPyTreePrefixMismatchError"
+4 -3
pkgs/development/python-modules/jaxopt/default.nix
··· 89 89 "test_binary_logit_log_likelihood" 90 90 91 91 # AssertionError (flaky numerical tests) 92 + "test_Rosenbrock2" 93 + "test_Rosenbrock5" 94 + "test_gradient1" 95 + "test_inv_hessian_product_pytree3" 92 96 "test_logreg_with_intercept_manual_loop3" 93 - "test_inv_hessian_product_pytree3" 94 97 "test_multiclass_logreg6" 95 - "test_Rosenbrock2" 96 - "test_Rosenbrock5" 97 98 ]; 98 99 99 100 meta = {
+2 -2
pkgs/development/python-modules/pyedflib/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "pyedflib"; 17 - version = "0.1.38"; 17 + version = "0.1.39"; 18 18 pyproject = true; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "holgern"; 22 22 repo = "pyedflib"; 23 23 tag = "v${version}"; 24 - hash = "sha256-sj2O5ISAy12u4GdtucLaRfOeSA6o6FJpZWTyiLq5B3U="; 24 + hash = "sha256-NHjeaNLbOxTPzTbQ9owFkessQY/QnxBSC8G93JahMGg="; 25 25 }; 26 26 27 27 build-system = [
+2 -2
pkgs/development/tools/analysis/checkov/default.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication rec { 8 8 pname = "checkov"; 9 - version = "3.2.355"; 9 + version = "3.2.357"; 10 10 pyproject = true; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "bridgecrewio"; 14 14 repo = "checkov"; 15 15 tag = version; 16 - hash = "sha256-yBm4v7YczngDFf7jSSVrlMbwIWYFMt6xdJe5qG6i4+I="; 16 + hash = "sha256-hWCYkzFKL60r1k2u9TUwuSRA2R+hHr4ooKGtctko41o="; 17 17 }; 18 18 19 19 patches = [ ./flake8-compat-5.x.patch ];
+2 -1
pkgs/os-specific/linux/acpi-call/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 21 22 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 + makeFlags = kernelModuleMakeFlags ++ [ 25 26 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 27 ]; 27 28
+2 -1
pkgs/os-specific/linux/akvcam/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 18 19 sourceRoot = "${src.name}/src"; 19 20 20 21 nativeBuildInputs = kernel.moduleBuildDependencies; 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 24 ]; 24 25
+2 -1
pkgs/os-specific/linux/amneziawg/default.nix
··· 4 4 fetchFromGitHub, 5 5 srcOnly, 6 6 kernel, 7 + kernelModuleMakeFlags, 7 8 nix-update-script, 8 9 }: 9 10 ··· 28 29 ]; 29 30 30 31 makeFlags = 31 - kernel.moduleMakeFlags 32 + kernelModuleMakeFlags 32 33 ++ [ "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" ] 33 34 ++ lib.optional (lib.versionAtLeast kernel.version "5.6") "KERNEL_SOURCE_DIR=${srcOnly kernel}"; 34 35
+2 -1
pkgs/os-specific/linux/apfs/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 nixosTests, 7 8 }: 8 9 ··· 23 24 hardeningDisable = [ "pic" ]; 24 25 nativeBuildInputs = kernel.moduleBuildDependencies; 25 26 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 + makeFlags = kernelModuleMakeFlags ++ [ 27 28 "KERNELRELEASE=${kernel.modDirVersion}" 28 29 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 29 30 "INSTALL_MOD_PATH=$(out)"
+2 -1
pkgs/os-specific/linux/batman-adv/default.nix
··· 3 3 stdenv, 4 4 fetchurl, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 let ··· 19 20 }; 20 21 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 22 - makeFlags = kernel.moduleMakeFlags ++ [ 23 + makeFlags = kernelModuleMakeFlags ++ [ 23 24 "KERNELPATH=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 ]; 25 26
+2 -1
pkgs/os-specific/linux/bbswitch/default.nix
··· 4 4 fetchFromGitHub, 5 5 fetchpatch, 6 6 kernel, 7 + kernelModuleMakeFlags, 7 8 runtimeShell, 8 9 }: 9 10 ··· 41 42 --replace "/lib/modules" "${kernel.dev}/lib/modules" 42 43 ''; 43 44 44 - makeFlags = kernel.moduleMakeFlags; 45 + makeFlags = kernelModuleMakeFlags; 45 46 46 47 installPhase = '' 47 48 mkdir -p $out/lib/modules/${kernel.modDirVersion}/misc
+2 -1
pkgs/os-specific/linux/can-isotp/default.nix
··· 2 2 lib, 3 3 stdenv, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 fetchFromGitHub, 6 7 }: 7 8 ··· 18 19 sha256 = "1laax93czalclg7cy9iq1r7hfh9jigh7igj06y9lski75ap2vhfq"; 19 20 }; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 24 "INSTALL_MOD_PATH=${placeholder "out"}" 24 25 ];
+2 -1
pkgs/os-specific/linux/cryptodev/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel ? false, 6 + kernelModuleMakeFlags ? [], 6 7 }: 7 8 8 9 stdenv.mkDerivation (finalAttrs: { ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 hardeningDisable = [ "pic" ]; 21 22 22 - makeFlags = kernel.moduleMakeFlags ++ [ 23 + makeFlags = kernelModuleMakeFlags ++ [ 23 24 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 "INSTALL_MOD_PATH=$(out)" 25 26 "prefix=$(out)"
+2 -1
pkgs/os-specific/linux/ddcci/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitLab, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 fetchpatch, 7 8 }: 8 9 ··· 39 40 --replace depmod \# 40 41 ''; 41 42 42 - makeFlags = kernel.moduleMakeFlags ++ [ 43 + makeFlags = kernelModuleMakeFlags ++ [ 43 44 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 44 45 "KVER=${kernel.modDirVersion}" 45 46 "KERNEL_MODLIB=$(out)/lib/modules/${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/digimend/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 33 34 rm -r $out/lib/udev 34 35 ''; 35 36 36 - makeFlags = kernel.moduleMakeFlags ++ [ 37 + makeFlags = kernelModuleMakeFlags ++ [ 37 38 "KVERSION=${kernel.modDirVersion}" 38 39 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 39 40 "DESTDIR=${placeholder "out"}"
+2 -1
pkgs/os-specific/linux/dpdk-kmods/default.nix
··· 3 3 stdenv, 4 4 fetchzip, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 16 17 17 18 hardeningDisable = [ "pic" ]; 18 19 19 - makeFlags = kernel.moduleMakeFlags ++ [ 20 + makeFlags = kernelModuleMakeFlags ++ [ 20 21 "INSTALL_MOD_PATH=${placeholder "out"}" 21 22 ]; 22 23 KSRC = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
+2 -1
pkgs/os-specific/linux/drbd/driver.nix
··· 3 3 lib, 4 4 fetchurl, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 nixosTests, 7 8 flex, 8 9 coccinelle, ··· 29 30 30 31 enableParallelBuilding = true; 31 32 32 - makeFlags = kernel.moduleMakeFlags ++ [ 33 + makeFlags = kernelModuleMakeFlags ++ [ 33 34 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 34 35 "KVER=${kernel.version}" 35 36 "INSTALL_MOD_PATH=${placeholder "out"}"
+2 -1
pkgs/os-specific/linux/ena/default.nix
··· 4 4 fetchFromGitHub, 5 5 gitUpdater, 6 6 kernel, 7 + kernelModuleMakeFlags, 7 8 }: 8 9 let 9 10 rev-prefix = "ena_linux_"; ··· 23 24 hardeningDisable = [ "pic" ]; 24 25 25 26 nativeBuildInputs = kernel.moduleBuildDependencies; 26 - makeFlags = kernel.moduleMakeFlags; 27 + makeFlags = kernelModuleMakeFlags; 27 28 28 29 env.KERNEL_BUILD_DIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"; 29 30
+2 -1
pkgs/os-specific/linux/evdi/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 libdrm, 7 8 python3, 8 9 }: ··· 39 40 python3WithLibs 40 41 ]; 41 42 42 - makeFlags = kernel.moduleMakeFlags ++ [ 43 + makeFlags = kernelModuleMakeFlags ++ [ 43 44 "KVER=${kernel.modDirVersion}" 44 45 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 45 46 ];
+2 -1
pkgs/os-specific/linux/fanout/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 kmod, 7 8 nixosTests, 8 9 }: ··· 33 34 34 35 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 35 36 36 - makeFlags = kernel.moduleMakeFlags ++ [ 37 + makeFlags = kernelModuleMakeFlags ++ [ 37 38 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 38 39 ]; 39 40
+2 -1
pkgs/os-specific/linux/framework-laptop-kmod/default.nix
··· 2 2 lib, 3 3 stdenv, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 fetchFromGitHub, 6 7 unstableGitUpdater, 7 8 }: ··· 19 20 20 21 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 22 - makeFlags = kernel.moduleMakeFlags ++ [ 23 + makeFlags = kernelModuleMakeFlags ++ [ 23 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 ]; 25 26
+2 -1
pkgs/os-specific/linux/fwts/module.nix
··· 3 3 stdenv, 4 4 fwts, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 23 24 24 25 hardeningDisable = [ "pic" ]; 25 26 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 + makeFlags = kernelModuleMakeFlags ++ [ 27 28 "INSTALL_MOD_PATH=${placeholder "out"}" 28 29 ]; 29 30
+2 -1
pkgs/os-specific/linux/gasket/default.nix
··· 4 4 fetchFromGitHub, 5 5 fetchpatch2, 6 6 kernel, 7 + kernelModuleMakeFlags, 7 8 }: 8 9 9 10 stdenv.mkDerivation rec { ··· 31 32 cd src 32 33 ''; 33 34 34 - makeFlags = kernel.moduleMakeFlags ++ [ 35 + makeFlags = kernelModuleMakeFlags ++ [ 35 36 "-C" 36 37 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 37 38 "M=$(PWD)"
+2 -1
pkgs/os-specific/linux/gcadapter-oc-kmod/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 kmod, 7 8 }: 8 9 ··· 22 23 23 24 nativeBuildInputs = kernel.moduleBuildDependencies; 24 25 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 + makeFlags = kernelModuleMakeFlags ++ [ 26 27 "KERNEL_SOURCE_DIR=${kernel.dev}/${kerneldir}/build" 27 28 "INSTALL_MOD_PATH=$(out)" 28 29 ];
+2 -1
pkgs/os-specific/linux/hid-ite8291r3/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "VERSION=${version}" 23 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 ];
+2 -1
pkgs/os-specific/linux/hid-t150/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 21 22 22 23 sourceRoot = "${src.name}/hid-t150"; 23 24 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 + makeFlags = kernelModuleMakeFlags ++ [ 25 26 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 27 "INSTALL_MOD_PATH=${placeholder "out"}" 27 28 ];
+2 -2
pkgs/os-specific/linux/hid-tmff2/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, kernel }: 1 + { stdenv, lib, fetchFromGitHub, kernel, kernelModuleMakeFlags }: 2 2 3 3 stdenv.mkDerivation { 4 4 pname = "hid-tmff2"; ··· 16 16 17 17 nativeBuildInputs = kernel.moduleBuildDependencies; 18 18 19 - makeFlags = kernel.moduleMakeFlags ++ [ 19 + makeFlags = kernelModuleMakeFlags ++ [ 20 20 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 21 21 ]; 22 22
+2 -1
pkgs/os-specific/linux/ipu6-drivers/default.nix
··· 4 4 fetchFromGitHub, 5 5 ivsc-driver, 6 6 kernel, 7 + kernelModuleMakeFlags, 7 8 }: 8 9 9 10 stdenv.mkDerivation rec { ··· 31 32 32 33 nativeBuildInputs = kernel.moduleBuildDependencies; 33 34 34 - makeFlags = kernel.moduleMakeFlags ++ [ 35 + makeFlags = kernelModuleMakeFlags ++ [ 35 36 "KERNELRELEASE=${kernel.modDirVersion}" 36 37 "KERNEL_SRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 37 38 ];
+2 -1
pkgs/os-specific/linux/ithc/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "VERSION=${version}" 23 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 ];
+2 -1
pkgs/os-specific/linux/ivsc-driver/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation { ··· 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "KERNELRELEASE=${kernel.modDirVersion}" 23 24 "KERNEL_SRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 ];
+2 -1
pkgs/os-specific/linux/jool/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 nixosTests, 7 8 }: 8 9 ··· 22 23 sed -e 's@/lib/modules/\$(.*)@${kernel.dev}/lib/modules/${kernel.modDirVersion}@' -i src/mod/*/Makefile 23 24 ''; 24 25 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 + makeFlags = kernelModuleMakeFlags ++ [ 26 27 "-C src/mod" 27 28 "INSTALL_MOD_PATH=${placeholder "out"}" 28 29 ];
+17 -19
pkgs/os-specific/linux/kernel/manual-config.nix
··· 434 434 "LD=${stdenv.cc.bintools.bintools}/bin/${stdenv.cc.targetPrefix}ld" 435 435 ] ++ (stdenv.hostPlatform.linux-kernel.makeFlags or []) 436 436 ++ extraMakeFlags; 437 + in 437 438 438 - finalKernel = stdenv.mkDerivation ( 439 - builtins.foldl' lib.recursiveUpdate {} [ 440 - (drvAttrs config stdenv.hostPlatform.linux-kernel kernelPatches configfile) 441 - { 442 - inherit pname version; 439 + stdenv.mkDerivation ( 440 + builtins.foldl' lib.recursiveUpdate {} [ 441 + (drvAttrs config stdenv.hostPlatform.linux-kernel kernelPatches configfile) 442 + { 443 + inherit pname version; 443 444 444 - enableParallelBuilding = true; 445 + enableParallelBuilding = true; 445 446 446 - hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 447 + hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 447 448 448 - makeFlags = [ 449 - "O=$(buildRoot)" 450 - ] ++ commonMakeFlags; 449 + makeFlags = [ 450 + "O=$(buildRoot)" 451 + ] ++ commonMakeFlags; 451 452 452 - passthru.moduleMakeFlags = [ 453 - "KBUILD_OUTPUT=${finalKernel.dev}/lib/modules/${finalKernel.modDirVersion}/build" 454 - ] ++ commonMakeFlags; 453 + passthru = { inherit commonMakeFlags; }; 455 454 456 - karch = stdenv.hostPlatform.linuxArch; 457 - } 458 - (optionalAttrs (pos != null) { inherit pos; }) 459 - ] 460 - ); 461 - in finalKernel) 455 + karch = stdenv.hostPlatform.linuxArch; 456 + } 457 + (optionalAttrs (pos != null) { inherit pos; }) 458 + ] 459 + ))
+2 -1
pkgs/os-specific/linux/kernel/perf/default.nix
··· 4 4 fetchurl, 5 5 fetchpatch, 6 6 kernel, 7 + kernelModuleMakeFlags, 7 8 elfutils, 8 9 python3, 9 10 perl, ··· 101 102 "WERROR=0" 102 103 "ASCIIDOC8=1" 103 104 ] 104 - ++ kernel.moduleMakeFlags 105 + ++ kernelModuleMakeFlags 105 106 ++ lib.optional (!withGtk) "NO_GTK2=1" 106 107 ++ lib.optional (!withZstd) "NO_LIBZSTD=1" 107 108 ++ lib.optional (!withLibcap) "NO_LIBCAP=1";
+2 -1
pkgs/os-specific/linux/lenovo-legion/default.nix
··· 2 2 lib, 3 3 stdenv, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 bash, 6 7 lenovo-legion, 7 8 }: ··· 18 19 sed -i -e '/depmod/d' ./Makefile 19 20 ''; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "SHELL=bash" 23 24 "KERNELVERSION=${kernel.modDirVersion}" 24 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"
+2 -1
pkgs/os-specific/linux/lkrg/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 let 8 9 isKernelRT = ··· 25 26 26 27 nativeBuildInputs = kernel.moduleBuildDependencies; 27 28 28 - makeFlags = kernel.moduleMakeFlags ++ [ 29 + makeFlags = kernelModuleMakeFlags ++ [ 29 30 "KERNEL=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 31 ]; 31 32
+2 -1
pkgs/os-specific/linux/lttng-modules/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 22 23 23 24 env.NIX_CFLAGS_COMPILE = "-Wno-error=implicit-function-declaration"; 24 25 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 + makeFlags = kernelModuleMakeFlags ++ [ 26 27 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 28 "INSTALL_MOD_PATH=${placeholder "out"}" 28 29 ];
+2 -1
pkgs/os-specific/linux/mba6x_bl/default.nix
··· 1 1 { 2 2 fetchFromGitHub, 3 3 kernel, 4 + kernelModuleMakeFlags, 4 5 lib, 5 6 stdenv, 6 7 }: ··· 21 22 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 + makeFlags = kernelModuleMakeFlags ++ [ 25 26 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 27 "INSTALL_MOD_PATH=$(out)" 27 28 ];
+2 -1
pkgs/os-specific/linux/mbp-modules/mbp2018-bridge-drv/default.nix
··· 2 2 lib, 3 3 stdenv, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 fetchFromGitHub, 6 7 }: 7 8 ··· 17 18 }; 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 - makeFlags = kernel.moduleMakeFlags; 21 + makeFlags = kernelModuleMakeFlags; 21 22 22 23 buildPhase = '' 23 24 make -C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build \
+2 -1
pkgs/os-specific/linux/msi-ec/default.nix
··· 5 5 linuxPackages, 6 6 git, 7 7 kernel ? linuxPackages.kernel, 8 + kernelModuleMakeFlags, 8 9 }: 9 10 stdenv.mkDerivation { 10 11 pname = "msi-ec-kmods"; ··· 23 24 24 25 hardeningDisable = [ "pic" ]; 25 26 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 + makeFlags = kernelModuleMakeFlags ++ [ 27 28 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 28 29 "INSTALL_MOD_PATH=$(out)" 29 30 ];
+2 -2
pkgs/os-specific/linux/mstflint_access/default.nix
··· 1 - { lib, stdenv, fetchurl, kernel, kmod, mstflint }: 1 + { lib, stdenv, fetchurl, kernel, kmod, mstflint, kernelModuleMakeFlags }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "mstflint_access"; ··· 11 11 12 12 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 13 13 14 - makeFlags = kernel.moduleMakeFlags ++ [ 14 + makeFlags = kernelModuleMakeFlags ++ [ 15 15 "KVER=${kernel.modDirVersion}" 16 16 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 17 17 ];
+2 -1
pkgs/os-specific/linux/nct6687d/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 nix-update-script, 7 8 }: 8 9 ··· 23 24 24 25 nativeBuildInputs = kernel.moduleBuildDependencies; 25 26 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 + makeFlags = kernelModuleMakeFlags ++ [ 27 28 "-C" 28 29 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 29 30 "M=$(sourceRoot)"
+2 -1
pkgs/os-specific/linux/netatop/default.nix
··· 3 3 stdenv, 4 4 fetchurl, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 kmod, 7 8 zlib, 8 9 }: ··· 48 49 kmod=${kmod} substituteAllInPlace netatop.service 49 50 ''; 50 51 51 - makeFlags = kernel.moduleMakeFlags; 52 + makeFlags = kernelModuleMakeFlags; 52 53 53 54 preInstall = '' 54 55 mkdir -p $out/lib/systemd/system $out/bin $out/sbin $out/share/man/man{4,8}
+2 -1
pkgs/os-specific/linux/nullfs/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 stdenv.mkDerivation rec { 8 9 pname = "nullfs"; ··· 21 22 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 + makeFlags = kernelModuleMakeFlags ++ [ 25 26 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 27 ]; 27 28
+2 -1
pkgs/os-specific/linux/nvidia-x11/generic.nix
··· 42 42 fetchurl, 43 43 fetchzip, 44 44 kernel ? null, 45 + kernelModuleMakeFlags ? [], 45 46 perl, 46 47 nukeReferences, 47 48 which, ··· 205 206 kernelVersion = if libsOnly then null else kernel.modDirVersion; 206 207 207 208 makeFlags = lib.optionals (!libsOnly) ( 208 - kernel.moduleMakeFlags 209 + kernelModuleMakeFlags 209 210 ++ [ 210 211 "IGNORE_PREEMPT_RT_PRESENCE=1" 211 212 "NV_BUILD_SUPPORTS_HMM=1"
+2 -1
pkgs/os-specific/linux/nvidia-x11/open.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 nvidia_x11, 7 8 hash, 8 9 patches ? [ ], ··· 25 26 26 27 nativeBuildInputs = kernel.moduleBuildDependencies; 27 28 28 - makeFlags = kernel.moduleMakeFlags ++ [ 29 + makeFlags = kernelModuleMakeFlags ++ [ 29 30 "SYSSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source" 30 31 "SYSOUT=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 31 32 "MODLIB=$(out)/lib/modules/${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/openrazer/driver.nix
··· 2 2 coreutils, 3 3 fetchFromGitHub, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 stdenv, 6 7 lib, 7 8 util-linux, ··· 20 21 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 22 23 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 + makeFlags = kernelModuleMakeFlags ++ [ 24 25 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 26 ]; 26 27
+2 -1
pkgs/os-specific/linux/qc71_laptop/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "VERSION=${version}" 23 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 25 ];
+2 -2
pkgs/os-specific/linux/r8168/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, kernel }: 1 + { stdenv, lib, fetchFromGitHub, kernel, kernelModuleMakeFlags }: 2 2 3 3 4 4 let modDestDir = "$out/lib/modules/${kernel.modDirVersion}/kernel/drivers/net/wireless/realtek/r8168"; ··· 27 27 # avoid using the Makefile directly -- it doesn't understand 28 28 # any kernel but the current. 29 29 # based on the ArchLinux pkgbuild: https://git.archlinux.org/svntogit/community.git/tree/trunk/PKGBUILD?h=packages/r8168 30 - makeFlags = kernel.moduleMakeFlags ++ [ 30 + makeFlags = kernelModuleMakeFlags ++ [ 31 31 "-C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 32 32 "M=$(PWD)/src" 33 33 "modules"
+2 -1
pkgs/os-specific/linux/rtl8189es/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 bc, 7 8 nukeReferences, 8 9 }: ··· 34 35 substituteInPlace ./Makefile --replace '$(MODDESTDIR)' "$out/lib/modules/${kernel.modDirVersion}/kernel/net/wireless/" 35 36 ''; 36 37 37 - makeFlags = kernel.moduleMakeFlags ++ [ 38 + makeFlags = kernelModuleMakeFlags ++ [ 38 39 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 39 40 ( 40 41 "CONFIG_PLATFORM_I386_PC="
+2 -1
pkgs/os-specific/linux/rtl8192eu/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 bc, 7 8 }: 8 9 ··· 25 26 26 27 nativeBuildInputs = kernel.moduleBuildDependencies ++ [ bc ]; 27 28 28 - makeFlags = kernel.moduleMakeFlags ++ [ 29 + makeFlags = kernelModuleMakeFlags ++ [ 29 30 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 31 ]; 31 32
+2 -1
pkgs/os-specific/linux/rtl8814au/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation { ··· 17 18 }; 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 - makeFlags = kernel.moduleMakeFlags; 21 + makeFlags = kernelModuleMakeFlags; 21 22 22 23 hardeningDisable = [ "pic" ]; 23 24
+2 -1
pkgs/os-specific/linux/rtl8821ce/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 bc, 7 8 }: 8 9 ··· 20 21 hardeningDisable = [ "pic" ]; 21 22 22 23 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags; 24 + makeFlags = kernelModuleMakeFlags; 24 25 25 26 prePatch = '' 26 27 substituteInPlace ./Makefile \
+2 -1
pkgs/os-specific/linux/rtl8821cu/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 bc, 7 8 }: 8 9 ··· 20 21 hardeningDisable = [ "pic" ]; 21 22 22 23 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags; 24 + makeFlags = kernelModuleMakeFlags; 24 25 25 26 prePatch = '' 26 27 substituteInPlace ./Makefile \
+2 -1
pkgs/os-specific/linux/rtl88x2bu/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 bc, 7 8 }: 8 9 ··· 20 21 hardeningDisable = [ "pic" ]; 21 22 22 23 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags; 24 + makeFlags = kernelModuleMakeFlags; 24 25 25 26 prePatch = '' 26 27 substituteInPlace ./Makefile \
+2 -1
pkgs/os-specific/linux/rtw88/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 let ··· 20 21 }; 21 22 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 + makeFlags = kernelModuleMakeFlags ++ [ 24 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 26 ]; 26 27
+2 -1
pkgs/os-specific/linux/rtw89/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 let ··· 20 21 }; 21 22 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 + makeFlags = kernelModuleMakeFlags ++ [ 24 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 26 ]; 26 27
+2 -1
pkgs/os-specific/linux/rust-out-of-tree-module/default.nix
··· 2 2 lib, 3 3 fetchFromGitHub, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 unstableGitUpdater, 6 7 }: 7 8 kernel.stdenv.mkDerivation { ··· 17 18 }; 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 - makeFlags = kernel.moduleMakeFlags ++ [ 21 + makeFlags = kernelModuleMakeFlags ++ [ 21 22 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 22 23 ]; 23 24
+2 -1
pkgs/os-specific/linux/shufflecake/default.nix
··· 1 1 { 2 2 lib, 3 3 kernel, 4 + kernelModuleMakeFlags, 4 5 stdenv, 5 6 fetchFromGitea, 6 7 libgcrypt, ··· 22 23 libgcrypt 23 24 lvm2 24 25 ]; 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 + makeFlags = kernelModuleMakeFlags ++ [ 26 27 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 28 ]; 28 29
+2 -1
pkgs/os-specific/linux/tmon/default.nix
··· 2 2 lib, 3 3 stdenv, 4 4 kernel, 5 + kernelModuleMakeFlags, 5 6 ncurses, 6 7 }: 7 8 ··· 17 18 cd tools/thermal/tmon 18 19 ''; 19 20 20 - makeFlags = kernel.moduleMakeFlags ++ [ 21 + makeFlags = kernelModuleMakeFlags ++ [ 21 22 "INSTALL_ROOT=\"$(out)\"" 22 23 "BINDIR=bin" 23 24 ];
+2 -1
pkgs/os-specific/linux/trelay/default.nix
··· 3 3 lib, 4 4 fetchgit, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 kmod, 7 8 }: 8 9 let ··· 30 31 cp '${./Makefile}' Makefile 31 32 ''; 32 33 33 - makeFlags = kernel.moduleMakeFlags ++ [ 34 + makeFlags = kernelModuleMakeFlags ++ [ 34 35 "KERNELRELEASE=${kernel.modDirVersion}" 35 36 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 36 37 "INSTALL_MOD_PATH=$(out)"
+2 -1
pkgs/os-specific/linux/tsme-test/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation { ··· 18 19 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 + makeFlags = kernelModuleMakeFlags ++ [ 22 23 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 24 ]; 24 25
+2 -1
pkgs/os-specific/linux/tuxedo-drivers/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitLab, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 kmod, 7 8 pahole, 8 9 }: ··· 22 23 buildInputs = [ pahole ]; 23 24 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 24 25 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 + makeFlags = kernelModuleMakeFlags ++ [ 26 27 "KERNELRELEASE=${kernel.modDirVersion}" 27 28 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 28 29 "INSTALL_MOD_PATH=${placeholder "out"}"
+2 -2
pkgs/os-specific/linux/v4l2loopback/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, kernel, kmod }: 1 + { lib, stdenv, fetchFromGitHub, kernel, kmod, kernelModuleMakeFlags }: 2 2 3 3 let version = "0.13.2"; 4 4 ··· 28 28 29 29 outputs = [ "out" "bin" ]; 30 30 31 - makeFlags = kernel.moduleMakeFlags ++ [ 31 + makeFlags = kernelModuleMakeFlags ++ [ 32 32 "KERNELRELEASE=${kernel.modDirVersion}" 33 33 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 34 34 ];
+2 -1
pkgs/os-specific/linux/veikk-linux-driver/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 20 21 21 22 buildInputs = [ kernel ]; 22 23 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 + makeFlags = kernelModuleMakeFlags ++ [ 24 25 "BUILD_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 26 ]; 26 27
+2 -2
pkgs/os-specific/linux/virtio_vmmci/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, kernel }: 1 + { stdenv, lib, fetchFromGitHub, kernel, kernelModuleMakeFlags }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "virtio_vmmci"; ··· 18 18 CONFIG_RTC_HCTOSYS yes 19 19 ''; 20 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 21 + makeFlags = kernelModuleMakeFlags ++ [ 22 22 "DEPMOD=echo" 23 23 "INSTALL_MOD_PATH=$(out)" 24 24 "KERNELRELEASE=${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/vmm_clock/default.nix
··· 3 3 lib, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 }: 7 8 8 9 stdenv.mkDerivation rec { ··· 26 27 CONFIG_RTC_HCTOSYS yes 27 28 ''; 28 29 29 - makeFlags = kernel.moduleMakeFlags ++ [ 30 + makeFlags = kernelModuleMakeFlags ++ [ 30 31 "DEPMOD=echo" 31 32 "INSTALL_MOD_PATH=$(out)" 32 33 "KERNELRELEASE=${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/xpadneo/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 bluez, 7 8 nixosTests, 8 9 nix-update-script, ··· 26 27 nativeBuildInputs = kernel.moduleBuildDependencies; 27 28 buildInputs = [ bluez ]; 28 29 29 - makeFlags = kernel.moduleMakeFlags ++ [ 30 + makeFlags = kernelModuleMakeFlags ++ [ 30 31 "-C" 31 32 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 32 33 "M=$(sourceRoot)"
+2 -1
pkgs/os-specific/linux/zenergy/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 kernel, 6 + kernelModuleMakeFlags, 6 7 kmod, 7 8 }: 8 9 ··· 27 28 "pic" 28 29 ]; 29 30 30 - makeFlags = kernel.moduleMakeFlags ++ [ "KDIR=${kernelDirectory}" ]; 31 + makeFlags = kernelModuleMakeFlags ++ [ "KDIR=${kernelDirectory}" ]; 31 32 32 33 installTargets = [ "modules_install" ]; 33 34
+4 -2
pkgs/os-specific/linux/zfs/generic.nix
··· 34 34 35 35 # Kernel dependencies 36 36 kernel ? null, 37 + kernelModuleMakeFlags ? [ ], 37 38 enablePython ? true, 38 39 ... 39 40 }@outerArgs: ··· 191 192 "--with-linux=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source" 192 193 "--with-linux-obj=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 193 194 ] 194 - ++ kernel.moduleMakeFlags 195 + ++ kernelModuleMakeFlags 195 196 ); 196 197 197 - makeFlags = optionals buildKernel kernel.moduleMakeFlags; 198 + makeFlags = optionals buildKernel kernelModuleMakeFlags; 198 199 199 200 enableParallelBuilding = true; 200 201 ··· 264 265 outputs = [ "out" ] ++ optionals buildUser [ "dev" ]; 265 266 266 267 passthru = { 268 + inherit kernel; 267 269 inherit enableMail kernelModuleAttribute; 268 270 latestCompatibleLinuxPackages = lib.warn "zfs.latestCompatibleLinuxPackages is deprecated and is now pointing at the default kernel. If using the stable LTS kernel (default `linuxPackages` is not possible then you must explicitly pin a specific kernel release. For example, `boot.kernelPackages = pkgs.linuxPackages_6_6`. Please be aware that non-LTS kernels are likely to go EOL before ZFS supports the latest supported non-LTS release, requiring manual intervention." linuxPackages; 269 271
+3 -3
pkgs/servers/home-assistant/custom-lovelace-modules/hourly-weather/package.nix
··· 6 6 7 7 buildNpmPackage rec { 8 8 pname = "hourly-weather"; 9 - version = "6.6.0"; 9 + version = "6.6.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "decompil3d"; 13 13 repo = "lovelace-hourly-weather"; 14 14 rev = version; 15 - hash = "sha256-UlKObFzzjsjxqp2uKvI8BYHTFBWFLFg4RTnJkFplZCA="; 15 + hash = "sha256-D2kCUcUgLyMVeba3xc02q/5PrEzXrBVCX+75F58j8y0="; 16 16 }; 17 17 18 - npmDepsHash = "sha256-cDRS87+uNbf4OOQ5w6gFFgeI52YblfAB0bS07wJg5r0="; 18 + npmDepsHash = "sha256-gpyqQd4pRF4xKgfT9gRAVnXLSFThjfJV2yu4zOCvVpg="; 19 19 20 20 env.CYPRESS_INSTALL_BINARY = "0"; 21 21
+2 -2
pkgs/tools/package-management/nix/default.nix
··· 155 155 }; 156 156 157 157 nix_2_25 = common { 158 - version = "2.25.4"; 159 - hash = "sha256-cB/1vIYk8LWvL71hiKFu8froJHTUAfsYOOxBlBeNglI="; 158 + version = "2.25.5"; 159 + hash = "sha256-9xrQhrqHCSqWsQveykZvG/ZMu0se66fUQw3xVSg6BpQ="; 160 160 self_attribute_name = "nix_2_25"; 161 161 }; 162 162
-6
pkgs/top-level/all-packages.nix
··· 14775 14775 nodejs = nodejs_18; 14776 14776 }; 14777 14777 14778 - photoqt = callPackage ../by-name/ph/photoqt/package.nix { 14779 - stdenv = if stdenv.hostPlatform.isDarwin then overrideSDK stdenv "11.0" else stdenv; 14780 - }; 14781 - 14782 14778 photoflare = libsForQt5.callPackage ../applications/graphics/photoflare { }; 14783 14779 14784 14780 phototonic = libsForQt5.callPackage ../applications/graphics/phototonic { }; ··· 18188 18184 discord-screenaudio = qt6Packages.callPackage ../applications/networking/instant-messengers/discord-screenaudio { }; 18189 18185 18190 18186 discordo = callPackage ../applications/networking/discordo/default.nix { }; 18191 - 18192 - golden-cheetah = libsForQt5.callPackage ../applications/misc/golden-cheetah { }; 18193 18187 18194 18188 tomb = callPackage ../by-name/to/tomb/package.nix { 18195 18189 pinentry = pinentry-curses;
+3
pkgs/top-level/linux-kernels.nix
··· 322 322 # to help determine module compatibility 323 323 inherit (kernel) isZen isHardened isLibre; 324 324 inherit (kernel) kernelOlder kernelAtLeast; 325 + kernelModuleMakeFlags = self.kernel.commonMakeFlags ++ [ 326 + "KBUILD_OUTPUT=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 327 + ]; 325 328 # Obsolete aliases (these packages do not depend on the kernel). 326 329 inherit (pkgs) odp-dpdk pktgen; # added 2018-05 327 330 inherit (pkgs) bcc bpftrace; # added 2021-12