lol

Merge master into staging-next

authored by

nixpkgs-ci[bot] and committed by
GitHub
5df98c0e b6f676fb

+1228 -444
+6
maintainers/maintainer-list.nix
··· 1843 githubId = 53097078; 1844 name = "AJ Reifsnyder"; 1845 }; 1846 arezvov = { 1847 email = "alex@rezvov.ru"; 1848 github = "arezvov";
··· 1843 githubId = 53097078; 1844 name = "AJ Reifsnyder"; 1845 }; 1846 + arexon = { 1847 + email = "arexonreal@gmail.com"; 1848 + github = "arexon"; 1849 + githubId = 65680034; 1850 + name = "arexon"; 1851 + }; 1852 arezvov = { 1853 email = "alex@rezvov.ru"; 1854 github = "arezvov";
+2
nixos/doc/manual/release-notes/rl-2505.section.md
··· 123 124 - [Fider](https://fider.io/), an open platform to collect and prioritize feedback. Available as [services.fider](#opt-services.fider.enable). 125 126 - [mqtt-exporter](https://github.com/kpetremann/mqtt-exporter/), a Prometheus exporter for exposing messages from MQTT. Available as [services.prometheus.exporters.mqtt](#opt-services.prometheus.exporters.mqtt.enable). 127 128 - [nvidia-gpu](https://github.com/utkuozdemir/nvidia_gpu_exporter), a Prometheus exporter that scrapes `nvidia-smi` for GPU metrics. Available as [services.prometheus.exporters.nvidia-gpu](#opt-services.prometheus.exporters.nvidia-gpu.enable).
··· 123 124 - [Fider](https://fider.io/), an open platform to collect and prioritize feedback. Available as [services.fider](#opt-services.fider.enable). 125 126 + - [PDS](https://github.com/bluesky-social/pds), Personal Data Server for [bsky](https://bsky.social/). Available as [services.pds](option.html#opt-services.pds). 127 + 128 - [mqtt-exporter](https://github.com/kpetremann/mqtt-exporter/), a Prometheus exporter for exposing messages from MQTT. Available as [services.prometheus.exporters.mqtt](#opt-services.prometheus.exporters.mqtt.enable). 129 130 - [nvidia-gpu](https://github.com/utkuozdemir/nvidia_gpu_exporter), a Prometheus exporter that scrapes `nvidia-smi` for GPU metrics. Available as [services.prometheus.exporters.nvidia-gpu](#opt-services.prometheus.exporters.nvidia-gpu.enable).
+2 -2
nixos/modules/config/ldap.nix
··· 135 type = types.lines; 136 description = '' 137 Extra configuration options that will be added verbatim at 138 - the end of the nslcd configuration file (`nslcd.conf(5)`). 139 ''; 140 }; 141 ··· 219 type = types.lines; 220 description = '' 221 Extra configuration options that will be added verbatim at 222 - the end of the ldap configuration file (`ldap.conf(5)`). 223 If {option}`users.ldap.daemon` is enabled, this 224 configuration will not be used. In that case, use 225 {option}`users.ldap.daemon.extraConfig` instead.
··· 135 type = types.lines; 136 description = '' 137 Extra configuration options that will be added verbatim at 138 + the end of the nslcd configuration file ({manpage}`nslcd.conf(5)`). 139 ''; 140 }; 141 ··· 219 type = types.lines; 220 description = '' 221 Extra configuration options that will be added verbatim at 222 + the end of the ldap configuration file ({manpage}`ldap.conf(5)`). 223 If {option}`users.ldap.daemon` is enabled, this 224 configuration will not be used. In that case, use 225 {option}`users.ldap.daemon.extraConfig` instead.
+1 -1
nixos/modules/config/mysql.nix
··· 111 - `0` (or `"plain"`): 112 No encryption. Passwords are stored in plaintext. HIGHLY DISCOURAGED. 113 - `1` (or `"Y"`): 114 - Use crypt(3) function. 115 - `2` (or `"mysql"`): 116 Use the MySQL PASSWORD() function. It is possible that the encryption function used 117 by `pam_mysql` is different from that of the MySQL server, as
··· 111 - `0` (or `"plain"`): 112 No encryption. Passwords are stored in plaintext. HIGHLY DISCOURAGED. 113 - `1` (or `"Y"`): 114 + Use {manpage}`crypt(3)` function. 115 - `2` (or `"mysql"`): 116 Use the MySQL PASSWORD() function. It is possible that the encryption function used 117 by `pam_mysql` is different from that of the MySQL server, as
+3 -3
nixos/modules/config/swap.nix
··· 46 If not specified, the amount of data to read from `source` will be 47 determined by cryptsetup. 48 49 - See `cryptsetup-open(8)` for details. 50 ''; 51 }; 52 ··· 60 If not specified, the default sector size is determined from the 61 underlying block device. 62 63 - See `cryptsetup-open(8)` for details. 64 ''; 65 }; 66 ··· 158 whole swap space is discarded at swapon invocation. If "pages", 159 asynchronous discard on freed pages is performed, before returning to 160 the available pages pool. With "both", both policies are activated. 161 - See swapon(8) for more information. 162 ''; 163 }; 164
··· 46 If not specified, the amount of data to read from `source` will be 47 determined by cryptsetup. 48 49 + See `{manpage}`cryptsetup-open(8)`` for details. 50 ''; 51 }; 52 ··· 60 If not specified, the default sector size is determined from the 61 underlying block device. 62 63 + See `{manpage}`cryptsetup-open(8)`` for details. 64 ''; 65 }; 66 ··· 158 whole swap space is discarded at swapon invocation. If "pages", 159 asynchronous discard on freed pages is performed, before returning to 160 the available pages pool. With "both", both policies are activated. 161 + See {manpage}`swapon(8)` for more information. 162 ''; 163 }; 164
+1 -1
nixos/modules/config/users-groups.nix
··· 204 homeMode = mkOption { 205 type = types.strMatching "[0-7]{1,5}"; 206 default = "700"; 207 - description = "The user's home directory mode in numeric format. See chmod(1). The mode is only applied if {option}`users.users.<name>.createHome` is true."; 208 }; 209 210 cryptHomeLuks = mkOption {
··· 204 homeMode = mkOption { 205 type = types.strMatching "[0-7]{1,5}"; 206 default = "700"; 207 + description = "The user's home directory mode in numeric format. See {manpage}`chmod(1)`. The mode is only applied if {option}`users.users.<name>.createHome` is true."; 208 }; 209 210 cryptHomeLuks = mkOption {
+1 -1
nixos/modules/config/xdg/portals/wlr.nix
··· 28 description = '' 29 Configuration for `xdg-desktop-portal-wlr`. 30 31 - See `xdg-desktop-portal-wlr(5)` for supported 32 values. 33 ''; 34
··· 28 description = '' 29 Configuration for `xdg-desktop-portal-wlr`. 30 31 + See {manpage}`xdg-desktop-portal-wlr(5)` for supported 32 values. 33 ''; 34
+1
nixos/modules/module-list.nix
··· 1547 ./services/web-apps/mobilizon.nix 1548 ./services/web-apps/openwebrx.nix 1549 ./services/web-apps/outline.nix 1550 ./services/web-apps/peering-manager.nix 1551 ./services/web-apps/peertube.nix 1552 ./services/web-apps/pgpkeyserver-lite.nix
··· 1547 ./services/web-apps/mobilizon.nix 1548 ./services/web-apps/openwebrx.nix 1549 ./services/web-apps/outline.nix 1550 + ./services/web-apps/pds.nix 1551 ./services/web-apps/peering-manager.nix 1552 ./services/web-apps/peertube.nix 1553 ./services/web-apps/pgpkeyserver-lite.nix
+1 -1
nixos/modules/programs/gamemode.nix
··· 26 default = { }; 27 description = '' 28 System-wide configuration for GameMode (/etc/gamemode.ini). 29 - See gamemoded(8) man page for available settings. 30 ''; 31 example = lib.literalExpression '' 32 {
··· 26 default = { }; 27 description = '' 28 System-wide configuration for GameMode (/etc/gamemode.ini). 29 + See {manpage}`gamemoded(8)` man page for available settings. 30 ''; 31 example = lib.literalExpression '' 32 {
+1 -1
nixos/modules/programs/git.nix
··· 47 `config` to `[ { foo.x = 42; } { bar.y = 42; }]` will put the `foo` 48 section before the `bar` section unlike the default alphabetical 49 order, which can be helpful for sections such as `include` and 50 - `includeIf`. See the CONFIGURATION FILE section of git-config(1) for 51 more information. 52 ''; 53 };
··· 47 `config` to `[ { foo.x = 42; } { bar.y = 42; }]` will put the `foo` 48 section before the `bar` section unlike the default alphabetical 49 order, which can be helpful for sections such as `include` and 50 + `includeIf`. See the CONFIGURATION FILE section of {manpage}`git-config(1)` for 51 more information. 52 ''; 53 };
+3 -3
nixos/modules/programs/msmtp.nix
··· 34 }; 35 description = '' 36 Default values applied to all accounts. 37 - See msmtp(1) for the available options. 38 ''; 39 }; 40 ··· 52 description = '' 53 Named accounts and their respective configurations. 54 The special name "default" allows a default account to be defined. 55 - See msmtp(1) for the available options. 56 57 Use `programs.msmtp.extraConfig` instead of this attribute set-based 58 option if ordered account inheritance is needed. ··· 68 default = ""; 69 description = '' 70 Extra lines to add to the msmtp configuration verbatim. 71 - See msmtp(1) for the syntax and available options. 72 ''; 73 }; 74 };
··· 34 }; 35 description = '' 36 Default values applied to all accounts. 37 + See {manpage}`msmtp(1)` for the available options. 38 ''; 39 }; 40 ··· 52 description = '' 53 Named accounts and their respective configurations. 54 The special name "default" allows a default account to be defined. 55 + See {manpage}`msmtp(1)` for the available options. 56 57 Use `programs.msmtp.extraConfig` instead of this attribute set-based 58 option if ordered account inheritance is needed. ··· 68 default = ""; 69 description = '' 70 Extra lines to add to the msmtp configuration verbatim. 71 + See {manpage}`msmtp(1)` for the syntax and available options. 72 ''; 73 }; 74 };
+1 -1
nixos/modules/programs/shadow.nix
··· 31 description = '' 32 Config options for the /etc/login.defs file, that defines 33 the site-specific configuration for the shadow password suite. 34 - See login.defs(5) man page for available options. 35 ''; 36 type = lib.types.submodule { 37 freeformType = (pkgs.formats.keyValue { }).type;
··· 31 description = '' 32 Config options for the /etc/login.defs file, that defines 33 the site-specific configuration for the shadow password suite. 34 + See {manpage}`login.defs(5)` man page for available options. 35 ''; 36 type = lib.types.submodule { 37 freeformType = (pkgs.formats.keyValue { }).type;
+1 -1
nixos/modules/security/pam.nix
··· 1483 the YubiCloud. 1484 1485 Use "challenge-response" for offline validation using YubiKeys with HMAC-SHA-1 1486 - Challenge-Response configurations. See the man-page ykpamcfg(1) for further 1487 details on how to configure offline Challenge-Response validation. 1488 1489 More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
··· 1483 the YubiCloud. 1484 1485 Use "challenge-response" for offline validation using YubiKeys with HMAC-SHA-1 1486 + Challenge-Response configurations. See the man-page {manpage}`ykpamcfg(1)` for further 1487 details on how to configure offline Challenge-Response validation. 1488 1489 More information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).
+1 -1
nixos/modules/security/wrappers/default.nix
··· 214 example = "10G"; 215 type = lib.types.str; 216 description = '' 217 - Size limit for the /run/wrappers tmpfs. Look at mount(8), tmpfs size option, 218 for the accepted syntax. WARNING: don't set to less than 64MB. 219 ''; 220 };
··· 214 example = "10G"; 215 type = lib.types.str; 216 description = '' 217 + Size limit for the /run/wrappers tmpfs. Look at {manpage}`mount(8)`, tmpfs size option, 218 for the accepted syntax. WARNING: don't set to less than 64MB. 219 ''; 220 };
+2 -2
nixos/modules/services/backup/btrbk.nix
··· 163 default = 10; 164 }; 165 ioSchedulingClass = mkOption { 166 - description = "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle."; 167 type = types.enum [ 168 "idle" 169 "best-effort" ··· 181 type = types.nullOr types.str; 182 default = "daily"; 183 description = '' 184 - How often this btrbk instance is started. See systemd.time(7) for more information about the format. 185 Setting it to null disables the timer, thus this instance can only be started manually. 186 ''; 187 };
··· 163 default = 10; 164 }; 165 ioSchedulingClass = mkOption { 166 + description = "IO scheduling class for btrbk (see {manpage}`ionice(1)` for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle."; 167 type = types.enum [ 168 "idle" 169 "best-effort" ··· 181 type = types.nullOr types.str; 182 default = "daily"; 183 description = '' 184 + How often this btrbk instance is started. See {manpage}`systemd.time(7)` for more information about the format. 185 Setting it to null disables the timer, thus this instance can only be started manually. 186 ''; 187 };
+1 -1
nixos/modules/services/backup/restic.nix
··· 23 default = null; 24 description = '' 25 file containing the credentials to access the repository, in the 26 - format of an EnvironmentFile as described by systemd.exec(5) 27 ''; 28 }; 29
··· 23 default = null; 24 description = '' 25 file containing the credentials to access the repository, in the 26 + format of an EnvironmentFile as described by {manpage}`systemd.exec(5)` 27 ''; 28 }; 29
+4 -4
nixos/modules/services/backup/tarsnap.nix
··· 60 `"/root/tarsnap.key"`. 61 62 It's recommended for backups that you generate a key for every archive 63 - using `tarsnap-keygen(1)`, and then generate a 64 - write-only tarsnap key using `tarsnap-keymgmt(1)`, 65 and keep your master key(s) for a particular machine off-site. 66 67 The keyfile name should be given as a string and not a path, to ··· 86 Use this option if you want to run multiple backups 87 concurrently - each archive must have a unique key. You can 88 generate a write-only key derived from your master key (which 89 - is recommended) using `tarsnap-keymgmt(1)`. 90 91 Note: every archive must have an individual master key. You 92 must generate multiple keys with 93 - `tarsnap-keygen(1)`, and then generate write 94 only keys from those. 95 96 The keyfile name should be given as a string and not a path, to
··· 60 `"/root/tarsnap.key"`. 61 62 It's recommended for backups that you generate a key for every archive 63 + using {manpage}`tarsnap-keygen(1)`, and then generate a 64 + write-only tarsnap key using {manpage}`tarsnap-keymgmt(1)`, 65 and keep your master key(s) for a particular machine off-site. 66 67 The keyfile name should be given as a string and not a path, to ··· 86 Use this option if you want to run multiple backups 87 concurrently - each archive must have a unique key. You can 88 generate a write-only key derived from your master key (which 89 + is recommended) using {manpage}`tarsnap-keymgmt(1)`. 90 91 Note: every archive must have an individual master key. You 92 must generate multiple keys with 93 + {manpage}`tarsnap-keygen(1)`, and then generate write 94 only keys from those. 95 96 The keyfile name should be given as a string and not a path, to
+1 -1
nixos/modules/services/cluster/k3s/default.nix
··· 227 environmentFile = lib.mkOption { 228 type = lib.types.nullOr lib.types.path; 229 description = '' 230 - File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See systemd.exec(5). 231 ''; 232 default = null; 233 };
··· 227 environmentFile = lib.mkOption { 228 type = lib.types.nullOr lib.types.path; 229 description = '' 230 + File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See {manpage}`systemd.exec(5)`. 231 ''; 232 default = null; 233 };
+1 -1
nixos/modules/services/hardware/libinput.nix
··· 136 default = null; 137 example = "1 6 3 4 5 0 7"; 138 description = '' 139 - Sets the logical button mapping for this device, see XSetPointerMapping(3). The string must 140 be a space-separated list of button mappings in the order of the logical buttons on the 141 device, starting with button 1. The default mapping is "1 2 3 ... 32". A mapping of 0 deac‐ 142 tivates the button. Multiple buttons can have the same mapping. Invalid mapping strings are
··· 136 default = null; 137 example = "1 6 3 4 5 0 7"; 138 description = '' 139 + Sets the logical button mapping for this device, see {manpage}`XSetPointerMapping(3)`. The string must 140 be a space-separated list of button mappings in the order of the logical buttons on the 141 device, starting with button 1. The default mapping is "1 2 3 ... 32". A mapping of 0 deac‐ 142 tivates the button. Multiple buttons can have the same mapping. Invalid mapping strings are
+2 -2
nixos/modules/services/hardware/thinkfan.nix
··· 249 ]; 250 description = '' 251 A list of extra command line arguments to pass to thinkfan. 252 - Check the thinkfan(1) manpage for available arguments. 253 ''; 254 }; 255 ··· 259 description = '' 260 Thinkfan settings. Use this option to configure thinkfan 261 settings not exposed in a NixOS option or to bypass one. 262 - Before changing this, read the `thinkfan.conf(5)` 263 manpage and take a look at the example config file at 264 <https://github.com/vmatare/thinkfan/blob/master/examples/thinkfan.yaml> 265 '';
··· 249 ]; 250 description = '' 251 A list of extra command line arguments to pass to thinkfan. 252 + Check the {manpage}`thinkfan(1)` manpage for available arguments. 253 ''; 254 }; 255 ··· 259 description = '' 260 Thinkfan settings. Use this option to configure thinkfan 261 settings not exposed in a NixOS option or to bypass one. 262 + Before changing this, read the `{manpage}`thinkfan.conf(5)`` 263 manpage and take a look at the example config file at 264 <https://github.com/vmatare/thinkfan/blob/master/examples/thinkfan.yaml> 265 '';
+1 -1
nixos/modules/services/hardware/upower.nix
··· 65 on or off. We can't do much to fix these problems, but this is a way 66 for users to make the laptop panel vanish, a state that might be used 67 by a couple of user-space daemons. On Linux systems, see also 68 - logind.conf(5). 69 ''; 70 }; 71
··· 65 on or off. We can't do much to fix these problems, but this is a way 66 for users to make the laptop panel vanish, a state that might be used 67 by a couple of user-space daemons. On Linux systems, see also 68 + {manpage}`logind.conf(5)`. 69 ''; 70 }; 71
+1 -1
nixos/modules/services/home-automation/esphome.nix
··· 67 ]; 68 description = '' 69 A list of device nodes to which {command}`esphome` has access to. 70 - Refer to DeviceAllow in systemd.resource-control(5) for more information. 71 Beware that if a device is referred to by an absolute path instead of a device category, 72 it will only allow devices that already are plugged in when the service is started. 73 '';
··· 67 ]; 68 description = '' 69 A list of device nodes to which {command}`esphome` has access to. 70 + Refer to DeviceAllow in {manpage}`systemd.resource-control(5)` for more information. 71 Beware that if a device is referred to by an absolute path instead of a device category, 72 it will only allow devices that already are plugged in when the service is started. 73 '';
+3 -3
nixos/modules/services/logging/journalwatch.nix
··· 135 this patternBlock's {option}`filters` are applied. 136 If `value` starts and ends with a slash, it is interpreted as 137 an extended python regular expression, if not, it's an exact match. 138 - The journal fields are explained in systemd.journal-fields(7). 139 ''; 140 }; 141 ··· 210 description = '' 211 How often to run journalwatch. 212 213 - The format is described in systemd.time(7). 214 ''; 215 }; 216 accuracy = lib.mkOption { ··· 219 description = '' 220 The time window around the interval in which the journalwatch run will be scheduled. 221 222 - The format is described in systemd.time(7). 223 ''; 224 }; 225 };
··· 135 this patternBlock's {option}`filters` are applied. 136 If `value` starts and ends with a slash, it is interpreted as 137 an extended python regular expression, if not, it's an exact match. 138 + The journal fields are explained in {manpage}`systemd.journal-fields(7)`. 139 ''; 140 }; 141 ··· 210 description = '' 211 How often to run journalwatch. 212 213 + The format is described in {manpage}`systemd.time(7)`. 214 ''; 215 }; 216 accuracy = lib.mkOption { ··· 219 description = '' 220 The time window around the interval in which the journalwatch run will be scheduled. 221 222 + The format is described in {manpage}`systemd.time(7)`. 223 ''; 224 }; 225 };
+1 -1
nixos/modules/services/logging/syslogd.nix
··· 70 type = lib.types.bool; 71 default = false; 72 description = '' 73 - Accept logging through UDP. Option -r of syslogd(8). 74 ''; 75 }; 76
··· 70 type = lib.types.bool; 71 default = false; 72 description = '' 73 + Accept logging through UDP. Option -r of {manpage}`syslogd(8)`. 74 ''; 75 }; 76
+3 -3
nixos/modules/services/mail/clamsmtp.nix
··· 43 default = ""; 44 example = "X-Virus-Scanned: ClamAV using ClamSMTP"; 45 description = '' 46 - A header to add to scanned messages. See clamsmtpd.conf(5) for 47 more details. Empty means no header. 48 ''; 49 }; ··· 65 example = "127.0.0.1:10025"; 66 description = '' 67 Address to wait for incoming SMTP connections on. See 68 - clamsmtpd.conf(5) for more details. 69 ''; 70 }; 71 ··· 118 default = null; 119 description = '' 120 Command to run when a virus is found. Please see VIRUS ACTION in 121 - clamsmtpd(8) for a discussion of this option and its safe use. 122 ''; 123 }; 124
··· 43 default = ""; 44 example = "X-Virus-Scanned: ClamAV using ClamSMTP"; 45 description = '' 46 + A header to add to scanned messages. See {manpage}`clamsmtpd.conf(5)` for 47 more details. Empty means no header. 48 ''; 49 }; ··· 65 example = "127.0.0.1:10025"; 66 description = '' 67 Address to wait for incoming SMTP connections on. See 68 + {manpage}`clamsmtpd.conf(5)` for more details. 69 ''; 70 }; 71 ··· 118 default = null; 119 description = '' 120 Command to run when a virus is found. Please see VIRUS ACTION in 121 + {manpage}`clamsmtpd(8)` for a discussion of this option and its safe use. 122 ''; 123 }; 124
+3 -3
nixos/modules/services/mail/cyrus-imap.nix
··· 80 type = int; 81 default = 32; 82 description = '' 83 - Socket listen queue backlog size. See listen(2) for more information about a backlog. 84 Default is 32, which may be increased if you have a very high connection rate. 85 ''; 86 }; ··· 194 DAEMON = mkOption { 195 default = { }; 196 description = '' 197 - This section lists long running daemons to start before any SERVICES are spawned. master(8) will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when master(8) is exiting. 198 ''; 199 }; 200 }; ··· 221 type = path; 222 default = "/run/cyrus/lmtp"; 223 description = '' 224 - Unix socket that lmtpd listens on, used by deliver(8). This should match the path specified in cyrus.conf(5). 225 ''; 226 }; 227 idlesocket = mkOption {
··· 80 type = int; 81 default = 32; 82 description = '' 83 + Socket listen queue backlog size. See {manpage}`listen(2)` for more information about a backlog. 84 Default is 32, which may be increased if you have a very high connection rate. 85 ''; 86 }; ··· 194 DAEMON = mkOption { 195 default = { }; 196 description = '' 197 + This section lists long running daemons to start before any SERVICES are spawned. {manpage}`master(8)` will ensure that these processes are running, restarting any process which dies or forks. All listed processes will be shutdown when {manpage}`master(8)` is exiting. 198 ''; 199 }; 200 }; ··· 221 type = path; 222 default = "/run/cyrus/lmtp"; 223 description = '' 224 + Unix socket that lmtpd listens on, used by {manpage}`deliver(8)`. This should match the path specified in {manpage}`cyrus.conf(5)`. 225 ''; 226 }; 227 idlesocket = mkOption {
+2 -2
nixos/modules/services/mail/offlineimap.nix
··· 37 onCalendar = lib.mkOption { 38 type = lib.types.str; 39 default = "*:0/3"; # every 3 minutes 40 - description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See systemd.time(7) for more information about the format."; 41 }; 42 43 timeoutStartSec = lib.mkOption { 44 type = lib.types.str; 45 default = "120sec"; # Kill if still alive after 2 minutes 46 - description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See systemd.time(7) for more information about the format."; 47 }; 48 }; 49 config = lib.mkIf (cfg.enable || cfg.install) {
··· 37 onCalendar = lib.mkOption { 38 type = lib.types.str; 39 default = "*:0/3"; # every 3 minutes 40 + description = "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See {manpage}`systemd.time(7)` for more information about the format."; 41 }; 42 43 timeoutStartSec = lib.mkOption { 44 type = lib.types.str; 45 default = "120sec"; # Kill if still alive after 2 minutes 46 + description = "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See {manpage}`systemd.time(7)` for more information about the format."; 47 }; 48 }; 49 config = lib.mkIf (cfg.enable || cfg.install) {
+1 -1
nixos/modules/services/mail/opendkim.nix
··· 65 defaultText = lib.literalExpression ''"csl:''${config.networking.hostName}"''; 66 example = "csl:example.com,mydomain.net"; 67 description = '' 68 - Local domains set (see `opendkim(8)` for more information on datasets). 69 Messages from them are signed, not verified. 70 ''; 71 };
··· 65 defaultText = lib.literalExpression ''"csl:''${config.networking.hostName}"''; 66 example = "csl:example.com,mydomain.net"; 67 description = '' 68 + Local domains set (see {manpage}`opendkim(8)` for more information on datasets). 69 Messages from them are signed, not verified. 70 ''; 71 };
+4 -4
nixos/modules/services/mail/postfix.nix
··· 546 type = lib.types.lines; 547 default = ""; 548 description = '' 549 - Additional entries to put verbatim into aliases file, cf. man-page aliases(8). 550 ''; 551 }; 552 ··· 631 type = lib.types.lines; 632 default = ""; 633 description = '' 634 - Entries for the virtual alias map, cf. man-page virtual(5). 635 ''; 636 }; 637 ··· 654 List of accepted local users. Specify a bare username, an 655 `"@domain.tld"` wild-card, or a complete 656 `"user@domain.tld"` address. If set, these names end 657 - up in the local recipient map -- see the local(8) man-page -- and 658 effectively replace the system user database lookup that's otherwise 659 used by default. 660 ''; ··· 664 default = ""; 665 type = lib.types.lines; 666 description = '' 667 - Entries for the transport map, cf. man-page transport(8). 668 ''; 669 }; 670
··· 546 type = lib.types.lines; 547 default = ""; 548 description = '' 549 + Additional entries to put verbatim into aliases file, cf. man-page {manpage}`aliases(8)`. 550 ''; 551 }; 552 ··· 631 type = lib.types.lines; 632 default = ""; 633 description = '' 634 + Entries for the virtual alias map, cf. man-page {manpage}`virtual(5)`. 635 ''; 636 }; 637 ··· 654 List of accepted local users. Specify a bare username, an 655 `"@domain.tld"` wild-card, or a complete 656 `"user@domain.tld"` address. If set, these names end 657 + up in the local recipient map -- see the {manpage}`local(8)` man-page -- and 658 effectively replace the system user database lookup that's otherwise 659 used by default. 660 ''; ··· 664 default = ""; 665 type = lib.types.lines; 666 description = '' 667 + Entries for the transport map, cf. man-page {manpage}`transport(8)`. 668 ''; 669 }; 670
+3 -3
nixos/modules/services/mail/postgrey.nix
··· 119 greylistAction = mkOption { 120 type = str; 121 default = "DEFER_IF_PERMIT"; 122 - description = "Response status for greylisted messages (see access(5))"; 123 }; 124 greylistHeader = mkOption { 125 type = str; ··· 170 whitelistClients = mkOption { 171 type = listOf path; 172 default = [ ]; 173 - description = "Client address whitelist files (see postgrey(8))"; 174 }; 175 whitelistRecipients = mkOption { 176 type = listOf path; 177 default = [ ]; 178 - description = "Recipient address whitelist files (see postgrey(8))"; 179 }; 180 }; 181 };
··· 119 greylistAction = mkOption { 120 type = str; 121 default = "DEFER_IF_PERMIT"; 122 + description = "Response status for greylisted messages (see {manpage}`access(5)`)"; 123 }; 124 greylistHeader = mkOption { 125 type = str; ··· 170 whitelistClients = mkOption { 171 type = listOf path; 172 default = [ ]; 173 + description = "Client address whitelist files (see {manpage}`postgrey(8)`)"; 174 }; 175 whitelistRecipients = mkOption { 176 type = listOf path; 177 default = [ ]; 178 + description = "Recipient address whitelist files (see {manpage}`postgrey(8)`)"; 179 }; 180 }; 181 };
+1 -1
nixos/modules/services/misc/autofs.nix
··· 49 ''' 50 ''; 51 description = '' 52 - Contents of `/etc/auto.master` file. See {command}`auto.master(5)` and {command}`autofs(5)`. 53 ''; 54 }; 55
··· 49 ''' 50 ''; 51 description = '' 52 + Contents of `/etc/auto.master` file. See {manpage}`auto.master(5)` and {manpage}`autofs(5)`. 53 ''; 54 }; 55
+1 -1
nixos/modules/services/misc/gpsd.nix
··· 105 ]; 106 description = '' 107 A list of extra command line arguments to pass to gpsd. 108 - Check gpsd(8) mangpage for possible arguments. 109 ''; 110 }; 111
··· 105 ]; 106 description = '' 107 A list of extra command line arguments to pass to gpsd. 108 + Check {manpage}`gpsd(8)` mangpage for possible arguments. 109 ''; 110 }; 111
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/restic.nix
··· 54 default = null; 55 description = '' 56 File containing the credentials to access the repository, in the 57 - format of an EnvironmentFile as described by systemd.exec(5) 58 ''; 59 }; 60
··· 54 default = null; 55 description = '' 56 File containing the credentials to access the repository, in the 57 + format of an EnvironmentFile as described by {manpage}`systemd.exec(5)` 58 ''; 59 }; 60
+1 -1
nixos/modules/services/network-filesystems/cachefilesd.nix
··· 35 type = lib.types.lines; 36 default = ""; 37 example = "brun 10%"; 38 - description = "Additional configuration file entries. See cachefilesd.conf(5) for more information."; 39 }; 40 41 };
··· 35 type = lib.types.lines; 36 default = ""; 37 example = "brun 10%"; 38 + description = "Additional configuration file entries. See {manpage}`cachefilesd.conf(5)` for more information."; 39 }; 40 41 };
+1 -1
nixos/modules/services/network-filesystems/openafs/client.nix
··· 73 }); 74 description = '' 75 This cell's database server records, added to the global 76 - CellServDB. See CellServDB(5) man page for syntax. Ignored when 77 `afsdb` is set to `true`. 78 ''; 79 example = [
··· 73 }); 74 description = '' 75 This cell's database server records, added to the global 76 + CellServDB. See {manpage}`CellServDB(5)` man page for syntax. Ignored when 77 `afsdb` is set to `true`. 78 ''; 79 example = [
+1 -1
nixos/modules/services/network-filesystems/openafs/server.nix
··· 117 advertisedAddresses = mkOption { 118 type = types.listOf types.str; 119 default = [ ]; 120 - description = "List of IP addresses this server is advertised under. See NetInfo(5)"; 121 }; 122 123 cellName = mkOption {
··· 117 advertisedAddresses = mkOption { 118 type = types.listOf types.str; 119 default = [ ]; 120 + description = "List of IP addresses this server is advertised under. See {manpage}`NetInfo(5)`"; 121 }; 122 123 cellName = mkOption {
+2 -2
nixos/modules/services/networking/cgit.nix
··· 146 }; 147 148 repos = lib.mkOption { 149 - description = "cgit repository settings, see cgitrc(5)"; 150 type = with lib.types; attrsOf (attrsOf settingType); 151 default = { }; 152 example = { ··· 165 }; 166 167 settings = lib.mkOption { 168 - description = "cgit configuration, see cgitrc(5)"; 169 type = lib.types.attrsOf repeatedSettingType; 170 default = { }; 171 example = lib.literalExpression ''
··· 146 }; 147 148 repos = lib.mkOption { 149 + description = "cgit repository settings, see {manpage}`cgitrc(5)`"; 150 type = with lib.types; attrsOf (attrsOf settingType); 151 default = { }; 152 example = { ··· 165 }; 166 167 settings = lib.mkOption { 168 + description = "cgit configuration, see {manpage}`cgitrc(5)`"; 169 type = lib.types.attrsOf repeatedSettingType; 170 default = { }; 171 example = lib.literalExpression ''
+4 -4
nixos/modules/services/networking/hylafax/options.nix
··· 194 will be symlinked to the location given here. 195 This file must exist and be 196 readable only by the `uucp` user. 197 - See hosts.hfaxd(5) for details. 198 This configuration permits access for all users: 199 ``` 200 environment.etc."hosts.hfaxd" = { ··· 299 description = '' 300 purging old files from the spooling area with 301 {file}`faxcron` with the given frequency 302 - (see systemd.time(7)) 303 ''; 304 }; 305 faxcron.infoDays = mkOption { ··· 339 description = '' 340 Purge old files from the spooling area with 341 {file}`faxcron` with the given frequency 342 - (see systemd.time(7)). 343 ''; 344 }; 345 faxqclean.archiving = mkOption { ··· 356 `as-flagged` archives jobs that 357 have been flagged for archiving by sendfax, 358 `always` forces archiving of all jobs. 359 - See also sendfax(1) and faxqclean(8). 360 ''; 361 }; 362 faxqclean.doneqMinutes = mkOption {
··· 194 will be symlinked to the location given here. 195 This file must exist and be 196 readable only by the `uucp` user. 197 + See {manpage}`hosts.hfaxd(5)` for details. 198 This configuration permits access for all users: 199 ``` 200 environment.etc."hosts.hfaxd" = { ··· 299 description = '' 300 purging old files from the spooling area with 301 {file}`faxcron` with the given frequency 302 + (see {manpage}`systemd.time(7)`) 303 ''; 304 }; 305 faxcron.infoDays = mkOption { ··· 339 description = '' 340 Purge old files from the spooling area with 341 {file}`faxcron` with the given frequency 342 + (see {manpage}`systemd.time(7)`). 343 ''; 344 }; 345 faxqclean.archiving = mkOption { ··· 356 `as-flagged` archives jobs that 357 have been flagged for archiving by sendfax, 358 `always` forces archiving of all jobs. 359 + See also {manpage}`sendfax(1)` and {manpage}`faxqclean(8)`. 360 ''; 361 }; 362 faxqclean.doneqMinutes = mkOption {
+1 -1
nixos/modules/services/networking/minidlna.nix
··· 12 13 options.services.minidlna.settings = lib.mkOption { 14 default = {}; 15 - description = "Configuration for `minidlna.conf(5)`."; 16 type = lib.types.submodule { 17 freeformType = format.type; 18
··· 12 13 options.services.minidlna.settings = lib.mkOption { 14 default = {}; 15 + description = "Configuration for {manpage}`minidlna.conf(5)`."; 16 type = lib.types.submodule { 17 freeformType = format.type; 18
+1 -1
nixos/modules/services/networking/ngircd.nix
··· 29 enable = mkEnableOption "the ngircd IRC server"; 30 31 config = mkOption { 32 - description = "The ngircd configuration (see ngircd.conf(5))."; 33 34 type = types.lines; 35 };
··· 29 enable = mkEnableOption "the ngircd IRC server"; 30 31 config = mkOption { 32 + description = "The ngircd configuration (see {manpage}`ngircd.conf(5)`)."; 33 34 type = types.lines; 35 };
+1 -1
nixos/modules/services/networking/ntopng.nix
··· 58 interfaces and displays its findings at http://localhost:''${toString 59 config.${opt.http-port}}. Default username and password is admin/admin. 60 61 - See the ntopng(8) manual page and http://www.ntop.org/products/ntop/ 62 for more info. 63 64 Note that enabling ntopng will also enable redis (key-value
··· 58 interfaces and displays its findings at http://localhost:''${toString 59 config.${opt.http-port}}. Default username and password is admin/admin. 60 61 + See the {manpage}`ntopng(8)` manual page and http://www.ntop.org/products/ntop/ 62 for more info. 63 64 Note that enabling ntopng will also enable redis (key-value
+1 -1
nixos/modules/services/networking/pppd.nix
··· 53 config = mkOption { 54 type = types.lines; 55 default = ""; 56 - description = "pppd configuration for this peer, see the pppd(8) man page."; 57 }; 58 }; 59 }
··· 53 config = mkOption { 54 type = types.lines; 55 default = ""; 56 + description = "pppd configuration for this peer, see the {manpage}`pppd(8)` man page."; 57 }; 58 }; 59 }
+1 -1
nixos/modules/services/networking/privoxy.nix
··· 114 the disk usage, since Privoxy itself never deletes the certificates. 115 116 ::: {.note} 117 - The format is that of the `tmpfiles.d(5)` 118 Age parameter. 119 ::: 120 '';
··· 114 the disk usage, since Privoxy itself never deletes the certificates. 115 116 ::: {.note} 117 + The format is that of the {manpage}`tmpfiles.d(5)` 118 Age parameter. 119 ::: 120 '';
+1 -1
nixos/modules/services/networking/r53-ddns.nix
··· 45 type = types.str; 46 description = '' 47 File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY 48 - in the format of an EnvironmentFile as described by systemd.exec(5) 49 ''; 50 }; 51
··· 45 type = types.str; 46 description = '' 47 File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY 48 + in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)` 49 ''; 50 }; 51
+1 -1
nixos/modules/services/networking/robustirc-bridge.nix
··· 13 extraFlags = mkOption { 14 type = types.listOf types.str; 15 default = []; 16 - description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or robustirc-bridge(1) for details.''; 17 example = [ 18 "-network robustirc.net" 19 ];
··· 13 extraFlags = mkOption { 14 type = types.listOf types.str; 15 default = []; 16 + description = ''Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or {manpage}`robustirc-bridge(1)` for details.''; 17 example = [ 18 "-network robustirc.net" 19 ];
+1 -1
nixos/modules/services/networking/rpcbind.nix
··· 16 description = '' 17 Whether to enable `rpcbind`, an ONC RPC directory service 18 notably used by NFS and NIS, and which can be queried 19 - using the rpcinfo(1) command. `rpcbind` is a replacement for 20 `portmap`. 21 ''; 22 };
··· 16 description = '' 17 Whether to enable `rpcbind`, an ONC RPC directory service 18 notably used by NFS and NIS, and which can be queried 19 + using the {manpage}`rpcinfo(1)` command. `rpcbind` is a replacement for 20 `portmap`. 21 ''; 22 };
+1 -1
nixos/modules/services/networking/searx.nix
··· 56 type = types.nullOr types.path; 57 default = null; 58 description = '' 59 - Environment file (see `systemd.exec(5)` 60 "EnvironmentFile=" section for the syntax) to define variables for 61 Searx. This option can be used to safely include secret keys into the 62 Searx configuration.
··· 56 type = types.nullOr types.path; 57 default = null; 58 description = '' 59 + Environment file (see {manpage}`systemd.exec(5)` 60 "EnvironmentFile=" section for the syntax) to define variables for 61 Searx. This option can be used to safely include secret keys into the 62 Searx configuration.
+1 -1
nixos/modules/services/networking/spacecookie.nix
··· 53 description = '' 54 Address to listen on. Must be in the 55 `ListenStream=` syntax of 56 - [systemd.socket(5)](https://www.freedesktop.org/software/systemd/man/systemd.socket.html). 57 ''; 58 }; 59
··· 53 description = '' 54 Address to listen on. Must be in the 55 `ListenStream=` syntax of 56 + {manpage}`systemd.socket(5)`. 57 ''; 58 }; 59
+2 -2
nixos/modules/services/networking/ssh/sshd.nix
··· 357 type = lib.types.nullOr (lib.types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]); 358 default = "INFO"; # upstream default 359 description = '' 360 - Gives the verbosity level that is used when logging messages from sshd(8). Logging with a DEBUG level 361 violates the privacy of users and is not recommended. 362 ''; 363 }; ··· 369 # apply if cfg.useDns then "yes" else "no" 370 default = false; 371 description = '' 372 - Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for 373 the remote IP address maps back to the very same IP address. 374 If this option is set to no (the default) then only addresses and not host names may be used in 375 ~/.ssh/authorized_keys from and sshd_config Match Host directives.
··· 357 type = lib.types.nullOr (lib.types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]); 358 default = "INFO"; # upstream default 359 description = '' 360 + Gives the verbosity level that is used when logging messages from {manpage}`sshd(8)`. Logging with a DEBUG level 361 violates the privacy of users and is not recommended. 362 ''; 363 }; ··· 369 # apply if cfg.useDns then "yes" else "no" 370 default = false; 371 description = '' 372 + Specifies whether {manpage}`sshd(8)` should look up the remote host name, and to check that the resolved host name for 373 the remote IP address maps back to the very same IP address. 374 If this option is set to no (the default) then only addresses and not host names may be used in 375 ~/.ssh/authorized_keys from and sshd_config Match Host directives.
+1 -1
nixos/modules/services/networking/tinydns.nix
··· 16 data = mkOption { 17 type = types.lines; 18 default = ""; 19 - description = "The DNS data to serve, in the format described by tinydns-data(8)"; 20 }; 21 22 ip = mkOption {
··· 16 data = mkOption { 17 type = types.lines; 18 default = ""; 19 + description = "The DNS data to serve, in the format described by {manpage}`tinydns-data(8)`"; 20 }; 21 22 ip = mkOption {
+3 -3
nixos/modules/services/security/clamav.nix
··· 53 type = lib.types.str; 54 default = "hourly"; 55 description = '' 56 - How often freshclam is invoked. See systemd.time(7) for more 57 information about the format. 58 ''; 59 }; ··· 74 type = lib.types.str; 75 default = "hourly"; 76 description = '' 77 - How often freshclam is invoked. See systemd.time(7) for more 78 information about the format. 79 ''; 80 }; ··· 105 type = lib.types.str; 106 default = "*-*-* 04:00:00"; 107 description = '' 108 - How often clamdscan is invoked. See systemd.time(7) for more 109 information about the format. 110 By default this runs using 10 cores at most, be sure to run it at a time of low traffic. 111 '';
··· 53 type = lib.types.str; 54 default = "hourly"; 55 description = '' 56 + How often freshclam is invoked. See {manpage}`systemd.time(7)` for more 57 information about the format. 58 ''; 59 }; ··· 74 type = lib.types.str; 75 default = "hourly"; 76 description = '' 77 + How often freshclam is invoked. See {manpage}`systemd.time(7)` for more 78 information about the format. 79 ''; 80 }; ··· 105 type = lib.types.str; 106 default = "*-*-* 04:00:00"; 107 description = '' 108 + How often clamdscan is invoked. See {manpage}`systemd.time(7)` for more 109 information about the format. 110 By default this runs using 10 cores at most, be sure to run it at a time of low traffic. 111 '';
+1 -1
nixos/modules/services/torrent/transmission.nix
··· 181 defaultText = literalExpression "if cfg.package == pkgs.transmission_3 then 18 else \"022\""; 182 description = '' 183 Sets transmission's file mode creation mask. 184 - See the umask(2) manpage for more information. 185 Users who want their saved torrents to be world-writable 186 may want to set this value to 0/`"000"`. 187
··· 181 defaultText = literalExpression "if cfg.package == pkgs.transmission_3 then 18 else \"022\""; 182 description = '' 183 Sets transmission's file mode creation mask. 184 + See the {manpage}`umask(2)` manpage for more information. 185 Users who want their saved torrents to be world-writable 186 may want to set this value to 0/`"000"`. 187
+8 -8
nixos/modules/services/web-apps/cloudlog.nix
··· 173 type = str; 174 default = "daily"; 175 description = '' 176 - Specification (in the format described by systemd.time(7)) of the 177 time at which the LoTW upload will occur. 178 ''; 179 }; ··· 191 type = str; 192 default = "daily"; 193 description = '' 194 - Specification (in the format described by systemd.time(7)) of the time 195 at which the Clublog upload will occur. 196 ''; 197 }; ··· 210 type = str; 211 default = "weekly"; 212 description = '' 213 - Specification (in the format described by systemd.time(7)) of the 214 time at which the LoTW user update will occur. 215 ''; 216 }; ··· 228 type = str; 229 default = "monthly"; 230 description = '' 231 - Specification (in the format described by systemd.time(7)) of the 232 time at which the DOK update will occur. 233 ''; 234 }; ··· 247 type = str; 248 default = "monthly"; 249 description = '' 250 - Specification (in the format described by systemd.time(7)) of the time 251 at which the Clublog SCP update will occur. 252 ''; 253 }; ··· 266 type = str; 267 default = "monthly"; 268 description = '' 269 - Specification (in the format described by systemd.time(7)) of the time 270 at which the WWFF update will occur. 271 ''; 272 }; ··· 284 type = str; 285 default = "daily"; 286 description = '' 287 - Specification (in the format described by systemd.time(7)) of the 288 time at which the QRZ upload will occur. 289 ''; 290 }; ··· 302 type = str; 303 default = "monthly"; 304 description = '' 305 - Specification (in the format described by systemd.time(7)) of the time 306 at which the SOTA update will occur. 307 ''; 308 };
··· 173 type = str; 174 default = "daily"; 175 description = '' 176 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 177 time at which the LoTW upload will occur. 178 ''; 179 }; ··· 191 type = str; 192 default = "daily"; 193 description = '' 194 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 195 at which the Clublog upload will occur. 196 ''; 197 }; ··· 210 type = str; 211 default = "weekly"; 212 description = '' 213 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 214 time at which the LoTW user update will occur. 215 ''; 216 }; ··· 228 type = str; 229 default = "monthly"; 230 description = '' 231 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 232 time at which the DOK update will occur. 233 ''; 234 }; ··· 247 type = str; 248 default = "monthly"; 249 description = '' 250 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 251 at which the Clublog SCP update will occur. 252 ''; 253 }; ··· 266 type = str; 267 default = "monthly"; 268 description = '' 269 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 270 at which the WWFF update will occur. 271 ''; 272 }; ··· 284 type = str; 285 default = "daily"; 286 description = '' 287 + Specification (in the format described by {manpage}`systemd.time(7)`) of the 288 time at which the QRZ upload will occur. 289 ''; 290 }; ··· 302 type = str; 303 default = "monthly"; 304 description = '' 305 + Specification (in the format described by {manpage}`systemd.time(7)`) of the time 306 at which the SOTA update will occur. 307 ''; 308 };
+1 -1
nixos/modules/services/web-apps/dex.nix
··· 51 type = types.nullOr types.path; 52 default = null; 53 description = '' 54 - Environment file (see `systemd.exec(5)` 55 "EnvironmentFile=" section for the syntax) to define variables for dex. 56 This option can be used to safely include secret keys into the dex configuration. 57 '';
··· 51 type = types.nullOr types.path; 52 default = null; 53 description = '' 54 + Environment file (see {manpage}`systemd.exec(5)` 55 "EnvironmentFile=" section for the syntax) to define variables for dex. 56 This option can be used to safely include secret keys into the dex configuration. 57 '';
+1 -1
nixos/modules/services/web-apps/gotosocial.nix
··· 80 type = lib.types.nullOr lib.types.path; 81 description = '' 82 File path containing environment variables for configuring the GoToSocial service 83 - in the format of an EnvironmentFile as described by systemd.exec(5). 84 85 This option could be used to pass sensitive configuration to the GoToSocial daemon. 86
··· 80 type = lib.types.nullOr lib.types.path; 81 description = '' 82 File path containing environment variables for configuring the GoToSocial service 83 + in the format of an EnvironmentFile as described by {manpage}`systemd.exec(5)`. 84 85 This option could be used to pass sensitive configuration to the GoToSocial daemon. 86
+1 -1
nixos/modules/services/web-apps/miniflux.nix
··· 72 description = '' 73 File containing the ADMIN_USERNAME and 74 ADMIN_PASSWORD (length >= 6) in the format of 75 - an EnvironmentFile=, as described by systemd.exec(5). 76 ''; 77 example = "/etc/nixos/miniflux-admin-credentials"; 78 };
··· 72 description = '' 73 File containing the ADMIN_USERNAME and 74 ADMIN_PASSWORD (length >= 6) in the format of 75 + an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`. 76 ''; 77 example = "/etc/nixos/miniflux-admin-credentials"; 78 };
+233
nixos/modules/services/web-apps/pds.nix
···
··· 1 + { 2 + lib, 3 + pkgs, 4 + config, 5 + ... 6 + }: 7 + let 8 + cfg = config.services.pds; 9 + 10 + inherit (lib) 11 + getExe 12 + mkEnableOption 13 + mkIf 14 + mkOption 15 + mkPackageOption 16 + escapeShellArgs 17 + concatMapStringsSep 18 + types 19 + literalExpression 20 + ; 21 + 22 + pdsadminWrapper = 23 + let 24 + cfgSystemd = config.systemd.services.pds.serviceConfig; 25 + in 26 + pkgs.writeShellScriptBin "pdsadmin" '' 27 + DUMMY_PDS_ENV_FILE="$(mktemp)" 28 + trap 'rm -f "$DUMMY_PDS_ENV_FILE"' EXIT 29 + env "PDS_ENV_FILE=$DUMMY_PDS_ENV_FILE" \ 30 + ${escapeShellArgs cfgSystemd.Environment} \ 31 + ${concatMapStringsSep " " (envFile: "$(cat ${envFile})") cfgSystemd.EnvironmentFile} \ 32 + ${getExe pkgs.pdsadmin} "$@" 33 + ''; 34 + in 35 + # All defaults are from https://github.com/bluesky-social/pds/blob/8b9fc24cec5f30066b0d0b86d2b0ba3d66c2b532/installer.sh 36 + { 37 + options.services.pds = { 38 + enable = mkEnableOption "pds"; 39 + 40 + package = mkPackageOption pkgs "pds" { }; 41 + 42 + settings = mkOption { 43 + type = types.submodule { 44 + freeformType = types.attrsOf ( 45 + types.oneOf [ 46 + (types.nullOr types.str) 47 + types.port 48 + ] 49 + ); 50 + options = { 51 + PDS_PORT = mkOption { 52 + type = types.port; 53 + default = 3000; 54 + description = "Port to listen on"; 55 + }; 56 + 57 + PDS_HOSTNAME = mkOption { 58 + type = types.str; 59 + example = "pds.example.com"; 60 + description = "Instance hostname (base domain name)"; 61 + }; 62 + 63 + PDS_BLOB_UPLOAD_LIMIT = mkOption { 64 + type = types.str; 65 + default = "52428800"; 66 + description = "Size limit of uploaded blobs in bytes"; 67 + }; 68 + 69 + PDS_DID_PLC_URL = mkOption { 70 + type = types.str; 71 + default = "https://plc.directory"; 72 + description = "URL of DID PLC directory"; 73 + }; 74 + 75 + PDS_BSKY_APP_VIEW_URL = mkOption { 76 + type = types.str; 77 + default = "https://api.bsky.app"; 78 + description = "URL of bsky frontend"; 79 + }; 80 + 81 + PDS_BSKY_APP_VIEW_DID = mkOption { 82 + type = types.str; 83 + default = "did:web:api.bsky.app"; 84 + description = "DID of bsky frontend"; 85 + }; 86 + 87 + PDS_REPORT_SERVICE_URL = mkOption { 88 + type = types.str; 89 + default = "https://mod.bsky.app"; 90 + description = "URL of mod service"; 91 + }; 92 + 93 + PDS_REPORT_SERVICE_DID = mkOption { 94 + type = types.str; 95 + default = "did:plc:ar7c4by46qjdydhdevvrndac"; 96 + description = "DID of mod service"; 97 + }; 98 + 99 + PDS_CRAWLERS = mkOption { 100 + type = types.str; 101 + default = "https://bsky.network"; 102 + description = "URL of crawlers"; 103 + }; 104 + 105 + PDS_DATA_DIRECTORY = mkOption { 106 + type = types.str; 107 + default = "/var/lib/pds"; 108 + description = "Directory to store state"; 109 + }; 110 + 111 + PDS_BLOBSTORE_DISK_LOCATION = mkOption { 112 + type = types.nullOr types.str; 113 + default = "/var/lib/pds/blocks"; 114 + description = "Store blobs at this location, set to null to use e.g. S3"; 115 + }; 116 + 117 + LOG_ENABLED = mkOption { 118 + type = types.nullOr types.str; 119 + default = "true"; 120 + description = "Enable logging"; 121 + }; 122 + }; 123 + }; 124 + 125 + description = '' 126 + Environment variables to set for the service. Secrets should be 127 + specified using {option}`environmentFile`. 128 + 129 + Refer to <https://github.com/bluesky-social/atproto/blob/main/packages/pds/src/config/env.ts> for available environment variables. 130 + ''; 131 + }; 132 + 133 + environmentFiles = mkOption { 134 + type = types.listOf types.path; 135 + default = [ ]; 136 + description = '' 137 + File to load environment variables from. Loaded variables override 138 + values set in {option}`environment`. 139 + 140 + Use it to set values of `PDS_JWT_SECRET`, `PDS_ADMIN_PASSWORD`, 141 + and `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX` secrets. 142 + `PDS_JWT_SECRET` and `PDS_ADMIN_PASSWORD` can be generated with 143 + ``` 144 + openssl rand --hex 16 145 + ``` 146 + `PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX` can be generated with 147 + ``` 148 + openssl ecparam --name secp256k1 --genkey --noout --outform DER | tail --bytes=+8 | head --bytes=32 | xxd --plain --cols 32 149 + ``` 150 + ''; 151 + }; 152 + 153 + pdsadmin = { 154 + enable = mkOption { 155 + type = types.bool; 156 + default = cfg.enable; 157 + defaultText = literalExpression "config.services.pds.enable"; 158 + description = "Add pdsadmin script to PATH"; 159 + }; 160 + }; 161 + }; 162 + 163 + config = mkIf cfg.enable { 164 + environment = mkIf cfg.pdsadmin.enable { 165 + systemPackages = [ pdsadminWrapper ]; 166 + }; 167 + 168 + systemd.services.pds = { 169 + description = "pds"; 170 + 171 + after = [ "network-online.target" ]; 172 + wants = [ "network-online.target" ]; 173 + wantedBy = [ "multi-user.target" ]; 174 + 175 + serviceConfig = { 176 + ExecStart = getExe cfg.package; 177 + Environment = lib.mapAttrsToList (k: v: "${k}=${if builtins.isInt v then toString v else v}") ( 178 + lib.filterAttrs (_: v: v != null) cfg.settings 179 + ); 180 + 181 + EnvironmentFile = cfg.environmentFiles; 182 + User = "pds"; 183 + Group = "pds"; 184 + StateDirectory = "pds"; 185 + StateDirectoryMode = "0755"; 186 + Restart = "always"; 187 + 188 + # Hardening 189 + RemoveIPC = true; 190 + CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; 191 + NoNewPrivileges = true; 192 + PrivateDevices = true; 193 + ProtectClock = true; 194 + ProtectKernelLogs = true; 195 + ProtectControlGroups = true; 196 + ProtectKernelModules = true; 197 + PrivateMounts = true; 198 + SystemCallArchitectures = [ "native" ]; 199 + MemoryDenyWriteExecute = false; # required by V8 JIT 200 + RestrictNamespaces = true; 201 + RestrictSUIDSGID = true; 202 + ProtectHostname = true; 203 + LockPersonality = true; 204 + ProtectKernelTunables = true; 205 + RestrictAddressFamilies = [ 206 + "AF_UNIX" 207 + "AF_INET" 208 + "AF_INET6" 209 + ]; 210 + RestrictRealtime = true; 211 + DeviceAllow = [ "" ]; 212 + ProtectSystem = "strict"; 213 + ProtectProc = "invisible"; 214 + ProcSubset = "pid"; 215 + ProtectHome = true; 216 + PrivateUsers = true; 217 + PrivateTmp = true; 218 + UMask = "0077"; 219 + }; 220 + }; 221 + 222 + users = { 223 + users.pds = { 224 + group = "pds"; 225 + isSystemUser = true; 226 + }; 227 + groups.pds = { }; 228 + }; 229 + 230 + }; 231 + 232 + meta.maintainers = with lib.maintainers; [ t4ccer ]; 233 + }
+1 -1
nixos/modules/services/web-servers/merecat.nix
··· 30 inherit (format) type; 31 default = { }; 32 description = '' 33 - Merecat configuration. Refer to merecat(8) for details on supported values. 34 ''; 35 example = { 36 hostname = "localhost";
··· 30 inherit (format) type; 31 default = { }; 32 description = '' 33 + Merecat configuration. Refer to {manpage}`merecat(8)` for details on supported values. 34 ''; 35 example = { 36 hostname = "localhost";
+1 -1
nixos/modules/services/web-servers/minio.nix
··· 72 description = '' 73 File containing the MINIO_ROOT_USER, default is "minioadmin", and 74 MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of 75 - an EnvironmentFile=, as described by systemd.exec(5). 76 ''; 77 example = "/etc/nixos/minio-root-credentials"; 78 };
··· 72 description = '' 73 File containing the MINIO_ROOT_USER, default is "minioadmin", and 74 MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of 75 + an EnvironmentFile=, as described by {manpage}`systemd.exec(5)`. 76 ''; 77 example = "/etc/nixos/minio-root-credentials"; 78 };
+1 -1
nixos/modules/services/web-servers/pomerium.nix
··· 50 default = null; 51 description = '' 52 Path to file containing secrets for Pomerium, in systemd 53 - EnvironmentFile format. See the systemd.exec(5) man page. 54 ''; 55 }; 56 };
··· 50 default = null; 51 description = '' 52 Path to file containing secrets for Pomerium, in systemd 53 + EnvironmentFile format. See the {manpage}`systemd.exec(5)` man page. 54 ''; 55 }; 56 };
+1 -1
nixos/modules/services/web-servers/uwsgi.nix
··· 200 ''; 201 description = '' 202 Grant capabilities to the uWSGI instance. See the 203 - `capabilities(7)` for available values. 204 205 ::: {.note} 206 uWSGI runs as an unprivileged user (even as Emperor) with the minimal
··· 200 ''; 201 description = '' 202 Grant capabilities to the uWSGI instance. See the 203 + {manpage}`capabilities(7)` for available values. 204 205 ::: {.note} 206 uWSGI runs as an unprivileged user (even as Emperor) with the minimal
+1 -1
nixos/modules/services/x11/display-managers/startx.nix
··· 27 which allows users to start X manually via the "startx" command 28 from a vt shell. The X server runs under the user's id, not as root. 29 The user must provide a ~/.xinitrc file containing session startup 30 - commands, see startx(1). This is not automatically generated 31 from the desktopManager and windowManager settings. 32 ''; 33 };
··· 27 which allows users to start X manually via the "startx" command 28 from a vt shell. The X server runs under the user's id, not as root. 29 The user must provide a ~/.xinitrc file containing session startup 30 + commands, see {manpage}`startx(1)`. This is not automatically generated 31 from the desktopManager and windowManager settings. 32 ''; 33 };
+1 -1
nixos/modules/services/x11/display-managers/sx.nix
··· 18 to start manually via the "sx" command from a vt shell. The X server 19 runs under the user's id, not as root. The user must provide a 20 ~/.config/sx/sxrc file containing session startup commands, see 21 - sx(1). This is not automatically generated from the desktopManager 22 and windowManager settings. sx doesn't have a way to directly set 23 X server flags, but it can be done by overriding its xorgserver 24 dependency.
··· 18 to start manually via the "sx" command from a vt shell. The X server 19 runs under the user's id, not as root. The user must provide a 20 ~/.config/sx/sxrc file containing session startup commands, see 21 + {manpage}`sx(1)`. This is not automatically generated from the desktopManager 22 and windowManager settings. sx doesn't have a way to directly set 23 X server flags, but it can be done by overriding its xorgserver 24 dependency.
+3 -3
nixos/modules/services/x11/picom.nix
··· 126 ]; 127 description = '' 128 List of conditions of windows that should not be faded. 129 - See `picom(1)` man page for more examples. 130 ''; 131 }; 132 ··· 172 ]; 173 description = '' 174 List of conditions of windows that should have no shadow. 175 - See `picom(1)` man page for more examples. 176 ''; 177 }; 178 ··· 326 description = '' 327 Picom settings. Use this option to configure Picom settings not exposed 328 in a NixOS option or to bypass one. For the available options see the 329 - CONFIGURATION FILES section at `picom(1)`. 330 ''; 331 }; 332 };
··· 126 ]; 127 description = '' 128 List of conditions of windows that should not be faded. 129 + See {manpage}`picom(1)` man page for more examples. 130 ''; 131 }; 132 ··· 172 ]; 173 description = '' 174 List of conditions of windows that should have no shadow. 175 + See {manpage}`picom(1)` man page for more examples. 176 ''; 177 }; 178 ··· 326 description = '' 327 Picom settings. Use this option to configure Picom settings not exposed 328 in a NixOS option or to bypass one. For the available options see the 329 + CONFIGURATION FILES section at {manpage}`picom(1)`. 330 ''; 331 }; 332 };
+1 -1
nixos/modules/system/activation/activation-script.nix
··· 203 type = types.nullOr types.path; 204 visible = false; 205 description = '' 206 - The env(1) executable that is linked system-wide to 207 `/usr/bin/env`. 208 ''; 209 };
··· 203 type = types.nullOr types.path; 204 visible = false; 205 description = '' 206 + The {manpage}`env(1)` executable that is linked system-wide to 207 `/usr/bin/env`. 208 ''; 209 };
+1 -1
nixos/modules/system/boot/systemd/coredump.nix
··· 29 type = types.lines; 30 example = "Storage=journal"; 31 description = '' 32 - Extra config options for systemd-coredump. See coredump.conf(5) man page 33 for available options. 34 ''; 35 };
··· 29 type = types.lines; 30 example = "Storage=journal"; 31 description = '' 32 + Extra config options for systemd-coredump. See {manpage}`coredump.conf(5)` man page 33 for available options. 34 ''; 35 };
+1 -1
nixos/modules/system/boot/systemd/initrd.nix
··· 163 type = types.lines; 164 example = "DefaultLimitCORE=infinity"; 165 description = '' 166 - Extra config options for systemd. See systemd-system.conf(5) man page 167 for available options. 168 ''; 169 };
··· 163 type = types.lines; 164 example = "DefaultLimitCORE=infinity"; 165 description = '' 166 + Extra config options for systemd. See {manpage}`systemd-system.conf(5)` man page 167 for available options. 168 ''; 169 };
+1 -1
nixos/modules/system/boot/systemd/logind.nix
··· 29 example = "IdleAction=lock"; 30 description = '' 31 Extra config options for systemd-logind. 32 - See [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html) 33 for available options. 34 ''; 35 };
··· 29 example = "IdleAction=lock"; 30 description = '' 31 Extra config options for systemd-logind. 32 + See {manpage}`logind.conf(5)` 33 for available options. 34 ''; 35 };
+2 -2
nixos/modules/system/boot/timesyncd.nix
··· 28 `timesyncd.conf` file as opposed to setting this option to null which 29 will remove `NTP=` entirely. 30 31 - See man:timesyncd.conf(5) for details. 32 ''; 33 }; 34 fallbackServers = mkOption { ··· 42 `timesyncd.conf` file as opposed to setting this option to null which 43 will remove `FallbackNTP=` entirely. 44 45 - See man:timesyncd.conf(5) for details. 46 ''; 47 }; 48 extraConfig = mkOption {
··· 28 `timesyncd.conf` file as opposed to setting this option to null which 29 will remove `NTP=` entirely. 30 31 + See {manpage}`timesyncd.conf(5)` for details. 32 ''; 33 }; 34 fallbackServers = mkOption { ··· 42 `timesyncd.conf` file as opposed to setting this option to null which 43 will remove `FallbackNTP=` entirely. 44 45 + See {manpage}`timesyncd.conf(5)` for details. 46 ''; 47 }; 48 extraConfig = mkOption {
+1 -1
nixos/modules/tasks/filesystems/nfs.nix
··· 99 default = { }; 100 description = '' 101 General configuration for NFS daemons and tools. 102 - See nfs.conf(5) and related man pages for details. 103 ''; 104 example = lib.literalExpression '' 105 {
··· 99 default = { }; 100 description = '' 101 General configuration for NFS daemons and tools. 102 + See {manpage}`nfs.conf(5)` and related man pages for details. 103 ''; 104 example = lib.literalExpression '' 105 {
+2 -2
nixos/modules/tasks/network-interfaces.nix
··· 97 default = null; 98 description = '' 99 Type of the route. See the `Route types` section 100 - in the `ip-route(8)` manual page for the details. 101 102 Note that `prohibit`, `blackhole`, 103 `unreachable`, and `throw` cannot ··· 118 example = { mtu = "1492"; window = "524288"; }; 119 description = '' 120 Other route options. See the symbol `OPTIONS` 121 - in the `ip-route(8)` manual page for the details. 122 You may also specify `metric`, 123 `src`, `protocol`, 124 `scope`, `from`
··· 97 default = null; 98 description = '' 99 Type of the route. See the `Route types` section 100 + in the {manpage}`ip-route(8)` manual page for the details. 101 102 Note that `prohibit`, `blackhole`, 103 `unreachable`, and `throw` cannot ··· 118 example = { mtu = "1492"; window = "524288"; }; 119 description = '' 120 Other route options. See the symbol `OPTIONS` 121 + in the {manpage}`ip-route(8)` manual page for the details. 122 You may also specify `metric`, 123 `src`, `protocol`, 124 `scope`, `from`
+1 -1
nixos/modules/virtualisation/docker.nix
··· 34 default = ["/run/docker.sock"]; 35 description = '' 36 A list of unix and tcp docker should listen to. The format follows 37 - ListenStream as described in systemd.socket(5). 38 ''; 39 }; 40
··· 34 default = ["/run/docker.sock"]; 35 description = '' 36 A list of unix and tcp docker should listen to. The format follows 37 + ListenStream as described in {manpage}`systemd.socket(5)`. 38 ''; 39 }; 40
+5 -5
nixos/modules/virtualisation/nixos-containers.nix
··· 349 Device node access modifier. Takes a combination 350 `r` (read), `w` (write), and 351 `m` (mknod). See the 352 - `systemd.resource-control(5)` man page for more 353 information.''; 354 }; 355 }; ··· 563 example = [ "CAP_NET_ADMIN" "CAP_MKNOD" ]; 564 description = '' 565 Grant additional capabilities to the container. See the 566 - capabilities(7) and systemd-nspawn(1) man pages for more 567 information. 568 ''; 569 }; ··· 644 shall run in. The specified path should refer to a (possibly bind-mounted) network 645 namespace file, as exposed by the kernel below /proc/<PID>/ns/net. This makes the 646 container enter the given network namespace. One of the typical use cases is to give 647 - a network namespace under /run/netns created by ip-netns(8). 648 Note that this option cannot be used together with other network-related options, 649 such as --private-network or --network-interface=. 650 ''; ··· 737 Mounts a set of tmpfs file systems into the container. 738 Multiple paths can be specified. 739 Valid items must conform to the --tmpfs argument 740 - of systemd-nspawn. See systemd-nspawn(1) for details. 741 ''; 742 }; 743 ··· 747 example = [ "--drop-capability=CAP_SYS_CHROOT" ]; 748 description = '' 749 Extra flags passed to the systemd-nspawn command. 750 - See systemd-nspawn(1) for details. 751 ''; 752 }; 753
··· 349 Device node access modifier. Takes a combination 350 `r` (read), `w` (write), and 351 `m` (mknod). See the 352 + {manpage}`systemd.resource-control(5)` man page for more 353 information.''; 354 }; 355 }; ··· 563 example = [ "CAP_NET_ADMIN" "CAP_MKNOD" ]; 564 description = '' 565 Grant additional capabilities to the container. See the 566 + {manpage}`capabilities(7)` and {manpage}`systemd-nspawn(1)` man pages for more 567 information. 568 ''; 569 }; ··· 644 shall run in. The specified path should refer to a (possibly bind-mounted) network 645 namespace file, as exposed by the kernel below /proc/<PID>/ns/net. This makes the 646 container enter the given network namespace. One of the typical use cases is to give 647 + a network namespace under /run/netns created by {manpage}`ip-netns(8)`. 648 Note that this option cannot be used together with other network-related options, 649 such as --private-network or --network-interface=. 650 ''; ··· 737 Mounts a set of tmpfs file systems into the container. 738 Multiple paths can be specified. 739 Valid items must conform to the --tmpfs argument 740 + of systemd-nspawn. See {manpage}`systemd-nspawn(1)` for details. 741 ''; 742 }; 743 ··· 747 example = [ "--drop-capability=CAP_SYS_CHROOT" ]; 748 description = '' 749 Extra flags passed to the systemd-nspawn command. 750 + See {manpage}`systemd-nspawn(1)` for details. 751 ''; 752 }; 753
+1 -1
nixos/modules/virtualisation/oci-containers.nix
··· 155 [Docker engine documentation](https://docs.docker.com/engine/logging/configure/) 156 157 For Podman: 158 - Refer to the docker-run(1) man page. 159 ''; 160 }; 161
··· 155 [Docker engine documentation](https://docs.docker.com/engine/logging/configure/) 156 157 For Podman: 158 + Refer to the {manpage}`docker-run(1)` man page. 159 ''; 160 }; 161
+1 -1
nixos/modules/virtualisation/waagent.nix
··· 151 ]; 152 description = '' 153 This option specifies disk mount options to be passed to the `mount -o` command. 154 - For more information, see the `mount(8)` manual page. 155 ''; 156 }; 157
··· 151 ]; 152 description = '' 153 This option specifies disk mount options to be passed to the `mount -o` command. 154 + For more information, see the {manpage}`mount(8)` manual page. 155 ''; 156 }; 157
+1
nixos/tests/all-tests.nix
··· 810 parsedmarc = handleTest ./parsedmarc {}; 811 password-option-override-ordering = handleTest ./password-option-override-ordering.nix {}; 812 pdns-recursor = handleTest ./pdns-recursor.nix {}; 813 peerflix = handleTest ./peerflix.nix {}; 814 peering-manager = handleTest ./web-apps/peering-manager.nix {}; 815 peertube = handleTestOn ["x86_64-linux"] ./web-apps/peertube.nix {};
··· 810 parsedmarc = handleTest ./parsedmarc {}; 811 password-option-override-ordering = handleTest ./password-option-override-ordering.nix {}; 812 pdns-recursor = handleTest ./pdns-recursor.nix {}; 813 + pds = handleTest ./pds.nix {}; 814 peerflix = handleTest ./peerflix.nix {}; 815 peering-manager = handleTest ./web-apps/peering-manager.nix {}; 816 peertube = handleTestOn ["x86_64-linux"] ./web-apps/peertube.nix {};
+29
nixos/tests/pds.nix
···
··· 1 + import ./make-test-python.nix ( 2 + { lib, ... }: 3 + { 4 + name = "PDS"; 5 + 6 + nodes.machine = { 7 + services.pds = { 8 + enable = true; 9 + settings = { 10 + PDS_PORT = 3000; 11 + PDS_HOSTNAME = "example.com"; 12 + 13 + # Snake oil testing credentials 14 + PDS_JWT_SECRET = "7b93fee53be046bf59c27a32a0fb2069"; 15 + PDS_ADMIN_PASSWORD = "3a4077bc0d5f04eca945ef0509f7e809"; 16 + PDS_PLC_ROTATION_KEY_K256_PRIVATE_KEY_HEX = "ae4f5028d04c833ba630f29debd5ff80b7700e43e9f4bf70f729a88cd6a6ce35"; 17 + }; 18 + }; 19 + }; 20 + 21 + testScript = '' 22 + machine.wait_for_unit("pds.service") 23 + machine.wait_for_open_port(3000) 24 + machine.succeed("curl --fail http://localhost:3000") 25 + ''; 26 + 27 + meta.maintainers = with lib.maintainers; [ t4ccer ]; 28 + } 29 + )
+12
pkgs/applications/editors/vim/plugins/generated.nix
··· 1302 meta.homepage = "https://github.com/Saghen/blink.compat/"; 1303 }; 1304 1305 blink-emoji-nvim = buildVimPlugin { 1306 pname = "blink-emoji.nvim"; 1307 version = "2025-01-04";
··· 1302 meta.homepage = "https://github.com/Saghen/blink.compat/"; 1303 }; 1304 1305 + blink-copilot = buildVimPlugin { 1306 + pname = "blink-copilot"; 1307 + version = "2025-01-27"; 1308 + src = fetchFromGitHub { 1309 + owner = "fang2hou"; 1310 + repo = "blink-copilot"; 1311 + rev = "7e63f20b8e96191e5c87bf96fc35da3547993be2"; 1312 + sha256 = "10lm90xa7w3ww94acivshnzkp4q2bfrq9zff2z5amrp3cxlga0rf"; 1313 + }; 1314 + meta.homepage = "https://github.com/fang2hou/blink-copilot/"; 1315 + }; 1316 + 1317 blink-emoji-nvim = buildVimPlugin { 1318 pname = "blink-emoji.nvim"; 1319 version = "2025-01-04";
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 105 https://github.com/LunarVim/bigfile.nvim/,, 106 https://github.com/APZelos/blamer.nvim/,HEAD, 107 https://github.com/giuxtaposition/blink-cmp-copilot/,HEAD, 108 https://github.com/moyiz/blink-emoji.nvim/,HEAD, 109 https://github.com/mikavilpas/blink-ripgrep.nvim/,HEAD, 110 https://github.com/Saghen/blink.compat/,HEAD,
··· 105 https://github.com/LunarVim/bigfile.nvim/,, 106 https://github.com/APZelos/blamer.nvim/,HEAD, 107 https://github.com/giuxtaposition/blink-cmp-copilot/,HEAD, 108 + https://github.com/fang2hou/blink-copilot/,HEAD, 109 https://github.com/moyiz/blink-emoji.nvim/,HEAD, 110 https://github.com/mikavilpas/blink-ripgrep.nvim/,HEAD, 111 https://github.com/Saghen/blink.compat/,HEAD,
+2 -1
pkgs/applications/emulators/cdemu/vhba.nix
··· 3 stdenv, 4 fetchurl, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 14 hash = "sha256-zjTLriw2zvjX0Jxfa9QtaHG5tTC7cLTKEA+WSCP+Dpg="; 15 }; 16 17 - makeFlags = kernel.moduleMakeFlags ++ [ 18 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 19 "INSTALL_MOD_PATH=$(out)" 20 ];
··· 3 stdenv, 4 fetchurl, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 15 hash = "sha256-zjTLriw2zvjX0Jxfa9QtaHG5tTC7cLTKEA+WSCP+Dpg="; 16 }; 17 18 + makeFlags = kernelModuleMakeFlags ++ [ 19 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 20 "INSTALL_MOD_PATH=$(out)" 21 ];
+2 -2
pkgs/applications/misc/ArchiSteamFarm/default.nix
··· 11 buildDotnetModule rec { 12 pname = "ArchiSteamFarm"; 13 # nixpkgs-update: no auto update 14 - version = "6.1.0.3"; 15 16 src = fetchFromGitHub { 17 owner = "JustArchiNET"; 18 repo = "ArchiSteamFarm"; 19 rev = version; 20 - hash = "sha256-3NOeKdXb1tz4qx+tCs6QKfze2KLfyodKwt/aNx6tLvI="; 21 }; 22 23 dotnet-runtime = dotnetCorePackages.aspnetcore_9_0;
··· 11 buildDotnetModule rec { 12 pname = "ArchiSteamFarm"; 13 # nixpkgs-update: no auto update 14 + version = "6.1.1.3"; 15 16 src = fetchFromGitHub { 17 owner = "JustArchiNET"; 18 repo = "ArchiSteamFarm"; 19 rev = version; 20 + hash = "sha256-e0LzM0N5N7BHyQDRQIPziQrAilJN1aUttKyLod/T8rU="; 21 }; 22 23 dotnet-runtime = dotnetCorePackages.aspnetcore_9_0;
+44 -54
pkgs/applications/misc/ArchiSteamFarm/deps.json
··· 281 }, 282 { 283 "pname": "Markdig.Signed", 284 - "version": "0.38.0", 285 - "hash": "sha256-yhO/GFoKdE/Z9SZPyGFe7DlnSd8dcAohqJNFqSqKLnk=" 286 }, 287 { 288 "pname": "Microsoft.ApplicationInsights", ··· 296 }, 297 { 298 "pname": "Microsoft.CodeAnalysis.ResxSourceGenerator", 299 - "version": "3.11.0-beta1.24508.2", 300 - "hash": "sha256-TpqR8oedeRXdPxwhesXwWU+FimbVcj1+WThE3iQe+zo=" 301 }, 302 { 303 "pname": "Microsoft.CodeCoverage", 304 - "version": "17.11.1", 305 - "hash": "sha256-1dLlK3NGh88PuFYZiYpT+izA96etxhU3BSgixDgdtGA=" 306 }, 307 { 308 "pname": "Microsoft.Extensions.ApiDescription.Server", ··· 446 }, 447 { 448 "pname": "Microsoft.NET.Test.Sdk", 449 - "version": "17.11.1", 450 - "hash": "sha256-0JUEucQ2lzaPgkrjm/NFLBTbqU1dfhvhN3Tl3moE6mI=" 451 }, 452 { 453 "pname": "Microsoft.NETCore.Platforms", ··· 461 }, 462 { 463 "pname": "Microsoft.Testing.Extensions.Telemetry", 464 - "version": "1.4.3", 465 - "hash": "sha256-oZ+AsyGdjWDoYx+nkveuniU4yB1DZ3bjgOgnucEtbnc=" 466 }, 467 { 468 "pname": "Microsoft.Testing.Extensions.TrxReport.Abstractions", 469 - "version": "1.4.3", 470 - "hash": "sha256-Q3E2sfTL6VvuK1X2JQsNqUTS9AtpnH9mf2aXMj09bz8=" 471 }, 472 { 473 "pname": "Microsoft.Testing.Extensions.VSTestBridge", 474 - "version": "1.4.3", 475 - "hash": "sha256-Sjx7GBgLYtX0nmjmViZHWVHwIZnL8aj+ivDK58GbA8k=" 476 }, 477 { 478 "pname": "Microsoft.Testing.Platform", 479 - "version": "1.4.3", 480 - "hash": "sha256-KqB3+uBGl0edpaGl6Qykubb3OrVTs6IcPWc59UQ/Iww=" 481 }, 482 { 483 "pname": "Microsoft.Testing.Platform.MSBuild", 484 - "version": "1.4.3", 485 - "hash": "sha256-289hhblU55kDvzbiSQAFSxOyht1MlXT4e+bEQyQqils=" 486 }, 487 { 488 "pname": "Microsoft.TestPlatform.ObjectModel", 489 - "version": "17.11.1", 490 - "hash": "sha256-5vX+vCzFY3S7xfMVIv8OlMMFtdedW9UIJzc0WEc+vm4=" 491 }, 492 { 493 "pname": "Microsoft.TestPlatform.TestHost", 494 - "version": "17.11.1", 495 - "hash": "sha256-wSkY0H1fQAq0H3LcKT4u7Y5RzhAAPa6yueVN84g8HxU=" 496 }, 497 { 498 "pname": "Microsoft.Win32.Registry", ··· 501 }, 502 { 503 "pname": "MSTest", 504 - "version": "3.6.4", 505 - "hash": "sha256-G7I371Rq+AQ+QmHbZ9/wOduj0Yfoa6rFxmvygf7Kol4=" 506 }, 507 { 508 "pname": "MSTest.Analyzers", 509 - "version": "3.6.4", 510 - "hash": "sha256-jlr8GVhTw32ErLq6YEMA4+EpWL5UO/q9I/BT9TDixK4=" 511 }, 512 { 513 "pname": "MSTest.TestAdapter", 514 - "version": "3.6.4", 515 - "hash": "sha256-ymaeH9pYE8O1ChlfJ4hvpV9KP9eVJCEm4xhGHngapQY=" 516 }, 517 { 518 "pname": "MSTest.TestFramework", 519 - "version": "3.6.4", 520 - "hash": "sha256-paCBVA5XtiAB8OwkbJSbw7v+HvTFLN9qHRgvQaeJKC0=" 521 }, 522 { 523 "pname": "Newtonsoft.Json", ··· 575 "hash": "sha256-ZSpQFnNgkk3dO8Q7yokJ/VSl4wp5PuIv9nduxgC6UxU=" 576 }, 577 { 578 - "pname": "OpenTelemetry.Api", 579 - "version": "1.9.0", 580 - "hash": "sha256-raXpHi2DZ3mSLn9dnJYF64XaP23epdfu8zgagSpm8+4=" 581 - }, 582 - { 583 "pname": "OpenTelemetry.Api.ProviderBuilderExtensions", 584 "version": "1.10.0", 585 "hash": "sha256-hLw3Sf1fviAlVJYhaMudVJEdG5pjX5JvVrqv9DgYAk8=" ··· 601 }, 602 { 603 "pname": "OpenTelemetry.Instrumentation.AspNetCore", 604 - "version": "1.9.0", 605 - "hash": "sha256-XYqa7kV4rhHPCgHsjQtMvyKCemW1OvQd/23QhjquYR4=" 606 }, 607 { 608 "pname": "OpenTelemetry.Instrumentation.Http", ··· 611 }, 612 { 613 "pname": "OpenTelemetry.Instrumentation.Runtime", 614 - "version": "1.9.0", 615 - "hash": "sha256-Xov89h4Py7MCz6SAOjV0tjtZvvjHbx7NyPXZsY1PZhk=" 616 }, 617 { 618 "pname": "protobuf-net", ··· 631 }, 632 { 633 "pname": "Swashbuckle.AspNetCore", 634 - "version": "7.1.0", 635 - "hash": "sha256-4puaFKTRLJtqy/bjcxr5JJuZ/Ko7MDw7MrxISHl002A=" 636 }, 637 { 638 "pname": "Swashbuckle.AspNetCore.Annotations", 639 - "version": "7.1.0", 640 - "hash": "sha256-4hD7FqfXeVySSRzLhZ2RSGEUdLjJRc4fqZIgAl5xjIA=" 641 }, 642 { 643 "pname": "Swashbuckle.AspNetCore.Swagger", 644 - "version": "7.1.0", 645 - "hash": "sha256-xxekkBO9brFYO0oId6OQVXdv5nXGjpwR3ZEcGe6rr0Q=" 646 }, 647 { 648 "pname": "Swashbuckle.AspNetCore.SwaggerGen", 649 - "version": "7.1.0", 650 - "hash": "sha256-4Gm9yxjueSeGFaedV8ncy+jtDwjFBVChpqCCK8E+qfY=" 651 }, 652 { 653 "pname": "Swashbuckle.AspNetCore.SwaggerUI", 654 - "version": "7.1.0", 655 - "hash": "sha256-br975EeG6O2fwyk8cFcjU/JkYrI35ZkqHm94j3qM5Cg=" 656 }, 657 { 658 "pname": "System.Collections.Immutable", ··· 698 "pname": "System.Diagnostics.DiagnosticSource", 699 "version": "5.0.0", 700 "hash": "sha256-6mW3N6FvcdNH/pB58pl+pFSCGWgyaP4hfVtC/SMWDV4=" 701 - }, 702 - { 703 - "pname": "System.Diagnostics.DiagnosticSource", 704 - "version": "8.0.0", 705 - "hash": "sha256-+aODaDEQMqla5RYZeq0Lh66j+xkPYxykrVvSCmJQ+Vs=" 706 }, 707 { 708 "pname": "System.Diagnostics.DiagnosticSource",
··· 281 }, 282 { 283 "pname": "Markdig.Signed", 284 + "version": "0.39.1", 285 + "hash": "sha256-jofkP6JUp4xuUjJ6B6+HDfBJ3+V2vgECt2CWmFq62k4=" 286 }, 287 { 288 "pname": "Microsoft.ApplicationInsights", ··· 296 }, 297 { 298 "pname": "Microsoft.CodeAnalysis.ResxSourceGenerator", 299 + "version": "3.11.0-beta1.24527.2", 300 + "hash": "sha256-NVqJ5cRa9G+ilWKazOTA8Xfm6ExOPpst8HMIFBC1/BU=" 301 }, 302 { 303 "pname": "Microsoft.CodeCoverage", 304 + "version": "17.12.0", 305 + "hash": "sha256-lGjifppD0OBMBp28pjUfPipaeXg739n8cPhtHWoo5RE=" 306 }, 307 { 308 "pname": "Microsoft.Extensions.ApiDescription.Server", ··· 446 }, 447 { 448 "pname": "Microsoft.NET.Test.Sdk", 449 + "version": "17.12.0", 450 + "hash": "sha256-DKFEbhh2wPzahNeHdEoFig8tZh/LEVrFc5+zpT43Btg=" 451 }, 452 { 453 "pname": "Microsoft.NETCore.Platforms", ··· 461 }, 462 { 463 "pname": "Microsoft.Testing.Extensions.Telemetry", 464 + "version": "1.5.0", 465 + "hash": "sha256-aKKGFpsp88Yy29GLbWRWnEil2M2WEHjRXZ62Q8x5QRQ=" 466 }, 467 { 468 "pname": "Microsoft.Testing.Extensions.TrxReport.Abstractions", 469 + "version": "1.5.0", 470 + "hash": "sha256-oiePvWpZMkT2AnEpfzWgvaXJai6crgHdoUSMZct3JB0=" 471 }, 472 { 473 "pname": "Microsoft.Testing.Extensions.VSTestBridge", 474 + "version": "1.5.0", 475 + "hash": "sha256-XauIF+r05RDgORsnxEp6Cq0WZjLycJ1hPH79QUi/SgM=" 476 }, 477 { 478 "pname": "Microsoft.Testing.Platform", 479 + "version": "1.5.0", 480 + "hash": "sha256-67ZNhvMifCIM7SFnwDN25EanRNKsjAFQWugrrYWAkrM=" 481 }, 482 { 483 "pname": "Microsoft.Testing.Platform.MSBuild", 484 + "version": "1.5.0", 485 + "hash": "sha256-nJ5fv8MwFw2PeJIZA9qKLfGPWYKmHww1CtVFICz6S00=" 486 }, 487 { 488 "pname": "Microsoft.TestPlatform.ObjectModel", 489 + "version": "17.12.0", 490 + "hash": "sha256-3XBHBSuCxggAIlHXmKNQNlPqMqwFlM952Av6RrLw1/w=" 491 }, 492 { 493 "pname": "Microsoft.TestPlatform.TestHost", 494 + "version": "17.12.0", 495 + "hash": "sha256-rf8Sh0fQq44Sneuvs64unkkIHg8kOjDGWE35j9iLx5I=" 496 }, 497 { 498 "pname": "Microsoft.Win32.Registry", ··· 501 }, 502 { 503 "pname": "MSTest", 504 + "version": "3.7.0", 505 + "hash": "sha256-z302okYPT36ebQhReEihire5fyig5pLkrx09nLyVuME=" 506 }, 507 { 508 "pname": "MSTest.Analyzers", 509 + "version": "3.7.0", 510 + "hash": "sha256-TVMFle7oE2ZU6U+VkJ0G9iNjJxnRU4rDIJCtZFwDhz0=" 511 }, 512 { 513 "pname": "MSTest.TestAdapter", 514 + "version": "3.7.0", 515 + "hash": "sha256-b6JCu2yyZmTZwZVd4MHaIwa01eQGWpFd8mNzHUBS6Tg=" 516 }, 517 { 518 "pname": "MSTest.TestFramework", 519 + "version": "3.7.0", 520 + "hash": "sha256-fIHwuc/zimd8oxvTiA3gmUzmJAj7JsQYh9IOb8NRJ/Y=" 521 }, 522 { 523 "pname": "Newtonsoft.Json", ··· 575 "hash": "sha256-ZSpQFnNgkk3dO8Q7yokJ/VSl4wp5PuIv9nduxgC6UxU=" 576 }, 577 { 578 "pname": "OpenTelemetry.Api.ProviderBuilderExtensions", 579 "version": "1.10.0", 580 "hash": "sha256-hLw3Sf1fviAlVJYhaMudVJEdG5pjX5JvVrqv9DgYAk8=" ··· 596 }, 597 { 598 "pname": "OpenTelemetry.Instrumentation.AspNetCore", 599 + "version": "1.10.1", 600 + "hash": "sha256-HqMFDpFsMaPlgyFt1MU3Un+BysEoj5qPc8HVxTlt0mE=" 601 }, 602 { 603 "pname": "OpenTelemetry.Instrumentation.Http", ··· 606 }, 607 { 608 "pname": "OpenTelemetry.Instrumentation.Runtime", 609 + "version": "1.10.0", 610 + "hash": "sha256-cCTYKxHh1Qzu8X51B8gGsrxwKhVSqJfiql/+o4TWrwg=" 611 }, 612 { 613 "pname": "protobuf-net", ··· 626 }, 627 { 628 "pname": "Swashbuckle.AspNetCore", 629 + "version": "7.2.0", 630 + "hash": "sha256-u1eg4GmYjaJAZdstRVvaTfGKnFRFLaxONhbOyiBKn5Y=" 631 }, 632 { 633 "pname": "Swashbuckle.AspNetCore.Annotations", 634 + "version": "7.2.0", 635 + "hash": "sha256-zsg29If2aWbFK8tIpu60YBbD1i8vvGPupiAjcXCq0l0=" 636 }, 637 { 638 "pname": "Swashbuckle.AspNetCore.Swagger", 639 + "version": "7.2.0", 640 + "hash": "sha256-v0wp8/2prWFZhHm+T7onPh2sZNY+YjnLik1b1MLaaos=" 641 }, 642 { 643 "pname": "Swashbuckle.AspNetCore.SwaggerGen", 644 + "version": "7.2.0", 645 + "hash": "sha256-zxxaHyHFPj3T8756QyaH9h+BkuUoV0xxKnbZUxnI8WU=" 646 }, 647 { 648 "pname": "Swashbuckle.AspNetCore.SwaggerUI", 649 + "version": "7.2.0", 650 + "hash": "sha256-EwJsqa4JBJhMzq+zgND3STyoZi1+6GaVQqXz3ZVP7p8=" 651 }, 652 { 653 "pname": "System.Collections.Immutable", ··· 693 "pname": "System.Diagnostics.DiagnosticSource", 694 "version": "5.0.0", 695 "hash": "sha256-6mW3N6FvcdNH/pB58pl+pFSCGWgyaP4hfVtC/SMWDV4=" 696 }, 697 { 698 "pname": "System.Diagnostics.DiagnosticSource",
+3 -3
pkgs/applications/misc/ArchiSteamFarm/web-ui/default.nix
··· 7 8 buildNpmPackage rec { 9 pname = "asf-ui"; 10 - version = "c316254ddaf7837e7d43145268b53f91f23027dc"; 11 12 src = fetchFromGitHub { 13 owner = "JustArchiNET"; ··· 15 # updated by the update script 16 # this is always the commit that should be used with asf-ui from the latest asf version 17 rev = version; 18 - hash = "sha256-teM8x1/O5QFO7bMGc474Dp9ssOLfdmYkDt7PIuvJ4Ss="; 19 }; 20 21 - npmDepsHash = "sha256-8KqIUSWaeu5Tk8lw8F1O6KkXUfNqvjgxRNCePEMeLDo="; 22 23 installPhase = '' 24 runHook preInstall
··· 7 8 buildNpmPackage rec { 9 pname = "asf-ui"; 10 + version = "6be24065cd4904389d94140f4ed1f6738b1f7fbb"; 11 12 src = fetchFromGitHub { 13 owner = "JustArchiNET"; ··· 15 # updated by the update script 16 # this is always the commit that should be used with asf-ui from the latest asf version 17 rev = version; 18 + hash = "sha256-DFl+DCNj4JFKZG1awX5rlsHzj+67OFyBj9d16zDiKRA="; 19 }; 20 21 + npmDepsHash = "sha256-jZSiWZDckfGfgrBMHTX/sm7Pcl5ap3lfmwGi8SHXqu8="; 22 23 installPhase = '' 24 runHook preInstall
pkgs/applications/misc/golden-cheetah/0001-Fix-building-with-bison-3.7.patch pkgs/by-name/go/golden-cheetah/0001-Fix-building-with-bison-3.7.patch
-113
pkgs/applications/misc/golden-cheetah/default.nix
··· 1 - { 2 - lib, 3 - fetchFromGitHub, 4 - nix-update-script, 5 - mkDerivation, 6 - qtbase, 7 - qtsvg, 8 - qtserialport, 9 - qtwebengine, 10 - qtmultimedia, 11 - qttools, 12 - qtconnectivity, 13 - qtcharts, 14 - libusb-compat-0_1, 15 - gsl, 16 - blas, 17 - bison, 18 - flex, 19 - zlib, 20 - qmake, 21 - makeDesktopItem, 22 - wrapQtAppsHook, 23 - }: 24 - 25 - let 26 - desktopItem = makeDesktopItem { 27 - name = "goldencheetah"; 28 - exec = "GoldenCheetah"; 29 - icon = "goldencheetah"; 30 - desktopName = "GoldenCheetah"; 31 - genericName = "GoldenCheetah"; 32 - comment = "Performance software for cyclists, runners and triathletes"; 33 - categories = [ "Utility" ]; 34 - }; 35 - in 36 - mkDerivation rec { 37 - pname = "golden-cheetah"; 38 - version = "3.7-DEV2408"; 39 - 40 - src = fetchFromGitHub { 41 - owner = "GoldenCheetah"; 42 - repo = "GoldenCheetah"; 43 - tag = "v${version}"; 44 - hash = "sha256-6JAdnYaKULJsc/zdcTMbCkbOCbiVtnJivEazDKL721c="; 45 - }; 46 - 47 - buildInputs = [ 48 - qtbase 49 - qtsvg 50 - qtserialport 51 - qtwebengine 52 - qtmultimedia 53 - qttools 54 - zlib 55 - qtconnectivity 56 - qtcharts 57 - libusb-compat-0_1 58 - gsl 59 - blas 60 - ]; 61 - nativeBuildInputs = [ 62 - flex 63 - wrapQtAppsHook 64 - qmake 65 - bison 66 - ]; 67 - 68 - patches = [ 69 - # allow building with bison 3.7 70 - # Included in https://github.com/GoldenCheetah/GoldenCheetah/pull/3590, 71 - # which is periodically rebased but pre 3.6 release, as it'll break other CI systems 72 - ./0001-Fix-building-with-bison-3.7.patch 73 - ]; 74 - 75 - NIX_LDFLAGS = "-lz -lgsl -lblas"; 76 - 77 - qtWrapperArgs = [ 78 - "--prefix" 79 - "LD_LIBRARY_PATH" 80 - ":" 81 - "${zlib.out}/lib" 82 - ]; 83 - 84 - preConfigure = '' 85 - cp src/gcconfig.pri.in src/gcconfig.pri 86 - cp qwt/qwtconfig.pri.in qwt/qwtconfig.pri 87 - sed -i 's,^#QMAKE_LRELEASE.*,QMAKE_LRELEASE = ${qttools.dev}/bin/lrelease,' src/gcconfig.pri 88 - sed -i 's,^#LIBUSB_INSTALL.*,LIBUSB_INSTALL = ${libusb-compat-0_1},' src/gcconfig.pri 89 - sed -i 's,^#LIBUSB_INCLUDE.*,LIBUSB_INCLUDE = ${libusb-compat-0_1.dev}/include,' src/gcconfig.pri 90 - sed -i 's,^#LIBUSB_LIBS.*,LIBUSB_LIBS = -L${libusb-compat-0_1}/lib -lusb,' src/gcconfig.pri 91 - ''; 92 - 93 - installPhase = '' 94 - runHook preInstall 95 - 96 - mkdir -p $out/bin 97 - cp src/GoldenCheetah $out/bin 98 - install -Dm644 "${desktopItem}/share/applications/"* -t $out/share/applications/ 99 - install -Dm644 src/Resources/images/gc.png $out/share/pixmaps/goldencheetah.png 100 - 101 - runHook postInstall 102 - ''; 103 - 104 - passthru.updateScript = nix-update-script { }; 105 - 106 - meta = { 107 - description = "Performance software for cyclists, runners and triathletes. Built from source and without API tokens"; 108 - mainProgram = "GoldenCheetah"; 109 - platforms = lib.platforms.linux; 110 - maintainers = with lib.maintainers; [ adamcstephens ]; 111 - license = lib.licenses.gpl2Plus; 112 - }; 113 - }
···
+2
pkgs/build-support/fetchurl/builder.sh
··· 11 --location 12 --max-redirs 20 13 --retry 3 14 --disable-epsv 15 --cookie-jar cookies 16 --user-agent "curl/$curlVersion Nixpkgs/$nixpkgsVersion"
··· 11 --location 12 --max-redirs 20 13 --retry 3 14 + --retry-all-errors 15 + --continue-at - 16 --disable-epsv 17 --cookie-jar cookies 18 --user-agent "curl/$curlVersion Nixpkgs/$nixpkgsVersion"
+2 -2
pkgs/by-name/ch/checkstyle/package.nix
··· 1 { lib, stdenvNoCC, fetchurl, makeBinaryWrapper, jre }: 2 3 stdenvNoCC.mkDerivation rec { 4 - version = "10.21.1"; 5 pname = "checkstyle"; 6 7 src = fetchurl { 8 url = "https://github.com/checkstyle/checkstyle/releases/download/checkstyle-${version}/checkstyle-${version}-all.jar"; 9 - sha256 = "sha256-u8248qMMHRBxWk7VpFripdLQSbcAL3ApLtCQa6TyMJ4="; 10 }; 11 12 nativeBuildInputs = [ makeBinaryWrapper ];
··· 1 { lib, stdenvNoCC, fetchurl, makeBinaryWrapper, jre }: 2 3 stdenvNoCC.mkDerivation rec { 4 + version = "10.21.2"; 5 pname = "checkstyle"; 6 7 src = fetchurl { 8 url = "https://github.com/checkstyle/checkstyle/releases/download/checkstyle-${version}/checkstyle-${version}-all.jar"; 9 + sha256 = "sha256-r8uiXoaQFkQpcuxFE6jAbIEu32j1EciO9JfeAMM4ORc="; 10 }; 11 12 nativeBuildInputs = [ makeBinaryWrapper ];
+3 -3
pkgs/by-name/da/davinci-resolve/package.nix
··· 35 davinci = ( 36 stdenv.mkDerivation rec { 37 pname = "davinci-resolve${lib.optionalString studioVariant "-studio"}"; 38 - version = "19.1.2"; 39 40 nativeBuildInputs = [ 41 (appimage-run.override { buildFHSEnv = buildFHSEnvChroot; }) ··· 57 outputHashAlgo = "sha256"; 58 outputHash = 59 if studioVariant then 60 - "sha256-yLlvl/zm/epNs1e4sSDrfHNApcpPQV2fMF3Y09ml7is=" 61 else 62 - "sha256-ssX1ffB7ZSJObETQa2r5R4oHddAccC4GB14jaLs8bGg="; 63 64 impureEnvVars = lib.fetchers.proxyImpureEnvVars; 65
··· 35 davinci = ( 36 stdenv.mkDerivation rec { 37 pname = "davinci-resolve${lib.optionalString studioVariant "-studio"}"; 38 + version = "19.1.3"; 39 40 nativeBuildInputs = [ 41 (appimage-run.override { buildFHSEnv = buildFHSEnvChroot; }) ··· 57 outputHashAlgo = "sha256"; 58 outputHash = 59 if studioVariant then 60 + "sha256-aAKE+AY/a2XjVzdU0VXT3ekFrTp3rO6zUd7pRTTDc9E=" 61 else 62 + "sha256-CCr4/h0W1fhzUT4o6WyX2hBodzy9iqVLZwzdplzq9SI="; 63 64 impureEnvVars = lib.fetchers.proxyImpureEnvVars; 65
+2 -2
pkgs/by-name/fa/factoriolab/package.nix
··· 10 }: 11 buildNpmPackage rec { 12 pname = "factoriolab"; 13 - version = "3.9.2"; 14 15 src = fetchFromGitHub { 16 owner = "factoriolab"; 17 repo = "factoriolab"; 18 tag = "v${version}"; 19 - hash = "sha256-ogmez21QwFdRYVsMxeFmNnEerXbH4rQXmOwKuKbpuGs="; 20 }; 21 buildInputs = [ vips ]; 22 nativeBuildInputs = [
··· 10 }: 11 buildNpmPackage rec { 12 pname = "factoriolab"; 13 + version = "3.10.0"; 14 15 src = fetchFromGitHub { 16 owner = "factoriolab"; 17 repo = "factoriolab"; 18 tag = "v${version}"; 19 + hash = "sha256-MSiwtFd9u8IFrHDy++jO//P7Yn4Arip1DwBufR8KIRU="; 20 }; 21 buildInputs = [ vips ]; 22 nativeBuildInputs = [
+1 -1
pkgs/by-name/fi/filebeat8/package.nix
··· 29 doInstallCheck = true; 30 31 passthru = { 32 - updateScript = nix-update-script { }; 33 }; 34 35 meta = {
··· 29 doInstallCheck = true; 30 31 passthru = { 32 + updateScript = nix-update-script { extraArgs = [ "--version-regex=v(8\..*)" ]; }; 33 }; 34 35 meta = {
+123
pkgs/by-name/go/golden-cheetah/package.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + nix-update-script, 6 + qt6, 7 + libusb-compat-0_1, 8 + gsl, 9 + blas, 10 + bison, 11 + flex, 12 + zlib, 13 + makeDesktopItem, 14 + }: 15 + 16 + let 17 + desktopItem = makeDesktopItem { 18 + name = "goldencheetah"; 19 + exec = "GoldenCheetah"; 20 + icon = "goldencheetah"; 21 + desktopName = "GoldenCheetah"; 22 + genericName = "GoldenCheetah"; 23 + comment = "Performance software for cyclists, runners and triathletes"; 24 + categories = [ "Utility" ]; 25 + }; 26 + in 27 + stdenv.mkDerivation (finalAttrs: { 28 + pname = "golden-cheetah"; 29 + version = "3.7-DEV2408"; 30 + 31 + src = fetchFromGitHub { 32 + owner = "GoldenCheetah"; 33 + repo = "GoldenCheetah"; 34 + tag = "v${finalAttrs.version}"; 35 + hash = "sha256-6JAdnYaKULJsc/zdcTMbCkbOCbiVtnJivEazDKL721c="; 36 + }; 37 + 38 + buildInputs = 39 + with qt6; 40 + [ 41 + qt5compat 42 + qtbase 43 + qtcharts 44 + qtconnectivity 45 + qtmultimedia 46 + qtserialport 47 + qtsvg 48 + qttools 49 + qtwebengine 50 + ] 51 + ++ [ 52 + blas 53 + gsl 54 + libusb-compat-0_1 55 + zlib 56 + ]; 57 + nativeBuildInputs = 58 + [ 59 + bison 60 + flex 61 + ] 62 + ++ (with qt6; [ 63 + qmake 64 + wrapQtAppsHook 65 + ]); 66 + 67 + patches = [ 68 + # allow building with bison 3.7 69 + # Included in https://github.com/GoldenCheetah/GoldenCheetah/pull/3590, 70 + # which is periodically rebased but pre 3.6 release, as it'll break other CI systems 71 + ./0001-Fix-building-with-bison-3.7.patch 72 + ]; 73 + 74 + NIX_LDFLAGS = "-lz -lgsl -lblas"; 75 + 76 + qtWrapperArgs = [ 77 + "--prefix" 78 + "LD_LIBRARY_PATH" 79 + ":" 80 + "${zlib.out}/lib" 81 + ]; 82 + 83 + preConfigure = '' 84 + cp src/gcconfig.pri.in src/gcconfig.pri 85 + cp qwt/qwtconfig.pri.in qwt/qwtconfig.pri 86 + sed -i 's,^#QMAKE_LRELEASE.*,QMAKE_LRELEASE = ${qt6.qttools.dev}/bin/lrelease,' src/gcconfig.pri 87 + sed -i 's,^#LIBUSB_INSTALL.*,LIBUSB_INSTALL = ${libusb-compat-0_1},' src/gcconfig.pri 88 + sed -i 's,^#LIBUSB_INCLUDE.*,LIBUSB_INCLUDE = ${libusb-compat-0_1.dev}/include,' src/gcconfig.pri 89 + sed -i 's,^#LIBUSB_LIBS.*,LIBUSB_LIBS = -L${libusb-compat-0_1}/lib -lusb,' src/gcconfig.pri 90 + ''; 91 + 92 + installPhase = 93 + if stdenv.isLinux then 94 + '' 95 + runHook preInstall 96 + 97 + mkdir -p $out/bin 98 + cp src/GoldenCheetah $out/bin 99 + install -Dm644 "${desktopItem}/share/applications/"* -t $out/share/applications/ 100 + install -Dm644 src/Resources/images/gc.png $out/share/pixmaps/goldencheetah.png 101 + 102 + runHook postInstall 103 + '' 104 + else if stdenv.isDarwin then 105 + '' 106 + runHook preInstall 107 + mkdir -p $out/Applications 108 + cp -r src/GoldenCheetah.app $out/Applications 109 + runHook postInstall 110 + '' 111 + else 112 + abort "unsupported platform"; 113 + 114 + passthru.updateScript = nix-update-script { }; 115 + 116 + meta = { 117 + description = "Performance software for cyclists, runners and triathletes. Built from source and without API tokens"; 118 + mainProgram = "GoldenCheetah"; 119 + platforms = with lib.platforms; darwin ++ linux; 120 + maintainers = with lib.maintainers; [ adamcstephens ]; 121 + license = lib.licenses.gpl2Plus; 122 + }; 123 + })
+2 -2
pkgs/by-name/na/narsil/package.nix
··· 14 }: 15 stdenv.mkDerivation rec { 16 pname = "narsil"; 17 - version = "bbc8fc5efd779ec885045f9b8d903d0df1bec1b2"; 18 19 src = fetchFromGitHub { 20 owner = "NickMcConnell"; 21 repo = "NarSil"; 22 rev = version; 23 - hash = "sha256-keN1IJao80Pr8SpHe0tYXg14l9rBfboyNoDaivzWsyM="; 24 }; 25 26 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch=main" ]; };
··· 14 }: 15 stdenv.mkDerivation rec { 16 pname = "narsil"; 17 + version = "f5ec6bd6b8013f2a2b74fc45b6f4c53744590ec5"; 18 19 src = fetchFromGitHub { 20 owner = "NickMcConnell"; 21 repo = "NarSil"; 22 rev = version; 23 + hash = "sha256-xMY9XmFsjcucLPfwTXiC0oQ2UkWIkWCehvycesqbWn0="; 24 }; 25 26 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch=main" ]; };
+3
pkgs/by-name/ne/netrw/package.nix
··· 15 version = "1.3.2"; 16 17 configureFlags = [ 18 "--with-checksum=${checksumType}" 19 ]; 20
··· 15 version = "1.3.2"; 16 17 configureFlags = [ 18 + # This is to add "#include" directives for stdlib.h, stdio.h and string.h. 19 + "ac_cv_header_stdc=yes" 20 + 21 "--with-checksum=${checksumType}" 22 ]; 23
+97
pkgs/by-name/pd/pds/package.nix
···
··· 1 + { 2 + stdenv, 3 + makeBinaryWrapper, 4 + removeReferencesTo, 5 + srcOnly, 6 + python3, 7 + pnpm_9, 8 + fetchFromGitHub, 9 + nodejs, 10 + vips, 11 + pkg-config, 12 + nixosTests, 13 + lib, 14 + }: 15 + 16 + let 17 + nodeSources = srcOnly nodejs; 18 + pythonEnv = python3.withPackages (p: [ p.setuptools ]); 19 + in 20 + 21 + stdenv.mkDerivation (finalAttrs: { 22 + pname = "pds"; 23 + version = "0.4.74"; 24 + 25 + src = fetchFromGitHub { 26 + owner = "bluesky-social"; 27 + repo = "pds"; 28 + rev = "v${finalAttrs.version}"; 29 + hash = "sha256-kNHsQ6funmo8bnkFBNWHQ0Fmd5nf/uh+x9buaRJMZnM="; 30 + }; 31 + 32 + sourceRoot = "${finalAttrs.src.name}/service"; 33 + 34 + nativeBuildInputs = [ 35 + makeBinaryWrapper 36 + nodejs 37 + pythonEnv 38 + pkg-config 39 + pnpm_9.configHook 40 + removeReferencesTo 41 + ]; 42 + 43 + # Required for `sharp` NPM dependency 44 + buildInputs = [ vips ]; 45 + 46 + pnpmDeps = pnpm_9.fetchDeps { 47 + inherit (finalAttrs) 48 + pname 49 + version 50 + src 51 + sourceRoot 52 + ; 53 + hash = "sha256-oU4dwlBdsMmgAUv1ICaOqaqucmg/TjKOZxjnxpm0qL8="; 54 + }; 55 + 56 + buildPhase = '' 57 + runHook preBuild 58 + 59 + pushd ./node_modules/.pnpm/better-sqlite3@*/node_modules/better-sqlite3 60 + npm run build-release --offline --nodedir="${nodeSources}" 61 + find build -type f -exec remove-references-to -t "${nodeSources}" {} \; 62 + popd 63 + 64 + makeWrapper "${lib.getExe nodejs}" "$out/bin/pds" \ 65 + --add-flags --enable-source-maps \ 66 + --add-flags "$out/lib/pds/index.js" \ 67 + --set-default NODE_ENV production 68 + 69 + runHook postBuild 70 + ''; 71 + 72 + installPhase = '' 73 + runHook preInstall 74 + 75 + mkdir -p $out/{bin,lib/pds} 76 + mv node_modules $out/lib/pds 77 + mv index.js $out/lib/pds 78 + 79 + runHook postInstall 80 + ''; 81 + 82 + passthru.tests = { 83 + inherit (nixosTests) pds; 84 + }; 85 + 86 + meta = { 87 + description = "Bluesky Personal Data Server (PDS)"; 88 + homepage = "https://github.com/bluesky-social/pds"; 89 + license = with lib.licenses; [ 90 + mit 91 + asl20 92 + ]; 93 + maintainers = with lib.maintainers; [ t4ccer ]; 94 + platforms = lib.platforms.unix; 95 + mainProgram = "pds"; 96 + }; 97 + })
+58
pkgs/by-name/pd/pdsadmin/package.nix
···
··· 1 + { 2 + stdenvNoCC, 3 + fetchFromGitHub, 4 + bash, 5 + pds, 6 + makeBinaryWrapper, 7 + jq, 8 + curl, 9 + openssl, 10 + lib, 11 + }: 12 + 13 + stdenvNoCC.mkDerivation (finalAttrs: { 14 + pname = "pdsadmin"; 15 + inherit (pds) version src; 16 + 17 + patches = [ ./pdsadmin-offline.patch ]; 18 + 19 + nativeBuildInputs = [ makeBinaryWrapper ]; 20 + 21 + buildInputs = [ bash ]; 22 + 23 + strictDeps = true; 24 + 25 + buildPhase = '' 26 + runHook preBuild 27 + 28 + substituteInPlace pdsadmin.sh \ 29 + --replace-fail NIXPKGS_PDSADMIN_ROOT $out 30 + 31 + runHook postBuild 32 + ''; 33 + 34 + installPhase = '' 35 + runHook preInstall 36 + 37 + install -Dm755 pdsadmin.sh $out/lib/pds/pdsadmin.sh 38 + install -Dm755 pdsadmin/*.sh $out/lib/pds 39 + makeWrapper "$out/lib/pds/pdsadmin.sh" "$out/bin/pdsadmin" \ 40 + --prefix PATH : "${ 41 + lib.makeBinPath [ 42 + jq 43 + curl 44 + openssl 45 + ] 46 + }" 47 + 48 + runHook postInstall 49 + ''; 50 + 51 + meta = { 52 + description = "Admin scripts for Bluesky Personal Data Server (PDS)"; 53 + inherit (pds.meta) homepage license; 54 + maintainers = with lib.maintainers; [ t4ccer ]; 55 + platforms = lib.platforms.unix; 56 + mainProgram = "pdsadmin"; 57 + }; 58 + })
+24
pkgs/by-name/pd/pdsadmin/pdsadmin-offline.patch
···
··· 1 + diff --git a/pdsadmin.sh b/pdsadmin.sh 2 + index 913d2b4..b09c20c 100644 3 + --- a/pdsadmin.sh 4 + +++ b/pdsadmin.sh 5 + @@ -15,16 +15,11 @@ if [[ "${EUID}" -ne 0 ]]; then 6 + exit 1 7 + fi 8 + 9 + -# Download the script, if it exists. 10 + -SCRIPT_URL="${PDSADMIN_BASE_URL}/${COMMAND}.sh" 11 + -SCRIPT_FILE="$(mktemp /tmp/pdsadmin.${COMMAND}.XXXXXX)" 12 + +SCRIPT_FILE="NIXPKGS_PDSADMIN_ROOT/lib/pds/${COMMAND}.sh" 13 + 14 + -if ! curl --fail --silent --show-error --location --output "${SCRIPT_FILE}" "${SCRIPT_URL}"; then 15 + +if ! [ -f "${SCRIPT_FILE}" ]; then 16 + echo "ERROR: ${COMMAND} not found" 17 + exit 2 18 + fi 19 + 20 + -chmod +x "${SCRIPT_FILE}" 21 + -if "${SCRIPT_FILE}" "$@"; then 22 + - rm --force "${SCRIPT_FILE}" 23 + -fi 24 + +"${SCRIPT_FILE}" "$@"
+2 -2
pkgs/by-name/ph/photoqt/package.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "photoqt"; 20 - version = "4.7"; 21 22 src = fetchurl { 23 url = "https://photoqt.org/pkgs/photoqt-${version}.tar.gz"; 24 - hash = "sha256-uZCeJJsQoIDZ6nf+JbFhbXE4ZHL8pCY0pJOG5w6v4vs="; 25 }; 26 27 nativeBuildInputs = [
··· 17 18 stdenv.mkDerivation rec { 19 pname = "photoqt"; 20 + version = "4.8"; 21 22 src = fetchurl { 23 url = "https://photoqt.org/pkgs/photoqt-${version}.tar.gz"; 24 + hash = "sha256-ccSbG5MTIyVJFqNHstaW53BfsGmN/I4ObCZfY0h22QE="; 25 }; 26 27 nativeBuildInputs = [
+2 -2
pkgs/by-name/pl/plasma-panel-colorizer/package.nix
··· 9 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "plasma-panel-colorizer"; 12 - version = "1.2.0"; 13 14 src = fetchFromGitHub { 15 owner = "luisbocanegra"; 16 repo = "plasma-panel-colorizer"; 17 tag = "v${finalAttrs.version}"; 18 - hash = "sha256-yeUicFoafKqj6suVJSaaNjmT+g+ZYb8QsguYyKNBYFA="; 19 }; 20 21 nativeBuildInputs = [
··· 9 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "plasma-panel-colorizer"; 12 + version = "2.1.0"; 13 14 src = fetchFromGitHub { 15 owner = "luisbocanegra"; 16 repo = "plasma-panel-colorizer"; 17 tag = "v${finalAttrs.version}"; 18 + hash = "sha256-Xv1yGIGIWqfxukJub0X2sH0XwtRTr13p+vDi+Wdgnkg="; 19 }; 20 21 nativeBuildInputs = [
+38
pkgs/by-name/ra/rastertoezpl/package.nix
···
··· 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + cups, 6 + }: 7 + 8 + stdenv.mkDerivation (finalAttrs: { 9 + pname = "rastertoezpl"; 10 + version = "1.1.12"; 11 + 12 + src = fetchurl { 13 + url = "https://godex.s3-accelerate.amazonaws.com/tWHDYruxWFM98frjWNTE,g.file?v01"; 14 + name = "${finalAttrs.pname}-${finalAttrs.version}-source.tar.gz"; 15 + hash = "sha256-iBhM8Mht/XncWU75cd485WK5GZtJNv78yMsFsD0eKWQ="; 16 + }; 17 + 18 + buildInputs = [ cups ]; 19 + 20 + configureFlags = [ 21 + "--datarootdir=${placeholder "out"}/share" 22 + "PPDDIR=${placeholder "out"}/share/cups/model" 23 + ]; 24 + 25 + postInstall = '' 26 + mkdir -p $out/lib/cups/filter 27 + ln -s $out/libexec/rastertoezpl/rastertoezpl $out/lib/cups/filter/rastertoezpl 28 + gzip -9n $out/share/cups/model/godex/*.ppd 29 + ''; 30 + 31 + meta = { 32 + description = "CUPS driver for GODEX printers"; 33 + homepage = "https://www.godexintl.com/downloads"; 34 + license = lib.licenses.gpl2Plus; 35 + maintainers = with lib.maintainers; [ stargate01 ]; 36 + platforms = lib.platforms.linux; 37 + }; 38 + })
+43
pkgs/by-name/re/regolith/package.nix
···
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + nix-update-script, 6 + versionCheckHook, 7 + }: 8 + buildGoModule rec { 9 + pname = "regolith"; 10 + version = "1.5.1"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "Bedrock-OSS"; 14 + repo = "regolith"; 15 + tag = version; 16 + hash = "sha256-gTEQ2hu581tD1I/3iLHzE/2nekAG49/M6V6QeqPhYsA="; 17 + }; 18 + 19 + # Requires network access. 20 + doCheck = false; 21 + 22 + vendorHash = "sha256-+4J4Z7lhbAphi6WUEJN9pzNXf6ROUKqN4NdKI2sQSW0="; 23 + 24 + ldflags = [ 25 + "-X main.buildSource=nix" 26 + "-X main.version=${version}" 27 + ]; 28 + 29 + nativeInstallCheckInputs = [ versionCheckHook ]; 30 + versionCheckProgramArg = "--version"; 31 + doInstallCheck = true; 32 + 33 + passthru.updateScript = nix-update-script { }; 34 + 35 + meta = { 36 + description = "Add-on Compiler for the Bedrock Edition of Minecraft"; 37 + homepage = "https://github.com/Bedrock-OSS/regolith"; 38 + changelog = "https://github.com/Bedrock-OSS/regolith/releases/tag/${version}"; 39 + license = lib.licenses.mit; 40 + maintainers = with lib.maintainers; [ arexon ]; 41 + mainProgram = "regolith"; 42 + }; 43 + }
+36 -23
pkgs/by-name/ut/ut1999/package.nix
··· 7 fetchurl, 8 makeDesktopItem, 9 copyDesktopItems, 10 imagemagick, 11 runCommand, 12 libgcc, 13 wxGTK32, 14 - innoextract, 15 libGL, 16 SDL2, 17 openal, ··· 39 hash = "sha256-TbhJbOH4E5WOb6XR9dmqLkXziK3/CzhNjd1ypBkkmvw="; 40 }; 41 }; 42 - unpackGog = 43 - runCommand "ut1999-gog" 44 { 45 - src = requireFile rec { 46 - name = "setup_ut_goty_2.0.0.5.exe"; 47 - hash = "sha256-TMJX1U2XZZxQYvK/GG0KjGlZVh0R5C2Pzy6sB/GSaAM="; 48 - message = '' 49 - Unreal Tournament 1999 requires the official GOG package, version 2.0.0.5. 50 - 51 - Once you download the file, run the following command: 52 - 53 - nix-prefetch-url file://\$PWD/${name} 54 - ''; 55 }; 56 - 57 - nativeBuildInputs = [ innoextract ]; 58 } 59 '' 60 - innoextract --extract --exclude-temp "$src" 61 mkdir $out 62 - cp -r app/* $out 63 ''; 64 systemDir = 65 { ··· 92 lib.optionals stdenv.hostPlatform.isLinux [ 93 copyDesktopItems 94 autoPatchelfHook 95 - imagemagick 96 ] 97 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 98 undmg ··· 111 chmod -R 755 $out 112 cd ${outPrefix} 113 114 rm -rf ./{Music,Sounds,Maps} 115 - ln -s ${unpackGog}/{Music,Sounds,Maps} . 116 117 - cp -n ${unpackGog}/Textures/* ./Textures || true 118 - cp -n ${unpackGog}/System/*.{u,int} ./System || true 119 '' 120 + lib.optionalString (stdenv.hostPlatform.isLinux) '' 121 ln -s "$out/${systemDir}/ut-bin" "$out/bin/ut1999" 122 ln -s "$out/${systemDir}/ucc-bin" "$out/bin/ut1999-ucc" 123 124 - convert "${unpackGog}/gfw_high.ico" "ut1999.png" 125 - install -D ut1999-5.png "$out/share/icons/hicolor/256x256/apps/ut1999.png" 126 127 # Remove bundled libraries to use native versions instead 128 rm $out/${systemDir}/libmpg123.so* \ 129 $out/${systemDir}/libopenal.so* \ 130 $out/${systemDir}/libSDL2* \ 131 $out/${systemDir}/libxmp.so* 132 '' 133 + '' 134 runHook postInstall
··· 7 fetchurl, 8 makeDesktopItem, 9 copyDesktopItems, 10 + libarchive, 11 imagemagick, 12 runCommand, 13 libgcc, 14 wxGTK32, 15 libGL, 16 SDL2, 17 openal, ··· 39 hash = "sha256-TbhJbOH4E5WOb6XR9dmqLkXziK3/CzhNjd1ypBkkmvw="; 40 }; 41 }; 42 + unpackIso = 43 + runCommand "ut1999-iso" 44 { 45 + # This upload of the game is officially sanctioned by OldUnreal (who has received permission from Epic Games to link to archive.org) and the UT99.org community 46 + # This is a copy of the original Unreal Tournament: Game of the Year Edition (also known as UT or UT99). 47 + src = fetchurl { 48 + url = "https://archive.org/download/ut-goty/UT_GOTY_CD1.iso"; 49 + hash = "sha256-4YSYTKiPABxd3VIDXXbNZOJm4mx0l1Fhte1yNmx0cE8="; 50 }; 51 + nativeBuildInputs = [ libarchive ]; 52 } 53 '' 54 + bsdtar -xvf "$src" 55 mkdir $out 56 + cp -r Music Sounds Textures Maps $out 57 ''; 58 systemDir = 59 { ··· 86 lib.optionals stdenv.hostPlatform.isLinux [ 87 copyDesktopItems 88 autoPatchelfHook 89 ] 90 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 91 undmg ··· 104 chmod -R 755 $out 105 cd ${outPrefix} 106 107 + # NOTE: OldUnreal patch doesn't include these folders but could in the future 108 rm -rf ./{Music,Sounds,Maps} 109 + ln -s ${unpackIso}/{Music,Sounds,Maps} . 110 111 + # TODO: unpack compressed maps with ucc 112 + 113 + cp -n ${unpackIso}/Textures/* ./Textures || true 114 + cp -n ${unpackIso}/System/*.{u,int} ./System || true 115 '' 116 + lib.optionalString (stdenv.hostPlatform.isLinux) '' 117 ln -s "$out/${systemDir}/ut-bin" "$out/bin/ut1999" 118 ln -s "$out/${systemDir}/ucc-bin" "$out/bin/ut1999-ucc" 119 120 + install -D "${./ut1999.svg}" "$out/share/pixmaps/ut1999.svg" 121 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 16x16 ut1999_16x16.png 122 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 24x24 ut1999_24x24.png 123 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 32x32 ut1999_32x32.png 124 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 48x48 ut1999_48x48.png 125 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 64x64 ut1999_64x64.png 126 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 128x128 ut1999_128x128.png 127 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 192x192 ut1999_192x192.png 128 + ${imagemagick}/bin/magick -background none ${./ut1999.svg} -resize 256x256 ut1999_256x256.png 129 + install -D "ut1999_16x16.png" "$out/share/icons/hicolor/16x16/apps/ut1999.png" 130 + install -D "ut1999_24x24.png" "$out/share/icons/hicolor/24x24/apps/ut1999.png" 131 + install -D "ut1999_32x32.png" "$out/share/icons/hicolor/32x32/apps/ut1999.png" 132 + install -D "ut1999_48x48.png" "$out/share/icons/hicolor/48x48/apps/ut1999.png" 133 + install -D "ut1999_64x64.png" "$out/share/icons/hicolor/64x64/apps/ut1999.png" 134 + install -D "ut1999_128x128.png" "$out/share/icons/hicolor/128x128/apps/ut1999.png" 135 + install -D "ut1999_192x192.png" "$out/share/icons/hicolor/192x192/apps/ut1999.png" 136 + install -D "ut1999_256x256.png" "$out/share/icons/hicolor/256x256/apps/ut1999.png" 137 138 # Remove bundled libraries to use native versions instead 139 rm $out/${systemDir}/libmpg123.so* \ 140 $out/${systemDir}/libopenal.so* \ 141 $out/${systemDir}/libSDL2* \ 142 $out/${systemDir}/libxmp.so* 143 + # NOTE: what about fmod? 144 + #$out/${systemDir}/libfmod.so* 145 '' 146 + '' 147 runHook postInstall
+148
pkgs/by-name/ut/ut1999/ut1999.svg
···
··· 1 + <?xml version="1.0" encoding="UTF-8" standalone="no"?> 2 + <svg 3 + width="512" 4 + height="512" 5 + viewBox="0 0 39.476429 39.476429" 6 + version="1.1" 7 + id="svg109" 8 + xmlns:xlink="http://www.w3.org/1999/xlink" 9 + xmlns="http://www.w3.org/2000/svg" 10 + xmlns:svg="http://www.w3.org/2000/svg"> 11 + <defs 12 + id="defs113"> 13 + <linearGradient 14 + id="linearGradient28292"> 15 + <stop 16 + style="stop-color:#ffffff;stop-opacity:1;" 17 + offset="0" 18 + id="stop28288" /> 19 + <stop 20 + style="stop-color:#ffffff;stop-opacity:0;" 21 + offset="1" 22 + id="stop28290" /> 23 + </linearGradient> 24 + <linearGradient 25 + id="linearGradient1749"> 26 + <stop 27 + style="stop-color:#f5be39;stop-opacity:1;" 28 + offset="0" 29 + id="stop1745" /> 30 + <stop 31 + style="stop-color:#ffd699;stop-opacity:1;" 32 + offset="0.44286996" 33 + id="stop5511" /> 34 + <stop 35 + style="stop-color:#9a5f00;stop-opacity:1;" 36 + offset="0.58172649" 37 + id="stop5507" /> 38 + <stop 39 + style="stop-color:#cfa344;stop-opacity:1;" 40 + offset="0.85889333" 41 + id="stop5509" /> 42 + <stop 43 + style="stop-color:#ffd587;stop-opacity:1;" 44 + offset="1" 45 + id="stop1747" /> 46 + </linearGradient> 47 + <linearGradient 48 + xlink:href="#linearGradient1749" 49 + id="linearGradient1751" 50 + x1="-45.682671" 51 + y1="18.414253" 52 + x2="-45.682671" 53 + y2="-21.00696" 54 + gradientUnits="userSpaceOnUse" /> 55 + <linearGradient 56 + xlink:href="#linearGradient1749" 57 + id="linearGradient18718" 58 + x1="-6.2713218" 59 + y1="-20.88386" 60 + x2="-6.2713218" 61 + y2="18.420364" 62 + gradientUnits="userSpaceOnUse" /> 63 + <linearGradient 64 + xlink:href="#linearGradient28292" 65 + id="linearGradient28294" 66 + x1="-24.591709" 67 + y1="0.21153279" 68 + x2="-24.591709" 69 + y2="-18.75918" 70 + gradientUnits="userSpaceOnUse" /> 71 + <linearGradient 72 + xlink:href="#linearGradient1749" 73 + id="linearGradient37018" 74 + gradientUnits="userSpaceOnUse" 75 + x1="-45.682671" 76 + y1="18.414253" 77 + x2="-45.682671" 78 + y2="-21.00696" /> 79 + <linearGradient 80 + xlink:href="#linearGradient1749" 81 + id="linearGradient37020" 82 + gradientUnits="userSpaceOnUse" 83 + x1="-6.2713218" 84 + y1="-20.88386" 85 + x2="-6.2713218" 86 + y2="18.420364" /> 87 + <linearGradient 88 + xlink:href="#linearGradient1749" 89 + id="linearGradient37022" 90 + gradientUnits="userSpaceOnUse" 91 + x1="-45.682671" 92 + y1="18.414253" 93 + x2="-45.682671" 94 + y2="-21.00696" /> 95 + <linearGradient 96 + xlink:href="#linearGradient1749" 97 + id="linearGradient37024" 98 + gradientUnits="userSpaceOnUse" 99 + x1="-45.682671" 100 + y1="18.414253" 101 + x2="-45.682671" 102 + y2="-21.00696" /> 103 + </defs> 104 + <g 105 + fill-rule="evenodd" 106 + clip-rule="evenodd" 107 + id="g107" 108 + transform="matrix(0.99032725,0,0,0.99032725,45.431715,21.024607)"> 109 + <circle 110 + style="opacity:1;fill:#000000;fill-opacity:1;stroke-width:0.305415" 111 + id="path9973" 112 + cx="-25.944456" 113 + cy="-1.2989572" 114 + r="19.738214" /> 115 + <path 116 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 117 + id="path12879" 118 + style="fill:url(#linearGradient37024);fill-opacity:1;stroke:url(#linearGradient18718);stroke-width:0.385512;stroke-dasharray:none" /> 119 + <path 120 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 121 + id="path105" 122 + style="fill:url(#linearGradient1751);fill-opacity:1;stroke-width:0.224611" /> 123 + </g> 124 + <g 125 + fill-rule="evenodd" 126 + clip-rule="evenodd" 127 + id="g21630" 128 + transform="matrix(0.99032725,0,0,0.99032725,45.431715,21.024607)"> 129 + <circle 130 + style="opacity:1;fill:#000000;fill-opacity:1;stroke-width:0.305415" 131 + id="circle21624" 132 + cx="-25.944456" 133 + cy="-1.2989572" 134 + r="19.738214" /> 135 + <path 136 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 137 + id="path21626" 138 + style="fill:url(#linearGradient37018);fill-opacity:1;stroke:url(#linearGradient37020);stroke-width:0.385512;stroke-dasharray:none" /> 139 + <path 140 + d="m -21.940063,-5.9119705 c 0.753568,-0.8721626 1.606864,-1.6598716 2.511595,-2.3757053 0.910795,-0.7205505 1.873251,-1.3685518 2.986646,-1.8325972 1.177857,-0.490774 2.524622,-0.775805 3.829832,-0.839819 3.8350002,5.2922731 4.1768574,12.3520059 0.870366,17.9899535 0.09748,-2.605032 -0.06491,-4.8394573 -0.51009,-6.72214252 -0.382512,-1.61921708 -0.97436,-2.97833528 -1.921093,-4.31184788 l 2.645686,-2.3489766 a 15.141443,15.141443 0 0 0 -1.522184,-3.138258 c -0.764574,0.2003526 -1.469178,0.4638207 -2.131554,1.0394974 -0.812416,0.7057262 -1.562615,1.8804392 -1.881562,3.0239313 v 9.542128 c 0,1.0543217 0.192042,2.0895508 0.665521,3.0910891 0.512786,1.0857671 1.355524,2.1317783 2.322922,2.9057857 -5.433104,5.652324 -14.098802,6.689575 -20.712458,2.479026 -6.613881,-4.2103234 -9.341326,-12.50047182 -6.51932,-19.8153621 -0.07749,1.9550098 0.210011,3.9646 0.949653,5.7922557 0.740317,1.82855408 1.933672,3.4751737 3.350964,4.8266551 l -2.183887,2.9217327 a 15.277108,15.277108 0 0 0 23.293007,3.8931736 l -6.743032,-2.8426702 -0.03504,-1.6459451 -3.957637,3.7474009 -5.708925,-1.9262596 h -2.311916 c 0.780746,-0.6693393 1.494109,-1.7618442 1.523084,-2.6492803 0.02628,-0.8027579 -0.507845,-1.4379564 -1.249958,-1.9424316 -0.821625,-0.5588309 -1.898408,-0.9577392 -3.074693,-1.261188 0.937973,-0.047617 1.905146,-0.087598 2.735307,-0.1655379 0.547151,-0.051436 1.03478,-0.1194928 1.198297,-0.3434295 0.135665,-0.18552825 0.04829,-0.47842034 -0.192267,-0.74548223 -0.410812,-0.45573471 -1.268375,-0.83757257 -2.01251,-1.171793 -0.72931,-0.32748207 -1.349235,-0.60936827 -2.146153,-1.10261297 1.631795,-0.075918 3.359274,-0.1282526 4.078926,-0.454387 0.323664,-0.1466707 0.443382,-0.3488202 0.532552,-0.6538412 0.16464,-0.5633232 0.224835,-1.4777125 -0.06693,-2.244982 -0.318722,-0.8377972 -1.057242,-1.4999489 -2.004649,-2.1508702 -1.227496,-0.8434124 -2.805609,-1.6679576 -4.682455,-2.5068778 4.576664,-7.5284953 14.268832,-10.1200513 21.992513,-5.8800783 -2.321574,-0.05548 -4.092179,-8.99e-4 -5.873115,0.375324 -1.80789,0.381838 -3.625663,1.094976 -5.359432,2.551126 l -2.321798,-2.695551 a 15.276883,15.276883 0 0 0 -6.531898,4.957379 l 9.273044,4.7673579 2.757993,-1.769257 -0.988736,2.9662063 v 7.3896856 c 0.209112,1.1852696 0.956392,2.0455279 1.809238,2.0677643 0.969868,0.024932 2.076299,-1.0332083 2.705433,-2.1021297 v -5.7017376 l -2.37548,-3.3258078 z m 13.9851477,4.6128259 c 0,-9.9351964 -8.0543067,-17.9895044 -17.9897277,-17.9895044 -9.935422,0 -17.989505,8.054083 -17.989505,17.9895044 0,9.9354204 8.054083,17.9895036 17.989505,17.9895036 9.935196,0 17.9897277,-8.0543078 17.9897277,-17.9895036 z M -43.051653,-11.140903 a 19.708898,19.708898 0 0 1 11.964327,-9.2124 19.708673,19.708673 0 0 1 14.984666,1.947149 19.709347,19.709347 0 0 1 9.2126231,11.9643273 A 19.708673,19.708673 0 0 1 -8.83741,8.5428378 19.709122,19.709122 0 0 1 -20.801512,17.755462 19.708673,19.708673 0 0 1 -35.786177,15.808089 19.709572,19.709572 0 0 1 -44.998802,3.8437621 19.708673,19.708673 0 0 1 -43.051653,-11.140903 Z" 141 + id="path21628" 142 + style="fill:url(#linearGradient37022);fill-opacity:1;stroke-width:0.224611" /> 143 + <path 144 + id="path23092" 145 + style="fill:url(#linearGradient28294);fill-opacity:1;stroke-width:0.224611" 146 + d="m -25.805762,-20.69277 c -0.473953,-0.0033 -0.948507,0.01071 -1.42278,0.04232 -1.26469,0.08428 -2.527642,0.29308 -3.769434,0.629017 -4.964981,1.336993 -9.192635,4.59465 -11.75405,9.052755 -0.818765,1.4212894 -1.446154,2.9278069 -1.878016,4.4815773 a 32.997555,12.991727 0 0 0 1.016337,0.282508 c 2.144166,-7.7443653 9.240277,-13.4281663 17.668346,-13.4281663 8.575261,-2e-6 15.773207,5.884158 17.7781269,13.8358151 a 32.997555,12.991727 0 0 0 1.023715,-0.2510346 c -0.025651,-0.1013013 -0.051879,-0.2025527 -0.079211,-0.3035907 -1.3370968,-4.9650198 -4.5945139,-9.1944868 -9.0526049,-11.7558568 -2.926257,-1.685736 -6.212755,-2.562011 -9.530429,-2.58534 z m -0.392439,3.281068 c -0.315168,10e-4 -0.629998,0.01309 -0.944354,0.03674 -4.901415,0.368776 -9.523879,3.000923 -12.347678,7.4140287 1.69084,0.7738331 3.203378,1.5417462 4.353575,2.3320464 0.965845,0.6635889 1.777805,1.379284 2.132815,2.3124697 0.121158,0.3186123 0.186893,0.6600124 0.212333,0.9949523 a 32.997555,12.991727 0 0 0 5.381356,0.3290405 v -0.6443773 l 0.699192,-2.0917038 -2.10345,1.3495932 -9.8164,-5.0449367 0.24998,-0.328137 c 1.722821,-2.266828 4.030876,-4.01882 6.67764,-5.068278 l 0.228597,-0.0899 2.290935,2.658226 c 1.700941,-1.345359 3.465567,-2.071066 5.218869,-2.441375 1.321534,-0.279144 2.809888,-0.261758 4.322252,-0.277388 -2.130497,-0.912593 -4.349481,-1.448123 -6.555662,-1.441002 z m 13.405277,6.837417 c -1.204493,0.08068 -2.438519,0.322655 -3.515689,0.7714759 -1.073715,0.4475077 -2.008833,1.0752856 -2.906249,1.7852518 -0.891251,0.7051681 -1.728121,1.4773958 -2.464867,2.3300888 l -0.117159,0.138694 -2.400415,-0.2734726 1.308783,1.8328385 a 32.997555,12.991727 0 0 0 5.482252,-0.3287394 v -1.156536 l 0.01175,-0.044876 c 0.334785,-1.2002751 1.126171,-2.4441515 1.98629,-3.1913165 0.720737,-0.6263985 1.48247,-0.9085104 2.271509,-1.1152742 l 0.244108,-0.062495 0.134778,0.2109775 c 0.640923,1.0064672 1.161188,2.0847697 1.554698,3.2108933 l 0.0762,0.2166999 -1.493408,1.3273058 a 32.997555,12.991727 0 0 0 2.231001,-0.3965051 c -0.460072,-1.8497566 -1.259524,-3.6315218 -2.403577,-5.2550107 z" /> 147 + </g> 148 + </svg>
+2 -2
pkgs/by-name/vi/victoriametrics/package.nix
··· 14 15 buildGoModule rec { 16 pname = "VictoriaMetrics"; 17 - version = "1.109.0"; 18 19 src = fetchFromGitHub { 20 owner = "VictoriaMetrics"; 21 repo = "VictoriaMetrics"; 22 rev = "v${version}"; 23 - hash = "sha256-ZeHQxJtUZSFwWeQgHcEXdq9GR26HH4NOuLnO8S4u21o="; 24 }; 25 26 vendorHash = null;
··· 14 15 buildGoModule rec { 16 pname = "VictoriaMetrics"; 17 + version = "1.110.0"; 18 19 src = fetchFromGitHub { 20 owner = "VictoriaMetrics"; 21 repo = "VictoriaMetrics"; 22 rev = "v${version}"; 23 + hash = "sha256-TrM2YyxZZZw+wGMIFACJExtQb6aJwDe1xe63OQqCjDo="; 24 }; 25 26 vendorHash = null;
+2 -2
pkgs/by-name/wo/wownero/package.nix
··· 5 fetchFromGitea, 6 cmake, 7 python3, 8 - boost, 9 libsodium, 10 openssl, 11 rapidjson, ··· 62 63 buildInputs = 64 [ 65 - boost 66 libsodium 67 openssl 68 rapidjson
··· 5 fetchFromGitea, 6 cmake, 7 python3, 8 + boost186, 9 libsodium, 10 openssl, 11 rapidjson, ··· 62 63 buildInputs = 64 [ 65 + boost186 66 libsodium 67 openssl 68 rapidjson
+7 -3
pkgs/development/php-packages/box/default.nix
··· 2 lib, 3 php82, 4 fetchFromGitHub, 5 }: 6 7 - php82.buildComposerProject (finalAttrs: { 8 pname = "box"; 9 version = "4.6.2"; 10 11 src = fetchFromGitHub { 12 owner = "box-project"; 13 repo = "box"; 14 - rev = finalAttrs.version; 15 hash = "sha256-gYIAP9pTjahNkpNNXx0c8sQm+9Kaq6/IAo/xI5bNy7Y="; 16 }; 17 18 - vendorHash = "sha256-HCbjW4HdyQNWDEHXj9U1t3S3EKcrPV1z/9I1ClFsMsc="; 19 20 meta = { 21 changelog = "https://github.com/box-project/box/releases/tag/${finalAttrs.version}";
··· 2 lib, 3 php82, 4 fetchFromGitHub, 5 + versionCheckHook, 6 }: 7 8 + php82.buildComposerProject2 (finalAttrs: { 9 pname = "box"; 10 version = "4.6.2"; 11 12 src = fetchFromGitHub { 13 owner = "box-project"; 14 repo = "box"; 15 + tag = finalAttrs.version; 16 hash = "sha256-gYIAP9pTjahNkpNNXx0c8sQm+9Kaq6/IAo/xI5bNy7Y="; 17 }; 18 19 + vendorHash = "sha256-TAubvl+rsdQdqKz+lRg1oX/ENuRyHoJQVmL1ELz24fg="; 20 + 21 + nativeInstallCheckInputs = [ versionCheckHook ]; 22 + doInstallCheck = true; 23 24 meta = { 25 changelog = "https://github.com/box-project/box/releases/tag/${finalAttrs.version}";
+8 -3
pkgs/development/php-packages/phpmd/default.nix
··· 2 lib, 3 fetchFromGitHub, 4 php, 5 }: 6 7 - php.buildComposerProject (finalAttrs: { 8 pname = "phpmd"; 9 version = "2.15.0"; 10 11 src = fetchFromGitHub { 12 owner = "phpmd"; 13 repo = "phpmd"; 14 - rev = finalAttrs.version; 15 hash = "sha256-nTuJGzOZnkqrfE9R9Vujz/zGJRLlj8+yRZmmnxWrieQ="; 16 }; 17 18 # Missing `composer.lock` from the repository. 19 # Issue open at https://github.com/phpmd/phpmd/issues/1056 20 composerLock = ./composer.lock; 21 - vendorHash = "sha256-vr0wQkfhXHLEz8Q5nEq5Bocu1U1nDhXUlaHBsysvuRQ="; 22 23 meta = { 24 changelog = "https://github.com/phpmd/phpmd/releases/tag/${finalAttrs.version}";
··· 2 lib, 3 fetchFromGitHub, 4 php, 5 + versionCheckHook, 6 }: 7 8 + php.buildComposerProject2 (finalAttrs: { 9 pname = "phpmd"; 10 version = "2.15.0"; 11 12 src = fetchFromGitHub { 13 owner = "phpmd"; 14 repo = "phpmd"; 15 + tag = finalAttrs.version; 16 hash = "sha256-nTuJGzOZnkqrfE9R9Vujz/zGJRLlj8+yRZmmnxWrieQ="; 17 }; 18 19 # Missing `composer.lock` from the repository. 20 # Issue open at https://github.com/phpmd/phpmd/issues/1056 21 composerLock = ./composer.lock; 22 + vendorHash = "sha256-AahAs3Gq1OQ+CW3+rU8NnWcR3hKzVNq7s3llsO4mQ38="; 23 + 24 + nativeInstallCheckInputs = [ versionCheckHook ]; 25 + versionCheckProgramArg = "--version"; 26 + doInstallCheck = true; 27 28 meta = { 29 changelog = "https://github.com/phpmd/phpmd/releases/tag/${finalAttrs.version}";
+6 -1
pkgs/development/python-modules/altair/default.nix
··· 25 version = "5.5.0"; 26 pyproject = true; 27 28 - disabled = pythonOlder "3.8"; 29 30 src = fetchFromGitHub { 31 owner = "altair-viz"; ··· 60 disabledTests = [ 61 # ValueError: Saving charts in 'svg' format requires the vl-convert-python or altair_saver package: see http://github.com/altair-viz/altair_saver/ 62 "test_renderer_with_none_embed_options" 63 ]; 64 65 disabledTestPaths = [
··· 25 version = "5.5.0"; 26 pyproject = true; 27 28 + disabled = pythonOlder "3.9"; 29 30 src = fetchFromGitHub { 31 owner = "altair-viz"; ··· 60 disabledTests = [ 61 # ValueError: Saving charts in 'svg' format requires the vl-convert-python or altair_saver package: see http://github.com/altair-viz/altair_saver/ 62 "test_renderer_with_none_embed_options" 63 + # Sometimes conflict due to parallelism 64 + "test_dataframe_to_csv[polars]" 65 + "test_dataframe_to_csv[pandas]" 66 + # Network access 67 + "test_theme_remote_lambda" 68 ]; 69 70 disabledTestPaths = [
+2 -2
pkgs/development/python-modules/databricks-sdk/default.nix
··· 22 23 buildPythonPackage rec { 24 pname = "databricks-sdk"; 25 - version = "0.40.0"; 26 pyproject = true; 27 28 src = fetchFromGitHub { 29 owner = "databricks"; 30 repo = "databricks-sdk-py"; 31 tag = "v${version}"; 32 - hash = "sha256-x8CbjWdholuIGVr3TxbFjEszu0owjSIm7+G3Sh+cHEk="; 33 }; 34 35 build-system = [
··· 22 23 buildPythonPackage rec { 24 pname = "databricks-sdk"; 25 + version = "0.41.0"; 26 pyproject = true; 27 28 src = fetchFromGitHub { 29 owner = "databricks"; 30 repo = "databricks-sdk-py"; 31 tag = "v${version}"; 32 + hash = "sha256-mKytUMPipee/sg5VWBTfCg0sZwNg69pI+Uuqu1EhNIc="; 33 }; 34 35 build-system = [
+3
pkgs/development/python-modules/jax/default.nix
··· 95 ] 96 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 97 # SystemError: nanobind::detail::nb_func_error_except(): exception could not be translated! 98 "--deselect tests/shape_poly_test.py::ShapePolyTest" 99 "--deselect tests/tree_util_test.py::TreeTest" 100 ]; ··· 150 ] 151 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 152 # SystemError: nanobind::detail::nb_func_error_except(): exception could not be translated! 153 "testInAxesPyTreePrefixMismatchError" 154 "testInAxesPyTreePrefixMismatchErrorKwargs" 155 "testOutAxesPyTreePrefixMismatchError"
··· 95 ] 96 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 97 # SystemError: nanobind::detail::nb_func_error_except(): exception could not be translated! 98 + # reported at: https://github.com/jax-ml/jax/issues/26106 99 + "--deselect tests/pjit_test.py::PJitErrorTest::testAxisResourcesMismatch" 100 "--deselect tests/shape_poly_test.py::ShapePolyTest" 101 "--deselect tests/tree_util_test.py::TreeTest" 102 ]; ··· 152 ] 153 ++ lib.optionals stdenv.hostPlatform.isDarwin [ 154 # SystemError: nanobind::detail::nb_func_error_except(): exception could not be translated! 155 + # reported at: https://github.com/jax-ml/jax/issues/26106 156 "testInAxesPyTreePrefixMismatchError" 157 "testInAxesPyTreePrefixMismatchErrorKwargs" 158 "testOutAxesPyTreePrefixMismatchError"
+4 -3
pkgs/development/python-modules/jaxopt/default.nix
··· 89 "test_binary_logit_log_likelihood" 90 91 # AssertionError (flaky numerical tests) 92 "test_logreg_with_intercept_manual_loop3" 93 - "test_inv_hessian_product_pytree3" 94 "test_multiclass_logreg6" 95 - "test_Rosenbrock2" 96 - "test_Rosenbrock5" 97 ]; 98 99 meta = {
··· 89 "test_binary_logit_log_likelihood" 90 91 # AssertionError (flaky numerical tests) 92 + "test_Rosenbrock2" 93 + "test_Rosenbrock5" 94 + "test_gradient1" 95 + "test_inv_hessian_product_pytree3" 96 "test_logreg_with_intercept_manual_loop3" 97 "test_multiclass_logreg6" 98 ]; 99 100 meta = {
+2 -2
pkgs/development/python-modules/pyedflib/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "pyedflib"; 17 - version = "0.1.38"; 18 pyproject = true; 19 20 src = fetchFromGitHub { 21 owner = "holgern"; 22 repo = "pyedflib"; 23 tag = "v${version}"; 24 - hash = "sha256-sj2O5ISAy12u4GdtucLaRfOeSA6o6FJpZWTyiLq5B3U="; 25 }; 26 27 build-system = [
··· 14 15 buildPythonPackage rec { 16 pname = "pyedflib"; 17 + version = "0.1.39"; 18 pyproject = true; 19 20 src = fetchFromGitHub { 21 owner = "holgern"; 22 repo = "pyedflib"; 23 tag = "v${version}"; 24 + hash = "sha256-NHjeaNLbOxTPzTbQ9owFkessQY/QnxBSC8G93JahMGg="; 25 }; 26 27 build-system = [
+2 -2
pkgs/development/tools/analysis/checkov/default.nix
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "checkov"; 9 - version = "3.2.355"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "bridgecrewio"; 14 repo = "checkov"; 15 tag = version; 16 - hash = "sha256-yBm4v7YczngDFf7jSSVrlMbwIWYFMt6xdJe5qG6i4+I="; 17 }; 18 19 patches = [ ./flake8-compat-5.x.patch ];
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "checkov"; 9 + version = "3.2.357"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "bridgecrewio"; 14 repo = "checkov"; 15 tag = version; 16 + hash = "sha256-hWCYkzFKL60r1k2u9TUwuSRA2R+hHr4ooKGtctko41o="; 17 }; 18 19 patches = [ ./flake8-compat-5.x.patch ];
+2 -1
pkgs/os-specific/linux/acpi-call/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 ]; 27
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 24 25 + makeFlags = kernelModuleMakeFlags ++ [ 26 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 ]; 28
+2 -1
pkgs/os-specific/linux/akvcam/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 18 sourceRoot = "${src.name}/src"; 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 ]; 24
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 19 sourceRoot = "${src.name}/src"; 20 21 nativeBuildInputs = kernel.moduleBuildDependencies; 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ]; 25
+2 -1
pkgs/os-specific/linux/amneziawg/default.nix
··· 4 fetchFromGitHub, 5 srcOnly, 6 kernel, 7 nix-update-script, 8 }: 9 ··· 28 ]; 29 30 makeFlags = 31 - kernel.moduleMakeFlags 32 ++ [ "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" ] 33 ++ lib.optional (lib.versionAtLeast kernel.version "5.6") "KERNEL_SOURCE_DIR=${srcOnly kernel}"; 34
··· 4 fetchFromGitHub, 5 srcOnly, 6 kernel, 7 + kernelModuleMakeFlags, 8 nix-update-script, 9 }: 10 ··· 29 ]; 30 31 makeFlags = 32 + kernelModuleMakeFlags 33 ++ [ "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" ] 34 ++ lib.optional (lib.versionAtLeast kernel.version "5.6") "KERNEL_SOURCE_DIR=${srcOnly kernel}"; 35
+2 -1
pkgs/os-specific/linux/apfs/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 nixosTests, 7 }: 8 ··· 23 hardeningDisable = [ "pic" ]; 24 nativeBuildInputs = kernel.moduleBuildDependencies; 25 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 "KERNELRELEASE=${kernel.modDirVersion}" 28 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 29 "INSTALL_MOD_PATH=$(out)"
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 nixosTests, 8 }: 9 ··· 24 hardeningDisable = [ "pic" ]; 25 nativeBuildInputs = kernel.moduleBuildDependencies; 26 27 + makeFlags = kernelModuleMakeFlags ++ [ 28 "KERNELRELEASE=${kernel.modDirVersion}" 29 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 "INSTALL_MOD_PATH=$(out)"
+2 -1
pkgs/os-specific/linux/batman-adv/default.nix
··· 3 stdenv, 4 fetchurl, 5 kernel, 6 }: 7 8 let ··· 19 }; 20 21 nativeBuildInputs = kernel.moduleBuildDependencies; 22 - makeFlags = kernel.moduleMakeFlags ++ [ 23 "KERNELPATH=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ]; 25
··· 3 stdenv, 4 fetchurl, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 let ··· 20 }; 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 + makeFlags = kernelModuleMakeFlags ++ [ 24 "KERNELPATH=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ]; 26
+2 -1
pkgs/os-specific/linux/bbswitch/default.nix
··· 4 fetchFromGitHub, 5 fetchpatch, 6 kernel, 7 runtimeShell, 8 }: 9 ··· 41 --replace "/lib/modules" "${kernel.dev}/lib/modules" 42 ''; 43 44 - makeFlags = kernel.moduleMakeFlags; 45 46 installPhase = '' 47 mkdir -p $out/lib/modules/${kernel.modDirVersion}/misc
··· 4 fetchFromGitHub, 5 fetchpatch, 6 kernel, 7 + kernelModuleMakeFlags, 8 runtimeShell, 9 }: 10 ··· 42 --replace "/lib/modules" "${kernel.dev}/lib/modules" 43 ''; 44 45 + makeFlags = kernelModuleMakeFlags; 46 47 installPhase = '' 48 mkdir -p $out/lib/modules/${kernel.modDirVersion}/misc
+2 -1
pkgs/os-specific/linux/can-isotp/default.nix
··· 2 lib, 3 stdenv, 4 kernel, 5 fetchFromGitHub, 6 }: 7 ··· 18 sha256 = "1laax93czalclg7cy9iq1r7hfh9jigh7igj06y9lski75ap2vhfq"; 19 }; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 "INSTALL_MOD_PATH=${placeholder "out"}" 24 ];
··· 2 lib, 3 stdenv, 4 kernel, 5 + kernelModuleMakeFlags, 6 fetchFromGitHub, 7 }: 8 ··· 19 sha256 = "1laax93czalclg7cy9iq1r7hfh9jigh7igj06y9lski75ap2vhfq"; 20 }; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 "INSTALL_MOD_PATH=${placeholder "out"}" 25 ];
+2 -1
pkgs/os-specific/linux/cryptodev/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel ? false, 6 }: 7 8 stdenv.mkDerivation (finalAttrs: { ··· 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 hardeningDisable = [ "pic" ]; 21 22 - makeFlags = kernel.moduleMakeFlags ++ [ 23 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 "INSTALL_MOD_PATH=$(out)" 25 "prefix=$(out)"
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel ? false, 6 + kernelModuleMakeFlags ? [], 7 }: 8 9 stdenv.mkDerivation (finalAttrs: { ··· 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 hardeningDisable = [ "pic" ]; 22 23 + makeFlags = kernelModuleMakeFlags ++ [ 24 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 "INSTALL_MOD_PATH=$(out)" 26 "prefix=$(out)"
+2 -1
pkgs/os-specific/linux/ddcci/default.nix
··· 3 stdenv, 4 fetchFromGitLab, 5 kernel, 6 fetchpatch, 7 }: 8 ··· 39 --replace depmod \# 40 ''; 41 42 - makeFlags = kernel.moduleMakeFlags ++ [ 43 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 44 "KVER=${kernel.modDirVersion}" 45 "KERNEL_MODLIB=$(out)/lib/modules/${kernel.modDirVersion}"
··· 3 stdenv, 4 fetchFromGitLab, 5 kernel, 6 + kernelModuleMakeFlags, 7 fetchpatch, 8 }: 9 ··· 40 --replace depmod \# 41 ''; 42 43 + makeFlags = kernelModuleMakeFlags ++ [ 44 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 45 "KVER=${kernel.modDirVersion}" 46 "KERNEL_MODLIB=$(out)/lib/modules/${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/digimend/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 33 rm -r $out/lib/udev 34 ''; 35 36 - makeFlags = kernel.moduleMakeFlags ++ [ 37 "KVERSION=${kernel.modDirVersion}" 38 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 39 "DESTDIR=${placeholder "out"}"
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 34 rm -r $out/lib/udev 35 ''; 36 37 + makeFlags = kernelModuleMakeFlags ++ [ 38 "KVERSION=${kernel.modDirVersion}" 39 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 40 "DESTDIR=${placeholder "out"}"
+2 -1
pkgs/os-specific/linux/dpdk-kmods/default.nix
··· 3 stdenv, 4 fetchzip, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 16 17 hardeningDisable = [ "pic" ]; 18 19 - makeFlags = kernel.moduleMakeFlags ++ [ 20 "INSTALL_MOD_PATH=${placeholder "out"}" 21 ]; 22 KSRC = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
··· 3 stdenv, 4 fetchzip, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 17 18 hardeningDisable = [ "pic" ]; 19 20 + makeFlags = kernelModuleMakeFlags ++ [ 21 "INSTALL_MOD_PATH=${placeholder "out"}" 22 ]; 23 KSRC = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
+2 -1
pkgs/os-specific/linux/drbd/driver.nix
··· 3 lib, 4 fetchurl, 5 kernel, 6 nixosTests, 7 flex, 8 coccinelle, ··· 29 30 enableParallelBuilding = true; 31 32 - makeFlags = kernel.moduleMakeFlags ++ [ 33 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 34 "KVER=${kernel.version}" 35 "INSTALL_MOD_PATH=${placeholder "out"}"
··· 3 lib, 4 fetchurl, 5 kernel, 6 + kernelModuleMakeFlags, 7 nixosTests, 8 flex, 9 coccinelle, ··· 30 31 enableParallelBuilding = true; 32 33 + makeFlags = kernelModuleMakeFlags ++ [ 34 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 35 "KVER=${kernel.version}" 36 "INSTALL_MOD_PATH=${placeholder "out"}"
+2 -1
pkgs/os-specific/linux/ena/default.nix
··· 4 fetchFromGitHub, 5 gitUpdater, 6 kernel, 7 }: 8 let 9 rev-prefix = "ena_linux_"; ··· 23 hardeningDisable = [ "pic" ]; 24 25 nativeBuildInputs = kernel.moduleBuildDependencies; 26 - makeFlags = kernel.moduleMakeFlags; 27 28 env.KERNEL_BUILD_DIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"; 29
··· 4 fetchFromGitHub, 5 gitUpdater, 6 kernel, 7 + kernelModuleMakeFlags, 8 }: 9 let 10 rev-prefix = "ena_linux_"; ··· 24 hardeningDisable = [ "pic" ]; 25 26 nativeBuildInputs = kernel.moduleBuildDependencies; 27 + makeFlags = kernelModuleMakeFlags; 28 29 env.KERNEL_BUILD_DIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"; 30
+2 -1
pkgs/os-specific/linux/evdi/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 libdrm, 7 python3, 8 }: ··· 39 python3WithLibs 40 ]; 41 42 - makeFlags = kernel.moduleMakeFlags ++ [ 43 "KVER=${kernel.modDirVersion}" 44 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 45 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 libdrm, 8 python3, 9 }: ··· 40 python3WithLibs 41 ]; 42 43 + makeFlags = kernelModuleMakeFlags ++ [ 44 "KVER=${kernel.modDirVersion}" 45 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 46 ];
+2 -1
pkgs/os-specific/linux/fanout/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 kmod, 7 nixosTests, 8 }: ··· 33 34 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 35 36 - makeFlags = kernel.moduleMakeFlags ++ [ 37 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 38 ]; 39
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 kmod, 8 nixosTests, 9 }: ··· 34 35 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 36 37 + makeFlags = kernelModuleMakeFlags ++ [ 38 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 39 ]; 40
+2 -1
pkgs/os-specific/linux/framework-laptop-kmod/default.nix
··· 2 lib, 3 stdenv, 4 kernel, 5 fetchFromGitHub, 6 unstableGitUpdater, 7 }: ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 - makeFlags = kernel.moduleMakeFlags ++ [ 23 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ]; 25
··· 2 lib, 3 stdenv, 4 kernel, 5 + kernelModuleMakeFlags, 6 fetchFromGitHub, 7 unstableGitUpdater, 8 }: ··· 20 21 nativeBuildInputs = kernel.moduleBuildDependencies; 22 23 + makeFlags = kernelModuleMakeFlags ++ [ 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ]; 26
+2 -1
pkgs/os-specific/linux/fwts/module.nix
··· 3 stdenv, 4 fwts, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 23 24 hardeningDisable = [ "pic" ]; 25 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 "INSTALL_MOD_PATH=${placeholder "out"}" 28 ]; 29
··· 3 stdenv, 4 fwts, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 24 25 hardeningDisable = [ "pic" ]; 26 27 + makeFlags = kernelModuleMakeFlags ++ [ 28 "INSTALL_MOD_PATH=${placeholder "out"}" 29 ]; 30
+2 -1
pkgs/os-specific/linux/gasket/default.nix
··· 4 fetchFromGitHub, 5 fetchpatch2, 6 kernel, 7 }: 8 9 stdenv.mkDerivation rec { ··· 31 cd src 32 ''; 33 34 - makeFlags = kernel.moduleMakeFlags ++ [ 35 "-C" 36 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 37 "M=$(PWD)"
··· 4 fetchFromGitHub, 5 fetchpatch2, 6 kernel, 7 + kernelModuleMakeFlags, 8 }: 9 10 stdenv.mkDerivation rec { ··· 32 cd src 33 ''; 34 35 + makeFlags = kernelModuleMakeFlags ++ [ 36 "-C" 37 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 38 "M=$(PWD)"
+2 -1
pkgs/os-specific/linux/gcadapter-oc-kmod/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 kmod, 7 }: 8 ··· 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 24 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 "KERNEL_SOURCE_DIR=${kernel.dev}/${kerneldir}/build" 27 "INSTALL_MOD_PATH=$(out)" 28 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 kmod, 8 }: 9 ··· 23 24 nativeBuildInputs = kernel.moduleBuildDependencies; 25 26 + makeFlags = kernelModuleMakeFlags ++ [ 27 "KERNEL_SOURCE_DIR=${kernel.dev}/${kerneldir}/build" 28 "INSTALL_MOD_PATH=$(out)" 29 ];
+2 -1
pkgs/os-specific/linux/hid-ite8291r3/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "VERSION=${version}" 23 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "VERSION=${version}" 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ];
+2 -1
pkgs/os-specific/linux/hid-t150/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 21 22 sourceRoot = "${src.name}/hid-t150"; 23 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 "INSTALL_MOD_PATH=${placeholder "out"}" 27 ];
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 22 23 sourceRoot = "${src.name}/hid-t150"; 24 25 + makeFlags = kernelModuleMakeFlags ++ [ 26 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 "INSTALL_MOD_PATH=${placeholder "out"}" 28 ];
+2 -2
pkgs/os-specific/linux/hid-tmff2/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, kernel }: 2 3 stdenv.mkDerivation { 4 pname = "hid-tmff2"; ··· 16 17 nativeBuildInputs = kernel.moduleBuildDependencies; 18 19 - makeFlags = kernel.moduleMakeFlags ++ [ 20 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 21 ]; 22
··· 1 + { stdenv, lib, fetchFromGitHub, kernel, kernelModuleMakeFlags }: 2 3 stdenv.mkDerivation { 4 pname = "hid-tmff2"; ··· 16 17 nativeBuildInputs = kernel.moduleBuildDependencies; 18 19 + makeFlags = kernelModuleMakeFlags ++ [ 20 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 21 ]; 22
+2 -1
pkgs/os-specific/linux/ipu6-drivers/default.nix
··· 4 fetchFromGitHub, 5 ivsc-driver, 6 kernel, 7 }: 8 9 stdenv.mkDerivation rec { ··· 31 32 nativeBuildInputs = kernel.moduleBuildDependencies; 33 34 - makeFlags = kernel.moduleMakeFlags ++ [ 35 "KERNELRELEASE=${kernel.modDirVersion}" 36 "KERNEL_SRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 37 ];
··· 4 fetchFromGitHub, 5 ivsc-driver, 6 kernel, 7 + kernelModuleMakeFlags, 8 }: 9 10 stdenv.mkDerivation rec { ··· 32 33 nativeBuildInputs = kernel.moduleBuildDependencies; 34 35 + makeFlags = kernelModuleMakeFlags ++ [ 36 "KERNELRELEASE=${kernel.modDirVersion}" 37 "KERNEL_SRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 38 ];
+2 -1
pkgs/os-specific/linux/ithc/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "VERSION=${version}" 23 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "VERSION=${version}" 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ];
+2 -1
pkgs/os-specific/linux/ivsc-driver/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation { ··· 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "KERNELRELEASE=${kernel.modDirVersion}" 23 "KERNEL_SRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation { ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "KERNELRELEASE=${kernel.modDirVersion}" 24 "KERNEL_SRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ];
+2 -1
pkgs/os-specific/linux/jool/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 nixosTests, 7 }: 8 ··· 22 sed -e 's@/lib/modules/\$(.*)@${kernel.dev}/lib/modules/${kernel.modDirVersion}@' -i src/mod/*/Makefile 23 ''; 24 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 "-C src/mod" 27 "INSTALL_MOD_PATH=${placeholder "out"}" 28 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 nixosTests, 8 }: 9 ··· 23 sed -e 's@/lib/modules/\$(.*)@${kernel.dev}/lib/modules/${kernel.modDirVersion}@' -i src/mod/*/Makefile 24 ''; 25 26 + makeFlags = kernelModuleMakeFlags ++ [ 27 "-C src/mod" 28 "INSTALL_MOD_PATH=${placeholder "out"}" 29 ];
+17 -19
pkgs/os-specific/linux/kernel/manual-config.nix
··· 434 "LD=${stdenv.cc.bintools.bintools}/bin/${stdenv.cc.targetPrefix}ld" 435 ] ++ (stdenv.hostPlatform.linux-kernel.makeFlags or []) 436 ++ extraMakeFlags; 437 438 - finalKernel = stdenv.mkDerivation ( 439 - builtins.foldl' lib.recursiveUpdate {} [ 440 - (drvAttrs config stdenv.hostPlatform.linux-kernel kernelPatches configfile) 441 - { 442 - inherit pname version; 443 444 - enableParallelBuilding = true; 445 446 - hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 447 448 - makeFlags = [ 449 - "O=$(buildRoot)" 450 - ] ++ commonMakeFlags; 451 452 - passthru.moduleMakeFlags = [ 453 - "KBUILD_OUTPUT=${finalKernel.dev}/lib/modules/${finalKernel.modDirVersion}/build" 454 - ] ++ commonMakeFlags; 455 456 - karch = stdenv.hostPlatform.linuxArch; 457 - } 458 - (optionalAttrs (pos != null) { inherit pos; }) 459 - ] 460 - ); 461 - in finalKernel)
··· 434 "LD=${stdenv.cc.bintools.bintools}/bin/${stdenv.cc.targetPrefix}ld" 435 ] ++ (stdenv.hostPlatform.linux-kernel.makeFlags or []) 436 ++ extraMakeFlags; 437 + in 438 439 + stdenv.mkDerivation ( 440 + builtins.foldl' lib.recursiveUpdate {} [ 441 + (drvAttrs config stdenv.hostPlatform.linux-kernel kernelPatches configfile) 442 + { 443 + inherit pname version; 444 445 + enableParallelBuilding = true; 446 447 + hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 448 449 + makeFlags = [ 450 + "O=$(buildRoot)" 451 + ] ++ commonMakeFlags; 452 453 + passthru = { inherit commonMakeFlags; }; 454 455 + karch = stdenv.hostPlatform.linuxArch; 456 + } 457 + (optionalAttrs (pos != null) { inherit pos; }) 458 + ] 459 + ))
+2 -1
pkgs/os-specific/linux/kernel/perf/default.nix
··· 4 fetchurl, 5 fetchpatch, 6 kernel, 7 elfutils, 8 python3, 9 perl, ··· 101 "WERROR=0" 102 "ASCIIDOC8=1" 103 ] 104 - ++ kernel.moduleMakeFlags 105 ++ lib.optional (!withGtk) "NO_GTK2=1" 106 ++ lib.optional (!withZstd) "NO_LIBZSTD=1" 107 ++ lib.optional (!withLibcap) "NO_LIBCAP=1";
··· 4 fetchurl, 5 fetchpatch, 6 kernel, 7 + kernelModuleMakeFlags, 8 elfutils, 9 python3, 10 perl, ··· 102 "WERROR=0" 103 "ASCIIDOC8=1" 104 ] 105 + ++ kernelModuleMakeFlags 106 ++ lib.optional (!withGtk) "NO_GTK2=1" 107 ++ lib.optional (!withZstd) "NO_LIBZSTD=1" 108 ++ lib.optional (!withLibcap) "NO_LIBCAP=1";
+2 -1
pkgs/os-specific/linux/lenovo-legion/default.nix
··· 2 lib, 3 stdenv, 4 kernel, 5 bash, 6 lenovo-legion, 7 }: ··· 18 sed -i -e '/depmod/d' ./Makefile 19 ''; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "SHELL=bash" 23 "KERNELVERSION=${kernel.modDirVersion}" 24 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"
··· 2 lib, 3 stdenv, 4 kernel, 5 + kernelModuleMakeFlags, 6 bash, 7 lenovo-legion, 8 }: ··· 19 sed -i -e '/depmod/d' ./Makefile 20 ''; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "SHELL=bash" 24 "KERNELVERSION=${kernel.modDirVersion}" 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"
+2 -1
pkgs/os-specific/linux/lkrg/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 let 8 isKernelRT = ··· 25 26 nativeBuildInputs = kernel.moduleBuildDependencies; 27 28 - makeFlags = kernel.moduleMakeFlags ++ [ 29 "KERNEL=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 ]; 31
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 let 9 isKernelRT = ··· 26 27 nativeBuildInputs = kernel.moduleBuildDependencies; 28 29 + makeFlags = kernelModuleMakeFlags ++ [ 30 "KERNEL=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 31 ]; 32
+2 -1
pkgs/os-specific/linux/lttng-modules/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 22 23 env.NIX_CFLAGS_COMPILE = "-Wno-error=implicit-function-declaration"; 24 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 "INSTALL_MOD_PATH=${placeholder "out"}" 28 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 23 24 env.NIX_CFLAGS_COMPILE = "-Wno-error=implicit-function-declaration"; 25 26 + makeFlags = kernelModuleMakeFlags ++ [ 27 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 28 "INSTALL_MOD_PATH=${placeholder "out"}" 29 ];
+2 -1
pkgs/os-specific/linux/mba6x_bl/default.nix
··· 1 { 2 fetchFromGitHub, 3 kernel, 4 lib, 5 stdenv, 6 }: ··· 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 "INSTALL_MOD_PATH=$(out)" 27 ];
··· 1 { 2 fetchFromGitHub, 3 kernel, 4 + kernelModuleMakeFlags, 5 lib, 6 stdenv, 7 }: ··· 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 24 25 + makeFlags = kernelModuleMakeFlags ++ [ 26 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 "INSTALL_MOD_PATH=$(out)" 28 ];
+2 -1
pkgs/os-specific/linux/mbp-modules/mbp2018-bridge-drv/default.nix
··· 2 lib, 3 stdenv, 4 kernel, 5 fetchFromGitHub, 6 }: 7 ··· 17 }; 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 - makeFlags = kernel.moduleMakeFlags; 21 22 buildPhase = '' 23 make -C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build \
··· 2 lib, 3 stdenv, 4 kernel, 5 + kernelModuleMakeFlags, 6 fetchFromGitHub, 7 }: 8 ··· 18 }; 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 + makeFlags = kernelModuleMakeFlags; 22 23 buildPhase = '' 24 make -C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build \
+2 -1
pkgs/os-specific/linux/msi-ec/default.nix
··· 5 linuxPackages, 6 git, 7 kernel ? linuxPackages.kernel, 8 }: 9 stdenv.mkDerivation { 10 pname = "msi-ec-kmods"; ··· 23 24 hardeningDisable = [ "pic" ]; 25 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 28 "INSTALL_MOD_PATH=$(out)" 29 ];
··· 5 linuxPackages, 6 git, 7 kernel ? linuxPackages.kernel, 8 + kernelModuleMakeFlags, 9 }: 10 stdenv.mkDerivation { 11 pname = "msi-ec-kmods"; ··· 24 25 hardeningDisable = [ "pic" ]; 26 27 + makeFlags = kernelModuleMakeFlags ++ [ 28 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 29 "INSTALL_MOD_PATH=$(out)" 30 ];
+2 -2
pkgs/os-specific/linux/mstflint_access/default.nix
··· 1 - { lib, stdenv, fetchurl, kernel, kmod, mstflint }: 2 3 stdenv.mkDerivation rec { 4 pname = "mstflint_access"; ··· 11 12 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 13 14 - makeFlags = kernel.moduleMakeFlags ++ [ 15 "KVER=${kernel.modDirVersion}" 16 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 17 ];
··· 1 + { lib, stdenv, fetchurl, kernel, kmod, mstflint, kernelModuleMakeFlags }: 2 3 stdenv.mkDerivation rec { 4 pname = "mstflint_access"; ··· 11 12 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 13 14 + makeFlags = kernelModuleMakeFlags ++ [ 15 "KVER=${kernel.modDirVersion}" 16 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 17 ];
+2 -1
pkgs/os-specific/linux/nct6687d/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 nix-update-script, 7 }: 8 ··· 23 24 nativeBuildInputs = kernel.moduleBuildDependencies; 25 26 - makeFlags = kernel.moduleMakeFlags ++ [ 27 "-C" 28 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 29 "M=$(sourceRoot)"
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 nix-update-script, 8 }: 9 ··· 24 25 nativeBuildInputs = kernel.moduleBuildDependencies; 26 27 + makeFlags = kernelModuleMakeFlags ++ [ 28 "-C" 29 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 "M=$(sourceRoot)"
+2 -1
pkgs/os-specific/linux/netatop/default.nix
··· 3 stdenv, 4 fetchurl, 5 kernel, 6 kmod, 7 zlib, 8 }: ··· 48 kmod=${kmod} substituteAllInPlace netatop.service 49 ''; 50 51 - makeFlags = kernel.moduleMakeFlags; 52 53 preInstall = '' 54 mkdir -p $out/lib/systemd/system $out/bin $out/sbin $out/share/man/man{4,8}
··· 3 stdenv, 4 fetchurl, 5 kernel, 6 + kernelModuleMakeFlags, 7 kmod, 8 zlib, 9 }: ··· 49 kmod=${kmod} substituteAllInPlace netatop.service 50 ''; 51 52 + makeFlags = kernelModuleMakeFlags; 53 54 preInstall = '' 55 mkdir -p $out/lib/systemd/system $out/bin $out/sbin $out/share/man/man{4,8}
+2 -1
pkgs/os-specific/linux/nullfs/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 }: 7 stdenv.mkDerivation rec { 8 pname = "nullfs"; ··· 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 - makeFlags = kernel.moduleMakeFlags ++ [ 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 ]; 27
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 stdenv.mkDerivation rec { 9 pname = "nullfs"; ··· 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 24 25 + makeFlags = kernelModuleMakeFlags ++ [ 26 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 ]; 28
+2 -1
pkgs/os-specific/linux/nvidia-x11/generic.nix
··· 42 fetchurl, 43 fetchzip, 44 kernel ? null, 45 perl, 46 nukeReferences, 47 which, ··· 205 kernelVersion = if libsOnly then null else kernel.modDirVersion; 206 207 makeFlags = lib.optionals (!libsOnly) ( 208 - kernel.moduleMakeFlags 209 ++ [ 210 "IGNORE_PREEMPT_RT_PRESENCE=1" 211 "NV_BUILD_SUPPORTS_HMM=1"
··· 42 fetchurl, 43 fetchzip, 44 kernel ? null, 45 + kernelModuleMakeFlags ? [], 46 perl, 47 nukeReferences, 48 which, ··· 206 kernelVersion = if libsOnly then null else kernel.modDirVersion; 207 208 makeFlags = lib.optionals (!libsOnly) ( 209 + kernelModuleMakeFlags 210 ++ [ 211 "IGNORE_PREEMPT_RT_PRESENCE=1" 212 "NV_BUILD_SUPPORTS_HMM=1"
+2 -1
pkgs/os-specific/linux/nvidia-x11/open.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 nvidia_x11, 7 hash, 8 patches ? [ ], ··· 25 26 nativeBuildInputs = kernel.moduleBuildDependencies; 27 28 - makeFlags = kernel.moduleMakeFlags ++ [ 29 "SYSSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source" 30 "SYSOUT=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 31 "MODLIB=$(out)/lib/modules/${kernel.modDirVersion}"
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 nvidia_x11, 8 hash, 9 patches ? [ ], ··· 26 27 nativeBuildInputs = kernel.moduleBuildDependencies; 28 29 + makeFlags = kernelModuleMakeFlags ++ [ 30 "SYSSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source" 31 "SYSOUT=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 32 "MODLIB=$(out)/lib/modules/${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/openrazer/driver.nix
··· 2 coreutils, 3 fetchFromGitHub, 4 kernel, 5 stdenv, 6 lib, 7 util-linux, ··· 20 21 nativeBuildInputs = kernel.moduleBuildDependencies; 22 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ]; 26
··· 2 coreutils, 3 fetchFromGitHub, 4 kernel, 5 + kernelModuleMakeFlags, 6 stdenv, 7 lib, 8 util-linux, ··· 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 24 + makeFlags = kernelModuleMakeFlags ++ [ 25 "KERNELDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 ]; 27
+2 -1
pkgs/os-specific/linux/qc71_laptop/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "VERSION=${version}" 23 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ];
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "VERSION=${version}" 24 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ];
+2 -2
pkgs/os-specific/linux/r8168/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, kernel }: 2 3 4 let modDestDir = "$out/lib/modules/${kernel.modDirVersion}/kernel/drivers/net/wireless/realtek/r8168"; ··· 27 # avoid using the Makefile directly -- it doesn't understand 28 # any kernel but the current. 29 # based on the ArchLinux pkgbuild: https://git.archlinux.org/svntogit/community.git/tree/trunk/PKGBUILD?h=packages/r8168 30 - makeFlags = kernel.moduleMakeFlags ++ [ 31 "-C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 32 "M=$(PWD)/src" 33 "modules"
··· 1 + { stdenv, lib, fetchFromGitHub, kernel, kernelModuleMakeFlags }: 2 3 4 let modDestDir = "$out/lib/modules/${kernel.modDirVersion}/kernel/drivers/net/wireless/realtek/r8168"; ··· 27 # avoid using the Makefile directly -- it doesn't understand 28 # any kernel but the current. 29 # based on the ArchLinux pkgbuild: https://git.archlinux.org/svntogit/community.git/tree/trunk/PKGBUILD?h=packages/r8168 30 + makeFlags = kernelModuleMakeFlags ++ [ 31 "-C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 32 "M=$(PWD)/src" 33 "modules"
+2 -1
pkgs/os-specific/linux/rtl8189es/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 bc, 7 nukeReferences, 8 }: ··· 34 substituteInPlace ./Makefile --replace '$(MODDESTDIR)' "$out/lib/modules/${kernel.modDirVersion}/kernel/net/wireless/" 35 ''; 36 37 - makeFlags = kernel.moduleMakeFlags ++ [ 38 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 39 ( 40 "CONFIG_PLATFORM_I386_PC="
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 bc, 8 nukeReferences, 9 }: ··· 35 substituteInPlace ./Makefile --replace '$(MODDESTDIR)' "$out/lib/modules/${kernel.modDirVersion}/kernel/net/wireless/" 36 ''; 37 38 + makeFlags = kernelModuleMakeFlags ++ [ 39 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 40 ( 41 "CONFIG_PLATFORM_I386_PC="
+2 -1
pkgs/os-specific/linux/rtl8192eu/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 bc, 7 }: 8 ··· 25 26 nativeBuildInputs = kernel.moduleBuildDependencies ++ [ bc ]; 27 28 - makeFlags = kernel.moduleMakeFlags ++ [ 29 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 ]; 31
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 bc, 8 }: 9 ··· 26 27 nativeBuildInputs = kernel.moduleBuildDependencies ++ [ bc ]; 28 29 + makeFlags = kernelModuleMakeFlags ++ [ 30 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 31 ]; 32
+2 -1
pkgs/os-specific/linux/rtl8814au/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation { ··· 17 }; 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 - makeFlags = kernel.moduleMakeFlags; 21 22 hardeningDisable = [ "pic" ]; 23
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation { ··· 18 }; 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 + makeFlags = kernelModuleMakeFlags; 22 23 hardeningDisable = [ "pic" ]; 24
+2 -1
pkgs/os-specific/linux/rtl8821ce/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 bc, 7 }: 8 ··· 20 hardeningDisable = [ "pic" ]; 21 22 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags; 24 25 prePatch = '' 26 substituteInPlace ./Makefile \
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 bc, 8 }: 9 ··· 21 hardeningDisable = [ "pic" ]; 22 23 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 24 + makeFlags = kernelModuleMakeFlags; 25 26 prePatch = '' 27 substituteInPlace ./Makefile \
+2 -1
pkgs/os-specific/linux/rtl8821cu/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 bc, 7 }: 8 ··· 20 hardeningDisable = [ "pic" ]; 21 22 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags; 24 25 prePatch = '' 26 substituteInPlace ./Makefile \
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 bc, 8 }: 9 ··· 21 hardeningDisable = [ "pic" ]; 22 23 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 24 + makeFlags = kernelModuleMakeFlags; 25 26 prePatch = '' 27 substituteInPlace ./Makefile \
+2 -1
pkgs/os-specific/linux/rtl88x2bu/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 bc, 7 }: 8 ··· 20 hardeningDisable = [ "pic" ]; 21 22 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags; 24 25 prePatch = '' 26 substituteInPlace ./Makefile \
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 bc, 8 }: 9 ··· 21 hardeningDisable = [ "pic" ]; 22 23 nativeBuildInputs = [ bc ] ++ kernel.moduleBuildDependencies; 24 + makeFlags = kernelModuleMakeFlags; 25 26 prePatch = '' 27 substituteInPlace ./Makefile \
+2 -1
pkgs/os-specific/linux/rtw88/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 let ··· 20 }; 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ]; 26
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 let ··· 21 }; 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 24 + makeFlags = kernelModuleMakeFlags ++ [ 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 ]; 27
+2 -1
pkgs/os-specific/linux/rtw89/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 let ··· 20 }; 21 22 nativeBuildInputs = kernel.moduleBuildDependencies; 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ]; 26
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 let ··· 21 }; 22 23 nativeBuildInputs = kernel.moduleBuildDependencies; 24 + makeFlags = kernelModuleMakeFlags ++ [ 25 "KSRC=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 ]; 27
+2 -1
pkgs/os-specific/linux/rust-out-of-tree-module/default.nix
··· 2 lib, 3 fetchFromGitHub, 4 kernel, 5 unstableGitUpdater, 6 }: 7 kernel.stdenv.mkDerivation { ··· 17 }; 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 - makeFlags = kernel.moduleMakeFlags ++ [ 21 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 22 ]; 23
··· 2 lib, 3 fetchFromGitHub, 4 kernel, 5 + kernelModuleMakeFlags, 6 unstableGitUpdater, 7 }: 8 kernel.stdenv.mkDerivation { ··· 18 }; 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 + makeFlags = kernelModuleMakeFlags ++ [ 22 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 ]; 24
+2 -1
pkgs/os-specific/linux/shufflecake/default.nix
··· 1 { 2 lib, 3 kernel, 4 stdenv, 5 fetchFromGitea, 6 libgcrypt, ··· 22 libgcrypt 23 lvm2 24 ]; 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 27 ]; 28
··· 1 { 2 lib, 3 kernel, 4 + kernelModuleMakeFlags, 5 stdenv, 6 fetchFromGitea, 7 libgcrypt, ··· 23 libgcrypt 24 lvm2 25 ]; 26 + makeFlags = kernelModuleMakeFlags ++ [ 27 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 28 ]; 29
+2 -1
pkgs/os-specific/linux/tmon/default.nix
··· 2 lib, 3 stdenv, 4 kernel, 5 ncurses, 6 }: 7 ··· 17 cd tools/thermal/tmon 18 ''; 19 20 - makeFlags = kernel.moduleMakeFlags ++ [ 21 "INSTALL_ROOT=\"$(out)\"" 22 "BINDIR=bin" 23 ];
··· 2 lib, 3 stdenv, 4 kernel, 5 + kernelModuleMakeFlags, 6 ncurses, 7 }: 8 ··· 18 cd tools/thermal/tmon 19 ''; 20 21 + makeFlags = kernelModuleMakeFlags ++ [ 22 "INSTALL_ROOT=\"$(out)\"" 23 "BINDIR=bin" 24 ];
+2 -1
pkgs/os-specific/linux/trelay/default.nix
··· 3 lib, 4 fetchgit, 5 kernel, 6 kmod, 7 }: 8 let ··· 30 cp '${./Makefile}' Makefile 31 ''; 32 33 - makeFlags = kernel.moduleMakeFlags ++ [ 34 "KERNELRELEASE=${kernel.modDirVersion}" 35 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 36 "INSTALL_MOD_PATH=$(out)"
··· 3 lib, 4 fetchgit, 5 kernel, 6 + kernelModuleMakeFlags, 7 kmod, 8 }: 9 let ··· 31 cp '${./Makefile}' Makefile 32 ''; 33 34 + makeFlags = kernelModuleMakeFlags ++ [ 35 "KERNELRELEASE=${kernel.modDirVersion}" 36 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 37 "INSTALL_MOD_PATH=$(out)"
+2 -1
pkgs/os-specific/linux/tsme-test/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation { ··· 18 19 nativeBuildInputs = kernel.moduleBuildDependencies; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 23 ]; 24
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation { ··· 19 20 nativeBuildInputs = kernel.moduleBuildDependencies; 21 22 + makeFlags = kernelModuleMakeFlags ++ [ 23 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 ]; 25
+2 -1
pkgs/os-specific/linux/tuxedo-drivers/default.nix
··· 3 stdenv, 4 fetchFromGitLab, 5 kernel, 6 kmod, 7 pahole, 8 }: ··· 22 buildInputs = [ pahole ]; 23 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 24 25 - makeFlags = kernel.moduleMakeFlags ++ [ 26 "KERNELRELEASE=${kernel.modDirVersion}" 27 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 28 "INSTALL_MOD_PATH=${placeholder "out"}"
··· 3 stdenv, 4 fetchFromGitLab, 5 kernel, 6 + kernelModuleMakeFlags, 7 kmod, 8 pahole, 9 }: ··· 23 buildInputs = [ pahole ]; 24 nativeBuildInputs = [ kmod ] ++ kernel.moduleBuildDependencies; 25 26 + makeFlags = kernelModuleMakeFlags ++ [ 27 "KERNELRELEASE=${kernel.modDirVersion}" 28 "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 29 "INSTALL_MOD_PATH=${placeholder "out"}"
+2 -2
pkgs/os-specific/linux/v4l2loopback/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, kernel, kmod }: 2 3 let version = "0.13.2"; 4 ··· 28 29 outputs = [ "out" "bin" ]; 30 31 - makeFlags = kernel.moduleMakeFlags ++ [ 32 "KERNELRELEASE=${kernel.modDirVersion}" 33 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 34 ];
··· 1 + { lib, stdenv, fetchFromGitHub, kernel, kmod, kernelModuleMakeFlags }: 2 3 let version = "0.13.2"; 4 ··· 28 29 outputs = [ "out" "bin" ]; 30 31 + makeFlags = kernelModuleMakeFlags ++ [ 32 "KERNELRELEASE=${kernel.modDirVersion}" 33 "KERNEL_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 34 ];
+2 -1
pkgs/os-specific/linux/veikk-linux-driver/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 20 21 buildInputs = [ kernel ]; 22 23 - makeFlags = kernel.moduleMakeFlags ++ [ 24 "BUILD_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 25 ]; 26
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 21 22 buildInputs = [ kernel ]; 23 24 + makeFlags = kernelModuleMakeFlags ++ [ 25 "BUILD_DIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 26 ]; 27
+2 -2
pkgs/os-specific/linux/virtio_vmmci/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, kernel }: 2 3 stdenv.mkDerivation rec { 4 name = "virtio_vmmci"; ··· 18 CONFIG_RTC_HCTOSYS yes 19 ''; 20 21 - makeFlags = kernel.moduleMakeFlags ++ [ 22 "DEPMOD=echo" 23 "INSTALL_MOD_PATH=$(out)" 24 "KERNELRELEASE=${kernel.modDirVersion}"
··· 1 + { stdenv, lib, fetchFromGitHub, kernel, kernelModuleMakeFlags }: 2 3 stdenv.mkDerivation rec { 4 name = "virtio_vmmci"; ··· 18 CONFIG_RTC_HCTOSYS yes 19 ''; 20 21 + makeFlags = kernelModuleMakeFlags ++ [ 22 "DEPMOD=echo" 23 "INSTALL_MOD_PATH=$(out)" 24 "KERNELRELEASE=${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/vmm_clock/default.nix
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 }: 7 8 stdenv.mkDerivation rec { ··· 26 CONFIG_RTC_HCTOSYS yes 27 ''; 28 29 - makeFlags = kernel.moduleMakeFlags ++ [ 30 "DEPMOD=echo" 31 "INSTALL_MOD_PATH=$(out)" 32 "KERNELRELEASE=${kernel.modDirVersion}"
··· 3 lib, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 }: 8 9 stdenv.mkDerivation rec { ··· 27 CONFIG_RTC_HCTOSYS yes 28 ''; 29 30 + makeFlags = kernelModuleMakeFlags ++ [ 31 "DEPMOD=echo" 32 "INSTALL_MOD_PATH=$(out)" 33 "KERNELRELEASE=${kernel.modDirVersion}"
+2 -1
pkgs/os-specific/linux/xpadneo/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 bluez, 7 nixosTests, 8 nix-update-script, ··· 26 nativeBuildInputs = kernel.moduleBuildDependencies; 27 buildInputs = [ bluez ]; 28 29 - makeFlags = kernel.moduleMakeFlags ++ [ 30 "-C" 31 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 32 "M=$(sourceRoot)"
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 bluez, 8 nixosTests, 9 nix-update-script, ··· 27 nativeBuildInputs = kernel.moduleBuildDependencies; 28 buildInputs = [ bluez ]; 29 30 + makeFlags = kernelModuleMakeFlags ++ [ 31 "-C" 32 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 33 "M=$(sourceRoot)"
+2 -1
pkgs/os-specific/linux/zenergy/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 kmod, 7 }: 8 ··· 27 "pic" 28 ]; 29 30 - makeFlags = kernel.moduleMakeFlags ++ [ "KDIR=${kernelDirectory}" ]; 31 32 installTargets = [ "modules_install" ]; 33
··· 3 stdenv, 4 fetchFromGitHub, 5 kernel, 6 + kernelModuleMakeFlags, 7 kmod, 8 }: 9 ··· 28 "pic" 29 ]; 30 31 + makeFlags = kernelModuleMakeFlags ++ [ "KDIR=${kernelDirectory}" ]; 32 33 installTargets = [ "modules_install" ]; 34
+4 -2
pkgs/os-specific/linux/zfs/generic.nix
··· 34 35 # Kernel dependencies 36 kernel ? null, 37 enablePython ? true, 38 ... 39 }@outerArgs: ··· 191 "--with-linux=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source" 192 "--with-linux-obj=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 193 ] 194 - ++ kernel.moduleMakeFlags 195 ); 196 197 - makeFlags = optionals buildKernel kernel.moduleMakeFlags; 198 199 enableParallelBuilding = true; 200 ··· 264 outputs = [ "out" ] ++ optionals buildUser [ "dev" ]; 265 266 passthru = { 267 inherit enableMail kernelModuleAttribute; 268 latestCompatibleLinuxPackages = lib.warn "zfs.latestCompatibleLinuxPackages is deprecated and is now pointing at the default kernel. If using the stable LTS kernel (default `linuxPackages` is not possible then you must explicitly pin a specific kernel release. For example, `boot.kernelPackages = pkgs.linuxPackages_6_6`. Please be aware that non-LTS kernels are likely to go EOL before ZFS supports the latest supported non-LTS release, requiring manual intervention." linuxPackages; 269
··· 34 35 # Kernel dependencies 36 kernel ? null, 37 + kernelModuleMakeFlags ? [ ], 38 enablePython ? true, 39 ... 40 }@outerArgs: ··· 192 "--with-linux=${kernel.dev}/lib/modules/${kernel.modDirVersion}/source" 193 "--with-linux-obj=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 194 ] 195 + ++ kernelModuleMakeFlags 196 ); 197 198 + makeFlags = optionals buildKernel kernelModuleMakeFlags; 199 200 enableParallelBuilding = true; 201 ··· 265 outputs = [ "out" ] ++ optionals buildUser [ "dev" ]; 266 267 passthru = { 268 + inherit kernel; 269 inherit enableMail kernelModuleAttribute; 270 latestCompatibleLinuxPackages = lib.warn "zfs.latestCompatibleLinuxPackages is deprecated and is now pointing at the default kernel. If using the stable LTS kernel (default `linuxPackages` is not possible then you must explicitly pin a specific kernel release. For example, `boot.kernelPackages = pkgs.linuxPackages_6_6`. Please be aware that non-LTS kernels are likely to go EOL before ZFS supports the latest supported non-LTS release, requiring manual intervention." linuxPackages; 271
+3 -3
pkgs/servers/home-assistant/custom-lovelace-modules/hourly-weather/package.nix
··· 6 7 buildNpmPackage rec { 8 pname = "hourly-weather"; 9 - version = "6.6.0"; 10 11 src = fetchFromGitHub { 12 owner = "decompil3d"; 13 repo = "lovelace-hourly-weather"; 14 rev = version; 15 - hash = "sha256-UlKObFzzjsjxqp2uKvI8BYHTFBWFLFg4RTnJkFplZCA="; 16 }; 17 18 - npmDepsHash = "sha256-cDRS87+uNbf4OOQ5w6gFFgeI52YblfAB0bS07wJg5r0="; 19 20 env.CYPRESS_INSTALL_BINARY = "0"; 21
··· 6 7 buildNpmPackage rec { 8 pname = "hourly-weather"; 9 + version = "6.6.1"; 10 11 src = fetchFromGitHub { 12 owner = "decompil3d"; 13 repo = "lovelace-hourly-weather"; 14 rev = version; 15 + hash = "sha256-D2kCUcUgLyMVeba3xc02q/5PrEzXrBVCX+75F58j8y0="; 16 }; 17 18 + npmDepsHash = "sha256-gpyqQd4pRF4xKgfT9gRAVnXLSFThjfJV2yu4zOCvVpg="; 19 20 env.CYPRESS_INSTALL_BINARY = "0"; 21
+2 -2
pkgs/tools/package-management/nix/default.nix
··· 155 }; 156 157 nix_2_25 = common { 158 - version = "2.25.4"; 159 - hash = "sha256-cB/1vIYk8LWvL71hiKFu8froJHTUAfsYOOxBlBeNglI="; 160 self_attribute_name = "nix_2_25"; 161 }; 162
··· 155 }; 156 157 nix_2_25 = common { 158 + version = "2.25.5"; 159 + hash = "sha256-9xrQhrqHCSqWsQveykZvG/ZMu0se66fUQw3xVSg6BpQ="; 160 self_attribute_name = "nix_2_25"; 161 }; 162
-6
pkgs/top-level/all-packages.nix
··· 14775 nodejs = nodejs_18; 14776 }; 14777 14778 - photoqt = callPackage ../by-name/ph/photoqt/package.nix { 14779 - stdenv = if stdenv.hostPlatform.isDarwin then overrideSDK stdenv "11.0" else stdenv; 14780 - }; 14781 - 14782 photoflare = libsForQt5.callPackage ../applications/graphics/photoflare { }; 14783 14784 phototonic = libsForQt5.callPackage ../applications/graphics/phototonic { }; ··· 18188 discord-screenaudio = qt6Packages.callPackage ../applications/networking/instant-messengers/discord-screenaudio { }; 18189 18190 discordo = callPackage ../applications/networking/discordo/default.nix { }; 18191 - 18192 - golden-cheetah = libsForQt5.callPackage ../applications/misc/golden-cheetah { }; 18193 18194 tomb = callPackage ../by-name/to/tomb/package.nix { 18195 pinentry = pinentry-curses;
··· 14775 nodejs = nodejs_18; 14776 }; 14777 14778 photoflare = libsForQt5.callPackage ../applications/graphics/photoflare { }; 14779 14780 phototonic = libsForQt5.callPackage ../applications/graphics/phototonic { }; ··· 18184 discord-screenaudio = qt6Packages.callPackage ../applications/networking/instant-messengers/discord-screenaudio { }; 18185 18186 discordo = callPackage ../applications/networking/discordo/default.nix { }; 18187 18188 tomb = callPackage ../by-name/to/tomb/package.nix { 18189 pinentry = pinentry-curses;
+3
pkgs/top-level/linux-kernels.nix
··· 322 # to help determine module compatibility 323 inherit (kernel) isZen isHardened isLibre; 324 inherit (kernel) kernelOlder kernelAtLeast; 325 # Obsolete aliases (these packages do not depend on the kernel). 326 inherit (pkgs) odp-dpdk pktgen; # added 2018-05 327 inherit (pkgs) bcc bpftrace; # added 2021-12
··· 322 # to help determine module compatibility 323 inherit (kernel) isZen isHardened isLibre; 324 inherit (kernel) kernelOlder kernelAtLeast; 325 + kernelModuleMakeFlags = self.kernel.commonMakeFlags ++ [ 326 + "KBUILD_OUTPUT=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 327 + ]; 328 # Obsolete aliases (these packages do not depend on the kernel). 329 inherit (pkgs) odp-dpdk pktgen; # added 2018-05 330 inherit (pkgs) bcc bpftrace; # added 2021-12