Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 6233e02d 9005cb88

+1044 -440
+6
maintainers/maintainer-list.nix
··· 9760 githubId = 37246692; 9761 name = "Riley Inman"; 9762 }; 9763 ris = { 9764 email = "code@humanleg.org.uk"; 9765 github = "risicle";
··· 9760 githubId = 37246692; 9761 name = "Riley Inman"; 9762 }; 9763 + riotbib = { 9764 + email = "github-nix@lnrt.de"; 9765 + github = "riotbib"; 9766 + githubId = 43172581; 9767 + name = "Lennart Mühlenmeier"; 9768 + }; 9769 ris = { 9770 email = "code@humanleg.org.uk"; 9771 github = "risicle";
+191 -137
nixos/modules/security/pam.nix
··· 410 # Samba stuff to the Samba module. This requires that the PAM 411 # module provides the right hooks. 412 text = mkDefault 413 - ('' 414 - # Account management. 415 - account required pam_unix.so 416 - ${optionalString use_ldap 417 - "account sufficient ${pam_ldap}/lib/security/pam_ldap.so"} 418 - ${optionalString (config.services.sssd.enable && cfg.sssdStrictAccess==false) 419 - "account sufficient ${pkgs.sssd}/lib/security/pam_sss.so"} 420 - ${optionalString (config.services.sssd.enable && cfg.sssdStrictAccess) 421 - "account [default=bad success=ok user_unknown=ignore] ${pkgs.sssd}/lib/security/pam_sss.so"} 422 - ${optionalString config.krb5.enable 423 - "account sufficient ${pam_krb5}/lib/security/pam_krb5.so"} 424 - ${optionalString cfg.googleOsLoginAccountVerification '' 425 account [success=ok ignore=ignore default=die] ${pkgs.google-compute-engine-oslogin}/lib/pam_oslogin_login.so 426 account [success=ok default=ignore] ${pkgs.google-compute-engine-oslogin}/lib/pam_oslogin_admin.so 427 - ''} 428 429 - # Authentication management. 430 - ${optionalString cfg.googleOsLoginAuthentication 431 - "auth [success=done perm_denied=bad default=ignore] ${pkgs.google-compute-engine-oslogin}/lib/pam_oslogin_login.so"} 432 - ${optionalString cfg.rootOK 433 - "auth sufficient pam_rootok.so"} 434 - ${optionalString cfg.requireWheel 435 - "auth required pam_wheel.so use_uid"} 436 - ${optionalString cfg.logFailures 437 - "auth required pam_faillock.so"} 438 - ${optionalString (config.security.pam.enableSSHAgentAuth && cfg.sshAgentAuth) 439 - "auth sufficient ${pkgs.pam_ssh_agent_auth}/libexec/pam_ssh_agent_auth.so file=${lib.concatStringsSep ":" config.services.openssh.authorizedKeysFiles}"} 440 - ${let p11 = config.security.pam.p11; in optionalString cfg.p11Auth 441 - "auth ${p11.control} ${pkgs.pam_p11}/lib/security/pam_p11.so ${pkgs.opensc}/lib/opensc-pkcs11.so"} 442 - ${let u2f = config.security.pam.u2f; in optionalString cfg.u2fAuth 443 - "auth ${u2f.control} ${pkgs.pam_u2f}/lib/security/pam_u2f.so ${optionalString u2f.debug "debug"} ${optionalString (u2f.authFile != null) "authfile=${u2f.authFile}"} ${optionalString u2f.interactive "interactive"} ${optionalString u2f.cue "cue"} ${optionalString (u2f.appId != null) "appid=${u2f.appId}"}"} 444 - ${optionalString cfg.usbAuth 445 - "auth sufficient ${pkgs.pam_usb}/lib/security/pam_usb.so"} 446 - ${let oath = config.security.pam.oath; in optionalString cfg.oathAuth 447 - "auth requisite ${pkgs.oathToolkit}/lib/security/pam_oath.so window=${toString oath.window} usersfile=${toString oath.usersFile} digits=${toString oath.digits}"} 448 - ${let yubi = config.security.pam.yubico; in optionalString cfg.yubicoAuth 449 - "auth ${yubi.control} ${pkgs.yubico-pam}/lib/security/pam_yubico.so mode=${toString yubi.mode} ${optionalString (yubi.challengeResponsePath != null) "chalresp_path=${yubi.challengeResponsePath}"} ${optionalString (yubi.mode == "client") "id=${toString yubi.id}"} ${optionalString yubi.debug "debug"}"} 450 - ${optionalString cfg.fprintAuth 451 - "auth sufficient ${pkgs.fprintd}/lib/security/pam_fprintd.so"} 452 - '' + 453 # Modules in this block require having the password set in PAM_AUTHTOK. 454 # pam_unix is marked as 'sufficient' on NixOS which means nothing will run 455 # after it succeeds. Certain modules need to run after pam_unix ··· 457 # earlier point and it will run again with 'sufficient' further down. 458 # We use try_first_pass the second time to avoid prompting password twice 459 (optionalString (cfg.unixAuth && 460 - (config.security.pam.enableEcryptfs 461 - || cfg.pamMount 462 - || cfg.enableKwallet 463 - || cfg.enableGnomeKeyring 464 - || cfg.googleAuthenticator.enable 465 - || cfg.gnupg.enable 466 - || cfg.duoSecurity.enable)) '' 467 - auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth 468 - ${optionalString config.security.pam.enableEcryptfs 469 - "auth optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so unwrap"} 470 - ${optionalString cfg.pamMount 471 - "auth optional ${pkgs.pam_mount}/lib/security/pam_mount.so disable_interactive"} 472 - ${optionalString cfg.enableKwallet 473 - ("auth optional ${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so" + 474 - " kwalletd=${pkgs.plasma5Packages.kwallet.bin}/bin/kwalletd5")} 475 - ${optionalString cfg.enableGnomeKeyring 476 - "auth optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so"} 477 - ${optionalString cfg.gnupg.enable 478 - "auth optional ${pkgs.pam_gnupg}/lib/security/pam_gnupg.so" 479 - + optionalString cfg.gnupg.storeOnly " store-only" 480 - } 481 - ${optionalString cfg.googleAuthenticator.enable 482 - "auth required ${pkgs.googleAuthenticator}/lib/security/pam_google_authenticator.so no_increment_hotp"} 483 - ${optionalString cfg.duoSecurity.enable 484 - "auth required ${pkgs.duo-unix}/lib/security/pam_duo.so"} 485 - '') + '' 486 - ${optionalString cfg.unixAuth 487 - "auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass"} 488 - ${optionalString cfg.otpwAuth 489 - "auth sufficient ${pkgs.otpw}/lib/security/pam_otpw.so"} 490 - ${optionalString use_ldap 491 - "auth sufficient ${pam_ldap}/lib/security/pam_ldap.so use_first_pass"} 492 - ${optionalString config.services.sssd.enable 493 - "auth sufficient ${pkgs.sssd}/lib/security/pam_sss.so use_first_pass"} 494 - ${optionalString config.krb5.enable '' 495 auth [default=ignore success=1 service_err=reset] ${pam_krb5}/lib/security/pam_krb5.so use_first_pass 496 auth [default=die success=done] ${pam_ccreds}/lib/security/pam_ccreds.so action=validate use_first_pass 497 auth sufficient ${pam_ccreds}/lib/security/pam_ccreds.so action=store use_first_pass 498 - ''} 499 - auth required pam_deny.so 500 501 - # Password management. 502 - password sufficient pam_unix.so nullok sha512 503 - ${optionalString config.security.pam.enableEcryptfs 504 - "password optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"} 505 - ${optionalString cfg.pamMount 506 - "password optional ${pkgs.pam_mount}/lib/security/pam_mount.so"} 507 - ${optionalString use_ldap 508 - "password sufficient ${pam_ldap}/lib/security/pam_ldap.so"} 509 - ${optionalString config.services.sssd.enable 510 - "password sufficient ${pkgs.sssd}/lib/security/pam_sss.so use_authtok"} 511 - ${optionalString config.krb5.enable 512 - "password sufficient ${pam_krb5}/lib/security/pam_krb5.so use_first_pass"} 513 - ${optionalString cfg.enableGnomeKeyring 514 - "password optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so use_authtok"} 515 516 - # Session management. 517 - ${optionalString cfg.setEnvironment '' 518 session required pam_env.so conffile=/etc/pam/environment readenv=0 519 - ''} 520 - session required pam_unix.so 521 - ${optionalString cfg.setLoginUid 522 - "session ${ 523 - if config.boot.isContainer then "optional" else "required" 524 - } pam_loginuid.so"} 525 - ${optionalString cfg.ttyAudit.enable 526 - "session required ${pkgs.pam}/lib/security/pam_tty_audit.so 527 open_only=${toString cfg.ttyAudit.openOnly} 528 ${optionalString (cfg.ttyAudit.enablePattern != null) "enable=${cfg.ttyAudit.enablePattern}"} 529 ${optionalString (cfg.ttyAudit.disablePattern != null) "disable=${cfg.ttyAudit.disablePattern}"} 530 - "} 531 - ${optionalString cfg.makeHomeDir 532 - "session required ${pkgs.pam}/lib/security/pam_mkhomedir.so silent skel=${config.security.pam.makeHomeDir.skelDirectory} umask=0077"} 533 - ${optionalString cfg.updateWtmp 534 - "session required ${pkgs.pam}/lib/security/pam_lastlog.so silent"} 535 - ${optionalString config.security.pam.enableEcryptfs 536 - "session optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"} 537 - ${optionalString cfg.pamMount 538 - "session optional ${pkgs.pam_mount}/lib/security/pam_mount.so disable_interactive"} 539 - ${optionalString use_ldap 540 - "session optional ${pam_ldap}/lib/security/pam_ldap.so"} 541 - ${optionalString config.services.sssd.enable 542 - "session optional ${pkgs.sssd}/lib/security/pam_sss.so"} 543 - ${optionalString config.krb5.enable 544 - "session optional ${pam_krb5}/lib/security/pam_krb5.so"} 545 - ${optionalString cfg.otpwAuth 546 - "session optional ${pkgs.otpw}/lib/security/pam_otpw.so"} 547 - ${optionalString cfg.startSession 548 - "session optional ${pkgs.systemd}/lib/security/pam_systemd.so"} 549 - ${optionalString cfg.forwardXAuth 550 - "session optional pam_xauth.so xauthpath=${pkgs.xorg.xauth}/bin/xauth systemuser=99"} 551 - ${optionalString (cfg.limits != []) 552 - "session required ${pkgs.pam}/lib/security/pam_limits.so conf=${makeLimitsConf cfg.limits}"} 553 - ${optionalString (cfg.showMotd && config.users.motd != null) 554 - "session optional ${pkgs.pam}/lib/security/pam_motd.so motd=${motd}"} 555 - ${optionalString (cfg.enableAppArmor && config.security.apparmor.enable) 556 - "session optional ${pkgs.apparmor-pam}/lib/security/pam_apparmor.so order=user,group,default debug"} 557 - ${optionalString (cfg.enableKwallet) 558 - ("session optional ${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so" + 559 - " kwalletd=${pkgs.plasma5Packages.kwallet.bin}/bin/kwalletd5")} 560 - ${optionalString (cfg.enableGnomeKeyring) 561 - "session optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so auto_start"} 562 - ${optionalString cfg.gnupg.enable 563 - "session optional ${pkgs.pam_gnupg}/lib/security/pam_gnupg.so" 564 - + optionalString cfg.gnupg.noAutostart " no-autostart" 565 - } 566 - ${optionalString (config.virtualisation.lxc.lxcfs.enable) 567 - "session optional ${pkgs.lxc}/lib/security/pam_cgfs.so -c all"} 568 - ''); 569 }; 570 571 };
··· 410 # Samba stuff to the Samba module. This requires that the PAM 411 # module provides the right hooks. 412 text = mkDefault 413 + ( 414 + '' 415 + # Account management. 416 + account required pam_unix.so 417 + '' + 418 + optionalString use_ldap '' 419 + account sufficient ${pam_ldap}/lib/security/pam_ldap.so 420 + '' + 421 + optionalString (config.services.sssd.enable && cfg.sssdStrictAccess==false) '' 422 + account sufficient ${pkgs.sssd}/lib/security/pam_sss.so 423 + '' + 424 + optionalString (config.services.sssd.enable && cfg.sssdStrictAccess) '' 425 + account [default=bad success=ok user_unknown=ignore] ${pkgs.sssd}/lib/security/pam_sss.so 426 + '' + 427 + optionalString config.krb5.enable '' 428 + account sufficient ${pam_krb5}/lib/security/pam_krb5.so 429 + '' + 430 + optionalString cfg.googleOsLoginAccountVerification '' 431 account [success=ok ignore=ignore default=die] ${pkgs.google-compute-engine-oslogin}/lib/pam_oslogin_login.so 432 account [success=ok default=ignore] ${pkgs.google-compute-engine-oslogin}/lib/pam_oslogin_admin.so 433 + '' + 434 + '' 435 436 + # Authentication management. 437 + '' + 438 + optionalString cfg.googleOsLoginAuthentication '' 439 + auth [success=done perm_denied=bad default=ignore] ${pkgs.google-compute-engine-oslogin}/lib/pam_oslogin_login.so 440 + '' + 441 + optionalString cfg.rootOK '' 442 + auth sufficient pam_rootok.so 443 + '' + 444 + optionalString cfg.requireWheel '' 445 + auth required pam_wheel.so use_uid 446 + '' + 447 + optionalString cfg.logFailures '' 448 + auth required pam_faillock.so 449 + '' + 450 + optionalString (config.security.pam.enableSSHAgentAuth && cfg.sshAgentAuth) '' 451 + auth sufficient ${pkgs.pam_ssh_agent_auth}/libexec/pam_ssh_agent_auth.so file=${lib.concatStringsSep ":" config.services.openssh.authorizedKeysFiles} 452 + '' + 453 + (let p11 = config.security.pam.p11; in optionalString cfg.p11Auth '' 454 + auth ${p11.control} ${pkgs.pam_p11}/lib/security/pam_p11.so ${pkgs.opensc}/lib/opensc-pkcs11.so 455 + '') + 456 + (let u2f = config.security.pam.u2f; in optionalString cfg.u2fAuth '' 457 + auth ${u2f.control} ${pkgs.pam_u2f}/lib/security/pam_u2f.so ${optionalString u2f.debug "debug"} ${optionalString (u2f.authFile != null) "authfile=${u2f.authFile}"} ${optionalString u2f.interactive "interactive"} ${optionalString u2f.cue "cue"} ${optionalString (u2f.appId != null) "appid=${u2f.appId}"} 458 + '') + 459 + optionalString cfg.usbAuth '' 460 + auth sufficient ${pkgs.pam_usb}/lib/security/pam_usb.so 461 + '' + 462 + (let oath = config.security.pam.oath; in optionalString cfg.oathAuth '' 463 + auth requisite ${pkgs.oathToolkit}/lib/security/pam_oath.so window=${toString oath.window} usersfile=${toString oath.usersFile} digits=${toString oath.digits} 464 + '') + 465 + (let yubi = config.security.pam.yubico; in optionalString cfg.yubicoAuth '' 466 + auth ${yubi.control} ${pkgs.yubico-pam}/lib/security/pam_yubico.so mode=${toString yubi.mode} ${optionalString (yubi.challengeResponsePath != null) "chalresp_path=${yubi.challengeResponsePath}"} ${optionalString (yubi.mode == "client") "id=${toString yubi.id}"} ${optionalString yubi.debug "debug"} 467 + '') + 468 + optionalString cfg.fprintAuth '' 469 + auth sufficient ${pkgs.fprintd}/lib/security/pam_fprintd.so 470 + '' + 471 # Modules in this block require having the password set in PAM_AUTHTOK. 472 # pam_unix is marked as 'sufficient' on NixOS which means nothing will run 473 # after it succeeds. Certain modules need to run after pam_unix ··· 475 # earlier point and it will run again with 'sufficient' further down. 476 # We use try_first_pass the second time to avoid prompting password twice 477 (optionalString (cfg.unixAuth && 478 + (config.security.pam.enableEcryptfs 479 + || cfg.pamMount 480 + || cfg.enableKwallet 481 + || cfg.enableGnomeKeyring 482 + || cfg.googleAuthenticator.enable 483 + || cfg.gnupg.enable 484 + || cfg.duoSecurity.enable)) 485 + ( 486 + '' 487 + auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth 488 + '' + 489 + optionalString config.security.pam.enableEcryptfs '' 490 + auth optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so unwrap 491 + '' + 492 + optionalString cfg.pamMount '' 493 + auth optional ${pkgs.pam_mount}/lib/security/pam_mount.so disable_interactive 494 + '' + 495 + optionalString cfg.enableKwallet '' 496 + auth optional ${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so kwalletd=${pkgs.plasma5Packages.kwallet.bin}/bin/kwalletd5 497 + '' + 498 + optionalString cfg.enableGnomeKeyring '' 499 + auth optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so 500 + '' + 501 + optionalString cfg.gnupg.enable '' 502 + auth optional ${pkgs.pam_gnupg}/lib/security/pam_gnupg.so ${optionalString cfg.gnupg.storeOnly " store-only"} 503 + '' + 504 + optionalString cfg.googleAuthenticator.enable '' 505 + auth required ${pkgs.googleAuthenticator}/lib/security/pam_google_authenticator.so no_increment_hotp 506 + '' + 507 + optionalString cfg.duoSecurity.enable '' 508 + auth required ${pkgs.duo-unix}/lib/security/pam_duo.so 509 + '' 510 + )) + 511 + optionalString cfg.unixAuth '' 512 + auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass 513 + '' + 514 + optionalString cfg.otpwAuth '' 515 + auth sufficient ${pkgs.otpw}/lib/security/pam_otpw.so 516 + '' + 517 + optionalString use_ldap '' 518 + auth sufficient ${pam_ldap}/lib/security/pam_ldap.so use_first_pass 519 + '' + 520 + optionalString config.services.sssd.enable '' 521 + auth sufficient ${pkgs.sssd}/lib/security/pam_sss.so use_first_pass 522 + '' + 523 + optionalString config.krb5.enable '' 524 auth [default=ignore success=1 service_err=reset] ${pam_krb5}/lib/security/pam_krb5.so use_first_pass 525 auth [default=die success=done] ${pam_ccreds}/lib/security/pam_ccreds.so action=validate use_first_pass 526 auth sufficient ${pam_ccreds}/lib/security/pam_ccreds.so action=store use_first_pass 527 + '' + 528 + '' 529 + auth required pam_deny.so 530 531 + # Password management. 532 + password sufficient pam_unix.so nullok sha512 533 + '' + 534 + optionalString config.security.pam.enableEcryptfs '' 535 + password optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so 536 + '' + 537 + optionalString cfg.pamMount '' 538 + password optional ${pkgs.pam_mount}/lib/security/pam_mount.so 539 + '' + 540 + optionalString use_ldap '' 541 + password sufficient ${pam_ldap}/lib/security/pam_ldap.so 542 + '' + 543 + optionalString config.services.sssd.enable '' 544 + password sufficient ${pkgs.sssd}/lib/security/pam_sss.so use_authtok 545 + '' + 546 + optionalString config.krb5.enable '' 547 + password sufficient ${pam_krb5}/lib/security/pam_krb5.so use_first_pass 548 + '' + 549 + optionalString cfg.enableGnomeKeyring '' 550 + password optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so use_authtok 551 + '' + 552 + '' 553 554 + # Session management. 555 + '' + 556 + optionalString cfg.setEnvironment '' 557 session required pam_env.so conffile=/etc/pam/environment readenv=0 558 + '' + 559 + '' 560 + session required pam_unix.so 561 + '' + 562 + optionalString cfg.setLoginUid '' 563 + session ${if config.boot.isContainer then "optional" else "required"} pam_loginuid.so 564 + '' + 565 + optionalString cfg.ttyAudit.enable '' 566 + session required ${pkgs.pam}/lib/security/pam_tty_audit.so 567 open_only=${toString cfg.ttyAudit.openOnly} 568 ${optionalString (cfg.ttyAudit.enablePattern != null) "enable=${cfg.ttyAudit.enablePattern}"} 569 ${optionalString (cfg.ttyAudit.disablePattern != null) "disable=${cfg.ttyAudit.disablePattern}"} 570 + '' + 571 + optionalString cfg.makeHomeDir '' 572 + session required ${pkgs.pam}/lib/security/pam_mkhomedir.so silent skel=${config.security.pam.makeHomeDir.skelDirectory} umask=0077 573 + '' + 574 + optionalString cfg.updateWtmp '' 575 + session required ${pkgs.pam}/lib/security/pam_lastlog.so silent 576 + '' + 577 + optionalString config.security.pam.enableEcryptfs '' 578 + session optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so 579 + '' + 580 + optionalString cfg.pamMount '' 581 + session optional ${pkgs.pam_mount}/lib/security/pam_mount.so disable_interactive 582 + '' + 583 + optionalString use_ldap '' 584 + session optional ${pam_ldap}/lib/security/pam_ldap.so 585 + '' + 586 + optionalString config.services.sssd.enable '' 587 + session optional ${pkgs.sssd}/lib/security/pam_sss.so 588 + '' + 589 + optionalString config.krb5.enable '' 590 + session optional ${pam_krb5}/lib/security/pam_krb5.so 591 + '' + 592 + optionalString cfg.otpwAuth '' 593 + session optional ${pkgs.otpw}/lib/security/pam_otpw.so 594 + '' + 595 + optionalString cfg.startSession '' 596 + session optional ${pkgs.systemd}/lib/security/pam_systemd.so 597 + '' + 598 + optionalString cfg.forwardXAuth '' 599 + session optional pam_xauth.so xauthpath=${pkgs.xorg.xauth}/bin/xauth systemuser=99 600 + '' + 601 + optionalString (cfg.limits != []) '' 602 + session required ${pkgs.pam}/lib/security/pam_limits.so conf=${makeLimitsConf cfg.limits} 603 + '' + 604 + optionalString (cfg.showMotd && config.users.motd != null) '' 605 + session optional ${pkgs.pam}/lib/security/pam_motd.so motd=${motd} 606 + '' + 607 + optionalString (cfg.enableAppArmor && config.security.apparmor.enable) '' 608 + session optional ${pkgs.apparmor-pam}/lib/security/pam_apparmor.so order=user,group,default debug 609 + '' + 610 + optionalString (cfg.enableKwallet) '' 611 + session optional ${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so kwalletd=${pkgs.plasma5Packages.kwallet.bin}/bin/kwalletd5 612 + '' + 613 + optionalString (cfg.enableGnomeKeyring) '' 614 + session optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so auto_start 615 + '' + 616 + optionalString cfg.gnupg.enable '' 617 + session optional ${pkgs.pam_gnupg}/lib/security/pam_gnupg.so ${optionalString cfg.gnupg.noAutostart " no-autostart"} 618 + '' + 619 + optionalString (config.virtualisation.lxc.lxcfs.enable) '' 620 + session optional ${pkgs.lxc}/lib/security/pam_cgfs.so -c all 621 + '' 622 + ); 623 }; 624 625 };
+7 -1
nixos/modules/services/misc/xmrig.nix
··· 51 }; 52 53 config = mkIf cfg.enable { 54 systemd.services.xmrig = { 55 wantedBy = [ "multi-user.target" ]; 56 after = [ "network.target" ]; ··· 58 serviceConfig = { 59 ExecStartPre = "${cfg.package}/bin/xmrig --config=${configFile} --dry-run"; 60 ExecStart = "${cfg.package}/bin/xmrig --config=${configFile}"; 61 - DynamicUser = true; 62 }; 63 }; 64 };
··· 51 }; 52 53 config = mkIf cfg.enable { 54 + boot.kernelModules = [ "msr" ]; 55 + 56 systemd.services.xmrig = { 57 wantedBy = [ "multi-user.target" ]; 58 after = [ "network.target" ]; ··· 60 serviceConfig = { 61 ExecStartPre = "${cfg.package}/bin/xmrig --config=${configFile} --dry-run"; 62 ExecStart = "${cfg.package}/bin/xmrig --config=${configFile}"; 63 + # https://xmrig.com/docs/miner/randomx-optimization-guide/msr 64 + # If you use recent XMRig with root privileges (Linux) or admin 65 + # privileges (Windows) the miner configure all MSR registers 66 + # automatically. 67 + DynamicUser = lib.mkDefault false; 68 }; 69 }; 70 };
+6 -1
nixos/modules/services/monitoring/zabbix-server.nix
··· 250 }; 251 252 security.wrappers = { 253 - fping.source = "${pkgs.fping}/bin/fping"; 254 }; 255 256 systemd.services.zabbix-server = {
··· 250 }; 251 252 security.wrappers = { 253 + fping = 254 + { setuid = true; 255 + owner = "root"; 256 + group = "root"; 257 + source = "${pkgs.fping}/bin/fping"; 258 + }; 259 }; 260 261 systemd.services.zabbix-server = {
+29 -1
pkgs/applications/networking/instant-messengers/deltachat-desktop/default.nix
··· 3 , electron 4 , esbuild 5 , fetchFromGitHub 6 , libdeltachat 7 , makeDesktopItem 8 , makeWrapper ··· 14 }: 15 16 let 17 electronExec = if stdenv.isDarwin then 18 "${electron}/Applications/Electron.app/Contents/MacOS/Electron" 19 else ··· 38 ]; 39 40 buildInputs = [ 41 - libdeltachat 42 ] ++ lib.optionals stdenv.isDarwin [ 43 CoreServices 44 ];
··· 3 , electron 4 , esbuild 5 , fetchFromGitHub 6 + , fetchpatch 7 , libdeltachat 8 , makeDesktopItem 9 , makeWrapper ··· 15 }: 16 17 let 18 + libdeltachat' = libdeltachat.overrideAttrs (old: rec { 19 + version = "1.60.0"; 20 + src = fetchFromGitHub { 21 + owner = "deltachat"; 22 + repo = "deltachat-core-rust"; 23 + rev = version; 24 + sha256 = "1agm5xyaib4ynmw4mhgmkhh4lnxs91wv0q9i1zfihv2vkckfm2s2"; 25 + }; 26 + cargoDeps = rustPlatform.fetchCargoTarball { 27 + inherit src; 28 + name = "${old.pname}-${version}"; 29 + sha256 = "09d3mw2hb1gmqg7smaqwnfm7izw40znl0h1dz7s2imms2cnkjws1"; 30 + }; 31 + patches = [ 32 + # https://github.com/deltachat/deltachat-core-rust/pull/2589 33 + (fetchpatch { 34 + url = "https://github.com/deltachat/deltachat-core-rust/commit/408467e85d04fbbfd6bed5908d84d9e995943487.patch"; 35 + sha256 = "1j2ywaazglgl6370js34acrg0wrh0b7krqg05dfjf65n527lzn59"; 36 + }) 37 + ./no-static-lib.patch 38 + # https://github.com/deltachat/deltachat-core-rust/pull/2660 39 + (fetchpatch { 40 + url = "https://github.com/deltachat/deltachat-core-rust/commit/8fb5e038a97d8ae68564c885d61b93127a68366d.patch"; 41 + sha256 = "088pzfrrkgfi4646dc72404s3kykcpni7hgkppalwlzg0p4is41x"; 42 + }) 43 + ]; 44 + }); 45 electronExec = if stdenv.isDarwin then 46 "${electron}/Applications/Electron.app/Contents/MacOS/Electron" 47 else ··· 66 ]; 67 68 buildInputs = [ 69 + libdeltachat' 70 ] ++ lib.optionals stdenv.isDarwin [ 71 CoreServices 72 ];
+39
pkgs/applications/networking/instant-messengers/deltachat-desktop/no-static-lib.patch
···
··· 1 + diff --git a/CMakeLists.txt b/CMakeLists.txt 2 + index fe7abe08..acdbe0d6 100644 3 + --- a/CMakeLists.txt 4 + +++ b/CMakeLists.txt 5 + @@ -13,7 +13,6 @@ find_program(CARGO cargo) 6 + 7 + add_custom_command( 8 + OUTPUT 9 + - "target/release/libdeltachat.a" 10 + "target/release/libdeltachat.${DYNAMIC_EXT}" 11 + "target/release/pkgconfig/deltachat.pc" 12 + COMMAND 13 + @@ -38,13 +37,11 @@ add_custom_target( 14 + lib_deltachat 15 + ALL 16 + DEPENDS 17 + - "target/release/libdeltachat.a" 18 + "target/release/libdeltachat.${DYNAMIC_EXT}" 19 + "target/release/pkgconfig/deltachat.pc" 20 + ) 21 + 22 + include(GNUInstallDirs) 23 + install(FILES "deltachat-ffi/deltachat.h" DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}) 24 + -install(FILES "target/release/libdeltachat.a" DESTINATION ${CMAKE_INSTALL_LIBDIR}) 25 + install(FILES "target/release/libdeltachat.${DYNAMIC_EXT}" DESTINATION ${CMAKE_INSTALL_LIBDIR}) 26 + install(FILES "target/release/pkgconfig/deltachat.pc" DESTINATION ${CMAKE_INSTALL_LIBDIR}/pkgconfig) 27 + diff --git a/deltachat-ffi/Cargo.toml b/deltachat-ffi/Cargo.toml 28 + index a34a27ba..cf354abb 100644 29 + --- a/deltachat-ffi/Cargo.toml 30 + +++ b/deltachat-ffi/Cargo.toml 31 + @@ -12,7 +12,7 @@ categories = ["cryptography", "std", "email"] 32 + 33 + [lib] 34 + name = "deltachat" 35 + -crate-type = ["cdylib", "staticlib"] 36 + +crate-type = ["cdylib"] 37 + 38 + [dependencies] 39 + deltachat = { path = "../", default-features = false }
+8 -5
pkgs/applications/networking/instant-messengers/deltachat-desktop/update.sh
··· 1 #! /usr/bin/env nix-shell 2 - #! nix-shell -i bash -p curl jq nix-prefetch 3 4 set -euo pipefail 5 cd "$(dirname "$0")" ··· 13 jq 'map(select(.prerelease | not)) | .[0].tag_name' --raw-output 14 ) 15 ver=$(echo "$rev" | sed 's/^v//') 16 - old_ver=$(sed -n 's/.*\bversion = "\(.*\)".*/\1/p' default.nix) 17 if [ "$ver" = "$old_ver" ]; then 18 echo "Up to date: $ver" 19 exit ··· 21 echo "$old_ver -> $ver" 22 23 sha256=$(nix-prefetch -f "$nixpkgs" deltachat-desktop --rev "$rev") 24 - sed -e "s#\\bversion = \".*\"#version = \"$ver\"#" \ 25 - -e "s#\\bsha256 = \".*\"#sha256 = \"$sha256\"#" \ 26 - -i default.nix 27 src=$(nix-build "$nixpkgs" -A deltachat-desktop.src --no-out-link) 28 29 jq '{ name, version, dependencies: (.dependencies + (.devDependencies | del(.["@typescript-eslint/eslint-plugin","@typescript-eslint/parser","esbuild","electron-builder","electron-devtools-installer","electron-notarize","esbuild","eslint","eslint-config-prettier","eslint-plugin-react-hooks","hallmark","prettier","tape","testcafe","testcafe-browser-provider-electron","testcafe-react-selectors","walk"]))) }' \
··· 1 #! /usr/bin/env nix-shell 2 + #! nix-shell -i bash -p coreutils curl gnused jq moreutils nix-prefetch 3 4 set -euo pipefail 5 cd "$(dirname "$0")" ··· 13 jq 'map(select(.prerelease | not)) | .[0].tag_name' --raw-output 14 ) 15 ver=$(echo "$rev" | sed 's/^v//') 16 + old_ver=$(tac default.nix | sed -n 's/.*\bversion = "\(.*\)".*/\1/p' | head -1) 17 if [ "$ver" = "$old_ver" ]; then 18 echo "Up to date: $ver" 19 exit ··· 21 echo "$old_ver -> $ver" 22 23 sha256=$(nix-prefetch -f "$nixpkgs" deltachat-desktop --rev "$rev") 24 + tac default.nix \ 25 + | sed -e "0,/version = \".*\"/s//version = \"$ver\"/" \ 26 + -e "0,/sha256 = \".*\"/s//sha256 = \"$sha256\"/" \ 27 + | tac \ 28 + | sponge default.nix 29 + 30 src=$(nix-build "$nixpkgs" -A deltachat-desktop.src --no-out-link) 31 32 jq '{ name, version, dependencies: (.dependencies + (.devDependencies | del(.["@typescript-eslint/eslint-plugin","@typescript-eslint/parser","esbuild","electron-builder","electron-devtools-installer","electron-notarize","esbuild","eslint","eslint-config-prettier","eslint-plugin-react-hooks","hallmark","prettier","tape","testcafe","testcafe-browser-provider-electron","testcafe-react-selectors","walk"]))) }' \
+36
pkgs/data/themes/gtk-theme-framework/default.nix
···
··· 1 + { stdenv, fetchFromGitHub, theme, lib }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "gtk-theme-framework"; 5 + version = "0.2.3"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "jaxwilko"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1z5s5rsgiypanf2z0avaisbflnvwrc8aiy5qskrsvbbaja63jy3s"; 12 + }; 13 + 14 + postPatch = '' 15 + substituteInPlace main.sh \ 16 + --replace "#!/usr/bin/env bash" "#!/bin/sh" 17 + 18 + substituteInPlace scripts/install.sh \ 19 + --replace "#!/usr/bin/env bash" "#!/bin/sh" 20 + ''; 21 + 22 + installPhase = '' 23 + runHook preInstall 24 + 25 + mkdir -p $out/share/themes 26 + ./main.sh -i -t ${theme} -d $out/share/themes 27 + 28 + runHook postInstall 29 + ''; 30 + 31 + meta = with lib; { 32 + homepage = "https://github.com/jaxwilko/gtk-theme-framework"; 33 + license = licenses.gpl3Only; 34 + maintainers = with maintainers; [ flexagoon ]; 35 + }; 36 + }
+2 -2
pkgs/development/compilers/kotlin/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "kotlin"; 5 - version = "1.5.31"; 6 7 src = fetchurl { 8 url = "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-compiler-${version}.zip"; 9 - sha256 = "sha256-ZhERKG8+WsBqrzqUA9hp2alqF2tisUGBS+YmpHJJ/p4="; 10 }; 11 12 propagatedBuildInputs = [ jre ] ;
··· 2 3 stdenv.mkDerivation rec { 4 pname = "kotlin"; 5 + version = "1.6.0"; 6 7 src = fetchurl { 8 url = "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-compiler-${version}.zip"; 9 + sha256 = "sha256-F0yS4SpUwJAf2fC62s8VFMKLUZepVlTk2rF3UpPd4dw="; 10 }; 11 12 propagatedBuildInputs = [ jre ] ;
+4 -4
pkgs/development/compilers/kotlin/native.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "kotlin-native"; 10 - version = "1.5.31"; 11 12 src = let 13 getArch = { ··· 20 "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-native-${arch}-${version}.tar.gz"; 21 22 getHash = arch: { 23 - "macos-aarch64" = "sha256-+9AF42AlPn1/8c14t8u+NN8FkoEmdt6tpmIKU9Rp2AM="; 24 - "macos-x86_64" = "sha256-/eciSo4Eps2TTsv1XU1Rlm+KBmgQT0MWp2s/OAYtGt4="; 25 - "linux-x86_64" = "sha256-Y2t+nlTu+j+h0oRneo7CJx0PmLAkqKYBJ+8go7rargM="; 26 }.${arch}; 27 in 28 fetchurl {
··· 7 8 stdenv.mkDerivation rec { 9 pname = "kotlin-native"; 10 + version = "1.6.0"; 11 12 src = let 13 getArch = { ··· 20 "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-native-${arch}-${version}.tar.gz"; 21 22 getHash = arch: { 23 + "macos-aarch64" = "sha256-HLI6E3Y8l/5vAgjT39ezBCEYhCGV3pdjx1B1fL57qO4="; 24 + "macos-x86_64" = "sha256-cJV+dP9/pJHlJx55HMqd7KC/OIWEzPXKmobCZLBZ+ec="; 25 + "linux-x86_64" = "sha256-C5R2hdPg1cOA9WcSZYkN22Ca3/pslEcp554tuy/HxnQ="; 26 }.${arch}; 27 in 28 fetchurl {
+3 -3
pkgs/development/libraries/libdeltachat/default.nix
··· 15 16 stdenv.mkDerivation rec { 17 pname = "libdeltachat"; 18 - version = "1.64.0"; 19 20 src = fetchFromGitHub { 21 owner = "deltachat"; 22 repo = "deltachat-core-rust"; 23 rev = version; 24 - sha256 = "04a1ncikapx53jjrx0ac1qi907wlj6javylz4aksg4nfbph6y9j4"; 25 }; 26 27 patches = [ ··· 33 cargoDeps = rustPlatform.fetchCargoTarball { 34 inherit src; 35 name = "${pname}-${version}"; 36 - sha256 = "0skrzxn99c1gqil7z0dv0xhg883k98v6mh96nycf7whl2d25965x"; 37 }; 38 39 nativeBuildInputs = [
··· 15 16 stdenv.mkDerivation rec { 17 pname = "libdeltachat"; 18 + version = "1.65.0"; 19 20 src = fetchFromGitHub { 21 owner = "deltachat"; 22 repo = "deltachat-core-rust"; 23 rev = version; 24 + sha256 = "1k906pll4k8bc2xc9qd9g7q10rikbij2sy0w2wg9mf335rfym6z4"; 25 }; 26 27 patches = [ ··· 33 cargoDeps = rustPlatform.fetchCargoTarball { 34 inherit src; 35 name = "${pname}-${version}"; 36 + sha256 = "0jc9kyn5h3cn2ni5h3km47sfprpxr7hc96ca01yal2zyksm7zqxn"; 37 }; 38 39 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/ailment/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "ailment"; 10 - version = "9.0.10534"; 11 disabled = pythonOlder "3.6"; 12 13 src = fetchFromGitHub { 14 owner = "angr"; 15 repo = pname; 16 rev = "v${version}"; 17 - sha256 = "sha256-EmfbyXHoWEd2Yp1RFRkW94dzeRXw0rsBtvVcl+Vg0qI="; 18 }; 19 20 propagatedBuildInputs = [ pyvex ];
··· 7 8 buildPythonPackage rec { 9 pname = "ailment"; 10 + version = "9.0.10576"; 11 disabled = pythonOlder "3.6"; 12 13 src = fetchFromGitHub { 14 owner = "angr"; 15 repo = pname; 16 rev = "v${version}"; 17 + sha256 = "sha256-s8GZV+hcuAZJhKVoLAtC2mwHlqr/vJ6P5mwlNDczEyY="; 18 }; 19 20 propagatedBuildInputs = [ pyvex ];
+2 -2
pkgs/development/python-modules/angr/default.nix
··· 43 44 buildPythonPackage rec { 45 pname = "angr"; 46 - version = "9.0.10534"; 47 disabled = pythonOlder "3.6"; 48 49 src = fetchFromGitHub { 50 owner = pname; 51 repo = pname; 52 rev = "v${version}"; 53 - sha256 = "sha256-A2dqCABkqkn/rjWGc8hrGs60BK+V8j2+jVAYxnEpx8Y="; 54 }; 55 56 propagatedBuildInputs = [
··· 43 44 buildPythonPackage rec { 45 pname = "angr"; 46 + version = "9.0.10576"; 47 disabled = pythonOlder "3.6"; 48 49 src = fetchFromGitHub { 50 owner = pname; 51 repo = pname; 52 rev = "v${version}"; 53 + sha256 = "sha256-lRoJZX7HPZE6y7v5AuU1C6sjOIXXefv8M/qPiNQtobw="; 54 }; 55 56 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/angrop/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "angrop"; 12 - version = "9.0.10534"; 13 disabled = pythonOlder "3.6"; 14 15 src = fetchFromGitHub { 16 owner = "angr"; 17 repo = pname; 18 rev = "v${version}"; 19 - sha256 = "sha256-PaAhEn/eJg1qfuq2sHWTGTiJKNfs60NJuvfS9hVObX4="; 20 }; 21 22 propagatedBuildInputs = [
··· 9 10 buildPythonPackage rec { 11 pname = "angrop"; 12 + version = "9.0.10576"; 13 disabled = pythonOlder "3.6"; 14 15 src = fetchFromGitHub { 16 owner = "angr"; 17 repo = pname; 18 rev = "v${version}"; 19 + sha256 = "sha256-i4F6VyJYJ6XON9G43Z2VwWAPHGRxR9DzxnEDGiJ8LSE="; 20 }; 21 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/archinfo/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "archinfo"; 10 - version = "9.0.10534"; 11 12 src = fetchFromGitHub { 13 owner = "angr"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-8bGDl3rHVT2JKEOfYPHzFTxJ7t3Yz7aLQMVKAUNCSBo="; 17 }; 18 19 checkInputs = [
··· 7 8 buildPythonPackage rec { 9 pname = "archinfo"; 10 + version = "9.0.10576"; 11 12 src = fetchFromGitHub { 13 owner = "angr"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-K36tAsVfminDFK09jE6+ruROkaLfCTNPCL5ziZJOrVk="; 17 }; 18 19 checkInputs = [
+2 -2
pkgs/development/python-modules/claripy/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "claripy"; 16 - version = "9.0.10534"; 17 disabled = pythonOlder "3.6"; 18 19 src = fetchFromGitHub { 20 owner = "angr"; 21 repo = pname; 22 rev = "v${version}"; 23 - sha256 = "sha256-WeqfNVGQio5ugC14iv0ls5b3O1ymEjfpV8J47cCqXeQ="; 24 }; 25 26 # Use upstream z3 implementation
··· 13 14 buildPythonPackage rec { 15 pname = "claripy"; 16 + version = "9.0.10576"; 17 disabled = pythonOlder "3.6"; 18 19 src = fetchFromGitHub { 20 owner = "angr"; 21 repo = pname; 22 rev = "v${version}"; 23 + sha256 = "sha256-86ySQ/2l1h5vayMfAsr9ShyE8oRKL37sT3bfrgIGFHY="; 24 }; 25 26 # Use upstream z3 implementation
+2 -2
pkgs/development/python-modules/cle/default.nix
··· 15 16 let 17 # The binaries are following the argr projects release cycle 18 - version = "9.0.10534"; 19 20 # Binary files from https://github.com/angr/binaries (only used for testing and only here) 21 binaries = fetchFromGitHub { ··· 35 owner = "angr"; 36 repo = pname; 37 rev = "v${version}"; 38 - sha256 = "sha256-edZC0pZf6A2lpqJDfpMeslLQQGEokq4B9qywgS7wLxo="; 39 }; 40 41 propagatedBuildInputs = [
··· 15 16 let 17 # The binaries are following the argr projects release cycle 18 + version = "9.0.10576"; 19 20 # Binary files from https://github.com/angr/binaries (only used for testing and only here) 21 binaries = fetchFromGitHub { ··· 35 owner = "angr"; 36 repo = pname; 37 rev = "v${version}"; 38 + sha256 = "sha256-ftaFISU37GcCFTybxV31PwUl2vrbKVm/S00Qo+pUxgo="; 39 }; 40 41 propagatedBuildInputs = [
+39
pkgs/development/python-modules/motionblinds/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pycryptodomex 5 + , pythonOlder 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "motionblinds"; 10 + version = "0.5.8.2"; 11 + format = "setuptools"; 12 + 13 + disabled = pythonOlder "3.7"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "starkillerOG"; 17 + repo = "motion-blinds"; 18 + rev = version; 19 + sha256 = "6aSwUuH5IpfcuVGXWVmb0DHglsUtGh/ATOe6iih6fXk="; 20 + }; 21 + 22 + propagatedBuildInputs = [ 23 + pycryptodomex 24 + ]; 25 + 26 + # Project has no tests 27 + doCheck = false; 28 + 29 + pythonImportsCheck = [ 30 + "motionblinds" 31 + ]; 32 + 33 + meta = with lib; { 34 + description = "Python library for interfacing with Motion Blinds"; 35 + homepage = "https://github.com/starkillerOG/motion-blinds"; 36 + license = with licenses; [ mit ]; 37 + maintainers = with maintainers; [ fab ]; 38 + }; 39 + }
+2 -2
pkgs/development/python-modules/pypinyin/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "pypinyin"; 9 - version = "0.43.0"; 10 11 src = fetchFromGitHub { 12 owner = "mozillazg"; 13 repo = "python-pinyin"; 14 rev = "v${version}"; 15 - sha256 = "0h3lpb8bw9zp8is5sx2zg931wz12x0zfan1kksnbhx16vwv1kgw3"; 16 }; 17 18 postPatch = ''
··· 6 7 buildPythonPackage rec { 8 pname = "pypinyin"; 9 + version = "0.44.0"; 10 11 src = fetchFromGitHub { 12 owner = "mozillazg"; 13 repo = "python-pinyin"; 14 rev = "v${version}"; 15 + sha256 = "sha256-LYiiZvpM/V3QRyTUXGWGnSnR0AnqWfTW0xJB4Vnw7lI="; 16 }; 17 18 postPatch = ''
+10 -1
pkgs/development/python-modules/pyscard/default.nix
··· 1 - { lib, stdenv, fetchPypi, buildPythonPackage, swig, pcsclite, PCSC }: 2 3 let 4 # Package does not support configuring the pcsc library. ··· 13 inherit pname version; 14 sha256 = "05de0579c42b4eb433903aa2fb327d4821ebac262434b6584da18ed72053fd9e"; 15 }; 16 17 postPatch = if withApplePCSC then '' 18 substituteInPlace smartcard/scard/winscarddll.c \
··· 1 + { lib, stdenv, fetchpatch, fetchPypi, buildPythonPackage, swig, pcsclite, PCSC }: 2 3 let 4 # Package does not support configuring the pcsc library. ··· 13 inherit pname version; 14 sha256 = "05de0579c42b4eb433903aa2fb327d4821ebac262434b6584da18ed72053fd9e"; 15 }; 16 + 17 + patches = [ 18 + # present in master - remove after 2.0.2 19 + (fetchpatch { 20 + name = "darwin-typo-test-fix.patch"; 21 + url = "https://github.com/LudovicRousseau/pyscard/commit/ce842fcc76fd61b8b6948d0b07306d82ad1ec12a.patch"; 22 + sha256 = "0wsaj87wp9d2vnfzwncfxp2w95m0zhr7zpkmg5jccn06z52ihis3"; 23 + }) 24 + ]; 25 26 postPatch = if withApplePCSC then '' 27 substituteInPlace smartcard/scard/winscarddll.c \
+2 -2
pkgs/development/python-modules/pyvex/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "pyvex"; 14 - version = "9.0.10534"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "sha256-tUjASwLQy/p3Q+XnkbpUQNM6VHk94bIle2BzRd4EYsg="; 19 }; 20 21 postPatch = lib.optionalString stdenv.isDarwin ''
··· 11 12 buildPythonPackage rec { 13 pname = "pyvex"; 14 + version = "9.0.10576"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "sha256-pOQZXymIuffUfShAUrXqlxwWCIRKZpkMZcJS1fad2bs="; 19 }; 20 21 postPatch = lib.optionalString stdenv.isDarwin ''
+49
pkgs/development/python-modules/stanza/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pythonOlder 5 + , emoji 6 + , numpy 7 + , protobuf 8 + , requests 9 + , six 10 + , pytorch 11 + , tqdm 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "stanza"; 16 + version = "1.3.0"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "stanfordnlp"; 20 + repo = pname; 21 + rev = "v${version}"; 22 + sha256 = "1j5918n875p3ibhzc5zp3vb97asbbnb04pj1igxwzl0xm6qcsbh8"; 23 + }; 24 + 25 + disabled = pythonOlder "3.6"; 26 + 27 + propagatedBuildInputs = [ 28 + emoji 29 + numpy 30 + protobuf 31 + requests 32 + six 33 + pytorch 34 + tqdm 35 + ]; 36 + 37 + # disabled, because the tests try to connect to the internet which 38 + # is forbidden in the sandbox 39 + doCheck = false; 40 + 41 + pythonImportsCheck = [ "stanza" ]; 42 + 43 + meta = with lib; { 44 + description = "Official Stanford NLP Python Library for Many Human Languages"; 45 + homepage = "https://github.com/stanfordnlp/stanza/"; 46 + license = licenses.asl20; 47 + maintainers = with maintainers; [ riotbib ]; 48 + }; 49 + }
+8 -3
pkgs/development/python-modules/trytond/default.nix
··· 12 , werkzeug 13 , wrapt 14 , passlib 15 , bcrypt 16 , pydot 17 , python-Levenshtein ··· 23 24 buildPythonApplication rec { 25 pname = "trytond"; 26 - version = "6.0.8"; 27 - disabled = pythonOlder "3.5"; 28 29 src = fetchPypi { 30 inherit pname version; 31 - sha256 = "686d498f9648875f48edc9fc2e97cd465ed4ea9270c4984b6f2db20a2eac4942"; 32 }; 33 34 # Tells the tests which database to use ··· 37 buildInputs = [ 38 mock 39 ]; 40 propagatedBuildInputs = [ 41 lxml 42 relatorio ··· 46 python-sql 47 werkzeug 48 wrapt 49 passlib 50 51 # extra dependencies
··· 12 , werkzeug 13 , wrapt 14 , passlib 15 + , pillow 16 , bcrypt 17 , pydot 18 , python-Levenshtein ··· 24 25 buildPythonApplication rec { 26 pname = "trytond"; 27 + version = "6.2.0"; 28 + format = "setuptools"; 29 + 30 + disabled = pythonOlder "3.6"; 31 32 src = fetchPypi { 33 inherit pname version; 34 + sha256 = "sha256-U73dzLTUJnOw24/ELQzjnxJ0PvjV+zE/PNuQHXbEukw="; 35 }; 36 37 # Tells the tests which database to use ··· 40 buildInputs = [ 41 mock 42 ]; 43 + 44 propagatedBuildInputs = [ 45 lxml 46 relatorio ··· 50 python-sql 51 werkzeug 52 wrapt 53 + pillow 54 passlib 55 56 # extra dependencies
+2 -2
pkgs/development/tools/analysis/checkov/default.nix
··· 56 57 buildPythonApplication rec { 58 pname = "checkov"; 59 - version = "2.0.574"; 60 61 src = fetchFromGitHub { 62 owner = "bridgecrewio"; 63 repo = pname; 64 rev = version; 65 - sha256 = "sha256-DM7fPwJcWEyOu55ThK/jP9jIUbiVCfEtltSP7puCoxQ="; 66 }; 67 68 nativeBuildInputs = with py.pkgs; [
··· 56 57 buildPythonApplication rec { 58 pname = "checkov"; 59 + version = "2.0.580"; 60 61 src = fetchFromGitHub { 62 owner = "bridgecrewio"; 63 repo = pname; 64 rev = version; 65 + sha256 = "sha256-GnEXGXJCI9VIOKJbGjTppum6j/uwX4m4ytaZqvpfl7Q="; 66 }; 67 68 nativeBuildInputs = with py.pkgs; [
+233 -233
pkgs/misc/vim-plugins/generated.nix
··· 77 78 ale = buildVimPluginFrom2Nix { 79 pname = "ale"; 80 - version = "2021-11-09"; 81 src = fetchFromGitHub { 82 owner = "dense-analysis"; 83 repo = "ale"; 84 - rev = "8b3b16d71c4c683da6f3ca39662d207a3e894901"; 85 - sha256 = "1mdxgiin61630fimxm2l0zcr30br4q2ipp84l3iqxjbs0fqg11s5"; 86 }; 87 meta.homepage = "https://github.com/dense-analysis/ale/"; 88 }; ··· 101 102 aniseed = buildVimPluginFrom2Nix { 103 pname = "aniseed"; 104 - version = "2021-10-24"; 105 src = fetchFromGitHub { 106 owner = "Olical"; 107 repo = "aniseed"; 108 - rev = "4bb3a4c1a1e329ebefa7ff022f7b3947770f7f26"; 109 - sha256 = "0sd81pagrrwsig1fjm4ly866wcpq4xqpf810a8q1p2bygjs95chx"; 110 }; 111 meta.homepage = "https://github.com/Olical/aniseed/"; 112 }; ··· 197 198 aurora = buildVimPluginFrom2Nix { 199 pname = "aurora"; 200 - version = "2021-11-06"; 201 src = fetchFromGitHub { 202 owner = "ray-x"; 203 repo = "aurora"; 204 - rev = "ea1b3e8398acde2659e4430b17f3084c33829fcb"; 205 - sha256 = "1xwhp8fzasiyym5yqnhdfzrbh59vjf5jl1cc10xrf00kv2l2kvwx"; 206 }; 207 meta.homepage = "https://github.com/ray-x/aurora/"; 208 }; ··· 413 414 bufferline-nvim = buildVimPluginFrom2Nix { 415 pname = "bufferline.nvim"; 416 - version = "2021-11-01"; 417 src = fetchFromGitHub { 418 owner = "akinsho"; 419 repo = "bufferline.nvim"; 420 - rev = "782fab8a2352e872dc991c42f806dae18e848b2d"; 421 - sha256 = "0j5r0cgcdgnqdd0fd6y9b0nh301xyb6b2vgqc34rdk30gam7h5d1"; 422 }; 423 meta.homepage = "https://github.com/akinsho/bufferline.nvim/"; 424 }; ··· 473 474 chadtree = buildVimPluginFrom2Nix { 475 pname = "chadtree"; 476 - version = "2021-11-11"; 477 src = fetchFromGitHub { 478 owner = "ms-jpq"; 479 repo = "chadtree"; 480 - rev = "8bf4553d1000b2c9189f1893ac5c737b61572791"; 481 - sha256 = "1jk795a6r8yzbjbyx121qn65njs4j3l947x3n937kygqpb7paflm"; 482 }; 483 meta.homepage = "https://github.com/ms-jpq/chadtree/"; 484 }; ··· 581 582 cmp-buffer = buildVimPluginFrom2Nix { 583 pname = "cmp-buffer"; 584 - version = "2021-11-10"; 585 src = fetchFromGitHub { 586 owner = "hrsh7th"; 587 repo = "cmp-buffer"; 588 - rev = "2d85e76c725a389b72067f86fc3c65f3868b9a59"; 589 - sha256 = "0lvx58nchrl08jjp2gvyfrxkqdqnyi97zj86nnx184vnx8a5qcqh"; 590 }; 591 meta.homepage = "https://github.com/hrsh7th/cmp-buffer/"; 592 }; ··· 821 822 coc-fzf = buildVimPluginFrom2Nix { 823 pname = "coc-fzf"; 824 - version = "2021-10-23"; 825 src = fetchFromGitHub { 826 owner = "antoinemadec"; 827 repo = "coc-fzf"; 828 - rev = "9fc34a66e6744f52769bb0b95cba851723964faf"; 829 - sha256 = "0lhvaygicayqpabgmdya6fq7yybch5nd7myjydmcdnpmivzh7mk8"; 830 }; 831 meta.homepage = "https://github.com/antoinemadec/coc-fzf/"; 832 }; 833 834 coc-lua = buildVimPluginFrom2Nix { 835 pname = "coc-lua"; 836 - version = "2021-11-09"; 837 src = fetchFromGitHub { 838 owner = "josa42"; 839 repo = "coc-lua"; 840 - rev = "9672c9cde3cce32720fafbdb65618d817b7022d8"; 841 - sha256 = "1y35xqzd17c8cvlrqfa10lninql2xkkkgy40wl1bwfzl5awk9rm7"; 842 }; 843 meta.homepage = "https://github.com/josa42/coc-lua/"; 844 }; ··· 1098 1099 conjure = buildVimPluginFrom2Nix { 1100 pname = "conjure"; 1101 - version = "2021-10-24"; 1102 src = fetchFromGitHub { 1103 owner = "Olical"; 1104 repo = "conjure"; 1105 - rev = "a2831ac61c44f9fe98a0fb469b02b761d503bc9a"; 1106 - sha256 = "1r1lz397fga204i4a4g6zbaf457wmvb35kpd9m7n8476iay892j7"; 1107 }; 1108 meta.homepage = "https://github.com/Olical/conjure/"; 1109 }; ··· 1134 1135 Coqtail = buildVimPluginFrom2Nix { 1136 pname = "Coqtail"; 1137 - version = "2021-10-28"; 1138 src = fetchFromGitHub { 1139 owner = "whonore"; 1140 repo = "Coqtail"; 1141 - rev = "86b9aecfaeaed5db9064b58115ff6dc67b318f7e"; 1142 - sha256 = "10gjlxnga52f21r558xz7pqv63pbqqfw01yl71i0z46y33jnpy14"; 1143 }; 1144 meta.homepage = "https://github.com/whonore/Coqtail/"; 1145 }; ··· 1170 1171 crates-nvim = buildVimPluginFrom2Nix { 1172 pname = "crates.nvim"; 1173 - version = "2021-11-10"; 1174 src = fetchFromGitHub { 1175 owner = "saecki"; 1176 repo = "crates.nvim"; 1177 - rev = "0b17e2bb069cb388ba22d156bbe1b3b3b3585312"; 1178 - sha256 = "1d7gssvw2sl1girj8svbdzlrhxsjgp9rkfkjrr2jd7p5ilhry27a"; 1179 }; 1180 meta.homepage = "https://github.com/saecki/crates.nvim/"; 1181 }; ··· 1242 1243 ctrlp-vim = buildVimPluginFrom2Nix { 1244 pname = "ctrlp.vim"; 1245 - version = "2021-10-19"; 1246 src = fetchFromGitHub { 1247 owner = "ctrlpvim"; 1248 repo = "ctrlp.vim"; 1249 - rev = "61e964f2d168f52cb8e80e67d26605b52d726b16"; 1250 - sha256 = "0qi4ip94lxfxzbkhs779v1afmvh6q0wp8fcfxxdhzgl44qlhy6hx"; 1251 }; 1252 meta.homepage = "https://github.com/ctrlpvim/ctrlp.vim/"; 1253 }; ··· 1640 1641 diffview-nvim = buildVimPluginFrom2Nix { 1642 pname = "diffview.nvim"; 1643 - version = "2021-10-22"; 1644 src = fetchFromGitHub { 1645 owner = "sindrets"; 1646 repo = "diffview.nvim"; 1647 - rev = "d4ee04c9eb8951dcf1aa83d7a896bededfc68228"; 1648 - sha256 = "0wfrbhnal7y82bhrf446igc6g9avavk2jx0idk5sbv24bqhi9b60"; 1649 }; 1650 meta.homepage = "https://github.com/sindrets/diffview.nvim/"; 1651 }; ··· 2015 2016 friendly-snippets = buildVimPluginFrom2Nix { 2017 pname = "friendly-snippets"; 2018 - version = "2021-11-10"; 2019 src = fetchFromGitHub { 2020 owner = "rafamadriz"; 2021 repo = "friendly-snippets"; 2022 - rev = "7d4a4c4e57b7aabb9e7d1f591c29e6d5e7e382e4"; 2023 - sha256 = "19z6yjdd7q9hydzx3bw2w8c573y0xjn9s7n780w65n34iirjbh7i"; 2024 }; 2025 meta.homepage = "https://github.com/rafamadriz/friendly-snippets/"; 2026 }; ··· 2207 2208 git-messenger-vim = buildVimPluginFrom2Nix { 2209 pname = "git-messenger.vim"; 2210 - version = "2021-09-29"; 2211 src = fetchFromGitHub { 2212 owner = "rhysd"; 2213 repo = "git-messenger.vim"; 2214 - rev = "3f08e210b3f7edd5477a73257eb8d5ca8100ccf0"; 2215 - sha256 = "0wc3jwfyr4pvzhcm3nf4rr3gqllfg0d2r66wl75g69cj6syagjj4"; 2216 }; 2217 meta.homepage = "https://github.com/rhysd/git-messenger.vim/"; 2218 }; ··· 2243 2244 gitlinker-nvim = buildVimPluginFrom2Nix { 2245 pname = "gitlinker.nvim"; 2246 - version = "2021-10-18"; 2247 src = fetchFromGitHub { 2248 owner = "ruifm"; 2249 repo = "gitlinker.nvim"; 2250 - rev = "a6fb6d1ec2746fc18f81433648416edfb1a96d43"; 2251 - sha256 = "0c417li0jx970h8qkgrww7ifzjjknfi26i7n13qx96c5axjxady5"; 2252 }; 2253 meta.homepage = "https://github.com/ruifm/gitlinker.nvim/"; 2254 }; 2255 2256 gitsigns-nvim = buildVimPluginFrom2Nix { 2257 pname = "gitsigns.nvim"; 2258 - version = "2021-11-11"; 2259 src = fetchFromGitHub { 2260 owner = "lewis6991"; 2261 repo = "gitsigns.nvim"; 2262 - rev = "e6775fa32e4904cc8bbd098ba9807db9606e816e"; 2263 - sha256 = "1w7vq9jbw3lhd8i9wbf71q344235iwcigff7jrrh3fbcq6kk7m12"; 2264 }; 2265 meta.homepage = "https://github.com/lewis6991/gitsigns.nvim/"; 2266 }; ··· 2327 2328 goto-preview = buildVimPluginFrom2Nix { 2329 pname = "goto-preview"; 2330 - version = "2021-11-09"; 2331 src = fetchFromGitHub { 2332 owner = "rmagatti"; 2333 repo = "goto-preview"; 2334 - rev = "b930629c018c6b30d42e8d271a32a37e0360c628"; 2335 - sha256 = "0mly30sqbs43xmkda04jzk4knxcv7f42sddm87ky6j8ii67147ys"; 2336 }; 2337 meta.homepage = "https://github.com/rmagatti/goto-preview/"; 2338 }; ··· 2399 2400 gruvbox-nvim = buildVimPluginFrom2Nix { 2401 pname = "gruvbox.nvim"; 2402 - version = "2021-10-27"; 2403 src = fetchFromGitHub { 2404 owner = "ellisonleao"; 2405 repo = "gruvbox.nvim"; 2406 - rev = "526439a61a859936fe85da27fffa927e2dccdb83"; 2407 - sha256 = "1zlvrfyas257j2iqanf4i2kvxa5cdj2n3kg9xk6g8bzsjcsqw4cw"; 2408 }; 2409 meta.homepage = "https://github.com/ellisonleao/gruvbox.nvim/"; 2410 }; ··· 2495 2496 hologram-nvim = buildVimPluginFrom2Nix { 2497 pname = "hologram.nvim"; 2498 - version = "2021-08-01"; 2499 src = fetchFromGitHub { 2500 owner = "edluffy"; 2501 repo = "hologram.nvim"; 2502 - rev = "5598fea84f0bab236293793a6398fb7fbbf1cbc6"; 2503 - sha256 = "0a5fgnqh475ngv4n4xbxzisvcx9vs1w4qn1k4imh8p61n02q0h8w"; 2504 }; 2505 meta.homepage = "https://github.com/edluffy/hologram.nvim/"; 2506 }; ··· 2519 2520 hop-nvim = buildVimPluginFrom2Nix { 2521 pname = "hop.nvim"; 2522 - version = "2021-11-07"; 2523 src = fetchFromGitHub { 2524 owner = "phaazon"; 2525 repo = "hop.nvim"; 2526 - rev = "f0eaff8cc4e66820b17a08c518c22c687f714bb5"; 2527 - sha256 = "0a67fv1vabik4g7w5h2nl9h6j8jc2jb0yd92gzhbmfi4jjj2j19a"; 2528 }; 2529 meta.homepage = "https://github.com/phaazon/hop.nvim/"; 2530 }; ··· 2627 2628 indent-blankline-nvim = buildVimPluginFrom2Nix { 2629 pname = "indent-blankline.nvim"; 2630 - version = "2021-11-08"; 2631 src = fetchFromGitHub { 2632 owner = "lukas-reineke"; 2633 repo = "indent-blankline.nvim"; 2634 - rev = "bc8372815506066f3ca7885baca717cb986957be"; 2635 - sha256 = "0svhinr5qmhcskvakl71yykzxhm6m0ydymx7dp5w0jwsdcv9nnrx"; 2636 }; 2637 meta.homepage = "https://github.com/lukas-reineke/indent-blankline.nvim/"; 2638 }; ··· 2928 2929 lean-nvim = buildVimPluginFrom2Nix { 2930 pname = "lean.nvim"; 2931 - version = "2021-11-11"; 2932 src = fetchFromGitHub { 2933 owner = "Julian"; 2934 repo = "lean.nvim"; 2935 - rev = "27a9bba67bc9114ba9a6f48686ac983f301dd4be"; 2936 - sha256 = "1vcd1i2w9vnkmlhan62s0raa8gigxpdyyzqvn2qqv1rifxzigpfw"; 2937 }; 2938 meta.homepage = "https://github.com/Julian/lean.nvim/"; 2939 }; ··· 3048 3049 lightline-gruvbox-vim = buildVimPluginFrom2Nix { 3050 pname = "lightline-gruvbox.vim"; 3051 - version = "2018-03-23"; 3052 src = fetchFromGitHub { 3053 owner = "shinchu"; 3054 repo = "lightline-gruvbox.vim"; 3055 - rev = "21659af1fc980ebe7de0f475e57c3fda9a82c2d3"; 3056 - sha256 = "0h9br1r5vbrx5cplnk34xlg1kagasj3zn18f8d4ifi0pibyq6pm1"; 3057 }; 3058 meta.homepage = "https://github.com/shinchu/lightline-gruvbox.vim/"; 3059 }; ··· 3072 3073 lightspeed-nvim = buildVimPluginFrom2Nix { 3074 pname = "lightspeed.nvim"; 3075 - version = "2021-11-11"; 3076 src = fetchFromGitHub { 3077 owner = "ggandor"; 3078 repo = "lightspeed.nvim"; 3079 - rev = "6429028c58a2a64916cb9132743e5301af460c1c"; 3080 - sha256 = "0qhx7axm5vg1xh5j2mg0x3l7154f4n55k28pajrak4yw7ws82232"; 3081 }; 3082 meta.homepage = "https://github.com/ggandor/lightspeed.nvim/"; 3083 }; ··· 3180 3181 lsp_signature-nvim = buildVimPluginFrom2Nix { 3182 pname = "lsp_signature.nvim"; 3183 - version = "2021-11-06"; 3184 src = fetchFromGitHub { 3185 owner = "ray-x"; 3186 repo = "lsp_signature.nvim"; 3187 - rev = "e5bd090b6d01af8f5d171f4183ff01aaa63a2b99"; 3188 - sha256 = "133bapazws12g2axzw8v9vkigpsdxc708hjlnzfkg0rwbm1pw9sc"; 3189 }; 3190 meta.homepage = "https://github.com/ray-x/lsp_signature.nvim/"; 3191 }; ··· 3228 3229 lualine-nvim = buildVimPluginFrom2Nix { 3230 pname = "lualine.nvim"; 3231 - version = "2021-11-11"; 3232 src = fetchFromGitHub { 3233 owner = "nvim-lualine"; 3234 repo = "lualine.nvim"; 3235 - rev = "df46c1e70a0aeb234aa9d2048d14f626a1cca317"; 3236 - sha256 = "0khkkicwcnrwpd9scdsggia916ws6hvpyx0gnszg43zq74q5h27q"; 3237 }; 3238 meta.homepage = "https://github.com/nvim-lualine/lualine.nvim/"; 3239 }; 3240 3241 luasnip = buildVimPluginFrom2Nix { 3242 pname = "luasnip"; 3243 - version = "2021-11-09"; 3244 src = fetchFromGitHub { 3245 owner = "l3mon4d3"; 3246 repo = "luasnip"; 3247 - rev = "366fd76ea226bed11966cd8b1a229cba08fa4394"; 3248 - sha256 = "17jla5yvi0vzgi0himl8fyfmc8sl8xg1k5bzl58iq0d2ycmr08as"; 3249 }; 3250 meta.homepage = "https://github.com/l3mon4d3/luasnip/"; 3251 }; ··· 3348 3349 minimap-vim = buildVimPluginFrom2Nix { 3350 pname = "minimap.vim"; 3351 - version = "2021-10-15"; 3352 src = fetchFromGitHub { 3353 owner = "wfxr"; 3354 repo = "minimap.vim"; 3355 - rev = "5c54258d34b8ae4be70a8fbc09b400eb7be0bee8"; 3356 - sha256 = "0gy5c5v80xbgx511xk1zp2scxzmgipwad1zqpsff4grz80vzsa13"; 3357 }; 3358 meta.homepage = "https://github.com/wfxr/minimap.vim/"; 3359 }; ··· 3372 3373 mkdx = buildVimPluginFrom2Nix { 3374 pname = "mkdx"; 3375 - version = "2021-07-05"; 3376 src = fetchFromGitHub { 3377 owner = "SidOfc"; 3378 repo = "mkdx"; 3379 - rev = "439c518cea989c875eea44ce54a36f7e7dc561d9"; 3380 - sha256 = "19b155lfiynm450cr9acm7dk58hh2ynrs3zpvrcll7slz8fgrhql"; 3381 }; 3382 meta.homepage = "https://github.com/SidOfc/mkdx/"; 3383 }; ··· 4036 src = fetchFromGitHub { 4037 owner = "MunifTanjim"; 4038 repo = "nui.nvim"; 4039 - rev = "a07b754552008012f2d7d3602b7a233a29d92c66"; 4040 - sha256 = "19ffxpmq82f9qxbnb2lw2hvc9gqc1vfyvf553wpc439rpi98mxja"; 4041 }; 4042 meta.homepage = "https://github.com/MunifTanjim/nui.nvim/"; 4043 }; 4044 4045 null-ls-nvim = buildVimPluginFrom2Nix { 4046 pname = "null-ls.nvim"; 4047 - version = "2021-11-11"; 4048 src = fetchFromGitHub { 4049 owner = "jose-elias-alvarez"; 4050 repo = "null-ls.nvim"; 4051 - rev = "2bf885dda0ecb669ef66d1c757287c98f6c16500"; 4052 - sha256 = "1303gpdr5yzxznx0djn5q09p1vibh15d0nmj1j6n2zqbjdx6bhfw"; 4053 }; 4054 meta.homepage = "https://github.com/jose-elias-alvarez/null-ls.nvim/"; 4055 }; ··· 4092 4093 nvim-autopairs = buildVimPluginFrom2Nix { 4094 pname = "nvim-autopairs"; 4095 - version = "2021-11-09"; 4096 src = fetchFromGitHub { 4097 owner = "windwp"; 4098 repo = "nvim-autopairs"; 4099 - rev = "f4f1c9f27d8514885cd851b3ae0a648e1eb15a17"; 4100 - sha256 = "0ipb2pvkc28zp5pdb5ih5rcnzj4wkwg5i59lb3ll4cv0yj398kr9"; 4101 }; 4102 meta.homepage = "https://github.com/windwp/nvim-autopairs/"; 4103 }; ··· 4116 4117 nvim-bqf = buildVimPluginFrom2Nix { 4118 pname = "nvim-bqf"; 4119 - version = "2021-11-03"; 4120 src = fetchFromGitHub { 4121 owner = "kevinhwang91"; 4122 repo = "nvim-bqf"; 4123 - rev = "3ef30d2a754f6b47d6c696add0276519f9a8a2cf"; 4124 - sha256 = "1rd18r4113fpg7ihw87l7xprh5dpddx8s7g68qazbrxgmf1xbmd7"; 4125 }; 4126 meta.homepage = "https://github.com/kevinhwang91/nvim-bqf/"; 4127 }; ··· 4152 4153 nvim-cmp = buildVimPluginFrom2Nix { 4154 pname = "nvim-cmp"; 4155 - version = "2021-11-11"; 4156 src = fetchFromGitHub { 4157 owner = "hrsh7th"; 4158 repo = "nvim-cmp"; 4159 - rev = "af06bd4b440c4da6b363ec2c3feb49bc0cda5510"; 4160 - sha256 = "0ckvm3kggnfqv4ngaxpl4zikbs2pwbqgy5x9fqzrdj2vydfm85wp"; 4161 }; 4162 meta.homepage = "https://github.com/hrsh7th/nvim-cmp/"; 4163 }; 4164 4165 nvim-code-action-menu = buildVimPluginFrom2Nix { 4166 pname = "nvim-code-action-menu"; 4167 - version = "2021-10-28"; 4168 src = fetchFromGitHub { 4169 owner = "weilbith"; 4170 repo = "nvim-code-action-menu"; 4171 - rev = "32a02caf1cb6d5d31167945a2df9d371d68b1009"; 4172 - sha256 = "1cpl29lz2c3fahrrz8lf9dccwy2iwdj4mn71xgn12kq3qarjijdv"; 4173 }; 4174 meta.homepage = "https://github.com/weilbith/nvim-code-action-menu/"; 4175 }; ··· 4224 4225 nvim-dap = buildVimPluginFrom2Nix { 4226 pname = "nvim-dap"; 4227 - version = "2021-10-29"; 4228 src = fetchFromGitHub { 4229 owner = "mfussenegger"; 4230 repo = "nvim-dap"; 4231 - rev = "dd778f65dc95323f781f291fb7c5bf3c17d057b1"; 4232 - sha256 = "1nvn03rx7gvrdvfmgsmwm2ncgsyizqyvgv92v7cvfa3jv30vfb0a"; 4233 }; 4234 meta.homepage = "https://github.com/mfussenegger/nvim-dap/"; 4235 }; ··· 4284 4285 nvim-gps = buildVimPluginFrom2Nix { 4286 pname = "nvim-gps"; 4287 - version = "2021-11-10"; 4288 src = fetchFromGitHub { 4289 owner = "smiteshp"; 4290 repo = "nvim-gps"; 4291 - rev = "14653c92c93b2e00a8cc742ee109f510350afc2a"; 4292 - sha256 = "13i1pyd5ibmczyw3r2wrhrislkych994487iv5202zv0jn6jaglm"; 4293 }; 4294 meta.homepage = "https://github.com/smiteshp/nvim-gps/"; 4295 }; 4296 4297 nvim-highlite = buildVimPluginFrom2Nix { 4298 pname = "nvim-highlite"; 4299 - version = "2021-11-06"; 4300 src = fetchFromGitHub { 4301 owner = "Iron-E"; 4302 repo = "nvim-highlite"; 4303 - rev = "61773fc76e0d78c1223f158605f1cd698dc83a94"; 4304 - sha256 = "1p3hz5ap16yf3720l682sclal4ycqmqa4kaiw5ljz57jg070ckz8"; 4305 }; 4306 meta.homepage = "https://github.com/Iron-E/nvim-highlite/"; 4307 }; ··· 4344 4345 nvim-lightbulb = buildVimPluginFrom2Nix { 4346 pname = "nvim-lightbulb"; 4347 - version = "2021-10-17"; 4348 src = fetchFromGitHub { 4349 owner = "kosayoda"; 4350 repo = "nvim-lightbulb"; 4351 - rev = "66223954d7bd7d4358c36d157c25503168d04319"; 4352 - sha256 = "0jghq2fkvibilb1zglkckhpmq6dgi1q87fcwpvcv9slk1qlgw19d"; 4353 }; 4354 meta.homepage = "https://github.com/kosayoda/nvim-lightbulb/"; 4355 }; 4356 4357 nvim-lint = buildVimPluginFrom2Nix { 4358 pname = "nvim-lint"; 4359 - version = "2021-11-08"; 4360 src = fetchFromGitHub { 4361 owner = "mfussenegger"; 4362 repo = "nvim-lint"; 4363 - rev = "0116b78963fd24643faa34fa1bc02f8d425a73ef"; 4364 - sha256 = "07y1z3c2mqcwlbg682h9d98wghfh1l69y9j4igw77bdxrcmnlyrr"; 4365 }; 4366 meta.homepage = "https://github.com/mfussenegger/nvim-lint/"; 4367 }; 4368 4369 nvim-lsp-ts-utils = buildVimPluginFrom2Nix { 4370 pname = "nvim-lsp-ts-utils"; 4371 - version = "2021-11-11"; 4372 src = fetchFromGitHub { 4373 owner = "jose-elias-alvarez"; 4374 repo = "nvim-lsp-ts-utils"; 4375 - rev = "1af2922c3ab7f80654c09932c55bd5d70f13f1e3"; 4376 - sha256 = "1qcska723k2ajimmib7i57clhdbrbqlcp4b18capsrrnxsl92pq0"; 4377 }; 4378 meta.homepage = "https://github.com/jose-elias-alvarez/nvim-lsp-ts-utils/"; 4379 }; 4380 4381 nvim-lspconfig = buildVimPluginFrom2Nix { 4382 pname = "nvim-lspconfig"; 4383 - version = "2021-11-11"; 4384 src = fetchFromGitHub { 4385 owner = "neovim"; 4386 repo = "nvim-lspconfig"; 4387 - rev = "edca6c107027111ed02abe17a231d1cf0d353adf"; 4388 - sha256 = "13abx9r8p9admskallw3y1dqia288xm6l3l6idshih6wbmkx2jk2"; 4389 }; 4390 meta.homepage = "https://github.com/neovim/nvim-lspconfig/"; 4391 }; ··· 4416 4417 nvim-notify = buildVimPluginFrom2Nix { 4418 pname = "nvim-notify"; 4419 - version = "2021-11-02"; 4420 src = fetchFromGitHub { 4421 owner = "rcarriga"; 4422 repo = "nvim-notify"; 4423 - rev = "ee79a5e2f8bde0ebdf99880a98d1312da83a3caa"; 4424 - sha256 = "1krpd6jqy73kqf63yyyp4crkrnb80hi23wks6rf31mag6ry1xr27"; 4425 }; 4426 meta.homepage = "https://github.com/rcarriga/nvim-notify/"; 4427 }; ··· 4464 4465 nvim-spectre = buildVimPluginFrom2Nix { 4466 pname = "nvim-spectre"; 4467 - version = "2021-11-10"; 4468 src = fetchFromGitHub { 4469 owner = "windwp"; 4470 repo = "nvim-spectre"; 4471 - rev = "9502f162a43d18d03f6d11e2152aee39b1ed5adb"; 4472 - sha256 = "1czj2jbls3ci35mbvvzb7x2zzh3aw2rz42bvfx45ibpw6iabdgky"; 4473 }; 4474 meta.homepage = "https://github.com/windwp/nvim-spectre/"; 4475 }; ··· 4584 4585 nvim-web-devicons = buildVimPluginFrom2Nix { 4586 pname = "nvim-web-devicons"; 4587 - version = "2021-10-08"; 4588 src = fetchFromGitHub { 4589 owner = "kyazdani42"; 4590 repo = "nvim-web-devicons"; 4591 - rev = "ee101462d127ed6a5561ce9ce92bfded87d7d478"; 4592 - sha256 = "097i8x5yyr0krq4jn5zwn6lild8dwv7yqdmlgrwbmywad32vfyh2"; 4593 }; 4594 meta.homepage = "https://github.com/kyazdani42/nvim-web-devicons/"; 4595 }; ··· 4692 4693 onedarkpro-nvim = buildVimPluginFrom2Nix { 4694 pname = "onedarkpro.nvim"; 4695 - version = "2021-11-08"; 4696 src = fetchFromGitHub { 4697 owner = "olimorris"; 4698 repo = "onedarkpro.nvim"; 4699 - rev = "9015d8a1313b16cf3792830eb8d77553765adb80"; 4700 - sha256 = "19mhfr8ih2hp9jadgphwq0g576qsbnggiknv6ipkl60d8jrhxflk"; 4701 }; 4702 meta.homepage = "https://github.com/olimorris/onedarkpro.nvim/"; 4703 }; ··· 4740 4741 orgmode-nvim = buildVimPluginFrom2Nix { 4742 pname = "orgmode.nvim"; 4743 - version = "2021-11-10"; 4744 src = fetchFromGitHub { 4745 owner = "kristijanhusak"; 4746 repo = "orgmode.nvim"; 4747 - rev = "93779c1eed34da14ab8082933fb1e3d47869d07f"; 4748 - sha256 = "145460q9a9f4jp8l8pfqi5rf12vvz05g4jfd70h65i7i55l2v37j"; 4749 }; 4750 meta.homepage = "https://github.com/kristijanhusak/orgmode.nvim/"; 4751 }; 4752 4753 package-info-nvim = buildVimPluginFrom2Nix { 4754 pname = "package-info.nvim"; 4755 - version = "2021-11-09"; 4756 src = fetchFromGitHub { 4757 owner = "vuki656"; 4758 repo = "package-info.nvim"; 4759 - rev = "037bedfa881d60f0ece93c31f31d04cf3ca29a87"; 4760 - sha256 = "0gflgccj0ymgv89paq9dp54f56g0wwz7m56sdfdycjii491q5hm4"; 4761 }; 4762 meta.homepage = "https://github.com/vuki656/package-info.nvim/"; 4763 }; ··· 4872 4873 plenary-nvim = buildVimPluginFrom2Nix { 4874 pname = "plenary.nvim"; 4875 - version = "2021-11-08"; 4876 src = fetchFromGitHub { 4877 owner = "nvim-lua"; 4878 repo = "plenary.nvim"; 4879 - rev = "b42e0cfe22ad3a0cac35cf14315e9dc22cea2ec9"; 4880 - sha256 = "09is80vcmnp0w42nahsqwliiyiyv64s9x459rl2dk4mnr7hgi7fm"; 4881 }; 4882 meta.homepage = "https://github.com/nvim-lua/plenary.nvim/"; 4883 }; ··· 4921 4922 presence-nvim = buildVimPluginFrom2Nix { 4923 pname = "presence.nvim"; 4924 - version = "2021-10-19"; 4925 src = fetchFromGitHub { 4926 owner = "andweeb"; 4927 repo = "presence.nvim"; 4928 - rev = "11adcec0db647625c5f4876257d2764db4621662"; 4929 - sha256 = "0jzks4nvsw69g0gvrb8qpqszhd957fmx0ly9a11h2m5wry179ppp"; 4930 }; 4931 meta.homepage = "https://github.com/andweeb/presence.nvim/"; 4932 }; ··· 5065 5066 rainbow = buildVimPluginFrom2Nix { 5067 pname = "rainbow"; 5068 - version = "2021-11-08"; 5069 src = fetchFromGitHub { 5070 owner = "luochen1990"; 5071 repo = "rainbow"; 5072 - rev = "f1cb0d3d4a4785428f7ccec9f0e69ad314d748d9"; 5073 - sha256 = "15227jrbhagbyvd56cq1byc32hwgbsh293r9fb96419pa3rm9j1l"; 5074 }; 5075 meta.homepage = "https://github.com/luochen1990/rainbow/"; 5076 }; ··· 5149 5150 refactoring-nvim = buildVimPluginFrom2Nix { 5151 pname = "refactoring.nvim"; 5152 - version = "2021-11-11"; 5153 src = fetchFromGitHub { 5154 owner = "theprimeagen"; 5155 repo = "refactoring.nvim"; 5156 - rev = "c3fea5e8b377b07cd744579f8ca65e3f805ddaad"; 5157 - sha256 = "0rbn1mnyn9dhxv48qngs71n8pw25fmyaaffqgrk3qxfc1rxihf4a"; 5158 }; 5159 meta.homepage = "https://github.com/theprimeagen/refactoring.nvim/"; 5160 }; ··· 5269 5270 rust-tools-nvim = buildVimPluginFrom2Nix { 5271 pname = "rust-tools.nvim"; 5272 - version = "2021-11-04"; 5273 src = fetchFromGitHub { 5274 owner = "simrat39"; 5275 repo = "rust-tools.nvim"; 5276 - rev = "488a79a053525fd1b3ceacb9b0675ebd0ed95dc0"; 5277 - sha256 = "13vks86lswp9xl934nqmgsdwx2jkjyz4qzm806ln2mz0mwmjk7zx"; 5278 }; 5279 meta.homepage = "https://github.com/simrat39/rust-tools.nvim/"; 5280 }; ··· 5317 5318 SchemaStore-nvim = buildVimPluginFrom2Nix { 5319 pname = "SchemaStore.nvim"; 5320 - version = "2021-11-09"; 5321 src = fetchFromGitHub { 5322 owner = "b0o"; 5323 repo = "SchemaStore.nvim"; 5324 - rev = "6b3ec7db13a9935d5d948fb0985707181e07979d"; 5325 - sha256 = "18inch8c1n9b835igw8brvmxh4c8pl9cq8qiv3v64fry2pv59mqd"; 5326 }; 5327 meta.homepage = "https://github.com/b0o/SchemaStore.nvim/"; 5328 }; 5329 5330 scrollbar-nvim = buildVimPluginFrom2Nix { 5331 pname = "scrollbar.nvim"; 5332 - version = "2021-06-04"; 5333 src = fetchFromGitHub { 5334 owner = "Xuyuanp"; 5335 repo = "scrollbar.nvim"; 5336 - rev = "c338467dd6ef141fa8ce3172097a1f5be6c43779"; 5337 - sha256 = "1wvzdrj8gckhh6x4szipjjb6mg0v3ix5cq5dy83lfb28psyznshw"; 5338 }; 5339 meta.homepage = "https://github.com/Xuyuanp/scrollbar.nvim/"; 5340 }; ··· 5606 5607 specs-nvim = buildVimPluginFrom2Nix { 5608 pname = "specs.nvim"; 5609 - version = "2021-05-05"; 5610 src = fetchFromGitHub { 5611 owner = "edluffy"; 5612 repo = "specs.nvim"; 5613 - rev = "a62319a224b73b70af47a48ba076d7ec67b08526"; 5614 - sha256 = "1hs7qp3fr451ziddv08nyygnxx1n6y32fr0y97s9zjc7j13d3nc3"; 5615 }; 5616 meta.homepage = "https://github.com/edluffy/specs.nvim/"; 5617 }; ··· 5667 5668 srcery-vim = buildVimPluginFrom2Nix { 5669 pname = "srcery-vim"; 5670 - version = "2021-09-25"; 5671 src = fetchFromGitHub { 5672 owner = "srcery-colors"; 5673 repo = "srcery-vim"; 5674 - rev = "0325ba54262c7d03450d877b44e692c88b17cf7a"; 5675 - sha256 = "1vrvmp3ihjb8zlg5f00hs7d6km8p30g7pakaw5rdk60pxj21sw2v"; 5676 }; 5677 meta.homepage = "https://github.com/srcery-colors/srcery-vim/"; 5678 }; ··· 5691 5692 stabilize-nvim = buildVimPluginFrom2Nix { 5693 pname = "stabilize.nvim"; 5694 - version = "2021-11-10"; 5695 src = fetchFromGitHub { 5696 owner = "luukvbaal"; 5697 repo = "stabilize.nvim"; 5698 - rev = "fd74d2a9d2a384a530eba3a9771a5396b4ddad26"; 5699 - sha256 = "190mf9w344db5civ122l7zdr63l811qcqf7shh89zx4qfrsllf43"; 5700 }; 5701 meta.homepage = "https://github.com/luukvbaal/stabilize.nvim/"; 5702 }; ··· 6065 6066 telescope-nvim = buildVimPluginFrom2Nix { 6067 pname = "telescope.nvim"; 6068 - version = "2021-11-10"; 6069 src = fetchFromGitHub { 6070 owner = "nvim-telescope"; 6071 repo = "telescope.nvim"; 6072 - rev = "f3ef5920725d719ed23195a457a86015826d3e1d"; 6073 - sha256 = "1dhczp84lhsz1ikqprg552wqi0hncigvhfb726iz01cr9y25b8mg"; 6074 }; 6075 meta.homepage = "https://github.com/nvim-telescope/telescope.nvim/"; 6076 }; ··· 6210 6211 toggleterm-nvim = buildVimPluginFrom2Nix { 6212 pname = "toggleterm.nvim"; 6213 - version = "2021-11-07"; 6214 src = fetchFromGitHub { 6215 owner = "akinsho"; 6216 repo = "toggleterm.nvim"; 6217 - rev = "0b6d65d8b45e261bc17176e86abb3f631c88fc1b"; 6218 - sha256 = "07qj7z2rrdz2n5gks7nh1xvapvdc5s641vsvg0nm54q4y72lp2ds"; 6219 }; 6220 meta.homepage = "https://github.com/akinsho/toggleterm.nvim/"; 6221 }; ··· 6234 6235 traces-vim = buildVimPluginFrom2Nix { 6236 pname = "traces.vim"; 6237 - version = "2021-08-27"; 6238 src = fetchFromGitHub { 6239 owner = "markonm"; 6240 repo = "traces.vim"; 6241 - rev = "419ce02f68b13aa892735febc1d1887a9a11d5db"; 6242 - sha256 = "07va4rr9xfmr93qq4nn0d3ssay4mwdvxzl4f92akib36kxnv0m69"; 6243 }; 6244 meta.homepage = "https://github.com/markonm/traces.vim/"; 6245 }; ··· 6438 6439 vifm-vim = buildVimPluginFrom2Nix { 6440 pname = "vifm.vim"; 6441 - version = "2021-11-04"; 6442 src = fetchFromGitHub { 6443 owner = "vifm"; 6444 repo = "vifm.vim"; 6445 - rev = "7aee389c0ada5677eff5872195c0e3a47c20cb76"; 6446 - sha256 = "17hph035igj8b0m8dc3qw76w7mq47rzbm7n513npfy367vicably"; 6447 }; 6448 meta.homepage = "https://github.com/vifm/vifm.vim/"; 6449 }; ··· 6702 6703 vim-airline = buildVimPluginFrom2Nix { 6704 pname = "vim-airline"; 6705 - version = "2021-11-11"; 6706 src = fetchFromGitHub { 6707 owner = "vim-airline"; 6708 repo = "vim-airline"; 6709 - rev = "47bf6b1716d599fa19756ce094309a3d551fac73"; 6710 - sha256 = "1c2sqkyd0zha9pchh1lbyww7v281rr488ff5b1c2rkc6inya9lcd"; 6711 }; 6712 meta.homepage = "https://github.com/vim-airline/vim-airline/"; 6713 }; ··· 7710 7711 vim-fireplace = buildVimPluginFrom2Nix { 7712 pname = "vim-fireplace"; 7713 - version = "2021-08-03"; 7714 src = fetchFromGitHub { 7715 owner = "tpope"; 7716 repo = "vim-fireplace"; 7717 - rev = "c9a155b88d629221628937eadb64a3e87f8d82d9"; 7718 - sha256 = "1h0y4k3xypbn4lyyksjddvcdnz8nqy73qnjxm21ahsz73xk6bpwk"; 7719 }; 7720 meta.homepage = "https://github.com/tpope/vim-fireplace/"; 7721 }; ··· 7842 7843 vim-fugitive = buildVimPluginFrom2Nix { 7844 pname = "vim-fugitive"; 7845 - version = "2021-11-11"; 7846 src = fetchFromGitHub { 7847 owner = "tpope"; 7848 repo = "vim-fugitive"; 7849 - rev = "2e4ee0b5d6e61c6b3bc48e844343f89615dfc6e0"; 7850 - sha256 = "0ibks13hicpv5syk6lgrzjfbacwxfp02cmp23ry8wjm2dkzmv81s"; 7851 }; 7852 meta.homepage = "https://github.com/tpope/vim-fugitive/"; 7853 }; ··· 7962 7963 vim-glsl = buildVimPluginFrom2Nix { 7964 pname = "vim-glsl"; 7965 - version = "2021-09-05"; 7966 src = fetchFromGitHub { 7967 owner = "tikhomirov"; 7968 repo = "vim-glsl"; 7969 - rev = "373e4ec58f725910ea242e79ce03fe21f100b6e3"; 7970 - sha256 = "0hf583fkrkq0y38ic9m0rl1p2h1s6fq8gx9gxk64hh6ibqxdicgz"; 7971 }; 7972 meta.homepage = "https://github.com/tikhomirov/vim-glsl/"; 7973 }; ··· 8287 8288 vim-illuminate = buildVimPluginFrom2Nix { 8289 pname = "vim-illuminate"; 8290 - version = "2021-09-28"; 8291 src = fetchFromGitHub { 8292 owner = "RRethy"; 8293 repo = "vim-illuminate"; 8294 - rev = "084b012ce5bc1bf302b69eb73562146afe0a9756"; 8295 - sha256 = "0rl048hny15rq5m85vl0iy11c4xiv0plr0j8b65vqmmb5r1mxmbg"; 8296 }; 8297 meta.homepage = "https://github.com/RRethy/vim-illuminate/"; 8298 }; ··· 8395 8396 vim-javacomplete2 = buildVimPluginFrom2Nix { 8397 pname = "vim-javacomplete2"; 8398 - version = "2021-11-09"; 8399 src = fetchFromGitHub { 8400 owner = "artur-shaik"; 8401 repo = "vim-javacomplete2"; 8402 - rev = "19aec7d63eda429d056586d9bcc98f61f860c668"; 8403 - sha256 = "055f58342ai117gq0021zwhv8ck5sca8bxrqqixbv5cjywck0r17"; 8404 }; 8405 meta.homepage = "https://github.com/artur-shaik/vim-javacomplete2/"; 8406 }; ··· 8516 8517 vim-kitty-navigator = buildVimPluginFrom2Nix { 8518 pname = "vim-kitty-navigator"; 8519 - version = "2021-08-17"; 8520 src = fetchFromGitHub { 8521 owner = "knubie"; 8522 repo = "vim-kitty-navigator"; 8523 - rev = "a58f56960933df0b34b98ba3b025995774315adc"; 8524 - sha256 = "16vz20fvhbb2p9g68qix9s4fbr9adrgwc45g12ldi7bdgkr1006g"; 8525 }; 8526 meta.homepage = "https://github.com/knubie/vim-kitty-navigator/"; 8527 }; ··· 10402 10403 vim-tpipeline = buildVimPluginFrom2Nix { 10404 pname = "vim-tpipeline"; 10405 - version = "2021-11-02"; 10406 src = fetchFromGitHub { 10407 owner = "vimpostor"; 10408 repo = "vim-tpipeline"; 10409 - rev = "065cf18295fa8d08ab2d458c67ea6281c81bbd26"; 10410 - sha256 = "0l0zp64jzhdyrlgfplqkpsl0jbpxkr4sijymqsiabjiyvc8p6qc7"; 10411 }; 10412 meta.homepage = "https://github.com/vimpostor/vim-tpipeline/"; 10413 }; ··· 10558 10559 vim-vsnip = buildVimPluginFrom2Nix { 10560 pname = "vim-vsnip"; 10561 - version = "2021-11-02"; 10562 src = fetchFromGitHub { 10563 owner = "hrsh7th"; 10564 repo = "vim-vsnip"; 10565 - rev = "4d57a1f4efce38e0d05196f9beba4bcc6e9d1ed5"; 10566 - sha256 = "0p6bqhddbqnfcd0wq1wy3ix082phhgiqrx593wq54fjx4wqg9xvi"; 10567 }; 10568 meta.homepage = "https://github.com/hrsh7th/vim-vsnip/"; 10569 }; ··· 10594 10595 vim-wakatime = buildVimPluginFrom2Nix { 10596 pname = "vim-wakatime"; 10597 - version = "2021-11-05"; 10598 src = fetchFromGitHub { 10599 owner = "wakatime"; 10600 repo = "vim-wakatime"; 10601 - rev = "2464b7a65c002b3ec92f8a8fc300d52582e9eefd"; 10602 - sha256 = "06i33hk0q41dvcr75kqq57jr88sqczqiwfhmssyxifhxfhcb6x2r"; 10603 }; 10604 meta.homepage = "https://github.com/wakatime/vim-wakatime/"; 10605 }; ··· 10630 10631 vim-which-key = buildVimPluginFrom2Nix { 10632 pname = "vim-which-key"; 10633 - version = "2021-09-22"; 10634 src = fetchFromGitHub { 10635 owner = "liuchengxu"; 10636 repo = "vim-which-key"; 10637 - rev = "2c915b6de918c073fbd83809e51343651f00f9a8"; 10638 - sha256 = "05jdjmpyczcgqsm5mznyb79bq10ianv7v3rhxy9wrklkama3jrgs"; 10639 }; 10640 meta.homepage = "https://github.com/liuchengxu/vim-which-key/"; 10641 }; ··· 10882 10883 vimspector = buildVimPluginFrom2Nix { 10884 pname = "vimspector"; 10885 - version = "2021-11-04"; 10886 src = fetchFromGitHub { 10887 owner = "puremourning"; 10888 repo = "vimspector"; 10889 - rev = "15eddb7445c6dc9131058631a03140d03443647a"; 10890 - sha256 = "0xv1afx1yah867ksxf5a60v3fk1qg5g3vn72bhybqmcjidxz29p8"; 10891 fetchSubmodules = true; 10892 }; 10893 meta.homepage = "https://github.com/puremourning/vimspector/"; ··· 10895 10896 vimtex = buildVimPluginFrom2Nix { 10897 pname = "vimtex"; 10898 - version = "2021-11-11"; 10899 src = fetchFromGitHub { 10900 owner = "lervag"; 10901 repo = "vimtex"; 10902 - rev = "c63adb6958458b62a7b9c0e4156d11a5da5f1a9f"; 10903 - sha256 = "07q4wmckz2a1x2l11pa1m5dqbk8wz0slk28p7wcapwfn5lxf48jq"; 10904 }; 10905 meta.homepage = "https://github.com/lervag/vimtex/"; 10906 }; ··· 10955 10956 vista-vim = buildVimPluginFrom2Nix { 10957 pname = "vista.vim"; 10958 - version = "2021-10-26"; 10959 src = fetchFromGitHub { 10960 owner = "liuchengxu"; 10961 repo = "vista.vim"; 10962 - rev = "587b6b2de244491c3fbe118ebe6739a90f3c91b2"; 10963 - sha256 = "14qxc1f8nx5ahc8809ywgrzcq08v0qkyw6hnrd9ps7mjxqgrsppf"; 10964 }; 10965 meta.homepage = "https://github.com/liuchengxu/vista.vim/"; 10966 }; ··· 11136 11137 YouCompleteMe = buildVimPluginFrom2Nix { 11138 pname = "YouCompleteMe"; 11139 - version = "2021-11-05"; 11140 src = fetchFromGitHub { 11141 owner = "ycm-core"; 11142 repo = "YouCompleteMe"; 11143 - rev = "166f499cb1e7c0f445d0ffd8d280329f3942b93b"; 11144 - sha256 = "10p7nfjv76q5lf367a56dn4k2f70xdz28r3w0c28laym49jfm5wd"; 11145 fetchSubmodules = true; 11146 }; 11147 meta.homepage = "https://github.com/ycm-core/YouCompleteMe/";
··· 77 78 ale = buildVimPluginFrom2Nix { 79 pname = "ale"; 80 + version = "2021-11-15"; 81 src = fetchFromGitHub { 82 owner = "dense-analysis"; 83 repo = "ale"; 84 + rev = "31dc6a61a07839ea906f6f0b80be713fb8cad1c7"; 85 + sha256 = "1j8fzyxl3lgc5xwklllvk7cq0qh7hdjjvv9r93xzbmr74w82410v"; 86 }; 87 meta.homepage = "https://github.com/dense-analysis/ale/"; 88 }; ··· 101 102 aniseed = buildVimPluginFrom2Nix { 103 pname = "aniseed"; 104 + version = "2021-11-14"; 105 src = fetchFromGitHub { 106 owner = "Olical"; 107 repo = "aniseed"; 108 + rev = "9c8f2cd17d454a38b11cedd323579b579ee27f9c"; 109 + sha256 = "1j7nsiikf2bl6h52pa0v2mwhsrk8irq9104jm7hy6a6wz97dqmfb"; 110 }; 111 meta.homepage = "https://github.com/Olical/aniseed/"; 112 }; ··· 197 198 aurora = buildVimPluginFrom2Nix { 199 pname = "aurora"; 200 + version = "2021-11-13"; 201 src = fetchFromGitHub { 202 owner = "ray-x"; 203 repo = "aurora"; 204 + rev = "639f60317e7ccaccb6b8b6681b40897308d466b8"; 205 + sha256 = "0b4nsdkfmd8j0v74fd4yzyx1rm2l4a968g3s9vhckrn9wnyj7khf"; 206 }; 207 meta.homepage = "https://github.com/ray-x/aurora/"; 208 }; ··· 413 414 bufferline-nvim = buildVimPluginFrom2Nix { 415 pname = "bufferline.nvim"; 416 + version = "2021-11-15"; 417 src = fetchFromGitHub { 418 owner = "akinsho"; 419 repo = "bufferline.nvim"; 420 + rev = "463637a3ac86dcaacbcd47aa608f53aaad749696"; 421 + sha256 = "0nphn0ks8xqf0l8xklqn2fv2wvizzpg1x399x9yd916q4ck92588"; 422 }; 423 meta.homepage = "https://github.com/akinsho/bufferline.nvim/"; 424 }; ··· 473 474 chadtree = buildVimPluginFrom2Nix { 475 pname = "chadtree"; 476 + version = "2021-11-17"; 477 src = fetchFromGitHub { 478 owner = "ms-jpq"; 479 repo = "chadtree"; 480 + rev = "6202def5abfbc83acfbb86110753a03e00bc97bf"; 481 + sha256 = "1gp0if044cqzpjfxrsn8kdk4siqm18bvdrngpqqar4rqgsx89kg1"; 482 }; 483 meta.homepage = "https://github.com/ms-jpq/chadtree/"; 484 }; ··· 581 582 cmp-buffer = buildVimPluginFrom2Nix { 583 pname = "cmp-buffer"; 584 + version = "2021-11-15"; 585 src = fetchFromGitHub { 586 owner = "hrsh7th"; 587 repo = "cmp-buffer"; 588 + rev = "bfbc32a8aadbf3d21294aad45f069b7d204b34b1"; 589 + sha256 = "11wmq4fh5nbyswcgmw17ihx7g4naqba06a55f1cxk913aqcqqnwx"; 590 }; 591 meta.homepage = "https://github.com/hrsh7th/cmp-buffer/"; 592 }; ··· 821 822 coc-fzf = buildVimPluginFrom2Nix { 823 pname = "coc-fzf"; 824 + version = "2021-11-11"; 825 src = fetchFromGitHub { 826 owner = "antoinemadec"; 827 repo = "coc-fzf"; 828 + rev = "60828294b9ba846c78893389d4772021043d2fa1"; 829 + sha256 = "1y7rslksa558fdh3m4m626vpvs424pvxkkk70mr57is47cminm3m"; 830 }; 831 meta.homepage = "https://github.com/antoinemadec/coc-fzf/"; 832 }; 833 834 coc-lua = buildVimPluginFrom2Nix { 835 pname = "coc-lua"; 836 + version = "2021-11-16"; 837 src = fetchFromGitHub { 838 owner = "josa42"; 839 repo = "coc-lua"; 840 + rev = "3a5366b11ca3c11a9e894755d365328ba36de227"; 841 + sha256 = "0qv73ph2wgn0j7il508zb29k04r4n5q601fih2hp264zvyqkw6sf"; 842 }; 843 meta.homepage = "https://github.com/josa42/coc-lua/"; 844 }; ··· 1098 1099 conjure = buildVimPluginFrom2Nix { 1100 pname = "conjure"; 1101 + version = "2021-11-14"; 1102 src = fetchFromGitHub { 1103 owner = "Olical"; 1104 repo = "conjure"; 1105 + rev = "9ed390497a5013aa533a15f5d96f3fb6319b4eb9"; 1106 + sha256 = "0w8akq23s5j5kais5s67f6zpkank9wgms30kzyvq2bpslk9kwvfx"; 1107 }; 1108 meta.homepage = "https://github.com/Olical/conjure/"; 1109 }; ··· 1134 1135 Coqtail = buildVimPluginFrom2Nix { 1136 pname = "Coqtail"; 1137 + version = "2021-11-15"; 1138 src = fetchFromGitHub { 1139 owner = "whonore"; 1140 repo = "Coqtail"; 1141 + rev = "f38e086135c5d9b69c9a5f70f82072419d952c29"; 1142 + sha256 = "01lf10b6b07s7ywrh16p5b52jj21hzv1vn216h9bnf4xdfz5pf9a"; 1143 }; 1144 meta.homepage = "https://github.com/whonore/Coqtail/"; 1145 }; ··· 1170 1171 crates-nvim = buildVimPluginFrom2Nix { 1172 pname = "crates.nvim"; 1173 + version = "2021-11-13"; 1174 src = fetchFromGitHub { 1175 owner = "saecki"; 1176 repo = "crates.nvim"; 1177 + rev = "dea18a76bbe84d1eb80f9474cb33c8efd377c73d"; 1178 + sha256 = "0gc47ixbjb2zf9g0qr2jzq2cmnzgml1lvvv22zdsrk7j8n9kxxqb"; 1179 }; 1180 meta.homepage = "https://github.com/saecki/crates.nvim/"; 1181 }; ··· 1242 1243 ctrlp-vim = buildVimPluginFrom2Nix { 1244 pname = "ctrlp.vim"; 1245 + version = "2021-11-16"; 1246 src = fetchFromGitHub { 1247 owner = "ctrlpvim"; 1248 repo = "ctrlp.vim"; 1249 + rev = "d9388d89745bb30c20ad0051c53d301cd054f47c"; 1250 + sha256 = "1lsr0y4q57k65qk5y17gnm8cfi7rg8r6h2h7cxkmgzn11d4p34c0"; 1251 }; 1252 meta.homepage = "https://github.com/ctrlpvim/ctrlp.vim/"; 1253 }; ··· 1640 1641 diffview-nvim = buildVimPluginFrom2Nix { 1642 pname = "diffview.nvim"; 1643 + version = "2021-11-11"; 1644 src = fetchFromGitHub { 1645 owner = "sindrets"; 1646 repo = "diffview.nvim"; 1647 + rev = "a38306ddf893b95b55c6cd881605b3232c658e42"; 1648 + sha256 = "1c55zhxzf3zps7fzqs4vsd81z9la2x3blvjwh45abs93rnqik8nx"; 1649 }; 1650 meta.homepage = "https://github.com/sindrets/diffview.nvim/"; 1651 }; ··· 2015 2016 friendly-snippets = buildVimPluginFrom2Nix { 2017 pname = "friendly-snippets"; 2018 + version = "2021-11-12"; 2019 src = fetchFromGitHub { 2020 owner = "rafamadriz"; 2021 repo = "friendly-snippets"; 2022 + rev = "05bfa7681b8f11b664fab657001c2efb6f3ec85e"; 2023 + sha256 = "1133f32q4g990mmvdrbnjxggk8y96w0c5zlvh553cz9j626a4zks"; 2024 }; 2025 meta.homepage = "https://github.com/rafamadriz/friendly-snippets/"; 2026 }; ··· 2207 2208 git-messenger-vim = buildVimPluginFrom2Nix { 2209 pname = "git-messenger.vim"; 2210 + version = "2021-11-13"; 2211 src = fetchFromGitHub { 2212 owner = "rhysd"; 2213 repo = "git-messenger.vim"; 2214 + rev = "2e67899355f3f631aad6845925e4c2c13546444d"; 2215 + sha256 = "0a6c04far9ji7h7k0b195zxn62sj6drn56cacmz86zmzksqgm8wp"; 2216 }; 2217 meta.homepage = "https://github.com/rhysd/git-messenger.vim/"; 2218 }; ··· 2243 2244 gitlinker-nvim = buildVimPluginFrom2Nix { 2245 pname = "gitlinker.nvim"; 2246 + version = "2021-11-15"; 2247 src = fetchFromGitHub { 2248 owner = "ruifm"; 2249 repo = "gitlinker.nvim"; 2250 + rev = "003ee482a25118cdac73faea8bd35df0399e8f8f"; 2251 + sha256 = "0zpy1cpviia9l4z3b87534arnxfja48bjhqqb88mxjzm9gkc4rbf"; 2252 }; 2253 meta.homepage = "https://github.com/ruifm/gitlinker.nvim/"; 2254 }; 2255 2256 gitsigns-nvim = buildVimPluginFrom2Nix { 2257 pname = "gitsigns.nvim"; 2258 + version = "2021-11-17"; 2259 src = fetchFromGitHub { 2260 owner = "lewis6991"; 2261 repo = "gitsigns.nvim"; 2262 + rev = "5e49bb09f324580519d1ef41cb03bcb07536a239"; 2263 + sha256 = "1zfwazv58y4r9cpalx522hnb9wics50m90n59yabmimb2iyp323z"; 2264 }; 2265 meta.homepage = "https://github.com/lewis6991/gitsigns.nvim/"; 2266 }; ··· 2327 2328 goto-preview = buildVimPluginFrom2Nix { 2329 pname = "goto-preview"; 2330 + version = "2021-11-17"; 2331 src = fetchFromGitHub { 2332 owner = "rmagatti"; 2333 repo = "goto-preview"; 2334 + rev = "817bae89f75c8f061f7c0198ce392dca5d16ac94"; 2335 + sha256 = "0pxz7mrl4fsdi6pyk7zizxb7g3a11n8s36ndg3l9qsbihfxiqk5y"; 2336 }; 2337 meta.homepage = "https://github.com/rmagatti/goto-preview/"; 2338 }; ··· 2399 2400 gruvbox-nvim = buildVimPluginFrom2Nix { 2401 pname = "gruvbox.nvim"; 2402 + version = "2021-11-12"; 2403 src = fetchFromGitHub { 2404 owner = "ellisonleao"; 2405 repo = "gruvbox.nvim"; 2406 + rev = "dc7c63320c523997610ced545007935c72d81942"; 2407 + sha256 = "16nvlli0vmqxdbcx2d8p2nsl0865444l1d3ji23z9cbz4i171rsw"; 2408 }; 2409 meta.homepage = "https://github.com/ellisonleao/gruvbox.nvim/"; 2410 }; ··· 2495 2496 hologram-nvim = buildVimPluginFrom2Nix { 2497 pname = "hologram.nvim"; 2498 + version = "2021-11-14"; 2499 src = fetchFromGitHub { 2500 owner = "edluffy"; 2501 repo = "hologram.nvim"; 2502 + rev = "1d1acf102de7a5eed7de62691250b064d6db9d8a"; 2503 + sha256 = "0ihr85iisjc3xr9jhm4fdgzhrjr1krnvinzb2x8cgmk7zsl5l194"; 2504 }; 2505 meta.homepage = "https://github.com/edluffy/hologram.nvim/"; 2506 }; ··· 2519 2520 hop-nvim = buildVimPluginFrom2Nix { 2521 pname = "hop.nvim"; 2522 + version = "2021-11-17"; 2523 src = fetchFromGitHub { 2524 owner = "phaazon"; 2525 repo = "hop.nvim"; 2526 + rev = "d2a9f2a6b0d075fc85ac346d3c03c4a3257bc805"; 2527 + sha256 = "1gpgln5bfvygpkqb1p2pawq1pw5rg9j5jwgl7wmal4fik9yixp0f"; 2528 }; 2529 meta.homepage = "https://github.com/phaazon/hop.nvim/"; 2530 }; ··· 2627 2628 indent-blankline-nvim = buildVimPluginFrom2Nix { 2629 pname = "indent-blankline.nvim"; 2630 + version = "2021-11-12"; 2631 src = fetchFromGitHub { 2632 owner = "lukas-reineke"; 2633 repo = "indent-blankline.nvim"; 2634 + rev = "9f663d31d4ee0672f24cd5b26ca3863665048a25"; 2635 + sha256 = "1lzdi3pgw9hf8pkmh3y8w3lrl27kac18hq4ryk0mghqyb8saabzw"; 2636 }; 2637 meta.homepage = "https://github.com/lukas-reineke/indent-blankline.nvim/"; 2638 }; ··· 2928 2929 lean-nvim = buildVimPluginFrom2Nix { 2930 pname = "lean.nvim"; 2931 + version = "2021-11-17"; 2932 src = fetchFromGitHub { 2933 owner = "Julian"; 2934 repo = "lean.nvim"; 2935 + rev = "a74b5c09bee57c4c41a4fe7e4594416f92ea05aa"; 2936 + sha256 = "1zrzd0rahwzhyx46bfwz6gzwr513h3k5b1f5maf0qrc1jq2snd6g"; 2937 }; 2938 meta.homepage = "https://github.com/Julian/lean.nvim/"; 2939 }; ··· 3048 3049 lightline-gruvbox-vim = buildVimPluginFrom2Nix { 3050 pname = "lightline-gruvbox.vim"; 3051 + version = "2021-11-12"; 3052 src = fetchFromGitHub { 3053 owner = "shinchu"; 3054 repo = "lightline-gruvbox.vim"; 3055 + rev = "e94af37820d9c2e6d9eb27c735bb8ef926a66c7e"; 3056 + sha256 = "1wxhxc3aqd0z0giwi8ki5wdarzz6s5bpc5iss7q63w2sbgvbr9sh"; 3057 }; 3058 meta.homepage = "https://github.com/shinchu/lightline-gruvbox.vim/"; 3059 }; ··· 3072 3073 lightspeed-nvim = buildVimPluginFrom2Nix { 3074 pname = "lightspeed.nvim"; 3075 + version = "2021-11-17"; 3076 src = fetchFromGitHub { 3077 owner = "ggandor"; 3078 repo = "lightspeed.nvim"; 3079 + rev = "d60ee2ef756e89f51ee3f41be2fbacfac965091f"; 3080 + sha256 = "0m610jvk7zx7lri33d3b2dr60w2xy8kzlssigiciynhzs0lg9pyg"; 3081 }; 3082 meta.homepage = "https://github.com/ggandor/lightspeed.nvim/"; 3083 }; ··· 3180 3181 lsp_signature-nvim = buildVimPluginFrom2Nix { 3182 pname = "lsp_signature.nvim"; 3183 + version = "2021-11-13"; 3184 src = fetchFromGitHub { 3185 owner = "ray-x"; 3186 repo = "lsp_signature.nvim"; 3187 + rev = "600111e6249bcc948e2b811ef09adf4ea84ebfc1"; 3188 + sha256 = "0w012936d42m2bs2g8mgg72wkf9mvx4w5m01qdh8daksi1wg86hy"; 3189 }; 3190 meta.homepage = "https://github.com/ray-x/lsp_signature.nvim/"; 3191 }; ··· 3228 3229 lualine-nvim = buildVimPluginFrom2Nix { 3230 pname = "lualine.nvim"; 3231 + version = "2021-11-16"; 3232 src = fetchFromGitHub { 3233 owner = "nvim-lualine"; 3234 repo = "lualine.nvim"; 3235 + rev = "7b608cb5731087b157bd509103b1d82d8984cba4"; 3236 + sha256 = "04nbfml4j2yr4imvdzany4r6amakiwazgfjgd4y2h3c78pnlrb41"; 3237 }; 3238 meta.homepage = "https://github.com/nvim-lualine/lualine.nvim/"; 3239 }; 3240 3241 luasnip = buildVimPluginFrom2Nix { 3242 pname = "luasnip"; 3243 + version = "2021-11-16"; 3244 src = fetchFromGitHub { 3245 owner = "l3mon4d3"; 3246 repo = "luasnip"; 3247 + rev = "6e10a30178240182781955ce062618c8d793a37b"; 3248 + sha256 = "0z1n838d8fvis88a603fzzmdh1iqm41svay8ypmkbm3wcjaafjyl"; 3249 }; 3250 meta.homepage = "https://github.com/l3mon4d3/luasnip/"; 3251 }; ··· 3348 3349 minimap-vim = buildVimPluginFrom2Nix { 3350 pname = "minimap.vim"; 3351 + version = "2021-11-16"; 3352 src = fetchFromGitHub { 3353 owner = "wfxr"; 3354 repo = "minimap.vim"; 3355 + rev = "f699b8296c878a5d669f3a13a9d6f916f6276bef"; 3356 + sha256 = "1v4xhp82rw5f7zq8mfcj478p088qrcqbml1crhqi9v41gghwv9b5"; 3357 }; 3358 meta.homepage = "https://github.com/wfxr/minimap.vim/"; 3359 }; ··· 3372 3373 mkdx = buildVimPluginFrom2Nix { 3374 pname = "mkdx"; 3375 + version = "2021-11-12"; 3376 src = fetchFromGitHub { 3377 owner = "SidOfc"; 3378 repo = "mkdx"; 3379 + rev = "aeb41655826fbeb6c412b32f2cd3acd1c7e5e958"; 3380 + sha256 = "14bslsyrxc1x13mijybcinx39nmc3gp3skn05i537xzl7lq5dnlr"; 3381 }; 3382 meta.homepage = "https://github.com/SidOfc/mkdx/"; 3383 }; ··· 4036 src = fetchFromGitHub { 4037 owner = "MunifTanjim"; 4038 repo = "nui.nvim"; 4039 + rev = "e940b57f30f6035df690fb24b1e5c93ae6aafcd6"; 4040 + sha256 = "0nvg3zsgqbk0gs978gzfkc57xn3wcn1mcsf6qrgc1xz4jxdd582m"; 4041 }; 4042 meta.homepage = "https://github.com/MunifTanjim/nui.nvim/"; 4043 }; 4044 4045 null-ls-nvim = buildVimPluginFrom2Nix { 4046 pname = "null-ls.nvim"; 4047 + version = "2021-11-17"; 4048 src = fetchFromGitHub { 4049 owner = "jose-elias-alvarez"; 4050 repo = "null-ls.nvim"; 4051 + rev = "e460ba050d074416a64ee7881b527fb87fbad981"; 4052 + sha256 = "1nksrmh5aj2h4r845vbz9lg7lxa8cr05p4gmcccagpmq9y0fk8fn"; 4053 }; 4054 meta.homepage = "https://github.com/jose-elias-alvarez/null-ls.nvim/"; 4055 }; ··· 4092 4093 nvim-autopairs = buildVimPluginFrom2Nix { 4094 pname = "nvim-autopairs"; 4095 + version = "2021-11-15"; 4096 src = fetchFromGitHub { 4097 owner = "windwp"; 4098 repo = "nvim-autopairs"; 4099 + rev = "1f18e79ee9b30fec25c3f32b1ed22c3290f07bb2"; 4100 + sha256 = "0sy5p93vqbnz01blgsk085xm791iga1yk65lp147axbib7b760kq"; 4101 }; 4102 meta.homepage = "https://github.com/windwp/nvim-autopairs/"; 4103 }; ··· 4116 4117 nvim-bqf = buildVimPluginFrom2Nix { 4118 pname = "nvim-bqf"; 4119 + version = "2021-11-13"; 4120 src = fetchFromGitHub { 4121 owner = "kevinhwang91"; 4122 repo = "nvim-bqf"; 4123 + rev = "ee370769ea2d6da807533a4c2b8f55ef057d4477"; 4124 + sha256 = "1xxab1pwnvlhy9mgyyvck8w3acz7cmjpqpl2mdc3z6gagqbjjrll"; 4125 }; 4126 meta.homepage = "https://github.com/kevinhwang91/nvim-bqf/"; 4127 }; ··· 4152 4153 nvim-cmp = buildVimPluginFrom2Nix { 4154 pname = "nvim-cmp"; 4155 + version = "2021-11-17"; 4156 src = fetchFromGitHub { 4157 owner = "hrsh7th"; 4158 repo = "nvim-cmp"; 4159 + rev = "27d4c21e8ff7a68e6abc930ff0e74a486c0026ad"; 4160 + sha256 = "0hp88j9r7l82nx4fbg42hmv2vcfd74f72v6aizj4zdmx3xnxnyb1"; 4161 }; 4162 meta.homepage = "https://github.com/hrsh7th/nvim-cmp/"; 4163 }; 4164 4165 nvim-code-action-menu = buildVimPluginFrom2Nix { 4166 pname = "nvim-code-action-menu"; 4167 + version = "2021-11-16"; 4168 src = fetchFromGitHub { 4169 owner = "weilbith"; 4170 repo = "nvim-code-action-menu"; 4171 + rev = "d3d059082eff3eb081167f8a232b1bde54bb2bdb"; 4172 + sha256 = "0d7imklcz39ir53nr5kr0s826yqrwhrmr5p9iabs07hshyq3khgx"; 4173 }; 4174 meta.homepage = "https://github.com/weilbith/nvim-code-action-menu/"; 4175 }; ··· 4224 4225 nvim-dap = buildVimPluginFrom2Nix { 4226 pname = "nvim-dap"; 4227 + version = "2021-11-12"; 4228 src = fetchFromGitHub { 4229 owner = "mfussenegger"; 4230 repo = "nvim-dap"; 4231 + rev = "1a87456d280e8e308df7983650a5ea2b5a6bfb63"; 4232 + sha256 = "119cmq8bnm35l7vdlf83dkldk3jxdkdjsqw98b5hs437xrjwfhjr"; 4233 }; 4234 meta.homepage = "https://github.com/mfussenegger/nvim-dap/"; 4235 }; ··· 4284 4285 nvim-gps = buildVimPluginFrom2Nix { 4286 pname = "nvim-gps"; 4287 + version = "2021-11-14"; 4288 src = fetchFromGitHub { 4289 owner = "smiteshp"; 4290 repo = "nvim-gps"; 4291 + rev = "4805df6a5858aea5ccff56a6d706c96fb746c5d7"; 4292 + sha256 = "13jmdnz9wxgqm5gcys42flfnwgj0pdwlcgx2vkmncfmg675fgfq6"; 4293 }; 4294 meta.homepage = "https://github.com/smiteshp/nvim-gps/"; 4295 }; 4296 4297 nvim-highlite = buildVimPluginFrom2Nix { 4298 pname = "nvim-highlite"; 4299 + version = "2021-11-11"; 4300 src = fetchFromGitHub { 4301 owner = "Iron-E"; 4302 repo = "nvim-highlite"; 4303 + rev = "c0f6d68ea245fd2efb527fe1b7874c48084d8150"; 4304 + sha256 = "1nai09x1sc9wvz2m5j4rj6wjpdhwk88v4sapdmvb5pqvrqqylg60"; 4305 }; 4306 meta.homepage = "https://github.com/Iron-E/nvim-highlite/"; 4307 }; ··· 4344 4345 nvim-lightbulb = buildVimPluginFrom2Nix { 4346 pname = "nvim-lightbulb"; 4347 + version = "2021-11-13"; 4348 src = fetchFromGitHub { 4349 owner = "kosayoda"; 4350 repo = "nvim-lightbulb"; 4351 + rev = "cd5267d2d708e908dbd668c7de74e1325eb1e1da"; 4352 + sha256 = "1ans2kzg750d4a83hk5p9x5h51m9ywxgk6bxrcj1pwnpkhl5h75z"; 4353 }; 4354 meta.homepage = "https://github.com/kosayoda/nvim-lightbulb/"; 4355 }; 4356 4357 nvim-lint = buildVimPluginFrom2Nix { 4358 pname = "nvim-lint"; 4359 + version = "2021-11-16"; 4360 src = fetchFromGitHub { 4361 owner = "mfussenegger"; 4362 repo = "nvim-lint"; 4363 + rev = "c3c8a247fda421b0db1f2cbf50ab4340ba0ffc61"; 4364 + sha256 = "1sa3mqm65aspa91vavg1ng36w51jsb5kdjsra4bjjmggwbphdz8w"; 4365 }; 4366 meta.homepage = "https://github.com/mfussenegger/nvim-lint/"; 4367 }; 4368 4369 nvim-lsp-ts-utils = buildVimPluginFrom2Nix { 4370 pname = "nvim-lsp-ts-utils"; 4371 + version = "2021-11-16"; 4372 src = fetchFromGitHub { 4373 owner = "jose-elias-alvarez"; 4374 repo = "nvim-lsp-ts-utils"; 4375 + rev = "825630a5d28634fbb3663d1e605ff0a82b843d81"; 4376 + sha256 = "1zj7b0g3f9kqnpzqcvh0p9wg10y7kn5mq8vzcmwsyaiwqpdijgwv"; 4377 }; 4378 meta.homepage = "https://github.com/jose-elias-alvarez/nvim-lsp-ts-utils/"; 4379 }; 4380 4381 nvim-lspconfig = buildVimPluginFrom2Nix { 4382 pname = "nvim-lspconfig"; 4383 + version = "2021-11-17"; 4384 src = fetchFromGitHub { 4385 owner = "neovim"; 4386 repo = "nvim-lspconfig"; 4387 + rev = "27d2c116fdea5614f422dcbcae63da01a1415fcf"; 4388 + sha256 = "10ip201ihd2jjs9mb0vafa7iqzxh0f0rs5s96rrpw4zaxzq49gkn"; 4389 }; 4390 meta.homepage = "https://github.com/neovim/nvim-lspconfig/"; 4391 }; ··· 4416 4417 nvim-notify = buildVimPluginFrom2Nix { 4418 pname = "nvim-notify"; 4419 + version = "2021-11-12"; 4420 src = fetchFromGitHub { 4421 owner = "rcarriga"; 4422 repo = "nvim-notify"; 4423 + rev = "54375b724637eb6f29085c582318ae1fd042e717"; 4424 + sha256 = "1zli6vpcyk8ving7x7lh5nwgkf020rh5dixxsmiq6p8xhgi7hg53"; 4425 }; 4426 meta.homepage = "https://github.com/rcarriga/nvim-notify/"; 4427 }; ··· 4464 4465 nvim-spectre = buildVimPluginFrom2Nix { 4466 pname = "nvim-spectre"; 4467 + version = "2021-11-14"; 4468 src = fetchFromGitHub { 4469 owner = "windwp"; 4470 repo = "nvim-spectre"; 4471 + rev = "b630e04fa176ffb4e8c188b651561973a5ace077"; 4472 + sha256 = "1x0ndsgywkjb51y3zqhaxkrv9g7qjra6is3cxgiszl18d42g7nrd"; 4473 }; 4474 meta.homepage = "https://github.com/windwp/nvim-spectre/"; 4475 }; ··· 4584 4585 nvim-web-devicons = buildVimPluginFrom2Nix { 4586 pname = "nvim-web-devicons"; 4587 + version = "2021-11-12"; 4588 src = fetchFromGitHub { 4589 owner = "kyazdani42"; 4590 repo = "nvim-web-devicons"; 4591 + rev = "f936ff3e1f9d58ec0caf0bd398e9675b54fe292e"; 4592 + sha256 = "1vzrsr2m75nky1nz5hji7chqcc3d601bkx7raq88pjw4qa3s7b1r"; 4593 }; 4594 meta.homepage = "https://github.com/kyazdani42/nvim-web-devicons/"; 4595 }; ··· 4692 4693 onedarkpro-nvim = buildVimPluginFrom2Nix { 4694 pname = "onedarkpro.nvim"; 4695 + version = "2021-11-16"; 4696 src = fetchFromGitHub { 4697 owner = "olimorris"; 4698 repo = "onedarkpro.nvim"; 4699 + rev = "fd4dd7a09bac975c94612ce3c8fa98a51bcce412"; 4700 + sha256 = "0drjpfvkk9mmp7v2v16vwc3halxbwkwc95n0x0cz47lp2q3b7kss"; 4701 }; 4702 meta.homepage = "https://github.com/olimorris/onedarkpro.nvim/"; 4703 }; ··· 4740 4741 orgmode-nvim = buildVimPluginFrom2Nix { 4742 pname = "orgmode.nvim"; 4743 + version = "2021-11-14"; 4744 src = fetchFromGitHub { 4745 owner = "kristijanhusak"; 4746 repo = "orgmode.nvim"; 4747 + rev = "25e1fec55362124a8300108c88bd7127e09dad03"; 4748 + sha256 = "0yhdyiwbwwg7m57983pnlawjgzm40dg77jy8dk4gb2183ldk8srs"; 4749 }; 4750 meta.homepage = "https://github.com/kristijanhusak/orgmode.nvim/"; 4751 }; 4752 4753 package-info-nvim = buildVimPluginFrom2Nix { 4754 pname = "package-info.nvim"; 4755 + version = "2021-11-13"; 4756 src = fetchFromGitHub { 4757 owner = "vuki656"; 4758 repo = "package-info.nvim"; 4759 + rev = "8656a9305afe828b7b2664a571d309090043a0ac"; 4760 + sha256 = "0w5n1523d8la66d43w735lj57gmksj936kvlhwggmqyv64zw7jfz"; 4761 }; 4762 meta.homepage = "https://github.com/vuki656/package-info.nvim/"; 4763 }; ··· 4872 4873 plenary-nvim = buildVimPluginFrom2Nix { 4874 pname = "plenary.nvim"; 4875 + version = "2021-11-14"; 4876 src = fetchFromGitHub { 4877 owner = "nvim-lua"; 4878 repo = "plenary.nvim"; 4879 + rev = "1c31adb35fcebe921f65e5c6ff6d5481fa5fa5ac"; 4880 + sha256 = "075b6ak0hl3wqhsy1qmi91s30lh6p6vpbvqllzvyhlz3pxabh314"; 4881 }; 4882 meta.homepage = "https://github.com/nvim-lua/plenary.nvim/"; 4883 }; ··· 4921 4922 presence-nvim = buildVimPluginFrom2Nix { 4923 pname = "presence.nvim"; 4924 + version = "2021-11-14"; 4925 src = fetchFromGitHub { 4926 owner = "andweeb"; 4927 repo = "presence.nvim"; 4928 + rev = "e0cab790474fe8bf952edeeaf9bba5128a2434f1"; 4929 + sha256 = "1p1knd67sf4pw88y73xakay50br4zhgxr5k7az24cxmqylnn89ra"; 4930 }; 4931 meta.homepage = "https://github.com/andweeb/presence.nvim/"; 4932 }; ··· 5065 5066 rainbow = buildVimPluginFrom2Nix { 5067 pname = "rainbow"; 5068 + version = "2021-11-15"; 5069 src = fetchFromGitHub { 5070 owner = "luochen1990"; 5071 repo = "rainbow"; 5072 + rev = "c18071e5c7790928b763c2e88c487dfc93d84a15"; 5073 + sha256 = "1m691f3w1zraam4cmq0sj9a86bmd7g1bhirrzqy5mg089x6n3rdc"; 5074 }; 5075 meta.homepage = "https://github.com/luochen1990/rainbow/"; 5076 }; ··· 5149 5150 refactoring-nvim = buildVimPluginFrom2Nix { 5151 pname = "refactoring.nvim"; 5152 + version = "2021-11-17"; 5153 src = fetchFromGitHub { 5154 owner = "theprimeagen"; 5155 repo = "refactoring.nvim"; 5156 + rev = "9f730d6a87a63c7bd8cbc460882ca7e673da3cf1"; 5157 + sha256 = "1qqan1g34k11kjf9j50yfdzlgagjv3fm5yxlla9kxg2pz13b2jfc"; 5158 }; 5159 meta.homepage = "https://github.com/theprimeagen/refactoring.nvim/"; 5160 }; ··· 5269 5270 rust-tools-nvim = buildVimPluginFrom2Nix { 5271 pname = "rust-tools.nvim"; 5272 + version = "2021-11-16"; 5273 src = fetchFromGitHub { 5274 owner = "simrat39"; 5275 repo = "rust-tools.nvim"; 5276 + rev = "9f98538d36b5f2e3ac1a11a524b52d11bafdff74"; 5277 + sha256 = "0dfian3xi8cn4r537c8jp5qlnhgvppifgr9crrylvgj28y7vj9mw"; 5278 }; 5279 meta.homepage = "https://github.com/simrat39/rust-tools.nvim/"; 5280 }; ··· 5317 5318 SchemaStore-nvim = buildVimPluginFrom2Nix { 5319 pname = "SchemaStore.nvim"; 5320 + version = "2021-11-16"; 5321 src = fetchFromGitHub { 5322 owner = "b0o"; 5323 repo = "SchemaStore.nvim"; 5324 + rev = "fa321a8512c199e04e3361fa0679198e1176dc68"; 5325 + sha256 = "1ahsldfzqzwy83rhibyscr745s54571h6qmcmaz96rbv6k2wqyb5"; 5326 }; 5327 meta.homepage = "https://github.com/b0o/SchemaStore.nvim/"; 5328 }; 5329 5330 scrollbar-nvim = buildVimPluginFrom2Nix { 5331 pname = "scrollbar.nvim"; 5332 + version = "2021-11-16"; 5333 src = fetchFromGitHub { 5334 owner = "Xuyuanp"; 5335 repo = "scrollbar.nvim"; 5336 + rev = "590b23af866a32277cf803aca0fd770d5b39c2e7"; 5337 + sha256 = "1dvlmmxykf3vyhyvv5aiqbz8fd7zvpw4xq1nxnf3wyj371caawaq"; 5338 }; 5339 meta.homepage = "https://github.com/Xuyuanp/scrollbar.nvim/"; 5340 }; ··· 5606 5607 specs-nvim = buildVimPluginFrom2Nix { 5608 pname = "specs.nvim"; 5609 + version = "2021-11-12"; 5610 src = fetchFromGitHub { 5611 owner = "edluffy"; 5612 repo = "specs.nvim"; 5613 + rev = "e043580a65409ea071dfe34e94284959fd24e3be"; 5614 + sha256 = "1sg2i99ncx5j7al3mhwpnwyx1hila5gars0ak7q3n9yr4013i7dx"; 5615 }; 5616 meta.homepage = "https://github.com/edluffy/specs.nvim/"; 5617 }; ··· 5667 5668 srcery-vim = buildVimPluginFrom2Nix { 5669 pname = "srcery-vim"; 5670 + version = "2021-11-17"; 5671 src = fetchFromGitHub { 5672 owner = "srcery-colors"; 5673 repo = "srcery-vim"; 5674 + rev = "3d86afaa61aa45ca8d849494d9f8ceb5fc424353"; 5675 + sha256 = "16wx3wgmrslpsm1h5fskik2lkas390fj2gjz3vwii4c5mz2ijr9m"; 5676 }; 5677 meta.homepage = "https://github.com/srcery-colors/srcery-vim/"; 5678 }; ··· 5691 5692 stabilize-nvim = buildVimPluginFrom2Nix { 5693 pname = "stabilize.nvim"; 5694 + version = "2021-11-13"; 5695 src = fetchFromGitHub { 5696 owner = "luukvbaal"; 5697 repo = "stabilize.nvim"; 5698 + rev = "0026672d4b6fc922bd6f80df9a2858ce1e8cc0ed"; 5699 + sha256 = "0667yh9yprym7vakm83x174srb2x2ch9q97137qlj28acks3wnqh"; 5700 }; 5701 meta.homepage = "https://github.com/luukvbaal/stabilize.nvim/"; 5702 }; ··· 6065 6066 telescope-nvim = buildVimPluginFrom2Nix { 6067 pname = "telescope.nvim"; 6068 + version = "2021-11-15"; 6069 src = fetchFromGitHub { 6070 owner = "nvim-telescope"; 6071 repo = "telescope.nvim"; 6072 + rev = "9ac89ebf6755e9a3f4bae86625ec76106526e57b"; 6073 + sha256 = "0bljlg2hwa531rp53hwx1w06awksbhxl4lm672rn74sfaxqnzv87"; 6074 }; 6075 meta.homepage = "https://github.com/nvim-telescope/telescope.nvim/"; 6076 }; ··· 6210 6211 toggleterm-nvim = buildVimPluginFrom2Nix { 6212 pname = "toggleterm.nvim"; 6213 + version = "2021-11-15"; 6214 src = fetchFromGitHub { 6215 owner = "akinsho"; 6216 repo = "toggleterm.nvim"; 6217 + rev = "ff168c8218b963cc7fc9d80b684d840488839bb5"; 6218 + sha256 = "09ap50nln9130h6px3x0df3vxlc09iyl419hnr8qf75qa58gbhmr"; 6219 }; 6220 meta.homepage = "https://github.com/akinsho/toggleterm.nvim/"; 6221 }; ··· 6234 6235 traces-vim = buildVimPluginFrom2Nix { 6236 pname = "traces.vim"; 6237 + version = "2021-11-17"; 6238 src = fetchFromGitHub { 6239 owner = "markonm"; 6240 repo = "traces.vim"; 6241 + rev = "803d97786d0fbe95d33fe3c69e213518ea296839"; 6242 + sha256 = "1hqma8pjl1ladw8iraa6cnsp9jasx4w08zxq5q63ff5mzdb1avn1"; 6243 }; 6244 meta.homepage = "https://github.com/markonm/traces.vim/"; 6245 }; ··· 6438 6439 vifm-vim = buildVimPluginFrom2Nix { 6440 pname = "vifm.vim"; 6441 + version = "2021-11-17"; 6442 src = fetchFromGitHub { 6443 owner = "vifm"; 6444 repo = "vifm.vim"; 6445 + rev = "31c80d4f77056e89cabd9ea3e617feea076499f8"; 6446 + sha256 = "0p64fr5l5khs4p7d677zkjq6j81mxkh5aailzk9jr82q5sskv3wf"; 6447 }; 6448 meta.homepage = "https://github.com/vifm/vifm.vim/"; 6449 }; ··· 6702 6703 vim-airline = buildVimPluginFrom2Nix { 6704 pname = "vim-airline"; 6705 + version = "2021-11-12"; 6706 src = fetchFromGitHub { 6707 owner = "vim-airline"; 6708 repo = "vim-airline"; 6709 + rev = "4b96f58902a34abda87fd3105e9d47a08801a891"; 6710 + sha256 = "05fn2485098kml90n5wc0qla7wwjcrz0lkhkr9qgdv4bvc9g3hyn"; 6711 }; 6712 meta.homepage = "https://github.com/vim-airline/vim-airline/"; 6713 }; ··· 7710 7711 vim-fireplace = buildVimPluginFrom2Nix { 7712 pname = "vim-fireplace"; 7713 + version = "2021-11-16"; 7714 src = fetchFromGitHub { 7715 owner = "tpope"; 7716 repo = "vim-fireplace"; 7717 + rev = "18699186aad27dc92867527f5e3c2ad3ed51cb27"; 7718 + sha256 = "0681c6ica9xi7cvjzlhlwcvmdvq3109xx39c06d879n7yy6kjyqi"; 7719 }; 7720 meta.homepage = "https://github.com/tpope/vim-fireplace/"; 7721 }; ··· 7842 7843 vim-fugitive = buildVimPluginFrom2Nix { 7844 pname = "vim-fugitive"; 7845 + version = "2021-11-16"; 7846 src = fetchFromGitHub { 7847 owner = "tpope"; 7848 repo = "vim-fugitive"; 7849 + rev = "2dfaf17f9e9b2c8961eddc8ea51098fef500d189"; 7850 + sha256 = "1y5ac8sag0lcdkq8k6rzn1cfcwyrn8fwmm3imsiq4b9883qjw2v2"; 7851 }; 7852 meta.homepage = "https://github.com/tpope/vim-fugitive/"; 7853 }; ··· 7962 7963 vim-glsl = buildVimPluginFrom2Nix { 7964 pname = "vim-glsl"; 7965 + version = "2021-11-13"; 7966 src = fetchFromGitHub { 7967 owner = "tikhomirov"; 7968 repo = "vim-glsl"; 7969 + rev = "25f9a7dfca64787313fb4339866ff941b8974d61"; 7970 + sha256 = "0dm0nmglf7sr9rkxq4ya14pg1wrqfbv6pigj2f1hb0gf1n9bd6rz"; 7971 }; 7972 meta.homepage = "https://github.com/tikhomirov/vim-glsl/"; 7973 }; ··· 8287 8288 vim-illuminate = buildVimPluginFrom2Nix { 8289 pname = "vim-illuminate"; 8290 + version = "2021-11-14"; 8291 src = fetchFromGitHub { 8292 owner = "RRethy"; 8293 repo = "vim-illuminate"; 8294 + rev = "2beae0581caa66cf8c09fad7c7c557f92d49d2bd"; 8295 + sha256 = "1qrc789a3aps99x89hiwwrmnxm5hm1qsjp8xjhhls6jk8scqq2qv"; 8296 }; 8297 meta.homepage = "https://github.com/RRethy/vim-illuminate/"; 8298 }; ··· 8395 8396 vim-javacomplete2 = buildVimPluginFrom2Nix { 8397 pname = "vim-javacomplete2"; 8398 + version = "2021-11-15"; 8399 src = fetchFromGitHub { 8400 owner = "artur-shaik"; 8401 repo = "vim-javacomplete2"; 8402 + rev = "b5c8d305df52e0cb85b3436ca1e958c22c6e2d79"; 8403 + sha256 = "1zv6k8ld938zg000svi9q6c5jkbmvlyllxzkl41jcsx2zhqkwdiw"; 8404 }; 8405 meta.homepage = "https://github.com/artur-shaik/vim-javacomplete2/"; 8406 }; ··· 8516 8517 vim-kitty-navigator = buildVimPluginFrom2Nix { 8518 pname = "vim-kitty-navigator"; 8519 + version = "2021-11-15"; 8520 src = fetchFromGitHub { 8521 owner = "knubie"; 8522 repo = "vim-kitty-navigator"; 8523 + rev = "e097580586e802352f225eed467fafa90f11223e"; 8524 + sha256 = "1lzgqaxw0y53r1qrcqx3fxb1fdqkswzkl8b6yk4xmdxig6kyhm46"; 8525 }; 8526 meta.homepage = "https://github.com/knubie/vim-kitty-navigator/"; 8527 }; ··· 10402 10403 vim-tpipeline = buildVimPluginFrom2Nix { 10404 pname = "vim-tpipeline"; 10405 + version = "2021-11-12"; 10406 src = fetchFromGitHub { 10407 owner = "vimpostor"; 10408 repo = "vim-tpipeline"; 10409 + rev = "be9cd2c8cd007088f69019f18fb61aff457adb8c"; 10410 + sha256 = "1r2wvkgziil4bik3g7b19cscg17skhx98pgsvm2m00czrrfdxq6v"; 10411 }; 10412 meta.homepage = "https://github.com/vimpostor/vim-tpipeline/"; 10413 }; ··· 10558 10559 vim-vsnip = buildVimPluginFrom2Nix { 10560 pname = "vim-vsnip"; 10561 + version = "2021-11-15"; 10562 src = fetchFromGitHub { 10563 owner = "hrsh7th"; 10564 repo = "vim-vsnip"; 10565 + rev = "60ee20318550f4a5b6f7a5a8b827540c2c386898"; 10566 + sha256 = "0gl34m17pxgyfbdqghhfcgxhbhxwvjc9r048sim1gf86wga4mq39"; 10567 }; 10568 meta.homepage = "https://github.com/hrsh7th/vim-vsnip/"; 10569 }; ··· 10594 10595 vim-wakatime = buildVimPluginFrom2Nix { 10596 pname = "vim-wakatime"; 10597 + version = "2021-11-17"; 10598 src = fetchFromGitHub { 10599 owner = "wakatime"; 10600 repo = "vim-wakatime"; 10601 + rev = "0d66dd3596e414368e2b2b77e694e431a4b0bca3"; 10602 + sha256 = "157shaarg4xdnfzp47v5nv34py0wii6s7fdgzagh4h1b5czgszyv"; 10603 }; 10604 meta.homepage = "https://github.com/wakatime/vim-wakatime/"; 10605 }; ··· 10630 10631 vim-which-key = buildVimPluginFrom2Nix { 10632 pname = "vim-which-key"; 10633 + version = "2021-11-12"; 10634 src = fetchFromGitHub { 10635 owner = "liuchengxu"; 10636 repo = "vim-which-key"; 10637 + rev = "7e3819a91a7710ce561a9c11a22a82b9437a2533"; 10638 + sha256 = "0hx5ar663ai25jj7p44sl2nn2n0jj2iif5ybx5ic7cxz4qy477wn"; 10639 }; 10640 meta.homepage = "https://github.com/liuchengxu/vim-which-key/"; 10641 }; ··· 10882 10883 vimspector = buildVimPluginFrom2Nix { 10884 pname = "vimspector"; 10885 + version = "2021-11-17"; 10886 src = fetchFromGitHub { 10887 owner = "puremourning"; 10888 repo = "vimspector"; 10889 + rev = "d80485393139d15df237e856b8ef6675cfb88f6b"; 10890 + sha256 = "1cvj7k9xxg4hp0m6lxnqklrnj5dqp4pyx4w6x0p8wh81a94r0wvw"; 10891 fetchSubmodules = true; 10892 }; 10893 meta.homepage = "https://github.com/puremourning/vimspector/"; ··· 10895 10896 vimtex = buildVimPluginFrom2Nix { 10897 pname = "vimtex"; 10898 + version = "2021-11-16"; 10899 src = fetchFromGitHub { 10900 owner = "lervag"; 10901 repo = "vimtex"; 10902 + rev = "c3991f8a53dc8a193a23dba7645ce6b9b8d5038b"; 10903 + sha256 = "1zn094xjskqc0pjpjp21j18s9b01j5k0kpczcwf8nxi52bb8815v"; 10904 }; 10905 meta.homepage = "https://github.com/lervag/vimtex/"; 10906 }; ··· 10955 10956 vista-vim = buildVimPluginFrom2Nix { 10957 pname = "vista.vim"; 10958 + version = "2021-11-15"; 10959 src = fetchFromGitHub { 10960 owner = "liuchengxu"; 10961 repo = "vista.vim"; 10962 + rev = "a0469c645dcbe4033b857da27d35491f39e2f776"; 10963 + sha256 = "1i0j11lbqdych2914chb9rlmr902q52v400y3ifzi38g5md9zv3w"; 10964 }; 10965 meta.homepage = "https://github.com/liuchengxu/vista.vim/"; 10966 }; ··· 11136 11137 YouCompleteMe = buildVimPluginFrom2Nix { 11138 pname = "YouCompleteMe"; 11139 + version = "2021-11-16"; 11140 src = fetchFromGitHub { 11141 owner = "ycm-core"; 11142 repo = "YouCompleteMe"; 11143 + rev = "e17fb2fc92c7c1bee6a429db0d3b432c811d0c8a"; 11144 + sha256 = "0l95wj6ghfip2l7bsdv8frhnd92wdni6a8fi1i356x1ls2fm6vvr"; 11145 fetchSubmodules = true; 11146 }; 11147 meta.homepage = "https://github.com/ycm-core/YouCompleteMe/";
+18 -7
pkgs/servers/heisenbridge/default.nix
··· 1 - { lib, fetchurl, python3Packages }: 2 3 - python3Packages.buildPythonPackage rec { 4 pname = "heisenbridge"; 5 version = "1.6.0"; 6 7 - # Use the release tarball because it has the version set correctly using the 8 - # version.txt file. 9 - src = fetchurl { 10 - url = "https://github.com/hifi/heisenbridge/releases/download/v${version}/heisenbridge-${version}.tar.gz"; 11 - sha256 = "sha256-NhHMReY48lg1FhJlCRjRiSpy+9bDLtIV+j+zX8GZcL4="; 12 }; 13 14 propagatedBuildInputs = with python3Packages; [ 15 aiohttp 16 irc 17 mautrix 18 python-socks 19 pyyaml 20 ]; 21 22 meta = with lib; {
··· 1 + { lib, fetchFromGitHub, python3Packages }: 2 3 + python3Packages.buildPythonApplication rec { 4 pname = "heisenbridge"; 5 version = "1.6.0"; 6 7 + src = fetchFromGitHub { 8 + owner = "hifi"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "sha256-Q7xqKjAUBHh87VAgsgDOCPDINDh0yUdr3UoUlLqJr5k="; 12 }; 13 14 + postPatch = '' 15 + echo "${version}" > heisenbridge/version.txt 16 + 17 + substituteInPlace setup.cfg \ 18 + --replace "mautrix >=0.10.5, <0.11" "mautrix >=0.10.5, <0.12" 19 + ''; 20 + 21 propagatedBuildInputs = with python3Packages; [ 22 aiohttp 23 irc 24 mautrix 25 python-socks 26 pyyaml 27 + ]; 28 + 29 + checkInputs = with python3Packages; [ 30 + pytestCheckHook 31 ]; 32 33 meta = with lib; {
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 533 "mold_indicator" = ps: with ps; [ ]; 534 "monoprice" = ps: with ps; [ ]; # missing inputs: pymonoprice 535 "moon" = ps: with ps; [ ]; 536 - "motion_blinds" = ps: with ps; [ aiohttp-cors ifaddr ]; # missing inputs: motionblinds 537 "motioneye" = ps: with ps; [ aiohttp-cors motioneye-client ]; 538 "mpchc" = ps: with ps; [ ]; 539 "mpd" = ps: with ps; [ mpd2 ];
··· 533 "mold_indicator" = ps: with ps; [ ]; 534 "monoprice" = ps: with ps; [ ]; # missing inputs: pymonoprice 535 "moon" = ps: with ps; [ ]; 536 + "motion_blinds" = ps: with ps; [ aiohttp-cors ifaddr motionblinds ]; 537 "motioneye" = ps: with ps; [ aiohttp-cors motioneye-client ]; 538 "mpchc" = ps: with ps; [ ]; 539 "mpd" = ps: with ps; [ mpd2 ];
+1
pkgs/servers/home-assistant/default.nix
··· 520 "modbus" 521 "mold_indicator" 522 "moon" 523 "motioneye" 524 "mqtt" 525 "mqtt_eventstream"
··· 520 "modbus" 521 "mold_indicator" 522 "moon" 523 + "motion_blinds" 524 "motioneye" 525 "mqtt" 526 "mqtt_eventstream"
+23 -13
pkgs/servers/jackett/default.nix
··· 1 - { lib, stdenv, fetchurl, mono, makeWrapper, curl, icu60, openssl, zlib }: 2 3 - stdenv.mkDerivation rec { 4 pname = "jackett"; 5 - version = "0.18.925"; 6 7 - src = fetchurl { 8 - url = "https://github.com/Jackett/Jackett/releases/download/v${version}/Jackett.Binaries.Mono.tar.gz"; 9 - sha256 = "1md0iy6sx0agsnvrj9m7bq1lvp5z34x7zv3pvwy4zw8b46w97mnz"; 10 }; 11 12 - nativeBuildInputs = [ makeWrapper ]; 13 14 - installPhase = '' 15 - mkdir -p $out/{bin,share/${pname}-${version}} 16 - cp -r * $out/share/${pname}-${version} 17 18 - makeWrapper "${mono}/bin/mono" $out/bin/Jackett \ 19 - --add-flags "$out/share/${pname}-${version}/JackettConsole.exe" \ 20 - --prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ curl icu60 openssl zlib ]} 21 ''; 22 23 meta = with lib; { ··· 27 maintainers = with maintainers; [ edwtjo nyanloutre purcell ]; 28 platforms = platforms.all; 29 }; 30 }
··· 1 + { lib 2 + , buildDotnetModule 3 + , fetchFromGitHub 4 + , dotnetCorePackages 5 + , openssl 6 + }: 7 8 + buildDotnetModule rec { 9 pname = "jackett"; 10 + version = "0.19.138"; 11 12 + src = fetchFromGitHub { 13 + owner = pname; 14 + repo = pname; 15 + rev = "v${version}"; 16 + sha256 = "0qaaccc95csahylzv65ndx990kcr075jffawbjpsjfkxzflfjq9n"; 17 }; 18 19 + projectFile = "src/Jackett.Server/Jackett.Server.csproj"; 20 + nugetDeps = ./deps.nix; 21 22 + dotnetInstallFlags = [ "-p:TargetFramework=net5.0" ]; 23 + dotnet-runtime = dotnetCorePackages.aspnetcore_5_0; 24 25 + runtimeDeps = [ openssl ]; 26 + 27 + postFixup = '' 28 + # Legacy 29 + ln -s $out/bin/jackett $out/bin/Jackett 30 ''; 31 32 meta = with lib; { ··· 36 maintainers = with maintainers; [ edwtjo nyanloutre purcell ]; 37 platforms = platforms.all; 38 }; 39 + passthru.updateScript = ./updater.sh; 40 }
+250
pkgs/servers/jackett/deps.nix
···
··· 1 + { fetchNuGet }: [ 2 + (fetchNuGet { name = "AngleSharp"; version = "0.14.0"; sha256 = "1zgwhh1fp2mmaplvpgm86rpmslix3wqfxf0d3hxx1gxwfgr6wxm6"; }) 3 + (fetchNuGet { name = "Autofac"; version = "5.2.0"; sha256 = "0yxks2nynl0mcg3m94cl94x50k3wa8xh9k3f2gmh8mxn5nrpl64r"; }) 4 + (fetchNuGet { name = "Autofac.Extensions.DependencyInjection"; version = "6.0.0"; sha256 = "0ljgzn1jlv4k0q13l9n7gjrbw49wdfjzg8rvbwzzrg73bz77vxm3"; }) 5 + (fetchNuGet { name = "AutoMapper"; version = "8.1.1"; sha256 = "1p2sc82lrbarhs08n2132vijfr3hv9zksb6ra12y9hfckam5lz9h"; }) 6 + (fetchNuGet { name = "BencodeNET"; version = "3.1.4"; sha256 = "12zim3k5wnlxgkg3310djh3zy97d6g3k3xvf87qd8pk2669vb1gw"; }) 7 + (fetchNuGet { name = "CommandLineParser"; version = "2.8.0"; sha256 = "1m32xyilv2b7k55jy8ddg08c20glbcj2yi545kxs9hj2ahanhrbb"; }) 8 + (fetchNuGet { name = "DotNet4.SocksProxy"; version = "1.4.0.1"; sha256 = "1ig2a9ism041a6qrqkxa9xhvp19yxzcadlap5i1kz97f05a2msvb"; }) 9 + (fetchNuGet { name = "FlareSolverrSharp"; version = "2.0.0"; sha256 = "15rs97ayh6s9g2vbn3r1bj7imazald0f22gfikw6mmyx5ghc3zrz"; }) 10 + (fetchNuGet { name = "Microsoft.AspNetCore"; version = "2.2.0"; sha256 = "0vsv7hcsmnsgqhs67zp207n7m9ix3dbwm1p2ch3dizkcdvz235f9"; }) 11 + (fetchNuGet { name = "Microsoft.AspNetCore.Antiforgery"; version = "2.2.0"; sha256 = "026wjdwjx0lgccqv0xi5gxylxzgz5ifgxf25p5pqakgrhkz0a59l"; }) 12 + (fetchNuGet { name = "Microsoft.AspNetCore.Authentication"; version = "2.2.0"; sha256 = "0yqfzd0qq5ypmk6b9gnb1yscl75fxx9frq808cxs70ay7y7jqmgn"; }) 13 + (fetchNuGet { name = "Microsoft.AspNetCore.Authentication.Abstractions"; version = "2.2.0"; sha256 = "0vj7fhpk0d95nkkxz4q0rma6pb4ym96mx6nms4603y0l19h0k5yh"; }) 14 + (fetchNuGet { name = "Microsoft.AspNetCore.Authentication.Cookies"; version = "2.2.0"; sha256 = "0x7i7dmvq5ph8f21ajgb56fjvv31r4zn6pj8d7rsx0y6067vcp5d"; }) 15 + (fetchNuGet { name = "Microsoft.AspNetCore.Authentication.Core"; version = "2.2.0"; sha256 = "1wgn45fmdi7dk9cl4cdhzgqc9mdxhfw7zg8zwns3j7qgrhlv6k8h"; }) 16 + (fetchNuGet { name = "Microsoft.AspNetCore.Authorization"; version = "2.2.0"; sha256 = "1mpq8pmxlxfa625k2ghv6xcyy2wdpwv56xzya9mvmlnh50h1i8rx"; }) 17 + (fetchNuGet { name = "Microsoft.AspNetCore.Authorization.Policy"; version = "2.2.0"; sha256 = "1d1zh65kfjf81j21ssmhr465vx08bra8424vgnrb22gdx03mhwd2"; }) 18 + (fetchNuGet { name = "Microsoft.AspNetCore.Connections.Abstractions"; version = "2.2.0"; sha256 = "1rl94r8b0zq14f3dhfnvfjj1ivr81iw9zh5kdgs3zkdv0xc9x21j"; }) 19 + (fetchNuGet { name = "Microsoft.AspNetCore.Cors"; version = "2.2.0"; sha256 = "0qskbz87i74kfbklxqfyqaccyba21kkx2lcdfa54kxj9r8daq7sc"; }) 20 + (fetchNuGet { name = "Microsoft.AspNetCore.Cryptography.Internal"; version = "2.2.0"; sha256 = "01lg2fx85b47ldgdrhs6clsivj35x54xwc9r5xk3f1v8rr3gycsv"; }) 21 + (fetchNuGet { name = "Microsoft.AspNetCore.DataProtection"; version = "2.2.0"; sha256 = "09lzbp084xxy1xxfbxpqdff8phv2pzd1n5v30xfm03hhl7a038gx"; }) 22 + (fetchNuGet { name = "Microsoft.AspNetCore.DataProtection.Abstractions"; version = "2.2.0"; sha256 = "1gi4hpssmrrdf5lm6idkhvqbfy12bx14976y4gbhmx9z8lxaqcfz"; }) 23 + (fetchNuGet { name = "Microsoft.AspNetCore.Diagnostics"; version = "2.2.0"; sha256 = "0hq5s2h0k2714352bdz2s3c3m6spkn4ckfw3pv9c4rmn6adbw9b1"; }) 24 + (fetchNuGet { name = "Microsoft.AspNetCore.Diagnostics.Abstractions"; version = "2.2.0"; sha256 = "061cdhjh5w2f1frhimcgk68vx8p743jb9h4qik3lm1c734r0drm0"; }) 25 + (fetchNuGet { name = "Microsoft.AspNetCore.HostFiltering"; version = "2.2.0"; sha256 = "06wbgkbh24w9yxz6g8446l7nnjm3rdp1wklri710zqzr7zbfcx43"; }) 26 + (fetchNuGet { name = "Microsoft.AspNetCore.Hosting"; version = "2.2.0"; sha256 = "1nk61mj7a4ri3p47xd0j520szwj05xid16r2bld85cp70xnpxjhx"; }) 27 + (fetchNuGet { name = "Microsoft.AspNetCore.Hosting.Abstractions"; version = "2.1.0"; sha256 = "0sdzvjf6bz0krr2bm77zdyxpjcddadq2fqd3b4yybd6my3b5f7j2"; }) 28 + (fetchNuGet { name = "Microsoft.AspNetCore.Hosting.Abstractions"; version = "2.2.0"; sha256 = "043k651vbfshh3s997x42ymj8nb32419m7q3sjw5q2c27anrhfhv"; }) 29 + (fetchNuGet { name = "Microsoft.AspNetCore.Hosting.Server.Abstractions"; version = "2.1.0"; sha256 = "1xm8913slkx0cvk7gcbk1sf9518xmrajjjp3z8qhr5xdhdx1b879"; }) 30 + (fetchNuGet { name = "Microsoft.AspNetCore.Hosting.Server.Abstractions"; version = "2.2.0"; sha256 = "0nz73bwrvhc1n7gd7xxm3p5ww2wx9qr9m9i43y20gh0c54adkygh"; }) 31 + (fetchNuGet { name = "Microsoft.AspNetCore.Html.Abstractions"; version = "2.2.0"; sha256 = "1z5lkzb9h9wprvyxyjw4fj7bjypaibsw0cj4bz769hf0abjz8y1v"; }) 32 + (fetchNuGet { name = "Microsoft.AspNetCore.Http"; version = "2.1.0"; sha256 = "1nrhbsr58fh6hpzxq75qvrimh0lk6pdwghs3cbv0f1zk90rar1cq"; }) 33 + (fetchNuGet { name = "Microsoft.AspNetCore.Http"; version = "2.2.0"; sha256 = "1fcrafpa57sab3as18idqknzlxkx49n4sxzlzik3sj6pcji5j17q"; }) 34 + (fetchNuGet { name = "Microsoft.AspNetCore.Http"; version = "2.2.2"; sha256 = "09mgjvpqdyylz9dbngql9arx46lfkiczjdf7aqr9asd5vjqlv2c8"; }) 35 + (fetchNuGet { name = "Microsoft.AspNetCore.Http.Abstractions"; version = "2.1.0"; sha256 = "0jz5w1y661cxbh1sakyjh0813sqrc456mj53w3482ilb5xh5zhbf"; }) 36 + (fetchNuGet { name = "Microsoft.AspNetCore.Http.Abstractions"; version = "2.2.0"; sha256 = "13s8cm6jdpydxmr0rgmzrmnp1v2r7i3rs7v9fhabk5spixdgfy6b"; }) 37 + (fetchNuGet { name = "Microsoft.AspNetCore.Http.Extensions"; version = "2.2.0"; sha256 = "118gp1mfb8ymcvw87fzgjqwlc1d1b0l0sbfki291ydg414cz3dfn"; }) 38 + (fetchNuGet { name = "Microsoft.AspNetCore.Http.Features"; version = "2.1.0"; sha256 = "1mwpvbq0z982f9r5ik6k15h18qviy735i55hld9vfk8694k9zwcj"; }) 39 + (fetchNuGet { name = "Microsoft.AspNetCore.Http.Features"; version = "2.2.0"; sha256 = "0xrlq8i61vzhzzy25n80m7wh2kn593rfaii3aqnxdsxsg6sfgnx1"; }) 40 + (fetchNuGet { name = "Microsoft.AspNetCore.HttpOverrides"; version = "2.2.0"; sha256 = "1pbmmczxilgrf4qyaql88dc3av7kaixb1r36358kil68gl3irjy6"; }) 41 + (fetchNuGet { name = "Microsoft.AspNetCore.JsonPatch"; version = "2.2.0"; sha256 = "07cihb5sqkavg42nvircdwjp0b67mhrla97jgx285zdjphplg4h2"; }) 42 + (fetchNuGet { name = "Microsoft.AspNetCore.JsonPatch"; version = "5.0.0"; sha256 = "192mn6r73xjw8fvlss6vrv34iiavq7k8pg0w7advgj6khklw4dzx"; }) 43 + (fetchNuGet { name = "Microsoft.AspNetCore.Localization"; version = "2.2.0"; sha256 = "08knc70cy7ycid5sbbbzy6my4b7ddj4j760k5xf1qnfb0njxhfh7"; }) 44 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc"; version = "2.2.0"; sha256 = "16jrikcywkd4r4jh551p8gxxw6hj3aizdzd5i7agb06gwpgqqv9c"; }) 45 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Abstractions"; version = "2.2.0"; sha256 = "09p447ipd19517vy8xx9ykvspn6b4fgbm2rskpmzyw41x9wz4k0b"; }) 46 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Analyzers"; version = "2.2.0"; sha256 = "1b975z00bzgh2z5hina4bzfksvc2vgnbzmi8g3q962hspg6ylh9f"; }) 47 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.ApiExplorer"; version = "2.2.0"; sha256 = "1ryhd1md30fgrli74qv45mhldivbasdvydw0lllg6x6jzpyrkwpa"; }) 48 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Core"; version = "2.2.0"; sha256 = "1k6lkgk9zak5sczvyjbwgqnfcwcg9ks74wznqfzck8c6hns1by0m"; }) 49 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Cors"; version = "2.2.0"; sha256 = "077vjxn0k5rr4s675g50rzkns6scgijxxh5iib59k77ldwpdr14q"; }) 50 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.DataAnnotations"; version = "2.2.0"; sha256 = "0vdhdjarh4az7g71gkvmhq6xpvwhh8si3sbrpdwb8p60i94cdyl6"; }) 51 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Formatters.Json"; version = "2.2.0"; sha256 = "0421fcf2z8a6z81ql123ili32wbr3x25zpq17xjf4s9fmsr0069a"; }) 52 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Localization"; version = "2.2.0"; sha256 = "0d27xirwsr3j7jacsrz6g2r4py35hgzjyy6ak6gkd07cm707wgc6"; }) 53 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.NewtonsoftJson"; version = "5.0.0"; sha256 = "1q3z35pxgvpf6l6ywh5wb6gfly055rk99a80rjqisyrbmza1msd1"; }) 54 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Razor"; version = "2.2.0"; sha256 = "06fqg7rfyvfj3hdppkhy37ddjff2d6pg7khj6lccs9lwc732yr7q"; }) 55 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.Razor.Extensions"; version = "2.2.0"; sha256 = "04javqbzv7mkakqjl40j429giaagjj7hmwcljrgj8q1jknk0x9xc"; }) 56 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.RazorPages"; version = "2.2.0"; sha256 = "0zqyqfxzl3lkqfy9chd0ipani75q3109imlxrnhdfiwmxrd8xqbm"; }) 57 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.TagHelpers"; version = "2.2.0"; sha256 = "16aprk81sp2i0n0dmp318cm65mk03i58rhpijm4fz4xz51j7z8li"; }) 58 + (fetchNuGet { name = "Microsoft.AspNetCore.Mvc.ViewFeatures"; version = "2.2.0"; sha256 = "1isflvb0ff5nfqnvdlyvmszkd42axbbz0xmdaf0d7sah0qkvvi7n"; }) 59 + (fetchNuGet { name = "Microsoft.AspNetCore.Razor"; version = "2.2.0"; sha256 = "02ybprvsi59nwa0fdq99jvx7r26bs2bg3xjxkilc495clgg98zp0"; }) 60 + (fetchNuGet { name = "Microsoft.AspNetCore.Razor.Design"; version = "2.2.0"; sha256 = "03pcdcbmyw050hag588b7caqilnq3cb6ndq5g6j0r7j7wf3plsn6"; }) 61 + (fetchNuGet { name = "Microsoft.AspNetCore.Razor.Language"; version = "2.2.0"; sha256 = "0n58qdipwy5wymfhgm3anickwvnf4svb9ipbrby7ksrhhrkqvx4z"; }) 62 + (fetchNuGet { name = "Microsoft.AspNetCore.Razor.Runtime"; version = "2.2.0"; sha256 = "1n9j5hjinm5gp39nwmcf26dwg1psl7sf7xkxnvfxsnl44mbcy695"; }) 63 + (fetchNuGet { name = "Microsoft.AspNetCore.ResponseCaching.Abstractions"; version = "2.2.0"; sha256 = "01sp2i2bgcn6blw1mcvg5nrlc97c9czyawwvgfi6ydzdvs6ang37"; }) 64 + (fetchNuGet { name = "Microsoft.AspNetCore.ResponseCompression"; version = "2.2.0"; sha256 = "0madnk92752alpc7cv2bazqlihhzgl3yj1s9ajhi3w09vg8n8pz4"; }) 65 + (fetchNuGet { name = "Microsoft.AspNetCore.Rewrite"; version = "2.2.0"; sha256 = "0f21v96wkvxcxfz5a9nvhqf1dshvgg34g9075fb0nd57nsw289af"; }) 66 + (fetchNuGet { name = "Microsoft.AspNetCore.Routing"; version = "2.2.0"; sha256 = "12kv602j2rxp43l1v3618yz3pdd7hqc3r98ya0bqz6y2ppvhbyws"; }) 67 + (fetchNuGet { name = "Microsoft.AspNetCore.Routing.Abstractions"; version = "2.1.0"; sha256 = "1f8xixbg749nhv10vaf3jmdv9zjdw822hw7ikwa97h70767d8xz5"; }) 68 + (fetchNuGet { name = "Microsoft.AspNetCore.Routing.Abstractions"; version = "2.2.0"; sha256 = "0d9wwz1rsh1fslbv1y72jpkvqv2v9n28rl3vslcg0x74lp2678ly"; }) 69 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.IIS"; version = "2.2.0"; sha256 = "0cgyw8xjr6kgvrj7rn072mr97sh4xj95f635vmjrx10b8rnypmkk"; }) 70 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.IISIntegration"; version = "2.2.0"; sha256 = "1dmk68cyh02g9fcg1bxp90dxl7xpqiqikdlh1835jgm44m985mpc"; }) 71 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.Kestrel"; version = "2.2.0"; sha256 = "0wh7hf09i9qxs9r0d5xdcx3qingsid9nxlwcyjg2r44pjs6cg1rf"; }) 72 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.Kestrel.Core"; version = "2.2.0"; sha256 = "075ffds8hwp8ps0zf84bsv9pgiaqry9njc403qack701aybci97r"; }) 73 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.Kestrel.Https"; version = "2.2.0"; sha256 = "08z447wrbzy3l9lmmas353nr17sg9yccwcg62l9ax9a6n1wvds8c"; }) 74 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions"; version = "2.2.0"; sha256 = "08bj95zy4zszyx1rsy8v2ai9kg4120ij6yi0zillwx3ndb3q7vfb"; }) 75 + (fetchNuGet { name = "Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets"; version = "2.2.0"; sha256 = "0vhicfnv12sz2c81czdgdlffcgrhnn1jzz9zwy3a9c2n4rn8k9k5"; }) 76 + (fetchNuGet { name = "Microsoft.AspNetCore.StaticFiles"; version = "2.2.0"; sha256 = "1bpggypnx8ai11jqlbyb6cir3x7cnw1mvqh6h88f3b0gg8wxnnpj"; }) 77 + (fetchNuGet { name = "Microsoft.AspNetCore.WebUtilities"; version = "2.1.0"; sha256 = "148snpiq4rhm44gzx8wn9ljfb286h7vd1axc9by4r4fxp0gix0kf"; }) 78 + (fetchNuGet { name = "Microsoft.AspNetCore.WebUtilities"; version = "2.2.0"; sha256 = "0cs1g4ing4alfbwyngxzgvkrv7z964isv1j9dzflafda4p0wxmsi"; }) 79 + (fetchNuGet { name = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.0"; sha256 = "1dq5yw7cy6s42193yl4iqscfw5vzkjkgv0zyy32scr4jza6ni1a1"; }) 80 + (fetchNuGet { name = "Microsoft.CodeAnalysis.Analyzers"; version = "1.1.0"; sha256 = "08r667hj2259wbim1p3al5qxkshydykmb7nd9ygbjlg4mmydkapc"; }) 81 + (fetchNuGet { name = "Microsoft.CodeAnalysis.Common"; version = "2.8.0"; sha256 = "0g4h41fs0r8lqh9pk9s4mc1090kdpa6sbxq4rc866s8hnq9s1h4j"; }) 82 + (fetchNuGet { name = "Microsoft.CodeAnalysis.CSharp"; version = "2.8.0"; sha256 = "0p1xvw1h2fmnxywv1j4x6p3rgarpc8mfwfgn0vflk5xfnc961f6w"; }) 83 + (fetchNuGet { name = "Microsoft.CodeAnalysis.Razor"; version = "2.2.0"; sha256 = "03cm9danxxnsnmrzfz2swz6zhckkgg6hrz1ycnvnjrbpk3w4v0d6"; }) 84 + (fetchNuGet { name = "Microsoft.CSharp"; version = "4.5.0"; sha256 = "01i28nvzccxbqmiz217fxs6hnjwmd5fafs37rd49a6qp53y6623l"; }) 85 + (fetchNuGet { name = "Microsoft.CSharp"; version = "4.7.0"; sha256 = "0gd67zlw554j098kabg887b5a6pq9kzavpa3jjy5w53ccjzjfy8j"; }) 86 + (fetchNuGet { name = "Microsoft.DiaSymReader.Native"; version = "1.7.0"; sha256 = "0l2w3xpr7dpni20mqx41hqdzkrl0k6w9a0wqmjzdqv5f1jrwhfxn"; }) 87 + (fetchNuGet { name = "Microsoft.DotNet.PlatformAbstractions"; version = "2.1.0"; sha256 = "1qydvyyinj3b5mraazjal3n2k7jqhn05b6n1a2f3qjkqkxi63dmy"; }) 88 + (fetchNuGet { name = "Microsoft.Extensions.Caching.Abstractions"; version = "2.2.0"; sha256 = "0hhxc5dp52faha1bdqw0k426zicsv6x1kfqi30m9agr0b2hixj52"; }) 89 + (fetchNuGet { name = "Microsoft.Extensions.Caching.Memory"; version = "2.2.0"; sha256 = "0bzrsn5vas86w66bd04xilnlb21nx4l6lz7d3acvy6y8ir2vb5dv"; }) 90 + (fetchNuGet { name = "Microsoft.Extensions.Configuration"; version = "3.1.8"; sha256 = "1px3f7snw2iry7h7gfxzq0vg88cc8bf5kga22p0nkrkpgrm9hasa"; }) 91 + (fetchNuGet { name = "Microsoft.Extensions.Configuration"; version = "5.0.0"; sha256 = "01m9vzlq0vg0lhckj2dimwq42niwny8g3lm13c9a401hlyg90z1p"; }) 92 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Abstractions"; version = "2.1.0"; sha256 = "03gzlr3z9j1xnr1k6y91zgxpz3pj27i3zsvjwj7i8jqnlqmk7pxd"; }) 93 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Abstractions"; version = "2.2.0"; sha256 = "1fv5277hyhfqmc0gqszyqb1ilwnijm8kc9606yia6hwr8pxyg674"; }) 94 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.8"; sha256 = "05mlbia6vag0a0zfflv1m3ix48230wx0yib5hp7zsc72jpcmjd7q"; }) 95 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Abstractions"; version = "5.0.0"; sha256 = "0fqxkc9pjxkqylsdf26s9q21ciyk56h1w33pz3v1v4wcv8yv1v6k"; }) 96 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Binder"; version = "2.1.0"; sha256 = "0x1888w5ypavvszfmpja9krgc64527prs75vm8xbf9fv3rgsplql"; }) 97 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Binder"; version = "2.2.0"; sha256 = "10qyjdkymdmag3r807kvbnwag4j3nz65i4cwikbd77jjvz92ya3j"; }) 98 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Binder"; version = "3.0.0"; sha256 = "1415h62v6l1yjg95zrhbarwshmdd3hyphxavdim2z10lkyhsj9vz"; }) 99 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.CommandLine"; version = "2.2.0"; sha256 = "09kc7a6g6r9lxcm7y445bmnmkhxkxxvmx6fxh99ixb8a1fkxrvfi"; }) 100 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.EnvironmentVariables"; version = "2.2.0"; sha256 = "1af6003lmw6ms53m8wsvp9rx1alr8r9pharf6azaqcw4m99vd8c5"; }) 101 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.FileExtensions"; version = "2.2.0"; sha256 = "0bwk1kh6q259nmnly90j5rbbzi9w5gigq5vyjr31c1br4j8cjmqd"; }) 102 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.Json"; version = "2.2.0"; sha256 = "18cmrvlhc71bxplldbgwfjg29qflcaf4rrg2avp4g03fqwma6vvc"; }) 103 + (fetchNuGet { name = "Microsoft.Extensions.Configuration.UserSecrets"; version = "2.2.0"; sha256 = "15qarrjb7q463hsfkkja3yd34zf370qwjy22586w4r22rpxwirwp"; }) 104 + (fetchNuGet { name = "Microsoft.Extensions.DependencyInjection"; version = "2.2.0"; sha256 = "0lvv45rvq1xbf47lz818rjydc776zk8mf7svpzh1dml4qwlx9zck"; }) 105 + (fetchNuGet { name = "Microsoft.Extensions.DependencyInjection"; version = "3.0.0"; sha256 = "0cqbvy49ph16rlba2f35qhi0n7vpcf5kjybvn5fbs7dchfdzw927"; }) 106 + (fetchNuGet { name = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "2.1.0"; sha256 = "0c0cx8r5xkjpxmcfp51959jnp55qjvq28d9vaslk08avvi1by12s"; }) 107 + (fetchNuGet { name = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "2.2.0"; sha256 = "1jyzfdr9651h3x6pxwhpfbb9mysfh8f8z1jvy4g117h9790r9zx5"; }) 108 + (fetchNuGet { name = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.0.0"; sha256 = "06s8j8v0w06f12jxw6vvsd0l5zqrmsvc3rr2gqx9z3gcq7mdnr3l"; }) 109 + (fetchNuGet { name = "Microsoft.Extensions.DependencyModel"; version = "2.1.0"; sha256 = "0dl4qhjgifm6v3jsfzvzkvddyic77ggp9fq49ah661v45gk6ilgd"; }) 110 + (fetchNuGet { name = "Microsoft.Extensions.FileProviders.Abstractions"; version = "2.1.0"; sha256 = "1sxls5f5cgb0wr8cwb05skqmz074683hrhmd3hhq6m5dasnzb8n3"; }) 111 + (fetchNuGet { name = "Microsoft.Extensions.FileProviders.Abstractions"; version = "2.2.0"; sha256 = "1f83ffb4xjwljg8dgzdsa3pa0582q6b4zm0si467fgkybqzk3c54"; }) 112 + (fetchNuGet { name = "Microsoft.Extensions.FileProviders.Composite"; version = "2.2.0"; sha256 = "0k3qfxb0pn9b63grbf9jv7xw40gk6m1djmi3c4inwys7lxcj2k18"; }) 113 + (fetchNuGet { name = "Microsoft.Extensions.FileProviders.Physical"; version = "2.2.0"; sha256 = "0lrq4bxf67pw6n9kzwzqsnxkad2ygh2zn46hjias8j7aqljglh7x"; }) 114 + (fetchNuGet { name = "Microsoft.Extensions.FileSystemGlobbing"; version = "2.2.0"; sha256 = "01jw7s1nb44n65qs3rk7xdzc419qwl0s5c34k031f1cc5ag3jvc2"; }) 115 + (fetchNuGet { name = "Microsoft.Extensions.Hosting.Abstractions"; version = "2.1.0"; sha256 = "04vm9mdjjzg3lpp2rzpgkpn8h5bzdl3bwcr22lshd3kp602ws4k9"; }) 116 + (fetchNuGet { name = "Microsoft.Extensions.Hosting.Abstractions"; version = "2.2.0"; sha256 = "1xc7xr1nq7akfahyl5in9iyxrygap2xi9nxh39rfm37sf8lk55v1"; }) 117 + (fetchNuGet { name = "Microsoft.Extensions.Localization"; version = "2.2.0"; sha256 = "1k73kk5qmrvdyd7l8qxp19crw18f2p5dgk3cjx59g7vf3rkgmc6k"; }) 118 + (fetchNuGet { name = "Microsoft.Extensions.Localization.Abstractions"; version = "2.2.0"; sha256 = "1yzqs5x97rj6wlg0rylj0xi3dn1bw4ps26zdqsijx621jl1r97gy"; }) 119 + (fetchNuGet { name = "Microsoft.Extensions.Logging"; version = "2.1.0"; sha256 = "0dii8i7s6libfnspz2xb96ayagb4rwqj2kmr162vndivr9rmbm06"; }) 120 + (fetchNuGet { name = "Microsoft.Extensions.Logging"; version = "2.2.0"; sha256 = "0bx3ljyvvcbikradq2h583rl72h8bxdz33aghk026cxzpv2mm3wm"; }) 121 + (fetchNuGet { name = "Microsoft.Extensions.Logging"; version = "3.0.0"; sha256 = "1a9laql7pnka3n8ca26rsclkiijcdrzd57jyvbyrihgpb7bmzx0r"; }) 122 + (fetchNuGet { name = "Microsoft.Extensions.Logging.Abstractions"; version = "2.1.0"; sha256 = "1gvgif1wcx4k6pv7gc00qv1hid945jdywy1s50s33q0hfd91hbnj"; }) 123 + (fetchNuGet { name = "Microsoft.Extensions.Logging.Abstractions"; version = "2.2.0"; sha256 = "02w7hp6jicr7cl5p456k2cmrjvvhm6spg5kxnlncw3b72358m5wl"; }) 124 + (fetchNuGet { name = "Microsoft.Extensions.Logging.Abstractions"; version = "3.0.0"; sha256 = "0453382r1f39hgvw631lk1hx2kas8xa1xjr6xq4wshan8d62xgd7"; }) 125 + (fetchNuGet { name = "Microsoft.Extensions.Logging.Configuration"; version = "2.2.0"; sha256 = "1npblvkb4f251277sm6mc1xj2yww6nzag0azfz772nzkbdpj1q19"; }) 126 + (fetchNuGet { name = "Microsoft.Extensions.Logging.Console"; version = "2.2.0"; sha256 = "1g4wcd1kac0b4l0k4blr3qxpyfaf092cs2wnsjb3paj60rhr5agf"; }) 127 + (fetchNuGet { name = "Microsoft.Extensions.Logging.Debug"; version = "2.2.0"; sha256 = "1z5zzf43dw5xzvylkcgdi0q2mfhig6fmw2p5mxdxx916c5s007np"; }) 128 + (fetchNuGet { name = "Microsoft.Extensions.Logging.EventSource"; version = "2.2.0"; sha256 = "18kz2bm07zfj6d4j17zkj2zai7fmbsaq4xh312nh1x4468vi088g"; }) 129 + (fetchNuGet { name = "Microsoft.Extensions.ObjectPool"; version = "2.1.0"; sha256 = "0i0vmfc3ch7xa3awmbw3byylprfl2d6dp7lgm8k8f215kxzl1wdn"; }) 130 + (fetchNuGet { name = "Microsoft.Extensions.ObjectPool"; version = "2.2.0"; sha256 = "0n1q9lvc24ii1shzy575xldgmz7imnk4dswwwcgmzz93klri9r1z"; }) 131 + (fetchNuGet { name = "Microsoft.Extensions.Options"; version = "2.1.0"; sha256 = "0w9644sryd1c6r3n4lq2cgd5pn6jl3k5m38a05m7vjffa4m2spd2"; }) 132 + (fetchNuGet { name = "Microsoft.Extensions.Options"; version = "2.2.0"; sha256 = "1b20yh03fg4nmmi3vlf6gf13vrdkmklshfzl3ijygcs4c2hly6v0"; }) 133 + (fetchNuGet { name = "Microsoft.Extensions.Options"; version = "3.0.0"; sha256 = "1vzx8ha74y542n6w54vf60676aaz01ryklz6rm70w83v7sg2fxg3"; }) 134 + (fetchNuGet { name = "Microsoft.Extensions.Options.ConfigurationExtensions"; version = "2.2.0"; sha256 = "0w95rpxl0fzcz7rp8zabv3c9bvkj9ma2mj1hrx9nipsc4dnqp4jd"; }) 135 + (fetchNuGet { name = "Microsoft.Extensions.Primitives"; version = "2.1.0"; sha256 = "1r9gzwdfmb8ysnc4nzmyz5cyar1lw0qmizsvrsh252nhlyg06nmb"; }) 136 + (fetchNuGet { name = "Microsoft.Extensions.Primitives"; version = "2.2.0"; sha256 = "0znah6arbcqari49ymigg3wiy2hgdifz8zsq8vdc3ynnf45r7h0c"; }) 137 + (fetchNuGet { name = "Microsoft.Extensions.Primitives"; version = "3.0.0"; sha256 = "1d89yybxm7c30h5w79psybmpvy0pw7ha9r0y70f7i0kxgp8n62bk"; }) 138 + (fetchNuGet { name = "Microsoft.Extensions.Primitives"; version = "3.1.8"; sha256 = "1p48hk3r9ikv36wdpwdrbvaccziazncf7nl60fr82i04199lfhgl"; }) 139 + (fetchNuGet { name = "Microsoft.Extensions.Primitives"; version = "5.0.0"; sha256 = "0swqcknyh87ns82w539z1mvy804pfwhgzs97cr3nwqk6g5s42gd6"; }) 140 + (fetchNuGet { name = "Microsoft.Extensions.WebEncoders"; version = "2.2.0"; sha256 = "1mhnichccw6mjf37d38q2i1kr7qp485m7apa1b872ji0q16yy1y3"; }) 141 + (fetchNuGet { name = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 142 + (fetchNuGet { name = "Microsoft.NETCore.Platforms"; version = "5.0.0"; sha256 = "0mwpwdflidzgzfx2dlpkvvnkgkr2ayaf0s80737h4wa35gaj11rc"; }) 143 + (fetchNuGet { name = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 144 + (fetchNuGet { name = "Microsoft.NETFramework.ReferenceAssemblies"; version = "1.0.0"; sha256 = "0na724xhvqm63vq9y18fl9jw9q2v99bdwr353378s5fsi11qzxp9"; }) 145 + (fetchNuGet { name = "Microsoft.NETFramework.ReferenceAssemblies.net461"; version = "1.0.0"; sha256 = "00vkn4c6i0rn1l9pv912y0wgb9h6ks76qah8hvk441nari8fqbm1"; }) 146 + (fetchNuGet { name = "Microsoft.Net.Http.Headers"; version = "2.1.0"; sha256 = "1a02bll0flsin9grd3jxbi76ycl42qamynalbp7qbqcsprabw3ai"; }) 147 + (fetchNuGet { name = "Microsoft.Net.Http.Headers"; version = "2.2.0"; sha256 = "0w6lrk9z67bcirq2cj2ldfhnizc6id77ba6i30hjzgqjlyhh1gx5"; }) 148 + (fetchNuGet { name = "Microsoft.Win32.Registry"; version = "4.5.0"; sha256 = "1zapbz161ji8h82xiajgriq6zgzmb1f3ar517p2h63plhsq5gh2q"; }) 149 + (fetchNuGet { name = "Microsoft.Win32.Registry"; version = "5.0.0"; sha256 = "102hvhq2gmlcbq8y2cb7hdr2dnmjzfp2k3asr1ycwrfacwyaak7n"; }) 150 + (fetchNuGet { name = "MimeMapping"; version = "1.0.1.30"; sha256 = "03523g0kniwqzm30arnkds79j2gqjmhp5297xg4472l6iyfwwmln"; }) 151 + (fetchNuGet { name = "Mono.Posix.NETStandard"; version = "1.0.0"; sha256 = "0xlja36hwpjm837haq15mjh2prcf68lyrmn72nvgpz8qnf9vappw"; }) 152 + (fetchNuGet { name = "NETStandard.Library"; version = "2.0.3"; sha256 = "1fn9fxppfcg4jgypp2pmrpr6awl3qz1xmnri0cygpkwvyx27df1y"; }) 153 + (fetchNuGet { name = "Newtonsoft.Json"; version = "10.0.1"; sha256 = "15ncqic3p2rzs8q8ppi0irl2miq75kilw4lh8yfgjq96id0ds3hv"; }) 154 + (fetchNuGet { name = "Newtonsoft.Json"; version = "11.0.2"; sha256 = "1784xi44f4k8v1fr696hsccmwpy94bz7kixxqlri98zhcxn406b2"; }) 155 + (fetchNuGet { name = "Newtonsoft.Json"; version = "12.0.2"; sha256 = "0w2fbji1smd2y7x25qqibf1qrznmv4s6s0jvrbvr6alb7mfyqvh5"; }) 156 + (fetchNuGet { name = "Newtonsoft.Json"; version = "12.0.3"; sha256 = "17dzl305d835mzign8r15vkmav2hq8l6g7942dfjpnzr17wwl89x"; }) 157 + (fetchNuGet { name = "Newtonsoft.Json"; version = "9.0.1"; sha256 = "0mcy0i7pnfpqm4pcaiyzzji4g0c8i3a5gjz28rrr28110np8304r"; }) 158 + (fetchNuGet { name = "Newtonsoft.Json.Bson"; version = "1.0.1"; sha256 = "1r1hvj5gjl466bya2bfl5aaj8rbwyf5x1msg710wf3k2llbci1xa"; }) 159 + (fetchNuGet { name = "Newtonsoft.Json.Bson"; version = "1.0.2"; sha256 = "0c27bhy9x3c2n26inq32kmp6drpm71n6mqnmcr19wrlcaihglj35"; }) 160 + (fetchNuGet { name = "NLog"; version = "4.7.5"; sha256 = "0bx890dmwpx569982m532ibxlfh0n24hz1hkkxnxkpvximm4hsm5"; }) 161 + (fetchNuGet { name = "NLog.Extensions.Logging"; version = "1.6.4"; sha256 = "0yxx1mvz2d54kq00x38dgql8lssjxv5mk1yvx73v3qff1qxi7iyz"; }) 162 + (fetchNuGet { name = "NLog.Web.AspNetCore"; version = "4.9.3"; sha256 = "1mv5zaiyysp9j3h90i1v1rk0b6a4cv8ll6l8gj634y6ppshb8xkj"; }) 163 + (fetchNuGet { name = "Polly"; version = "7.2.1"; sha256 = "0cjmjkr2kq2q2cch30m95hms8mq73pzcqcirzvpzcl0rirvp3map"; }) 164 + (fetchNuGet { name = "SharpZipLib"; version = "1.2.0"; sha256 = "0ynhx1qkjm723bwjwsrdviw1d2s9azndpa12dagrjshhma3igqm5"; }) 165 + (fetchNuGet { name = "System.AppContext"; version = "4.3.0"; sha256 = "1649qvy3dar900z3g817h17nl8jp4ka5vcfmsr05kh0fshn7j3ya"; }) 166 + (fetchNuGet { name = "System.Buffers"; version = "4.4.0"; sha256 = "183f8063w8zqn99pv0ni0nnwh7fgx46qzxamwnans55hhs2l0g19"; }) 167 + (fetchNuGet { name = "System.Buffers"; version = "4.5.0"; sha256 = "1ywfqn4md6g3iilpxjn5dsr0f5lx6z0yvhqp4pgjcamygg73cz2c"; }) 168 + (fetchNuGet { name = "System.Buffers"; version = "4.5.1"; sha256 = "04kb1mdrlcixj9zh1xdi5as0k0qi8byr5mi3p3jcxx72qz93s2y3"; }) 169 + (fetchNuGet { name = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 170 + (fetchNuGet { name = "System.Collections.Concurrent"; version = "4.3.0"; sha256 = "0wi10md9aq33jrkh2c24wr2n9hrpyamsdhsxdcnf43b7y86kkii8"; }) 171 + (fetchNuGet { name = "System.Collections.Immutable"; version = "1.3.1"; sha256 = "17615br2x5riyx8ivf1dcqwj6q3ipq1bi5hqhw54yfyxmx38ddva"; }) 172 + (fetchNuGet { name = "System.Collections.Immutable"; version = "1.5.0"; sha256 = "1d5gjn5afnrf461jlxzawcvihz195gayqpcfbv6dd7pxa9ialn06"; }) 173 + (fetchNuGet { name = "System.ComponentModel.Annotations"; version = "4.5.0"; sha256 = "1jj6f6g87k0iwsgmg3xmnn67a14mq88np0l1ys5zkxhkvbc8976p"; }) 174 + (fetchNuGet { name = "System.Console"; version = "4.3.0"; sha256 = "1flr7a9x920mr5cjsqmsy9wgnv3lvd0h1g521pdr1lkb2qycy7ay"; }) 175 + (fetchNuGet { name = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 176 + (fetchNuGet { name = "System.Diagnostics.DiagnosticSource"; version = "4.5.0"; sha256 = "1y8m0p3127nak5yspapfnz25qc9x53gqpvwr3hdpsvrcd2r1pgyj"; }) 177 + (fetchNuGet { name = "System.Diagnostics.EventLog"; version = "5.0.0"; sha256 = "0cii8iq25awhlc3bl8i863b9415qisnhd3fkdwf41v4bpli6i5fr"; }) 178 + (fetchNuGet { name = "System.Diagnostics.FileVersionInfo"; version = "4.3.0"; sha256 = "094hx249lb3vb336q7dg3v257hbxvz2jnalj695l7cg5kxzqwai7"; }) 179 + (fetchNuGet { name = "System.Diagnostics.StackTrace"; version = "4.3.0"; sha256 = "0ash4h9k0m7xsm0yl79r0ixrdz369h7y922wipp5gladmlbvpyjd"; }) 180 + (fetchNuGet { name = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 181 + (fetchNuGet { name = "System.Dynamic.Runtime"; version = "4.3.0"; sha256 = "1d951hrvrpndk7insiag80qxjbf2y0y39y8h5hnq9612ws661glk"; }) 182 + (fetchNuGet { name = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 183 + (fetchNuGet { name = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 184 + (fetchNuGet { name = "System.IO.Compression"; version = "4.3.0"; sha256 = "084zc82yi6yllgda0zkgl2ys48sypiswbiwrv7irb3r0ai1fp4vz"; }) 185 + (fetchNuGet { name = "System.IO.FileSystem"; version = "4.3.0"; sha256 = "0z2dfrbra9i6y16mm9v1v6k47f0fm617vlb7s5iybjjsz6g1ilmw"; }) 186 + (fetchNuGet { name = "System.IO.FileSystem.AccessControl"; version = "5.0.0"; sha256 = "0ixl68plva0fsj3byv76bai7vkin86s6wyzr8vcav3szl862blvk"; }) 187 + (fetchNuGet { name = "System.IO.FileSystem.Primitives"; version = "4.3.0"; sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; }) 188 + (fetchNuGet { name = "System.IO.Pipelines"; version = "4.5.2"; sha256 = "045sn3vyk5xysjjm19q4dj5c1g1rf8l98n4qsl9pl9id4fn08yq1"; }) 189 + (fetchNuGet { name = "System.IO.Pipelines"; version = "4.6.0"; sha256 = "0r9ygjbxpyi6jgb67qnpbp42b7yvvhgmcjxnb50k3lb416claavh"; }) 190 + (fetchNuGet { name = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 191 + (fetchNuGet { name = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 192 + (fetchNuGet { name = "System.Memory"; version = "4.5.0"; sha256 = "1layqpcx1q4l805fdnj2dfqp6ncx2z42ca06rgsr6ikq4jjgbv30"; }) 193 + (fetchNuGet { name = "System.Memory"; version = "4.5.1"; sha256 = "0f07d7hny38lq9w69wx4lxkn4wszrqf9m9js6fh9is645csm167c"; }) 194 + (fetchNuGet { name = "System.Memory"; version = "4.5.2"; sha256 = "1g24dwqfcmf4gpbgbhaw1j49xmpsz389l6bw2xxbsmnzvsf860ld"; }) 195 + (fetchNuGet { name = "System.Memory"; version = "4.5.3"; sha256 = "0naqahm3wljxb5a911d37mwjqjdxv9l0b49p5dmfyijvni2ppy8a"; }) 196 + (fetchNuGet { name = "System.Memory"; version = "4.5.4"; sha256 = "14gbbs22mcxwggn0fcfs1b062521azb9fbb7c113x0mq6dzq9h6y"; }) 197 + (fetchNuGet { name = "System.Numerics.Vectors"; version = "4.4.0"; sha256 = "0rdvma399070b0i46c4qq1h2yvjj3k013sqzkilz4bz5cwmx1rba"; }) 198 + (fetchNuGet { name = "System.Numerics.Vectors"; version = "4.5.0"; sha256 = "1kzrj37yzawf1b19jq0253rcs8hsq1l2q8g69d7ipnhzb0h97m59"; }) 199 + (fetchNuGet { name = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 200 + (fetchNuGet { name = "System.Reflection.Emit"; version = "4.3.0"; sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; }) 201 + (fetchNuGet { name = "System.Reflection.Emit.ILGeneration"; version = "4.3.0"; sha256 = "0w1n67glpv8241vnpz1kl14sy7zlnw414aqwj4hcx5nd86f6994q"; }) 202 + (fetchNuGet { name = "System.Reflection.Metadata"; version = "1.4.2"; sha256 = "08b7b43vczlliv8k7q43jinjfrxwpljsglw7sxmc6sd7d54pd1vi"; }) 203 + (fetchNuGet { name = "System.Reflection.Metadata"; version = "1.6.0"; sha256 = "1wdbavrrkajy7qbdblpbpbalbdl48q3h34cchz24gvdgyrlf15r4"; }) 204 + (fetchNuGet { name = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 205 + (fetchNuGet { name = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 206 + (fetchNuGet { name = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 207 + (fetchNuGet { name = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.0"; sha256 = "17labczwqk3jng3kkky73m0jhi8wc21vbl7cz5c0hj2p1dswin43"; }) 208 + (fetchNuGet { name = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.1"; sha256 = "1xcrjx5fwg284qdnxyi2d0lzdm5q4frlpkp0nf6vvkx1kdz2prrf"; }) 209 + (fetchNuGet { name = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.2"; sha256 = "1vz4275fjij8inf31np78hw50al8nqkngk04p3xv5n4fcmf1grgi"; }) 210 + (fetchNuGet { name = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.3"; sha256 = "1afi6s2r1mh1kygbjmfba6l4f87pi5sg13p4a48idqafli94qxln"; }) 211 + (fetchNuGet { name = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.1"; sha256 = "119br3pd85lq8zcgh4f60jzmv1g976q1kdgi3hvqdlhfbw6siz2j"; }) 212 + (fetchNuGet { name = "System.Runtime.CompilerServices.Unsafe"; version = "5.0.0"; sha256 = "02k25ivn50dmqx5jn8hawwmz24yf0454fjd823qk6lygj9513q4x"; }) 213 + (fetchNuGet { name = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 214 + (fetchNuGet { name = "System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; }) 215 + (fetchNuGet { name = "System.Runtime.InteropServices.RuntimeInformation"; version = "4.0.0"; sha256 = "0glmvarf3jz5xh22iy3w9v3wyragcm4hfdr17v90vs7vcrm7fgp6"; }) 216 + (fetchNuGet { name = "System.Runtime.InteropServices.RuntimeInformation"; version = "4.3.0"; sha256 = "0q18r1sh4vn7bvqgd6dmqlw5v28flbpj349mkdish2vjyvmnb2ii"; }) 217 + (fetchNuGet { name = "System.Runtime.Numerics"; version = "4.3.0"; sha256 = "19rav39sr5dky7afygh309qamqqmi9kcwvz3i0c5700v0c5cg61z"; }) 218 + (fetchNuGet { name = "System.Security.AccessControl"; version = "4.5.0"; sha256 = "1wvwanz33fzzbnd2jalar0p0z3x0ba53vzx1kazlskp7pwyhlnq0"; }) 219 + (fetchNuGet { name = "System.Security.AccessControl"; version = "5.0.0"; sha256 = "17n3lrrl6vahkqmhlpn3w20afgz09n7i6rv0r3qypngwi7wqdr5r"; }) 220 + (fetchNuGet { name = "System.Security.Cryptography.Algorithms"; version = "4.3.0"; sha256 = "03sq183pfl5kp7gkvq77myv7kbpdnq3y0xj7vi4q1kaw54sny0ml"; }) 221 + (fetchNuGet { name = "System.Security.Cryptography.Cng"; version = "4.5.0"; sha256 = "1pm4ykbcz48f1hdmwpia432ha6qbb9kbrxrrp7cg3m8q8xn52ngn"; }) 222 + (fetchNuGet { name = "System.Security.Cryptography.Encoding"; version = "4.3.0"; sha256 = "1jr6w70igqn07k5zs1ph6xja97hxnb3mqbspdrff6cvssgrixs32"; }) 223 + (fetchNuGet { name = "System.Security.Cryptography.Primitives"; version = "4.3.0"; sha256 = "0pyzncsv48zwly3lw4f2dayqswcfvdwq2nz0dgwmi7fj3pn64wby"; }) 224 + (fetchNuGet { name = "System.Security.Cryptography.ProtectedData"; version = "5.0.0"; sha256 = "0jq1rcj5af2ydswld8ga3dyw2yi4c63wvb986b5kqsvpkwwc8x1b"; }) 225 + (fetchNuGet { name = "System.Security.Cryptography.X509Certificates"; version = "4.3.0"; sha256 = "0valjcz5wksbvijylxijjxb1mp38mdhv03r533vnx1q3ikzdav9h"; }) 226 + (fetchNuGet { name = "System.Security.Cryptography.Xml"; version = "4.5.0"; sha256 = "1rk40x0msf9k7sxnjyizagjns1z25dh3cf22bx6hsx6vhf0sk08l"; }) 227 + (fetchNuGet { name = "System.Security.Permissions"; version = "4.5.0"; sha256 = "192ww5rm3c9mirxgl1nzyrwd18am3izqls0hzm0fvcdjl5grvbhm"; }) 228 + (fetchNuGet { name = "System.Security.Principal.Windows"; version = "4.5.0"; sha256 = "0rmj89wsl5yzwh0kqjgx45vzf694v9p92r4x4q6yxldk1cv1hi86"; }) 229 + (fetchNuGet { name = "System.Security.Principal.Windows"; version = "5.0.0"; sha256 = "1mpk7xj76lxgz97a5yg93wi8lj0l8p157a5d50mmjy3gbz1904q8"; }) 230 + (fetchNuGet { name = "System.ServiceProcess.ServiceController"; version = "5.0.0"; sha256 = "1annp5kwwif6vfqn1x7vv3izwznxzb8ifvw3g9q3v0rrll26i99h"; }) 231 + (fetchNuGet { name = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 232 + (fetchNuGet { name = "System.Text.Encoding.CodePages"; version = "4.5.0"; sha256 = "19x38911pawq4mrxrm04l2bnxwxxlzq8v8rj4cbxnfjj8pnd3vj3"; }) 233 + (fetchNuGet { name = "System.Text.Encoding.CodePages"; version = "5.0.0"; sha256 = "1bn2pzaaq4wx9ixirr8151vm5hynn3lmrljcgjx9yghmm4k677k0"; }) 234 + (fetchNuGet { name = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 235 + (fetchNuGet { name = "System.Text.Encodings.Web"; version = "4.5.0"; sha256 = "0srd5bva52n92i90wd88pzrqjsxnfgka3ilybwh7s6sf469y5s53"; }) 236 + (fetchNuGet { name = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 237 + (fetchNuGet { name = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 238 + (fetchNuGet { name = "System.Threading.Tasks.Extensions"; version = "4.5.1"; sha256 = "1ikrplvw4m6pzjbq3bfbpr572n4i9mni577zvmrkaygvx85q3myw"; }) 239 + (fetchNuGet { name = "System.Threading.Tasks.Extensions"; version = "4.5.2"; sha256 = "1sh63dz0dymqcwmprp0nadm77b83vmm7lyllpv578c397bslb8hj"; }) 240 + (fetchNuGet { name = "System.Threading.Tasks.Parallel"; version = "4.3.0"; sha256 = "1rr3qa4hxwyj531s4nb3bwrxnxxwz617i0n9gh6x7nr7dd3ayzgh"; }) 241 + (fetchNuGet { name = "System.Threading.Thread"; version = "4.3.0"; sha256 = "0y2xiwdfcph7znm2ysxanrhbqqss6a3shi1z3c779pj2s523mjx4"; }) 242 + (fetchNuGet { name = "System.ValueTuple"; version = "4.3.0"; sha256 = "1227k7fxbxapq7dms4lvwwjdf3pr1jcsmhy2nzzhj6g6hs530hxn"; }) 243 + (fetchNuGet { name = "System.ValueTuple"; version = "4.5.0"; sha256 = "00k8ja51d0f9wrq4vv5z2jhq8hy31kac2rg0rv06prylcybzl8cy"; }) 244 + (fetchNuGet { name = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 245 + (fetchNuGet { name = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 246 + (fetchNuGet { name = "System.Xml.XmlDocument"; version = "4.3.0"; sha256 = "0bmz1l06dihx52jxjr22dyv5mxv6pj4852lx68grjm7bivhrbfwi"; }) 247 + (fetchNuGet { name = "System.Xml.XPath"; version = "4.3.0"; sha256 = "1cv2m0p70774a0sd1zxc8fm8jk3i5zk2bla3riqvi8gsm0r4kpci"; }) 248 + (fetchNuGet { name = "System.Xml.XPath.XDocument"; version = "4.3.0"; sha256 = "1wxckyb7n1pi433xzz0qcwcbl1swpra64065mbwwi8dhdc4kiabn"; }) 249 + (fetchNuGet { name = "YamlDotNet"; version = "8.1.2"; sha256 = "1lmi5mdw4067a8yk8gv9kilv1hljflkc45pr5vvz8n09af6gn78b"; }) 250 + ]
+34
pkgs/servers/jackett/updater.sh
···
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p curl jq common-updater-scripts nuget-to-nix dotnet-sdk_5 3 + set -eo pipefail 4 + cd "$(dirname "${BASH_SOURCE[0]}")" 5 + 6 + deps_file="$(realpath "./deps.nix")" 7 + 8 + new_version="$(curl -s "https://api.github.com/repos/jackett/jackett/releases?per_page=1" | jq -r '.[0].name')" 9 + old_version="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 10 + 11 + if [[ "$new_version" == "$old_version" ]]; then 12 + echo "Already up to date!" 13 + exit 0 14 + fi 15 + 16 + cd ../../.. 17 + update-source-version jackett "${new_version//v}" 18 + store_src="$(nix-build . -A jackett.src --no-out-link)" 19 + src="$(mktemp -d /tmp/jackett-src.XXX)" 20 + cp -rT "$store_src" "$src" 21 + chmod -R +w "$src" 22 + 23 + pushd "$src" 24 + 25 + export DOTNET_NOLOGO=1 26 + export DOTNET_CLI_TELEMETRY_OPTOUT=1 27 + 28 + mkdir ./nuget_pkgs 29 + dotnet restore src/Jackett.Server/Jackett.Server.csproj --packages ./nuget_pkgs 30 + 31 + nuget-to-nix ./nuget_pkgs > "$deps_file" 32 + 33 + popd 34 + rm -r "$src"
+2 -2
pkgs/servers/matrix-synapse/default.nix
··· 11 with python3.pkgs; 12 buildPythonApplication rec { 13 pname = "matrix-synapse"; 14 - version = "1.46.0"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "sha256-RcB+RSb/LZE8Q+UunyrYh28S7c7VsTmqg4mJIDVCX5U="; 19 }; 20 21 patches = [
··· 11 with python3.pkgs; 12 buildPythonApplication rec { 13 pname = "matrix-synapse"; 14 + version = "1.47.0"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "sha256-SS7ETkYQ3XBihOA6TQp+6f0PNhhlUvMBR6fEYmiLT3k="; 19 }; 20 21 patches = [
+8 -3
pkgs/servers/monitoring/icinga2/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, cmake, flex, bison, systemd 2 , boost, openssl, patchelf, mariadb-connector-c, postgresql, zlib 3 # Databases 4 , withMysql ? true, withPostgresql ? false ··· 9 10 stdenv.mkDerivation rec { 11 pname = "icinga2${nameSuffix}"; 12 - version = "2.13.1"; 13 14 src = fetchFromGitHub { 15 owner = "icinga"; 16 repo = "icinga2"; 17 rev = "v${version}"; 18 - sha256 = "sha256-cGVUNO3p00bkPd4tPbipevuixHz8ptk6W8y1rl3dge8="; 19 }; 20 21 patches = [ 22 ./etc-icinga2.patch # Makes /etc/icinga2 relative to / instead of the store path 23 ./no-systemd-service.patch # Prevent systemd service from being written to /usr 24 ./no-var-directories.patch # Prevent /var directories from being created 25 ]; 26 27 cmakeFlags = let
··· 1 + { stdenv, lib, fetchFromGitHub, fetchpatch, cmake, flex, bison, systemd 2 , boost, openssl, patchelf, mariadb-connector-c, postgresql, zlib 3 # Databases 4 , withMysql ? true, withPostgresql ? false ··· 9 10 stdenv.mkDerivation rec { 11 pname = "icinga2${nameSuffix}"; 12 + version = "2.13.2"; 13 14 src = fetchFromGitHub { 15 owner = "icinga"; 16 repo = "icinga2"; 17 rev = "v${version}"; 18 + sha256 = "sha256:1ijvav2ymgq1i8jycrqbp2y4r54y0dkwjnwxc20bmcixxh877zdn"; 19 }; 20 21 patches = [ 22 ./etc-icinga2.patch # Makes /etc/icinga2 relative to / instead of the store path 23 ./no-systemd-service.patch # Prevent systemd service from being written to /usr 24 ./no-var-directories.patch # Prevent /var directories from being created 25 + # Fix the non-unity build 26 + (fetchpatch { 27 + url = "https://github.com/Icinga/icinga2/commit/2ad0a4b8c3852ad937fec9fc85780230257c821e.patch"; 28 + sha256 = "sha256:06qn7x73zbccmd8ycj46a29x2rr6qjwg0rr831wc2gc6q2k9d2g0"; 29 + }) 30 ]; 31 32 cmakeFlags = let
+3 -3
pkgs/servers/mpd/default.nix
··· 98 # using libmad to decode mp3 files on darwin is causing a segfault -- there 99 # is probably a solution, but I'm disabling it for now 100 platformMask = lib.optionals stdenv.isDarwin [ "mad" "pulse" "jack" "nfs" "smbclient" ] 101 - ++ lib.optionals (!stdenv.isLinux) [ "alsa" "io_uring" "systemd" "syslog" ]; 102 103 knownFeatures = builtins.attrNames featureDependencies ++ builtins.attrNames nativeFeatureDependencies; 104 platformFeatures = lib.subtractLists platformMask knownFeatures; ··· 117 118 in stdenv.mkDerivation rec { 119 pname = "mpd"; 120 - version = "0.23.2"; 121 122 src = fetchFromGitHub { 123 owner = "MusicPlayerDaemon"; 124 repo = "MPD"; 125 rev = "v${version}"; 126 - sha256 = "sha256-gn06t8S0hh5xe5V1vnXVHSb0FwxY40onUV+Bt7oL9ic="; 127 }; 128 129 buildInputs = [
··· 98 # using libmad to decode mp3 files on darwin is causing a segfault -- there 99 # is probably a solution, but I'm disabling it for now 100 platformMask = lib.optionals stdenv.isDarwin [ "mad" "pulse" "jack" "nfs" "smbclient" ] 101 + ++ lib.optionals (!stdenv.isLinux) [ "alsa" "pipewire" "io_uring" "systemd" "syslog" ]; 102 103 knownFeatures = builtins.attrNames featureDependencies ++ builtins.attrNames nativeFeatureDependencies; 104 platformFeatures = lib.subtractLists platformMask knownFeatures; ··· 117 118 in stdenv.mkDerivation rec { 119 pname = "mpd"; 120 + version = "0.23.4"; 121 122 src = fetchFromGitHub { 123 owner = "MusicPlayerDaemon"; 124 repo = "MPD"; 125 rev = "v${version}"; 126 + sha256 = "sha256-siMFLV1fKdRt8To6AhLXmAAsgqZCA/bbvmlhbb6hLic="; 127 }; 128 129 buildInputs = [
+2 -2
pkgs/servers/zoneminder/default.nix
··· 78 79 in stdenv.mkDerivation rec { 80 pname = "zoneminder"; 81 - version = "1.36.8"; 82 83 src = fetchFromGitHub { 84 owner = "ZoneMinder"; 85 repo = "zoneminder"; 86 rev = version; 87 - sha256 = "sha256-UUpq4CCZq+EwVNGsLCQuVWdY3yoGw977AaMk1iJ6a5U="; 88 fetchSubmodules = true; 89 }; 90
··· 78 79 in stdenv.mkDerivation rec { 80 pname = "zoneminder"; 81 + version = "1.36.10"; 82 83 src = fetchFromGitHub { 84 owner = "ZoneMinder"; 85 repo = "zoneminder"; 86 rev = version; 87 + sha256 = "sha256-MmBnbVDitKOctPe2dNe1sMNNs/qEYGVq3UMJxAkLlCc="; 88 fetchSubmodules = true; 89 }; 90
+10
pkgs/top-level/all-packages.nix
··· 23130 23131 gruvbox-dark-gtk = callPackage ../data/themes/gruvbox-dark-gtk { }; 23132 23133 gruvbox-dark-icons-gtk = callPackage ../data/icons/gruvbox-dark-icons-gtk { 23134 inherit (plasma5Packages) breeze-icons; 23135 };
··· 23130 23131 gruvbox-dark-gtk = callPackage ../data/themes/gruvbox-dark-gtk { }; 23132 23133 + palenight-theme = callPackage ../data/themes/gtk-theme-framework { theme = "palenight"; }; 23134 + 23135 + amarena-theme = callPackage ../data/themes/gtk-theme-framework { theme = "amarena"; }; 23136 + 23137 + gruvterial-theme = callPackage ../data/themes/gtk-theme-framework { theme = "gruvterial"; }; 23138 + 23139 + oceanic-theme = callPackage ../data/themes/gtk-theme-framework { theme = "oceanic"; }; 23140 + 23141 + spacx-gtk-theme = callPackage ../data/themes/gtk-theme-framework { theme = "spacx"; }; 23142 + 23143 gruvbox-dark-icons-gtk = callPackage ../data/icons/gruvbox-dark-icons-gtk { 23144 inherit (plasma5Packages) breeze-icons; 23145 };
+4
pkgs/top-level/python-packages.nix
··· 4872 4873 mortgage = callPackage ../development/python-modules/mortgage { }; 4874 4875 motioneye-client = callPackage ../development/python-modules/motioneye-client { }; 4876 4877 moto = callPackage ../development/python-modules/moto { }; ··· 8928 sslyze = callPackage ../development/python-modules/sslyze { }; 8929 8930 stack-data = callPackage ../development/python-modules/stack-data { }; 8931 8932 starlette = callPackage ../development/python-modules/starlette { 8933 inherit (pkgs.darwin.apple_sdk.frameworks) ApplicationServices;
··· 4872 4873 mortgage = callPackage ../development/python-modules/mortgage { }; 4874 4875 + motionblinds = callPackage ../development/python-modules/motionblinds { }; 4876 + 4877 motioneye-client = callPackage ../development/python-modules/motioneye-client { }; 4878 4879 moto = callPackage ../development/python-modules/moto { }; ··· 8930 sslyze = callPackage ../development/python-modules/sslyze { }; 8931 8932 stack-data = callPackage ../development/python-modules/stack-data { }; 8933 + 8934 + stanza = callPackage ../development/python-modules/stanza { }; 8935 8936 starlette = callPackage ../development/python-modules/starlette { 8937 inherit (pkgs.darwin.apple_sdk.frameworks) ApplicationServices;