lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
6b78f024 a2569dbe

+290 -122
+16
maintainers/maintainer-list.nix
··· 9255 9255 githubId = 1102396; 9256 9256 name = "Jussi Maki"; 9257 9257 }; 9258 + joaquintrinanes = { 9259 + email = "hi@joaquint.io"; 9260 + github = "JoaquinTrinanes"; 9261 + name = "Joaquín Triñanes"; 9262 + githubId = 1385934; 9263 + keys = [{ 9264 + fingerprint = "3A13 5C15 E1D5 850D 2F90 AB25 6E14 46DD 451C 6BAF"; 9265 + }]; 9266 + }; 9258 9267 jobojeha = { 9259 9268 email = "jobojeha@jeppener.de"; 9260 9269 github = "jobojeha"; ··· 17159 17168 githubId = 1153271; 17160 17169 name = "Sander van der Burg"; 17161 17170 }; 17171 + Sanskarzz = { 17172 + email = "sanskar.gur@gmail.com"; 17173 + github = "Sanskarzz"; 17174 + githubId = 92817635; 17175 + name = "Sanskar Gurdasani"; 17176 + }; 17162 17177 sarcasticadmin = { 17163 17178 email = "rob@sarcasticadmin.com"; 17164 17179 github = "sarcasticadmin"; ··· 17824 17839 }; 17825 17840 sikmir = { 17826 17841 email = "sikmir@disroot.org"; 17842 + matrix = "@sikmir:matrix.org"; 17827 17843 github = "sikmir"; 17828 17844 githubId = 688044; 17829 17845 name = "Nikolay Korotkiy";
+23 -2
nixos/lib/make-iso9660-image.nix
··· 1 - { stdenv, closureInfo, xorriso, syslinux, libossp_uuid 1 + { lib, stdenv, callPackage, closureInfo, xorriso, syslinux, libossp_uuid, squashfsTools 2 2 3 3 , # The file name of the resulting ISO image. 4 4 isoName ? "cd.iso" ··· 15 15 # is a store path whose closure will be copied, and `symlink' is a 16 16 # symlink to `object' that will be added to the CD. 17 17 storeContents ? [] 18 + 19 + , # In addition to `contents', the closure of the store paths listed 20 + # in `squashfsContents' is compressed as squashfs and the result is 21 + # placed in /nix-store.squashfs on the CD. 22 + # FIXME: This is a performance optimization to avoid Hydra copying 23 + # the squashfs between builders and should be removed when Hydra 24 + # is smarter about scheduling. 25 + squashfsContents ? [] 26 + 27 + , # Compression settings for squashfs 28 + squashfsCompression ? "xz -Xdict-size 100%" 18 29 19 30 , # Whether this should be an El-Torito bootable CD. 20 31 bootable ? false ··· 45 56 assert efiBootable -> efiBootImage != ""; 46 57 assert usbBootable -> isohybridMbrImage != ""; 47 58 59 + let 60 + needSquashfs = squashfsContents != []; 61 + makeSquashfsDrv = callPackage ./make-squashfs.nix { 62 + storeContents = squashfsContents; 63 + comp = squashfsCompression; 64 + }; 65 + in 48 66 stdenv.mkDerivation { 49 67 name = isoName; 50 68 __structuredAttrs = true; 51 69 52 70 buildCommandPath = ./make-iso9660-image.sh; 53 - nativeBuildInputs = [ xorriso syslinux zstd libossp_uuid ]; 71 + nativeBuildInputs = [ xorriso syslinux zstd libossp_uuid ] 72 + ++ lib.optionals needSquashfs makeSquashfsDrv.nativeBuildInputs; 54 73 55 74 inherit isoName bootable bootImage compressImage volumeID efiBootImage efiBootable isohybridMbrImage usbBootable; 56 75 ··· 59 78 60 79 objects = map (x: x.object) storeContents; 61 80 symlinks = map (x: x.symlink) storeContents; 81 + 82 + squashfsCommand = lib.optionalString needSquashfs makeSquashfsDrv.buildCommand; 62 83 63 84 # For obtaining the closure of `storeContents'. 64 85 closureInfo = closureInfo { rootPaths = map (x: x.object) storeContents; };
+5
nixos/lib/make-iso9660-image.sh
··· 68 68 addPath "${i:1}" "$i" 69 69 done 70 70 71 + # If needed, build a squashfs and add that 72 + if [[ -n "$squashfsCommand" ]]; then 73 + (out="nix-store.squashfs" eval "$squashfsCommand") 74 + addPath "nix-store.squashfs" "nix-store.squashfs" 75 + fi 71 76 72 77 # Also include a manifest of the closures in a format suitable for 73 78 # nix-store --load-db.
+2 -9
nixos/modules/installer/cd-dvd/iso-image.nix
··· 811 811 optional config.isoImage.includeSystemBuildDependencies 812 812 config.system.build.toplevel.drvPath; 813 813 814 - # Create the squashfs image that contains the Nix store. 815 - system.build.squashfsStore = pkgs.callPackage ../../../lib/make-squashfs.nix { 816 - storeContents = config.isoImage.storeContents; 817 - comp = config.isoImage.squashfsCompression; 818 - }; 819 - 820 814 # Individual files to be included on the CD, outside of the Nix 821 815 # store on the CD. 822 816 isoImage.contents = ··· 826 820 } 827 821 { source = config.system.build.initialRamdisk + "/" + config.system.boot.loader.initrdFile; 828 822 target = "/boot/" + config.system.boot.loader.initrdFile; 829 - } 830 - { source = config.system.build.squashfsStore; 831 - target = "/nix-store.squashfs"; 832 823 } 833 824 { source = pkgs.writeText "version" config.system.nixos.label; 834 825 target = "/version.txt"; ··· 878 869 bootable = config.isoImage.makeBiosBootable; 879 870 bootImage = "/isolinux/isolinux.bin"; 880 871 syslinux = if config.isoImage.makeBiosBootable then pkgs.syslinux else null; 872 + squashfsContents = config.isoImage.storeContents; 873 + squashfsCompression = config.isoImage.squashfsCompression; 881 874 } // optionalAttrs (config.isoImage.makeUsbBootable && config.isoImage.makeBiosBootable) { 882 875 usbBootable = true; 883 876 isohybridMbrImage = "${pkgs.syslinux}/share/syslinux/isohdpfx.bin";
+1 -1
nixos/modules/services/x11/desktop-managers/default.nix
··· 18 18 # determines the default: later modules (if enabled) are preferred. 19 19 # E.g., if Plasma 5 is enabled, it supersedes xterm. 20 20 imports = [ 21 - ./none.nix ./xterm.nix ./phosh.nix ./xfce.nix ./plasma5.nix ./plasma6.nix ./lumina.nix 21 + ./none.nix ./xterm.nix ./phosh.nix ./xfce.nix ./plasma5.nix ../../desktop-managers/plasma6.nix ./lumina.nix 22 22 ./lxqt.nix ./enlightenment.nix ./gnome.nix ./retroarch.nix ./kodi.nix 23 23 ./mate.nix ./pantheon.nix ./surf-display.nix ./cde.nix 24 24 ./cinnamon.nix ./budgie.nix ./deepin.nix
+10 -5
nixos/modules/services/x11/desktop-managers/plasma6.nix nixos/modules/services/desktop-managers/plasma6.nix
··· 5 5 utils, 6 6 ... 7 7 }: let 8 - xcfg = config.services.xserver; 9 - cfg = xcfg.desktopManager.plasma6; 8 + cfg = config.services.desktopManager.plasma6; 10 9 11 10 inherit (pkgs) kdePackages; 12 11 inherit (lib) literalExpression mkDefault mkIf mkOption mkPackageOptionMD types; ··· 17 16 ''; 18 17 in { 19 18 options = { 20 - services.xserver.desktopManager.plasma6 = { 19 + services.desktopManager.plasma6 = { 21 20 enable = mkOption { 22 21 type = types.bool; 23 22 default = false; ··· 43 42 example = literalExpression "[ pkgs.kdePackages.elisa ]"; 44 43 }; 45 44 }; 45 + 46 + imports = [ 47 + (lib.mkRenamedOptionModule [ "services" "xserver" "desktopManager" "plasma6" "enable" ] [ "services" "desktopManager" "plasma6" "enable" ]) 48 + (lib.mkRenamedOptionModule [ "services" "xserver" "desktopManager" "plasma6" "enableQt5Integration" ] [ "services" "desktopManager" "plasma6" "enableQt5Integration" ]) 49 + (lib.mkRenamedOptionModule [ "services" "xserver" "desktopManager" "plasma6" "notoPackage" ] [ "services" "desktopManager" "plasma6" "notoPackage" ]) 50 + ]; 46 51 47 52 config = mkIf cfg.enable { 48 53 assertions = [ ··· 161 166 in 162 167 requiredPackages 163 168 ++ utils.removePackagesByName optionalPackages config.environment.plasma6.excludePackages 164 - ++ lib.optionals config.services.xserver.desktopManager.plasma6.enableQt5Integration [ 169 + ++ lib.optionals config.services.desktopManager.plasma6.enableQt5Integration [ 165 170 breeze.qt5 166 171 plasma-integration.qt5 167 172 pkgs.plasma5Packages.kwayland-integration ··· 185 190 "/libexec" # for drkonqi 186 191 ]; 187 192 188 - environment.etc."X11/xkb".source = xcfg.xkb.dir; 193 + environment.etc."X11/xkb".source = config.services.xserver.xkb.dir; 189 194 190 195 # Add ~/.config/kdedefaults to XDG_CONFIG_DIRS for shells, since Plasma sets that. 191 196 # FIXME: maybe we should append to XDG_CONFIG_DIRS in /etc/set-environment instead?
+1 -1
nixos/modules/virtualisation/incus.nix
··· 177 177 "network-online.target" 178 178 ]; 179 179 180 - path = lib.optional config.boot.zfs.enabled [ 180 + path = lib.optionals config.boot.zfs.enabled [ 181 181 config.boot.zfs.package 182 182 "${config.boot.zfs.package}/lib/udev" 183 183 ]
+2 -2
pkgs/applications/graphics/gthumb/default.nix
··· 35 35 36 36 stdenv.mkDerivation rec { 37 37 pname = "gthumb"; 38 - version = "3.12.5"; 38 + version = "3.12.6"; 39 39 40 40 src = fetchurl { 41 41 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 42 - sha256 = "sha256-9jhd9F/oxyYuw0nhP4FRLpDpl5jdI3eTLkKR1jNZ86s="; 42 + sha256 = "sha256-YIdwxsjnMHOh1AS2W9G3YeGsXcJecBMP8HJIj6kvXDM="; 43 43 }; 44 44 45 45 nativeBuildInputs = [
+1 -1
pkgs/applications/misc/syncthingtray/default.nix
··· 47 47 buildInputs = [ 48 48 qtbase 49 49 qtsvg 50 - qtwayland 51 50 cpp-utilities 52 51 qtutilities 53 52 boost 54 53 qtforkawesome 55 54 ] ++ lib.optionals stdenv.isDarwin [ iconv ] 55 + ++ lib.optionals stdenv.isLinux [ qtwayland ] 56 56 ++ lib.optionals webviewSupport [ qtwebengine ] 57 57 ++ lib.optionals jsSupport [ qtdeclarative ] 58 58 ++ lib.optionals kioPluginSupport [ kio ]
+3 -3
pkgs/applications/networking/cluster/nomad/default.nix
··· 81 81 82 82 nomad_1_7 = generic { 83 83 buildGoModule = buildGo121Module; 84 - version = "1.7.5"; 85 - sha256 = "sha256-uwPAmmxxlPp5NuuCUTv5VykX+q2vbA0yCRoblrJPP1g="; 86 - vendorHash = "sha256-xu1odCHUO3cv0ldXj3T8aM+fqPzc4r1gyFWsiuyzOpU="; 84 + version = "1.7.6"; 85 + sha256 = "sha256-rEWXQwkW/muX3D0An3WmHCoboPACFCrSG7Tyzor2wnQ="; 86 + vendorHash = "sha256-95yUtNfN/50LjWHHReaB4/riUqy8J67099bP8Ua7gRw="; 87 87 license = lib.licenses.bsl11; 88 88 passthru.tests.nomad = nixosTests.nomad; 89 89 preCheck = ''
+3 -2
pkgs/applications/networking/instant-messengers/teams-for-linux/default.nix
··· 9 9 , fetchYarnDeps 10 10 , prefetch-yarn-deps 11 11 , electron 12 + , libnotify 12 13 , libpulseaudio 13 14 , pipewire 14 15 , alsa-utils ··· 71 72 done 72 73 popd 73 74 74 - # Linux needs 'aplay' for notification sounds, 'libpulse' for meeting sound, and 'libpipewire' for screen sharing 75 + # Linux needs 'aplay' for notification sounds, 'libpulse' for meeting sound, 'libpipewire' for screen sharing and 'libnotify' for notifications 75 76 makeWrapper '${electron}/bin/electron' "$out/bin/teams-for-linux" \ 76 77 ${lib.optionalString stdenv.isLinux '' 77 78 --prefix PATH : ${lib.makeBinPath [ alsa-utils which ]} \ 78 - --prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ libpulseaudio pipewire ]} \ 79 + --prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ libpulseaudio pipewire libnotify ]} \ 79 80 ''} \ 80 81 --add-flags "$out/share/teams-for-linux/app.asar" \ 81 82 --add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--ozone-platform-hint=auto --enable-features=WaylandWindowDecorations}}"
+6 -8
pkgs/applications/networking/soulseek/nicotine-plus/default.nix pkgs/by-name/ni/nicotine-plus/package.nix
··· 1 1 { lib 2 - , stdenv 3 2 , fetchFromGitHub 4 - , wrapGAppsHook 3 + , wrapGAppsHook4 5 4 , gdk-pixbuf 6 5 , gettext 7 6 , gobject-introspection 8 - , gtk3 7 + , gtk4 9 8 , python3Packages 10 9 }: 11 10 ··· 17 16 owner = "nicotine-plus"; 18 17 repo = "nicotine-plus"; 19 18 rev = "refs/tags/${version}"; 20 - sha256 = "sha256-dl4fTa+CXsycC+hhSkIzQQxrSkBDPsdrmKdrHPakGig="; 19 + hash = "sha256-dl4fTa+CXsycC+hhSkIzQQxrSkBDPsdrmKdrHPakGig="; 21 20 }; 22 21 23 - nativeBuildInputs = [ gettext wrapGAppsHook gobject-introspection ]; 22 + nativeBuildInputs = [ gettext wrapGAppsHook4 gobject-introspection ]; 24 23 25 24 propagatedBuildInputs = [ 26 25 gdk-pixbuf 27 26 gobject-introspection 28 - gtk3 27 + gtk4 29 28 python3Packages.pygobject3 30 29 ]; 31 30 ··· 35 34 36 35 preFixup = '' 37 36 gappsWrapperArgs+=( 38 - --prefix XDG_DATA_DIRS : "${gtk3}/share/gsettings-schemas/${gtk3.name}" 37 + --prefix XDG_DATA_DIRS : "${gtk4}/share/gsettings-schemas/${gtk4.name}" 39 38 ) 40 39 ''; 41 40 42 41 doCheck = false; 43 42 44 43 meta = with lib; { 45 - broken = stdenv.isDarwin; 46 44 description = "A graphical client for the SoulSeek peer-to-peer system"; 47 45 longDescription = '' 48 46 Nicotine+ aims to be a pleasant, free and open source (FOSS) alternative
+2 -2
pkgs/applications/virtualization/virtualbox/guest-additions/default.nix
··· 118 118 #ln -s $out/lib/VBoxOGL.so $out/lib/dri/vboxvideo_dri.so 119 119 120 120 # Install desktop file 121 - mkdir -p $out/share/autostart 122 - cp -v other/vboxclient.desktop $out/share/autostart 121 + mkdir -p $out/etc/xdg/autostart 122 + cp -v other/vboxclient.desktop $out/etc/xdg/autostart 123 123 124 124 # Install Xorg drivers 125 125 mkdir -p $out/lib/xorg/modules/{drivers,input}
+4 -4
pkgs/by-name/at/atuin/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "atuin"; 13 - version = "18.0.2"; 13 + version = "18.1.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "atuinsh"; 17 17 repo = "atuin"; 18 18 rev = "v${version}"; 19 - hash = "sha256-1ZNp6e2ZjVRU0w9m8YDWOHApu8vRYlcg6MJw03ZV49M="; 19 + hash = "sha256-ddj8vHFTRBzeueSvY9kS1ZIcAID8k3MXrQkUVt04rQg="; 20 20 }; 21 21 22 22 # TODO: unify this to one hash because updater do not support this 23 23 cargoHash = 24 24 if stdenv.isLinux 25 - then "sha256-1yGv6Tmp7QhxIu3GNyRzK1i9Ghcil30+e8gTvyeKiZs=" 26 - else "sha256-+QdtQuXTk7Aw7xwelVDp/0T7FAYOnhDqSjazGemzSLw="; 25 + then "sha256-LKHBXm9ZThX96JjxJb8d7cRdhWL1t/3aG3Qq1TYBC74=" 26 + else "sha256-RSkC062XB5zy3lmI0OQhJfJ6FqFWXhpMPNIIqbrrlso="; 27 27 28 28 # atuin's default features include 'check-updates', which do not make sense 29 29 # for distribution builds. List all other default features.
+38
pkgs/by-name/ky/kyverno-chainsaw/package.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "kyverno-chainsaw"; 5 + version = "0.1.7"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "kyverno"; 9 + repo = "chainsaw"; 10 + rev = "v${version}"; 11 + hash = "sha256-v71qAJSpnbHd+jkPkR34IVNvwWLhm04TrPzduB6ZOgA="; 12 + }; 13 + 14 + vendorHash = "sha256-lHV5Ik/L/Svn9AvcKZupq778ektEsbxfOkCts4Ocx9g="; 15 + 16 + ldflags = [ 17 + "-s" "-w" 18 + "-X github.com/kyverno/chainsaw/pkg/version.BuildVersion=v${version}" 19 + "-X github.com/kyverno/chainsaw/pkg/version.BuildHash=${version}" 20 + "-X github.com/kyverno/chainsaw/pkg/version.BuildTime=1970-01-01_00:00:00" 21 + ]; 22 + 23 + doCheck = false; # requires running kubernetes 24 + 25 + meta = { 26 + changelog = "https://github.com/kyverno/chainsaw/releases/tag/v${version}"; 27 + description = "Declarative approach to test Kubernetes operators and controllers"; 28 + homepage = "https://kyverno.github.io/chainsaw/"; 29 + license = lib.licenses.asl20; 30 + longDescription = '' 31 + Chainsaw is meant to test Kubernetes operators work as expected by running a sequence of test steps for: 32 + * Creating resources 33 + * Asserting operators react (or not) the way they should 34 + ''; 35 + mainProgram = "chainsaw"; 36 + maintainers = with lib.maintainers; [ Sanskarzz ]; 37 + }; 38 + }
+6 -7
pkgs/by-name/pu/pupdate/add-runtime-identifier.patch
··· 1 - From f56083d95304752c45cc569fe42c3b0d7a2430bd Mon Sep 17 00:00:00 2001 1 + From 84d8c110882fe23bdd05d9007225b71d4395bbaa Mon Sep 17 00:00:00 2001 2 2 From: Philipp Rintz <git@rintz.net> 3 - Date: Wed, 24 Jan 2024 22:11:50 +0100 3 + Date: Sun, 3 Mar 2024 18:05:40 +0100 4 4 Subject: [PATCH] uncommited 5 5 6 6 --- ··· 8 8 1 file changed, 1 insertion(+) 9 9 10 10 diff --git a/pupdate.csproj b/pupdate.csproj 11 - index a6f59a8..0563137 100644 11 + index 04fe5e0..962682f 100644 12 12 --- a/pupdate.csproj 13 13 +++ b/pupdate.csproj 14 14 @@ -12,6 +12,7 @@ 15 15 <Authors>Matt Pannella</Authors> 16 16 <Product>Pupdate</Product> 17 - <RepositoryUrl>https://github.com/mattpannella/pocket-updater-utility</RepositoryUrl> 17 + <RepositoryUrl>https://github.com/mattpannella/pupdate</RepositoryUrl> 18 18 + <RuntimeIdentifier>@RuntimeIdentifier@</RuntimeIdentifier> 19 + <RootNamespace>Pannella</RootNamespace> 19 20 </PropertyGroup> 20 21 <ItemGroup> 21 - <PackageReference Include="CommandLineParser" Version="2.9.1" /> 22 22 -- 23 - 2.40.1 24 - 23 + 2.42.0
+1
pkgs/by-name/pu/pupdate/deps.nix
··· 7 7 (fetchNuGet { pname = "Crc32.NET"; version = "1.2.0"; sha256 = "0qaj3192k1vfji87zf50rhydn5mrzyzybrs2k4v7ap29k8i0vi5h"; }) 8 8 (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 9 9 (fetchNuGet { pname = "NETStandard.Library"; version = "2.0.0"; sha256 = "1bc4ba8ahgk15m8k4nd7x406nhi0kwqzbgjk2dmw52ss553xz7iy"; }) 10 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "13.0.3"; sha256 = "0xrwysmrn4midrjal8g2hr1bbg38iyisl0svamb11arqws4w2bw7"; }) 10 11 ]
+5 -5
pkgs/by-name/pu/pupdate/package.nix
··· 12 12 13 13 buildDotnetModule rec { 14 14 pname = "pupdate"; 15 - version = "3.2.1"; 15 + version = "3.8.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "mattpannella"; 19 19 repo = "${pname}"; 20 20 rev = "${version}"; 21 - hash = "sha256-jAZozcCHgKFTPCRktajrI77iH/GBbzhWa+QKZz1w62Y="; 21 + hash = "sha256-i9Y0liHeHrVwkYWzC/oRRKK3fu3GVcCfM6jGO9asIdQ="; 22 22 }; 23 23 24 24 buildInputs = [ ··· 43 43 executables = [ "pupdate" ]; 44 44 45 45 dotnetFlags = [ 46 - "-p:PackageRuntime=${dotnetCorePackages.systemToDotnetRid stdenv.hostPlatform.system}" 46 + "-p:PackageRuntime=${dotnetCorePackages.systemToDotnetRid stdenv.hostPlatform.system} -p:TrimMode=partial" 47 47 ]; 48 48 49 - dotnet-sdk = dotnetCorePackages.sdk_6_0; 50 - dotnet-runtime = dotnetCorePackages.runtime_6_0; 49 + dotnet-sdk = dotnetCorePackages.sdk_7_0; 50 + dotnet-runtime = dotnetCorePackages.runtime_7_0; 51 51 52 52 passthru = { 53 53 updateScript = nix-update-script { };
+3 -3
pkgs/by-name/sp/spicetify-cli/package.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "spicetify-cli"; 5 - version = "2.33.2"; 5 + version = "2.34.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "spicetify"; 9 9 repo = "spicetify-cli"; 10 10 rev = "v${version}"; 11 - hash = "sha256-GCeauokKzIbWwYrUopvvKEV7OBdoCfzFjHj0YxSuW3U="; 11 + hash = "sha256-37bR6Tf6vOrrILb9liyyCYiH6VNnGpQ3yUnQcXA8o14="; 12 12 }; 13 13 14 - vendorHash = "sha256-9rYShpUVI3KSY6UgGmoXo899NkUezkAAkTgFPdq094E="; 14 + vendorHash = "sha256-axE1SY+UW5oddyhOiktq+vNfhw2/SFX4ut4Hivg6TYQ="; 15 15 16 16 ldflags = [ 17 17 "-s -w"
+2 -2
pkgs/by-name/ti/tigerbeetle/package.nix
··· 14 14 in 15 15 stdenv.mkDerivation (finalAttrs: { 16 16 pname = "tigerbeetle"; 17 - version = "0.14.183"; 17 + version = "0.14.184"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "tigerbeetle"; 21 21 repo = "tigerbeetle"; 22 22 rev = "refs/tags/${finalAttrs.version}"; 23 - hash = "sha256-vyxuzSTwaXrQKVErxiwxjOQWUnHQMEl+PQGd/HU+noc="; 23 + hash = "sha256-7npd5qYrpE1mR/ZiDqH4sxCmjVAvF+R5bnlb3b/8+sk="; 24 24 }; 25 25 26 26 nativeBuildInputs = [ custom_zig_hook ];
+2 -2
pkgs/by-name/yo/youtrack/package.nix
··· 2 2 3 3 stdenvNoCC.mkDerivation (finalAttrs: { 4 4 pname = "youtrack"; 5 - version = "2023.3.24329"; 5 + version = "2024.1.25893"; 6 6 7 7 src = fetchzip { 8 8 url = "https://download.jetbrains.com/charisma/youtrack-${finalAttrs.version}.zip"; 9 - hash = "sha256-YIqRTCON8S/emj2AChrxhY4dfwtCnXtbiAQCTQ9k54Q="; 9 + hash = "sha256-YH+SC2kc4jfW3Tn9pnhROoUHID1JAWF86As5rrU4xlY="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeBinaryWrapper ];
+8 -2
pkgs/development/compilers/idris2/build-idris.nix
··· 18 18 , ... }@attrs: 19 19 20 20 let 21 + propagate = libs: lib.unique (lib.concatMap (nextLib: [nextLib] ++ nextLib.propagatedIdrisLibraries) libs); 21 22 ipkgFileName = ipkgName + ".ipkg"; 22 23 idrName = "idris2-${idris2.version}"; 23 24 libSuffix = "lib/${idrName}"; 25 + propagatedIdrisLibraries = propagate idrisLibraries; 24 26 libDirs = 25 - (lib.makeSearchPath libSuffix idrisLibraries) + 27 + (lib.makeSearchPath libSuffix propagatedIdrisLibraries) + 26 28 ":${idris2}/${idrName}"; 27 29 supportDir = "${idris2}/${idrName}/lib"; 28 30 drvAttrs = builtins.removeAttrs attrs [ ··· 35 37 inherit version; 36 38 src = src; 37 39 nativeBuildInputs = [ idris2 makeWrapper ] ++ attrs.nativeBuildInputs or []; 38 - buildInputs = idrisLibraries ++ attrs.buildInputs or []; 40 + buildInputs = propagatedIdrisLibraries ++ attrs.buildInputs or []; 39 41 40 42 IDRIS2_PACKAGE_PATH = libDirs; 41 43 ··· 44 46 idris2 --build ${ipkgFileName} 45 47 runHook postBuild 46 48 ''; 49 + 50 + passthru = { 51 + inherit propagatedIdrisLibraries; 52 + }; 47 53 }; 48 54 49 55 in {
+2 -2
pkgs/development/compilers/kotlin/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "kotlin"; 5 - version = "1.9.22"; 5 + version = "1.9.23"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-compiler-${version}.zip"; 9 - sha256 = "1rn3rabwyqqhs6xgyfwl326hrzpfpc3qqd2nzwbchck5a09r5cw8"; 9 + sha256 = "125yb2yzah7laf38m78pysvcd5a16b129a06rckrpylsmcx7s4wk"; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ jre ] ;
+4 -4
pkgs/development/compilers/kotlin/native.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "kotlin-native"; 10 - version = "1.9.22"; 10 + version = "1.9.23"; 11 11 12 12 src = let 13 13 getArch = { ··· 20 20 "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-native-${arch}-${version}.tar.gz"; 21 21 22 22 getHash = arch: { 23 - "macos-aarch64" = "1pf81rplikbp194pjrm2la101iz8vz3jv55109nipd26xghc15ca"; 24 - "macos-x86_64" = "1r7dmk8cc7f3iwaxamlnlcjl4mbvx443nwvsp8141a21ibrvrmx9"; 25 - "linux-x86_64" = "1m77qld44gbarjxm99gsdscncx4v0cf6ca3h9bdh2m7d3i4adc62"; 23 + "macos-aarch64" = "1v1ld4nxa77vjxiz4jw5h29s8i4ghfbmq0d01r15i75pr46md8r7"; 24 + "macos-x86_64" = "05ywdhagj3qzjaw5sd94sgjk89dysky7d7lfqpwvc8s35v77rv8f"; 25 + "linux-x86_64" = "1j2lpl1r7r30dgard6ia29n3qrsr98wb3qwpc80z4jh6k42qn6id"; 26 26 }.${arch}; 27 27 in 28 28 fetchurl {
+8 -2
pkgs/development/compilers/llvm/git/default.nix
··· 1 - { lowPrio, newScope, pkgs, lib, stdenv, stdenvNoCC, cmake, ninja 2 - , gccForLibs, preLibcCrossHeaders 1 + { lowPrio, newScope, pkgs, lib, stdenv, cmake, ninja 2 + , preLibcCrossHeaders 3 3 , libxml2, python3, fetchFromGitHub, overrideCC, wrapCCWith, wrapBintoolsWith 4 4 , buildLlvmTools # tools, but from the previous stage, for cross 5 5 , targetLlvmLibraries # libraries, but from the next stage, for cross ··· 272 272 nixSupport.cc-cflags = [ "-fno-exceptions" ]; 273 273 }); 274 274 275 + # Has to be in tools despite mostly being a library, 276 + # because we use a native helper executable from a 277 + # non-cross build in cross builds. 278 + libclc = callPackage ../common/libclc.nix { 279 + inherit buildLlvmTools; 280 + }; 275 281 }); 276 282 277 283 libraries = lib.makeExtensible (libraries: let
+14 -2
pkgs/development/compilers/spirv-llvm-translator/default.nix
··· 15 15 16 16 # ROCm, if actively updated will always be at the latest version 17 17 branch = 18 - if llvmMajor == "17" || isROCm then rec { 18 + if llvmMajor == "18" then rec { 19 + version = "18.1.0"; 20 + rev = "v${version}"; 21 + hash = "sha256-64guZiuO7VpaX01wNIjV7cnjEAe6ineMdY44S6sA33k="; 22 + } else if llvmMajor == "17" || isROCm then rec { 19 23 version = "17.0.0"; 20 24 rev = "v${version}"; 21 25 hash = "sha256-Rzm5Py9IPFtS9G7kME+uSwZ/0gPGW6MlL35ZWk4LfHM="; ··· 47 51 inherit (branch) rev hash; 48 52 }; 49 53 50 - patches = lib.optionals (lib.versionAtLeast llvmMajor "15") [ 54 + patches = lib.optionals (llvmMajor == "18") [ 55 + # Fixes build after SPV_INTEL_maximum_registers breaking change 56 + # TODO: remove on next spirv-headers release 57 + (fetchpatch { 58 + url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/d970c9126c033ebcbb7187bc705eae2e54726b74.patch"; 59 + revert = true; 60 + hash = "sha256-71sJuGqVjTcB549eIiCO0LoqAgxkdEHCoxh8Pd/Qzz8="; 61 + }) 62 + ] ++ lib.optionals (lib.versionAtLeast llvmMajor "15" && lib.versionOlder llvmMajor "18") [ 51 63 # Fixes build after spirv-headers breaking change 52 64 (fetchpatch { 53 65 url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/0166a0fb86dc6c0e8903436bbc3a89bc3273ebc0.patch";
+2 -2
pkgs/development/libraries/intel-gmmlib/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "intel-gmmlib"; 12 - version = "22.3.17"; 12 + version = "22.3.18"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "intel"; 16 16 repo = "gmmlib"; 17 17 rev = "intel-gmmlib-${version}"; 18 - sha256 = "sha256-9utlENByIQSayKTdSJapLBWMI2gFpOReNZe7bpbEoj8="; 18 + sha256 = "sha256-woEYEgvwf12aWCeYqSiosQAUJErGaEP3q8JER971lys="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/usbredir/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "usbredir"; 14 - version = "0.14.0"; 14 + version = "0.13.0"; 15 15 16 16 src = fetchFromGitLab { 17 17 domain = "gitlab.freedesktop.org"; 18 18 owner = "spice"; 19 19 repo = "usbredir"; 20 20 rev = "${pname}-${version}"; 21 - sha256 = "sha256-ShxysMoFSGP/dSIPthwb1Q6htotv7BP9jm09p2Nqdus="; 21 + sha256 = "sha256-zehf0DkqSSvmatbk/UB1oySjyqiFUYTuIhqb5xKeK7I="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/wlroots/default.nix
··· 134 134 }; 135 135 136 136 wlroots_0_17 = generic { 137 - version = "0.17.1"; 138 - hash = "sha256-Z0gWM7AQqJOSr2maUtjdgk/MF6pyeyFMMTaivgt+RMI="; 137 + version = "0.17.2"; 138 + hash = "sha256-Of9qykyVnBURc5A2pvCMm7sLbnuuG7OPWLxodQLN2Xg="; 139 139 extraBuildInputs = [ 140 140 ffmpeg 141 141 hwdata
+64
pkgs/development/python-modules/cffconvert/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , setuptools 5 + , click 6 + , requests 7 + , ruamel-yaml 8 + , pykwalify 9 + , jsonschema 10 + , pytestCheckHook 11 + , pytest-cov 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "cffconvert"; 16 + version = "2.0.0-unstable-2024-02-12"; 17 + pyproject = true; 18 + 19 + src = fetchFromGitHub { 20 + owner = "citation-file-format"; 21 + repo = "cffconvert"; 22 + rev = "5295f87c0e261da61a7b919fc754e3a77edd98a7"; 23 + hash = "sha256-/2qhWVNylrqPSf1KmuZQahzq+YH860cohVSfJsDm1BE="; 24 + }; 25 + 26 + build-system = [ 27 + setuptools 28 + ]; 29 + 30 + dependencies = [ 31 + click 32 + requests 33 + ruamel-yaml 34 + pykwalify 35 + jsonschema 36 + ]; 37 + 38 + nativeCheckInputs = [ 39 + pytestCheckHook 40 + ]; 41 + 42 + checkInputs = [ 43 + # addopts uses --no-cov 44 + pytest-cov 45 + ]; 46 + 47 + disabledTestPaths = [ 48 + # requires network access 49 + "tests/cli/test_rawify_url.py" 50 + ]; 51 + 52 + pythonImportsCheckHook = [ 53 + "cffconvert" 54 + ]; 55 + 56 + meta = { 57 + changelog = "https://github.com/citation-file-format/cffconvert/blob/${src.rev}/CHANGELOG.md"; 58 + description = "Command line program to validate and convert CITATION.cff files"; 59 + homepage = "https://github.com/citation-file-format/cffconvert"; 60 + license = lib.licenses.asl20; 61 + mainProgram = "cffconvert"; 62 + maintainers = with lib.maintainers; [ drupol ]; 63 + }; 64 + }
+3 -3
pkgs/development/tools/earthly/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "earthly"; 5 - version = "0.8.4"; 5 + version = "0.8.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "earthly"; 9 9 repo = "earthly"; 10 10 rev = "v${version}"; 11 - hash = "sha256-8grH07Vt6mrsKJ8FsG1yZcfLv5R8UIEBu19f1kal7Us="; 11 + hash = "sha256-vNgRI/LQZPILwYdIGk6BB+Yb36rEHv6kHZARq0+TF9Q="; 12 12 }; 13 13 14 - vendorHash = "sha256-zYueMiU3eL2vb2fn1dMkbfge+jZzM3Ry/AeLJerlMFg="; 14 + vendorHash = "sha256-14aaGrEJBdSo1hZf37xUO2S/q6YlaSqJuQCzP/PVkr8="; 15 15 subPackages = [ "cmd/earthly" "cmd/debugger" ]; 16 16 17 17 CGO_ENABLED = 0;
+2 -2
pkgs/development/tools/misc/astyle/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "astyle"; 5 - version = "3.4.12"; 5 + version = "3.4.13"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.bz2"; 9 - hash = "sha256-B3RZsp9zhvJWnBQsaKW2YHaAsMvaAhAgn/6m/w9atg4="; 9 + hash = "sha256-eKYQq9OelOD5E+nuXNoehbtizWM1U97LngDT2SAQGc4="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ cmake ];
+3 -3
pkgs/development/tools/misc/terraform-ls/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terraform-ls"; 5 - version = "0.32.7"; 5 + version = "0.32.8"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "hashicorp"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-gH0wJRf64XloBfnvtNdZlONESjxG5mS5Ok9HTX1PJUA="; 11 + hash = "sha256-ZXtzQEi5aLiYa4KjH3DkFPFi6EEEjxof6Y+8cRJkSCM="; 12 12 }; 13 13 14 - vendorHash = "sha256-YvzUdcCjkCApufLk5CZv6L/mIlOuo9qEBoxHOxv2Ljc="; 14 + vendorHash = "sha256-DGomEJ0IGs8uOrn50N+R3tRZJvw7iyHlPVpH3CVvjsU="; 15 15 16 16 ldflags = [ "-s" "-w" ]; 17 17
+8 -8
pkgs/servers/geospatial/t-rex/default.nix pkgs/by-name/t-/t-rex/package.nix
··· 1 - { lib, stdenv, rustPlatform, fetchFromGitHub, pkg-config, gdal, openssl, Security }: 1 + { lib, stdenv, rustPlatform, fetchFromGitHub, pkg-config, gdal, openssl, darwin }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "t-rex"; 5 - version = "0.14.3"; 5 + version = "0.15.0-alpha3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "t-rex-tileserver"; 9 - repo = pname; 9 + repo = "t-rex"; 10 10 rev = "v${version}"; 11 - hash = "sha256-LUVk5li2cl/LKbhKOh6Bbwav0GEuI/vUbDPLn7NSRIs="; 11 + hash = "sha256-oZZrR86/acoyMX3vC1JGrpc8G+DEuplqfEAnaP+TBGU="; 12 12 }; 13 13 14 - cargoHash = "sha256-I4QmjTTKUp9iugEwzM0xCcNLvF5ozeBdYmbi8sytY88="; 14 + cargoHash = "sha256-nxq4mX2Sy6Hyi8tA2CQsQwISB/kau4DEkAgIm4SvGns="; 15 15 16 - nativeBuildInputs = [ pkg-config ]; 16 + nativeBuildInputs = [ pkg-config rustPlatform.bindgenHook ]; 17 17 18 - buildInputs = [ gdal openssl ] ++ lib.optional stdenv.isDarwin Security; 18 + buildInputs = [ gdal openssl ] 19 + ++ lib.optional stdenv.isDarwin darwin.apple_sdk.frameworks.Security; 19 20 20 21 meta = with lib; { 21 22 description = "Vector tile server specialized on publishing MVT tiles"; ··· 25 26 maintainers = teams.geospatial.members; 26 27 mainProgram = "t_rex"; 27 28 platforms = platforms.unix; 28 - broken = true; # https://github.com/t-rex-tileserver/t-rex/issues/302 29 29 }; 30 30 }
+1 -1
pkgs/shells/nushell/default.nix
··· 73 73 description = "A modern shell written in Rust"; 74 74 homepage = "https://www.nushell.sh/"; 75 75 license = licenses.mit; 76 - maintainers = with maintainers; [ Br1ght0ne johntitor marsam ]; 76 + maintainers = with maintainers; [ Br1ght0ne johntitor marsam joaquintrinanes ]; 77 77 mainProgram = "nu"; 78 78 }; 79 79 }
+7 -5
pkgs/tools/graphics/realesrgan-ncnn-vulkan/cmakelists.patch
··· 1 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index 1e7b71a..9db85b1 100644 2 + index 1e7b71a..e743ab0 100644 3 3 --- a/CMakeLists.txt 4 4 +++ b/CMakeLists.txt 5 - @@ -107,6 +107,8 @@ if(USE_SYSTEM_NCNN) 5 + @@ -106,9 +106,9 @@ if(USE_SYSTEM_NCNN) 6 + message(STATUS "Using glslang install located at ${GLSLANG_TARGET_DIR}") 6 7 7 8 find_package(Threads) 9 + + find_package(SPIRV-Tools-opt REQUIRED) 8 10 9 - + include("${GLSLANG_TARGET_DIR}/SPIRV-Tools/SPIRV-ToolsTarget.cmake") 10 - + include("${GLSLANG_TARGET_DIR}/SPIRV-Tools-opt/SPIRV-Tools-optTargets.cmake") 11 11 include("${GLSLANG_TARGET_DIR}/OSDependentTargets.cmake") 12 - include("${GLSLANG_TARGET_DIR}/OGLCompilerTargets.cmake") 12 + - include("${GLSLANG_TARGET_DIR}/OGLCompilerTargets.cmake") 13 13 if(EXISTS "${GLSLANG_TARGET_DIR}/HLSLTargets.cmake") 14 + # hlsl support can be optional 15 + include("${GLSLANG_TARGET_DIR}/HLSLTargets.cmake")
+6 -1
pkgs/tools/graphics/realesrgan-ncnn-vulkan/default.nix
··· 50 50 51 51 installPhase = '' 52 52 mkdir -p $out/bin $out/share 53 + 53 54 cp realesrgan-ncnn-vulkan $out/bin/ 54 55 cp -r ${models}/models $out/share 55 56 ''; 56 57 58 + postFixup = '' 59 + patchelf $out/bin/realesrgan-ncnn-vulkan --add-needed libvulkan.so 60 + ''; 61 + 57 62 meta = with lib; { 58 63 description = "NCNN implementation of Real-ESRGAN. Real-ESRGAN aims at developing Practical Algorithms for General Image Restoration"; 59 64 homepage = "https://github.com/xinntao/Real-ESRGAN-ncnn-vulkan"; 60 65 license = licenses.mit; 61 - maintainers = with maintainers; [ tilcreator ]; 66 + maintainers = with maintainers; [ tilcreator iynaix ]; 62 67 platforms = platforms.all; 63 68 mainProgram = "realesrgan-ncnn-vulkan"; 64 69 };
+3 -14
pkgs/tools/text/djot-js/default.nix
··· 1 1 { lib 2 2 , buildNpmPackage 3 3 , fetchFromGitHub 4 - , fetchpatch 5 4 , installShellFiles 6 5 }: 7 6 8 7 buildNpmPackage rec { 9 8 pname = "djot-js"; 10 - version = "0.2.3"; 9 + version = "0.3.1"; 11 10 12 11 src = fetchFromGitHub { 13 12 owner = "jgm"; 14 13 repo = "djot.js"; 15 14 rev = "@djot/djot@${version}"; 16 - hash = "sha256-W/ZQXJXvFEIgj5PeI+jvw4nIkNP4qa1NyQCOv0unIuA="; 15 + hash = "sha256-dQfjI+8cKqn4qLT9eUKfCP++BFCWQ/MmrlQNVRNCFuU="; 17 16 }; 18 17 19 - npmDepsHash = "sha256-x/Oc39S6XwZ/ZsS/lmMU9OkHLlKuUxETYmD8pdHAIg8="; 20 - 21 - patches = [ 22 - # djot.js v0.2.3 doesn't include package-lock.json in the repository 23 - # remove at next release 24 - (fetchpatch { 25 - name = "add-package-lock-json-and-yarn-lock-to-repository.patch"; 26 - url = "https://github.com/jgm/djot.js/commit/15ed52755b2968932d4a9a80805b9ea6183fe539.patch"; 27 - hash = "sha256-saNmU7z4IOOG3ptXMFDSNci5uu0d2GiVZ/FAlaNccTc="; 28 - }) 29 - ]; 18 + npmDepsHash = "sha256-FjrjwhVv2WRjbEga9w37lwz7KYgTTHGsoqt496Uq/0c="; 30 19 31 20 nativeBuildInputs = [ 32 21 installShellFiles
+6
pkgs/tools/typesetting/tectonic/tests.nix
··· 90 90 tectonic -X new 91 91 cat Tectonic.toml | grep "${tectonic.bundleUrl}" 92 92 ''; 93 + 94 + /** test that the `nextonic -> tectonic` symlink is working as intended */ 95 + nextonic = '' 96 + nextonic new 2>&1 \ 97 + | grep '"version 2" Tectonic command-line interface activated' 98 + ''; 93 99 }
+2 -1
pkgs/tools/typesetting/tectonic/wrapper.nix
··· 46 46 + '' 47 47 makeWrapper ${lib.getBin tectonic-unwrapped}/bin/tectonic $out/bin/tectonic \ 48 48 --prefix PATH : "${lib.getBin biber-for-tectonic}/bin" \ 49 - --add-flags "--web-bundle ${tectonic.passthru.bundleUrl}" 49 + --add-flags "--web-bundle ${tectonic.passthru.bundleUrl}" \ 50 + --inherit-argv0 ## make sure binary name e.g. `nextonic` is passed along 50 51 ln -s $out/bin/tectonic $out/bin/nextonic 51 52 ''; 52 53
+5 -7
pkgs/top-level/all-packages.nix
··· 7094 7094 7095 7095 certstrap = callPackage ../tools/security/certstrap { }; 7096 7096 7097 + cffconvert = python3Packages.toPythonApplication python3Packages.cffconvert; 7098 + 7097 7099 cfssl = callPackage ../tools/security/cfssl { }; 7098 7100 7099 7101 cfs-zen-tweaks = callPackage ../os-specific/linux/cfs-zen-tweaks { }; ··· 19978 19980 terracognita = callPackage ../development/tools/misc/terracognita { }; 19979 19981 19980 19982 terraform-lsp = callPackage ../development/tools/misc/terraform-lsp { }; 19981 - terraform-ls = callPackage ../development/tools/misc/terraform-ls { }; 19983 + terraform-ls = callPackage ../development/tools/misc/terraform-ls { 19984 + buildGoModule = buildGo122Module; 19985 + }; 19982 19986 19983 19987 terraformer = callPackage ../development/tools/misc/terraformer { }; 19984 19988 ··· 27223 27227 27224 27228 pg_tileserv = callPackage ../servers/geospatial/pg_tileserv { }; 27225 27229 27226 - t-rex = callPackage ../servers/geospatial/t-rex { 27227 - inherit (darwin.apple_sdk.frameworks) Security; 27228 - }; 27229 - 27230 27230 tegola = callPackage ../servers/geospatial/tegola { }; 27231 27231 27232 27232 tile38 = callPackage ../servers/geospatial/tile38 { }; ··· 33607 33607 newsflash = callPackage ../applications/networking/feedreaders/newsflash { 33608 33608 webkitgtk = webkitgtk_6_0; 33609 33609 }; 33610 - 33611 - nicotine-plus = callPackage ../applications/networking/soulseek/nicotine-plus { }; 33612 33610 33613 33611 nice-dcv-client = callPackage ../applications/networking/remote/nice-dcv-client { }; 33614 33612
+2
pkgs/top-level/python-packages.nix
··· 1987 1987 1988 1988 cf-xarray = callPackage ../development/python-modules/cf-xarray { }; 1989 1989 1990 + cffconvert = callPackage ../development/python-modules/cffconvert { }; 1991 + 1990 1992 cffi = callPackage ../development/python-modules/cffi { }; 1991 1993 1992 1994 cffsubr = callPackage ../development/python-modules/cffsubr { };