Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
6cead635 77a94d88

+576 -270
+1 -1
.github/workflows/periodic-merge-24h.yml
··· 11 on: 12 schedule: 13 # * is a special character in YAML so you have to quote this string 14 - # Merge every 6 hours 15 - cron: '0 0 * * *' 16 17 jobs:
··· 11 on: 12 schedule: 13 # * is a special character in YAML so you have to quote this string 14 + # Merge every 24 hours 15 - cron: '0 0 * * *' 16 17 jobs:
+110
nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
··· 339 release instead of the old 2.31.0 version. 340 </para> 341 </listitem> 342 </itemizedlist> 343 </section> 344 <section xml:id="sec-release-21.11-notable-changes">
··· 339 release instead of the old 2.31.0 version. 340 </para> 341 </listitem> 342 + <listitem> 343 + <para> 344 + The <literal>bitwarden_rs</literal> packages and modules were 345 + renamed to <literal>vaultwarden</literal> 346 + <link xlink:href="https://github.com/dani-garcia/vaultwarden/discussions/1642">following 347 + upstream</link>. More specifically, 348 + </para> 349 + <itemizedlist> 350 + <listitem> 351 + <para> 352 + <literal>pkgs.bitwarden_rs</literal>, 353 + <literal>pkgs.bitwarden_rs-sqlite</literal>, 354 + <literal>pkgs.bitwarden_rs-mysql</literal> and 355 + <literal>pkgs.bitwarden_rs-postgresql</literal> were 356 + renamed to <literal>pkgs.vaultwarden</literal>, 357 + <literal>pkgs.vaultwarden-sqlite</literal>, 358 + <literal>pkgs.vaultwarden-mysql</literal> and 359 + <literal>pkgs.vaultwarden-postgresql</literal>, 360 + respectively. 361 + </para> 362 + <itemizedlist spacing="compact"> 363 + <listitem> 364 + <para> 365 + Old names are preserved as aliases for backwards 366 + compatibility, but may be removed in the future. 367 + </para> 368 + </listitem> 369 + <listitem> 370 + <para> 371 + The <literal>bitwarden_rs</literal> executable was 372 + also renamed to <literal>vaultwarden</literal> in all 373 + packages. 374 + </para> 375 + </listitem> 376 + </itemizedlist> 377 + </listitem> 378 + <listitem> 379 + <para> 380 + <literal>pkgs.bitwarden_rs-vault</literal> was renamed to 381 + <literal>pkgs.vaultwarden-vault</literal>. 382 + </para> 383 + <itemizedlist spacing="compact"> 384 + <listitem> 385 + <para> 386 + <literal>pkgs.bitwarden_rs-vault</literal> is 387 + preserved as an alias for backwards compatibility, but 388 + may be removed in the future. 389 + </para> 390 + </listitem> 391 + <listitem> 392 + <para> 393 + The static files were moved from 394 + <literal>/usr/share/bitwarden_rs</literal> to 395 + <literal>/usr/share/vaultwarden</literal>. 396 + </para> 397 + </listitem> 398 + </itemizedlist> 399 + </listitem> 400 + <listitem> 401 + <para> 402 + The <literal>services.bitwarden_rs</literal> config module 403 + was renamed to <literal>services.vaultwarden</literal>. 404 + </para> 405 + <itemizedlist spacing="compact"> 406 + <listitem> 407 + <para> 408 + <literal>services.bitwarden_rs</literal> is preserved 409 + as an alias for backwards compatibility, but may be 410 + removed in the future. 411 + </para> 412 + </listitem> 413 + </itemizedlist> 414 + </listitem> 415 + <listitem> 416 + <para> 417 + <literal>systemd.services.bitwarden_rs</literal>, 418 + <literal>systemd.services.backup-bitwarden_rs</literal> 419 + and <literal>systemd.timers.backup-bitwarden_rs</literal> 420 + were renamed to 421 + <literal>systemd.services.vaultwarden</literal>, 422 + <literal>systemd.services.backup-vaultwarden</literal> and 423 + <literal>systemd.timers.backup-vaultwarden</literal>, 424 + respectively. 425 + </para> 426 + <itemizedlist spacing="compact"> 427 + <listitem> 428 + <para> 429 + Old names are preserved as aliases for backwards 430 + compatibility, but may be removed in the future. 431 + </para> 432 + </listitem> 433 + </itemizedlist> 434 + </listitem> 435 + <listitem> 436 + <para> 437 + <literal>users.users.bitwarden_rs</literal> and 438 + <literal>users.groups.bitwarden_rs</literal> were renamed 439 + to <literal>users.users.vaultwarden</literal> and 440 + <literal>users.groups.vaultwarden</literal>, respectively. 441 + </para> 442 + </listitem> 443 + <listitem> 444 + <para> 445 + The data directory remains located at 446 + <literal>/var/lib/bitwarden_rs</literal>, for backwards 447 + compatibility. 448 + </para> 449 + </listitem> 450 + </itemizedlist> 451 + </listitem> 452 </itemizedlist> 453 </section> 454 <section xml:id="sec-release-21.11-notable-changes">
+26
nixos/doc/manual/release-notes/rl-2111.section.md
··· 85 * The `libwnck` package now defaults to the 3.x release instead of the 86 old 2.31.0 version. 87 88 ## Other Notable Changes {#sec-release-21.11-notable-changes} 89 90 - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets.
··· 85 * The `libwnck` package now defaults to the 3.x release instead of the 86 old 2.31.0 version. 87 88 + * The `bitwarden_rs` packages and modules were renamed to `vaultwarden` 89 + [following upstream](https://github.com/dani-garcia/vaultwarden/discussions/1642). More specifically, 90 + 91 + * `pkgs.bitwarden_rs`, `pkgs.bitwarden_rs-sqlite`, `pkgs.bitwarden_rs-mysql` and 92 + `pkgs.bitwarden_rs-postgresql` were renamed to `pkgs.vaultwarden`, `pkgs.vaultwarden-sqlite`, 93 + `pkgs.vaultwarden-mysql` and `pkgs.vaultwarden-postgresql`, respectively. 94 + * Old names are preserved as aliases for backwards compatibility, but may be removed in the future. 95 + * The `bitwarden_rs` executable was also renamed to `vaultwarden` in all packages. 96 + 97 + * `pkgs.bitwarden_rs-vault` was renamed to `pkgs.vaultwarden-vault`. 98 + * `pkgs.bitwarden_rs-vault` is preserved as an alias for backwards compatibility, but may be removed in the future. 99 + * The static files were moved from `/usr/share/bitwarden_rs` to `/usr/share/vaultwarden`. 100 + 101 + * The `services.bitwarden_rs` config module was renamed to `services.vaultwarden`. 102 + * `services.bitwarden_rs` is preserved as an alias for backwards compatibility, but may be removed in the future. 103 + 104 + * `systemd.services.bitwarden_rs`, `systemd.services.backup-bitwarden_rs` and `systemd.timers.backup-bitwarden_rs` 105 + were renamed to `systemd.services.vaultwarden`, `systemd.services.backup-vaultwarden` and 106 + `systemd.timers.backup-vaultwarden`, respectively. 107 + * Old names are preserved as aliases for backwards compatibility, but may be removed in the future. 108 + 109 + * `users.users.bitwarden_rs` and `users.groups.bitwarden_rs` were renamed to `users.users.vaultwarden` and 110 + `users.groups.vaultwarden`, respectively. 111 + 112 + * The data directory remains located at `/var/lib/bitwarden_rs`, for backwards compatibility. 113 + 114 ## Other Notable Changes {#sec-release-21.11-notable-changes} 115 116 - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets.
+1 -1
nixos/modules/module-list.nix
··· 874 ./services/search/hound.nix 875 ./services/search/kibana.nix 876 ./services/search/solr.nix 877 - ./services/security/bitwarden_rs/default.nix 878 ./services/security/certmgr.nix 879 ./services/security/cfssl.nix 880 ./services/security/clamav.nix ··· 900 ./services/security/torsocks.nix 901 ./services/security/usbguard.nix 902 ./services/security/vault.nix 903 ./services/security/yubikey-agent.nix 904 ./services/system/cloud-init.nix 905 ./services/system/dbus.nix
··· 874 ./services/search/hound.nix 875 ./services/search/kibana.nix 876 ./services/search/solr.nix 877 ./services/security/certmgr.nix 878 ./services/security/cfssl.nix 879 ./services/security/clamav.nix ··· 899 ./services/security/torsocks.nix 900 ./services/security/usbguard.nix 901 ./services/security/vault.nix 902 + ./services/security/vaultwarden/default.nix 903 ./services/security/yubikey-agent.nix 904 ./services/system/cloud-init.nix 905 ./services/system/dbus.nix
+63 -34
nixos/modules/services/networking/coturn.nix
··· 16 ${lib.optionalString cfg.no-auth "no-auth"} 17 ${lib.optionalString cfg.use-auth-secret "use-auth-secret"} 18 ${lib.optionalString (cfg.static-auth-secret != null) ("static-auth-secret=${cfg.static-auth-secret}")} 19 realm=${cfg.realm} 20 ${lib.optionalString cfg.no-udp "no-udp"} 21 ${lib.optionalString cfg.no-tcp "no-tcp"} ··· 182 by a separate program, so this is why that other mode is 'dynamic'. 183 ''; 184 }; 185 realm = mkOption { 186 type = types.str; 187 default = config.networking.hostName; ··· 293 }; 294 }; 295 296 - config = mkIf cfg.enable { 297 - users.users.turnserver = 298 - { uid = config.ids.uids.turnserver; 299 - description = "coturn TURN server user"; 300 - }; 301 - users.groups.turnserver = 302 - { gid = config.ids.gids.turnserver; 303 - members = [ "turnserver" ]; 304 - }; 305 306 - systemd.services.coturn = { 307 - description = "coturn TURN server"; 308 - after = [ "network-online.target" ]; 309 - wants = [ "network-online.target" ]; 310 - wantedBy = [ "multi-user.target" ]; 311 312 - unitConfig = { 313 - Documentation = "man:coturn(1) man:turnadmin(1) man:turnserver(1)"; 314 - }; 315 316 - serviceConfig = { 317 - Type = "simple"; 318 - ExecStart = "${pkgs.coturn}/bin/turnserver -c ${configFile}"; 319 - RuntimeDirectory = "turnserver"; 320 - User = "turnserver"; 321 - Group = "turnserver"; 322 - AmbientCapabilities = 323 - mkIf ( 324 - cfg.listening-port < 1024 || 325 - cfg.alt-listening-port < 1024 || 326 - cfg.tls-listening-port < 1024 || 327 - cfg.alt-tls-listening-port < 1024 || 328 - cfg.min-port < 1024 329 - ) "cap_net_bind_service"; 330 - Restart = "on-abort"; 331 }; 332 - }; 333 - }; 334 }
··· 16 ${lib.optionalString cfg.no-auth "no-auth"} 17 ${lib.optionalString cfg.use-auth-secret "use-auth-secret"} 18 ${lib.optionalString (cfg.static-auth-secret != null) ("static-auth-secret=${cfg.static-auth-secret}")} 19 + ${lib.optionalString (cfg.static-auth-secret-file != null) ("static-auth-secret=#static-auth-secret#")} 20 realm=${cfg.realm} 21 ${lib.optionalString cfg.no-udp "no-udp"} 22 ${lib.optionalString cfg.no-tcp "no-tcp"} ··· 183 by a separate program, so this is why that other mode is 'dynamic'. 184 ''; 185 }; 186 + static-auth-secret-file = mkOption { 187 + type = types.nullOr types.str; 188 + default = null; 189 + description = '' 190 + Path to the file containing the static authentication secret. 191 + ''; 192 + }; 193 realm = mkOption { 194 type = types.str; 195 default = config.networking.hostName; ··· 301 }; 302 }; 303 304 + config = mkIf cfg.enable (mkMerge ([ 305 + { assertions = [ 306 + { assertion = cfg.static-auth-secret != null -> cfg.static-auth-secret-file == null ; 307 + message = "static-auth-secret and static-auth-secret-file cannot be set at the same time"; 308 + } 309 + ];} 310 + 311 + { 312 + users.users.turnserver = 313 + { uid = config.ids.uids.turnserver; 314 + description = "coturn TURN server user"; 315 + }; 316 + users.groups.turnserver = 317 + { gid = config.ids.gids.turnserver; 318 + members = [ "turnserver" ]; 319 + }; 320 321 + systemd.services.coturn = let 322 + runConfig = "/run/coturn/turnserver.cfg"; 323 + in { 324 + description = "coturn TURN server"; 325 + after = [ "network-online.target" ]; 326 + wants = [ "network-online.target" ]; 327 + wantedBy = [ "multi-user.target" ]; 328 329 + unitConfig = { 330 + Documentation = "man:coturn(1) man:turnadmin(1) man:turnserver(1)"; 331 + }; 332 333 + preStart = '' 334 + cat ${configFile} > ${runConfig} 335 + ${optionalString (cfg.static-auth-secret-file != null) '' 336 + STATIC_AUTH_SECRET="$(head -n1 ${cfg.static-auth-secret-file} || :)" 337 + sed -e "s,#static-auth-secret#,$STATIC_AUTH_SECRET,g" \ 338 + -i ${runConfig} 339 + '' } 340 + chmod 640 ${runConfig} 341 + ''; 342 + serviceConfig = { 343 + Type = "simple"; 344 + ExecStart = "${pkgs.coturn}/bin/turnserver -c ${runConfig}"; 345 + RuntimeDirectory = "turnserver"; 346 + User = "turnserver"; 347 + Group = "turnserver"; 348 + AmbientCapabilities = 349 + mkIf ( 350 + cfg.listening-port < 1024 || 351 + cfg.alt-listening-port < 1024 || 352 + cfg.tls-listening-port < 1024 || 353 + cfg.alt-tls-listening-port < 1024 || 354 + cfg.min-port < 1024 355 + ) "cap_net_bind_service"; 356 + Restart = "on-abort"; 357 + }; 358 }; 359 + systemd.tmpfiles.rules = [ 360 + "d /run/coturn 0700 turnserver turnserver - -" 361 + ]; 362 + }])); 363 }
+1 -1
nixos/modules/services/security/bitwarden_rs/backup.sh nixos/modules/services/security/vaultwarden/backup.sh
··· 1 #!/usr/bin/env bash 2 3 - # Based on: https://github.com/dani-garcia/bitwarden_rs/wiki/Backing-up-your-vault 4 if ! mkdir -p "$BACKUP_FOLDER"; then 5 echo "Could not create backup folder '$BACKUP_FOLDER'" >&2 6 exit 1
··· 1 #!/usr/bin/env bash 2 3 + # Based on: https://github.com/dani-garcia/vaultwarden/wiki/Backing-up-your-vault 4 if ! mkdir -p "$BACKUP_FOLDER"; then 5 echo "Could not create backup folder '$BACKUP_FOLDER'" >&2 6 exit 1
+32 -25
nixos/modules/services/security/bitwarden_rs/default.nix nixos/modules/services/security/vaultwarden/default.nix
··· 3 with lib; 4 5 let 6 - cfg = config.services.bitwarden_rs; 7 - user = config.users.users.bitwarden_rs.name; 8 - group = config.users.groups.bitwarden_rs.name; 9 10 # Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER). 11 nameToEnvVar = name: ··· 26 if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else [] 27 ) cfg.config)); 28 in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") { 29 - WEB_VAULT_FOLDER = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault"; 30 } // configEnv; 31 32 - configFile = pkgs.writeText "bitwarden_rs.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv)); 33 34 - bitwarden_rs = pkgs.bitwarden_rs.override { inherit (cfg) dbBackend; }; 35 36 in { 37 - options.services.bitwarden_rs = with types; { 38 - enable = mkEnableOption "bitwarden_rs"; 39 40 dbBackend = mkOption { 41 type = enum [ "sqlite" "mysql" "postgresql" ]; 42 default = "sqlite"; 43 description = '' 44 - Which database backend bitwarden_rs will be using. 45 ''; 46 }; 47 ··· 49 type = nullOr str; 50 default = null; 51 description = '' 52 - The directory under which bitwarden_rs will backup its persistent data. 53 ''; 54 }; 55 ··· 65 } 66 ''; 67 description = '' 68 - The configuration of bitwarden_rs is done through environment variables, 69 therefore the names are converted from camel case (e.g. disable2FARemember) 70 to upper case snake case (e.g. DISABLE_2FA_REMEMBER). 71 In this conversion digits (0-9) are handled just like upper case characters, ··· 75 This allows working around any potential future conflicting naming conventions. 76 77 Based on the attributes passed to this config option an environment file will be generated 78 - that is passed to bitwarden_rs's systemd service. 79 80 The available configuration options can be found in 81 - <link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/${bitwarden_rs.version}/.env.template">the environment template file</link>. 82 ''; 83 }; 84 85 environmentFile = mkOption { 86 type = with types; nullOr path; 87 default = null; 88 - example = "/root/bitwarden_rs.env"; 89 description = '' 90 Additional environment file as defined in <citerefentry> 91 <refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum> ··· 95 may be passed to the service without adding them to the world-readable Nix store. 96 97 Note that this file needs to be available on the host on which 98 - <literal>bitwarden_rs</literal> is running. 99 ''; 100 }; 101 }; ··· 106 message = "Backups for database backends other than sqlite will need customization"; 107 } ]; 108 109 - users.users.bitwarden_rs = { 110 inherit group; 111 isSystemUser = true; 112 }; 113 - users.groups.bitwarden_rs = { }; 114 115 - systemd.services.bitwarden_rs = { 116 after = [ "network.target" ]; 117 path = with pkgs; [ openssl ]; 118 serviceConfig = { 119 User = user; 120 Group = group; 121 EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile; 122 - ExecStart = "${bitwarden_rs}/bin/bitwarden_rs"; 123 LimitNOFILE = "1048576"; 124 PrivateTmp = "true"; 125 PrivateDevices = "true"; ··· 131 wantedBy = [ "multi-user.target" ]; 132 }; 133 134 - systemd.services.backup-bitwarden_rs = mkIf (cfg.backupDir != null) { 135 - description = "Backup bitwarden_rs"; 136 environment = { 137 DATA_FOLDER = "/var/lib/bitwarden_rs"; 138 BACKUP_FOLDER = cfg.backupDir; 139 }; 140 path = with pkgs; [ sqlite ]; 141 serviceConfig = { 142 - SyslogIdentifier = "backup-bitwarden_rs"; 143 Type = "oneshot"; 144 User = mkDefault user; 145 Group = mkDefault group; ··· 148 wantedBy = [ "multi-user.target" ]; 149 }; 150 151 - systemd.timers.backup-bitwarden_rs = mkIf (cfg.backupDir != null) { 152 - description = "Backup bitwarden_rs on time"; 153 timerConfig = { 154 OnCalendar = mkDefault "23:00"; 155 Persistent = "true"; 156 - Unit = "backup-bitwarden_rs.service"; 157 }; 158 wantedBy = [ "multi-user.target" ]; 159 };
··· 3 with lib; 4 5 let 6 + cfg = config.services.vaultwarden; 7 + user = config.users.users.vaultwarden.name; 8 + group = config.users.groups.vaultwarden.name; 9 10 # Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER). 11 nameToEnvVar = name: ··· 26 if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else [] 27 ) cfg.config)); 28 in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") { 29 + WEB_VAULT_FOLDER = "${pkgs.vaultwarden-vault}/share/vaultwarden/vault"; 30 } // configEnv; 31 32 + configFile = pkgs.writeText "vaultwarden.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv)); 33 34 + vaultwarden = pkgs.vaultwarden.override { inherit (cfg) dbBackend; }; 35 36 in { 37 + imports = [ 38 + (mkRenamedOptionModule [ "services" "bitwarden_rs" ] [ "services" "vaultwarden" ]) 39 + ]; 40 + 41 + options.services.vaultwarden = with types; { 42 + enable = mkEnableOption "vaultwarden"; 43 44 dbBackend = mkOption { 45 type = enum [ "sqlite" "mysql" "postgresql" ]; 46 default = "sqlite"; 47 description = '' 48 + Which database backend vaultwarden will be using. 49 ''; 50 }; 51 ··· 53 type = nullOr str; 54 default = null; 55 description = '' 56 + The directory under which vaultwarden will backup its persistent data. 57 ''; 58 }; 59 ··· 69 } 70 ''; 71 description = '' 72 + The configuration of vaultwarden is done through environment variables, 73 therefore the names are converted from camel case (e.g. disable2FARemember) 74 to upper case snake case (e.g. DISABLE_2FA_REMEMBER). 75 In this conversion digits (0-9) are handled just like upper case characters, ··· 79 This allows working around any potential future conflicting naming conventions. 80 81 Based on the attributes passed to this config option an environment file will be generated 82 + that is passed to vaultwarden's systemd service. 83 84 The available configuration options can be found in 85 + <link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>. 86 ''; 87 }; 88 89 environmentFile = mkOption { 90 type = with types; nullOr path; 91 default = null; 92 + example = "/root/vaultwarden.env"; 93 description = '' 94 Additional environment file as defined in <citerefentry> 95 <refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum> ··· 99 may be passed to the service without adding them to the world-readable Nix store. 100 101 Note that this file needs to be available on the host on which 102 + <literal>vaultwarden</literal> is running. 103 ''; 104 }; 105 }; ··· 110 message = "Backups for database backends other than sqlite will need customization"; 111 } ]; 112 113 + users.users.vaultwarden = { 114 inherit group; 115 isSystemUser = true; 116 }; 117 + users.groups.vaultwarden = { }; 118 119 + systemd.services.vaultwarden = { 120 + aliases = [ "bitwarden_rs" ]; 121 after = [ "network.target" ]; 122 path = with pkgs; [ openssl ]; 123 serviceConfig = { 124 User = user; 125 Group = group; 126 EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile; 127 + ExecStart = "${vaultwarden}/bin/vaultwarden"; 128 LimitNOFILE = "1048576"; 129 PrivateTmp = "true"; 130 PrivateDevices = "true"; ··· 136 wantedBy = [ "multi-user.target" ]; 137 }; 138 139 + systemd.services.backup-vaultwarden = mkIf (cfg.backupDir != null) { 140 + aliases = [ "backup-bitwarden_rs" ]; 141 + description = "Backup vaultwarden"; 142 environment = { 143 DATA_FOLDER = "/var/lib/bitwarden_rs"; 144 BACKUP_FOLDER = cfg.backupDir; 145 }; 146 path = with pkgs; [ sqlite ]; 147 serviceConfig = { 148 + SyslogIdentifier = "backup-vaultwarden"; 149 Type = "oneshot"; 150 User = mkDefault user; 151 Group = mkDefault group; ··· 154 wantedBy = [ "multi-user.target" ]; 155 }; 156 157 + systemd.timers.backup-vaultwarden = mkIf (cfg.backupDir != null) { 158 + aliases = [ "backup-bitwarden_rs" ]; 159 + description = "Backup vaultwarden on time"; 160 timerConfig = { 161 OnCalendar = mkDefault "23:00"; 162 Persistent = "true"; 163 + Unit = "backup-vaultwarden.service"; 164 }; 165 wantedBy = [ "multi-user.target" ]; 166 };
+2 -1
nixos/tests/all-tests.nix
··· 42 bind = handleTest ./bind.nix {}; 43 bitcoind = handleTest ./bitcoind.nix {}; 44 bittorrent = handleTest ./bittorrent.nix {}; 45 - bitwarden = handleTest ./bitwarden.nix {}; 46 blockbook-frontend = handleTest ./blockbook-frontend.nix {}; 47 boot = handleTestOn ["x86_64-linux"] ./boot.nix {}; # syslinux is unsupported on aarch64 48 boot-stage1 = handleTest ./boot-stage1.nix {}; ··· 88 containers-tmpfs = handleTest ./containers-tmpfs.nix {}; 89 convos = handleTest ./convos.nix {}; 90 corerad = handleTest ./corerad.nix {}; 91 couchdb = handleTest ./couchdb.nix {}; 92 cri-o = handleTestOn ["x86_64-linux"] ./cri-o.nix {}; 93 custom-ca = handleTest ./custom-ca.nix {}; ··· 446 v2ray = handleTest ./v2ray.nix {}; 447 vault = handleTest ./vault.nix {}; 448 vault-postgresql = handleTest ./vault-postgresql.nix {}; 449 vector = handleTest ./vector.nix {}; 450 victoriametrics = handleTest ./victoriametrics.nix {}; 451 virtualbox = handleTestOn ["x86_64-linux"] ./virtualbox.nix {};
··· 42 bind = handleTest ./bind.nix {}; 43 bitcoind = handleTest ./bitcoind.nix {}; 44 bittorrent = handleTest ./bittorrent.nix {}; 45 blockbook-frontend = handleTest ./blockbook-frontend.nix {}; 46 boot = handleTestOn ["x86_64-linux"] ./boot.nix {}; # syslinux is unsupported on aarch64 47 boot-stage1 = handleTest ./boot-stage1.nix {}; ··· 87 containers-tmpfs = handleTest ./containers-tmpfs.nix {}; 88 convos = handleTest ./convos.nix {}; 89 corerad = handleTest ./corerad.nix {}; 90 + coturn = handleTest ./coturn.nix {}; 91 couchdb = handleTest ./couchdb.nix {}; 92 cri-o = handleTestOn ["x86_64-linux"] ./cri-o.nix {}; 93 custom-ca = handleTest ./custom-ca.nix {}; ··· 446 v2ray = handleTest ./v2ray.nix {}; 447 vault = handleTest ./vault.nix {}; 448 vault-postgresql = handleTest ./vault-postgresql.nix {}; 449 + vaultwarden = handleTest ./vaultwarden.nix {}; 450 vector = handleTest ./vector.nix {}; 451 victoriametrics = handleTest ./victoriametrics.nix {}; 452 virtualbox = handleTestOn ["x86_64-linux"] ./virtualbox.nix {};
+10 -10
nixos/tests/bitwarden.nix nixos/tests/vaultwarden.nix
··· 4 }: 5 6 # These tests will: 7 - # * Set up a bitwarden-rs server 8 # * Have Firefox use the web vault to create an account, log in, and save a password to the valut 9 # * Have the bw cli log in and read that password from the vault 10 # ··· 24 25 storedPassword = "seeeecret"; 26 27 - makeBitwardenTest = backend: makeTest { 28 - name = "bitwarden_rs-${backend}"; 29 meta = { 30 maintainers = with pkgs.lib.maintainers; [ jjjollyjim ]; 31 }; ··· 45 package = pkgs.mariadb; 46 }; 47 48 - services.bitwarden_rs.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 49 50 - systemd.services.bitwarden_rs.after = [ "mysql.service" ]; 51 }; 52 53 postgresql = { ··· 60 ''; 61 }; 62 63 - services.bitwarden_rs.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 64 65 - systemd.services.bitwarden_rs.after = [ "postgresql.service" ]; 66 }; 67 68 sqlite = { }; ··· 71 mkMerge [ 72 backendConfig.${backend} 73 { 74 - services.bitwarden_rs = { 75 enable = true; 76 dbBackend = backend; 77 config.rocketPort = 80; ··· 152 153 testScript = '' 154 start_all() 155 - server.wait_for_unit("bitwarden_rs.service") 156 server.wait_for_open_port(80) 157 158 with subtest("configure the cli"): ··· 184 in 185 builtins.listToAttrs ( 186 map 187 - (backend: { name = backend; value = makeBitwardenTest backend; }) 188 backends 189 )
··· 4 }: 5 6 # These tests will: 7 + # * Set up a vaultwarden server 8 # * Have Firefox use the web vault to create an account, log in, and save a password to the valut 9 # * Have the bw cli log in and read that password from the vault 10 # ··· 24 25 storedPassword = "seeeecret"; 26 27 + makeVaultwardenTest = backend: makeTest { 28 + name = "vaultwarden-${backend}"; 29 meta = { 30 maintainers = with pkgs.lib.maintainers; [ jjjollyjim ]; 31 }; ··· 45 package = pkgs.mariadb; 46 }; 47 48 + services.vaultwarden.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 49 50 + systemd.services.vaultwarden.after = [ "mysql.service" ]; 51 }; 52 53 postgresql = { ··· 60 ''; 61 }; 62 63 + services.vaultwarden.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 64 65 + systemd.services.vaultwarden.after = [ "postgresql.service" ]; 66 }; 67 68 sqlite = { }; ··· 71 mkMerge [ 72 backendConfig.${backend} 73 { 74 + services.vaultwarden = { 75 enable = true; 76 dbBackend = backend; 77 config.rocketPort = 80; ··· 152 153 testScript = '' 154 start_all() 155 + server.wait_for_unit("vaultwarden.service") 156 server.wait_for_open_port(80) 157 158 with subtest("configure the cli"): ··· 184 in 185 builtins.listToAttrs ( 186 map 187 + (backend: { name = backend; value = makeVaultwardenTest backend; }) 188 backends 189 )
+29
nixos/tests/coturn.nix
···
··· 1 + import ./make-test-python.nix ({ ... }: { 2 + name = "coturn"; 3 + nodes = { 4 + default = { 5 + services.coturn.enable = true; 6 + }; 7 + secretsfile = { 8 + boot.postBootCommands = '' 9 + echo "some-very-secret-string" > /run/coturn-secret 10 + ''; 11 + services.coturn = { 12 + enable = true; 13 + static-auth-secret-file = "/run/coturn-secret"; 14 + }; 15 + }; 16 + }; 17 + 18 + testScript = 19 + '' 20 + start_all() 21 + 22 + with subtest("by default works without configuration"): 23 + default.wait_for_unit("coturn.service") 24 + 25 + with subtest("works with static-auth-secret-file"): 26 + secretsfile.wait_for_unit("coturn.service") 27 + secretsfile.succeed("grep 'some-very-secret-string' /run/coturn/turnserver.cfg") 28 + ''; 29 + })
+1 -1
pkgs/applications/graphics/drawio/default.nix
··· 91 homepage = "https://about.draw.io/"; 92 license = licenses.asl20; 93 changelog = "https://github.com/jgraph/drawio-desktop/releases/tag/v${version}"; 94 - maintainers = with maintainers; [ danieldk ]; 95 platforms = [ "x86_64-linux" ]; 96 }; 97 }
··· 91 homepage = "https://about.draw.io/"; 92 license = licenses.asl20; 93 changelog = "https://github.com/jgraph/drawio-desktop/releases/tag/v${version}"; 94 + maintainers = with maintainers; [ ]; 95 platforms = [ "x86_64-linux" ]; 96 }; 97 }
+1 -1
pkgs/applications/misc/1password-gui/default.nix
··· 107 description = "Multi-platform password manager"; 108 homepage = "https://1password.com/"; 109 license = licenses.unfree; 110 - maintainers = with maintainers; [ danieldk timstott savannidgerinel ]; 111 platforms = [ "x86_64-linux" ]; 112 }; 113 }
··· 107 description = "Multi-platform password manager"; 108 homepage = "https://1password.com/"; 109 license = licenses.unfree; 110 + maintainers = with maintainers; [ timstott savannidgerinel ]; 111 platforms = [ "x86_64-linux" ]; 112 }; 113 }
+36
pkgs/applications/misc/otpclient/default.nix
···
··· 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , cmake 5 + , pkg-config 6 + , gtk3 7 + , wrapGAppsHook 8 + , jansson 9 + , libgcrypt 10 + , libzip 11 + , libpng 12 + , libcotp 13 + , zbar 14 + }: 15 + 16 + stdenv.mkDerivation rec { 17 + pname = "otpclient"; 18 + version = "2.4.4"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "paolostivanin"; 22 + repo = pname; 23 + rev = "v${version}"; 24 + sha256 = "0zjvhcx9q8nsf97zikddxriky0kghi4j4i7312s94pl8c7kb4abr"; 25 + }; 26 + 27 + buildInputs = [ gtk3 jansson libgcrypt libzip libpng libcotp zbar ]; 28 + nativeBuildInputs = [ cmake pkg-config wrapGAppsHook ]; 29 + 30 + meta = with lib; { 31 + description = "Highly secure and easy to use OTP client written in C/GTK that supports both TOTP and HOTP"; 32 + homepage = "https://github.com/paolostivanin/OTPClient"; 33 + license = licenses.gpl3Only; 34 + maintainers = with maintainers; [ alexbakker ]; 35 + }; 36 + }
+1 -1
pkgs/applications/networking/browsers/chromium/browser.nix
··· 62 -e '/\[Desktop Entry\]/a\' \ 63 -e 'StartupWMClass=chromium-browser' \ 64 $out/share/applications/chromium-browser.desktop 65 - '' + lib.optionalString (channel == "dev") '' 66 cp -v "$buildPath/crashpad_handler" "$libExecPath/" 67 ''; 68
··· 62 -e '/\[Desktop Entry\]/a\' \ 63 -e 'StartupWMClass=chromium-browser' \ 64 $out/share/applications/chromium-browser.desktop 65 + '' + lib.optionalString (channel != "stable") '' 66 cp -v "$buildPath/crashpad_handler" "$libExecPath/" 67 ''; 68
+3 -3
pkgs/applications/networking/dnscontrol/default.nix
··· 2 3 buildGoModule rec { 4 pname = "dnscontrol"; 5 - version = "3.10.0"; 6 7 src = fetchFromGitHub { 8 owner = "StackExchange"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-22wYc6W4a5P9+JW7NW+s85IlQ+tfLhYzDarN6PGkFk4="; 12 }; 13 14 - vendorSha256 = "sha256-TPvO/E/uOyVSMNRQ3zzt15+i0UK0uHvI4qM5PqmHY20="; 15 16 subPackages = [ "." ]; 17
··· 2 3 buildGoModule rec { 4 pname = "dnscontrol"; 5 + version = "3.10.1"; 6 7 src = fetchFromGitHub { 8 owner = "StackExchange"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-fYQqH/J027XJPML/qKMpuu2Nxuvb0cyjOu2czLH8SoM="; 12 }; 13 14 + vendorSha256 = "sha256-225TR9jTZSGEJZz3csl/pR/v2unUK67l08x5ESQTJzA="; 15 16 subPackages = [ "." ]; 17
+1 -1
pkgs/applications/office/softmaker/generic.nix
··· 123 description = "An office suite with a word processor, spreadsheet and presentation program"; 124 homepage = "https://www.softmaker.com/"; 125 license = licenses.unfree; 126 - maintainers = with maintainers; [ danieldk ]; 127 platforms = [ "x86_64-linux" ]; 128 }; 129 }
··· 123 description = "An office suite with a word processor, spreadsheet and presentation program"; 124 homepage = "https://www.softmaker.com/"; 125 license = licenses.unfree; 126 + maintainers = with maintainers; [ ]; 127 platforms = [ "x86_64-linux" ]; 128 }; 129 }
+2 -2
pkgs/applications/office/super-productivity/default.nix
··· 5 in 6 stdenv.mkDerivation rec { 7 pname = "super-productivity"; 8 - version = "6.5.2"; 9 10 src = fetchurl { 11 url = "https://github.com/johannesjo/super-productivity/releases/download/v${version}/superProductivity-${version}.AppImage"; 12 - sha256 = "1ivl7chsv9axgk6nqkf580pav651hchi3di0mrp0pylpsqgk6f1f"; 13 name = "${pname}-${version}.AppImage"; 14 }; 15
··· 5 in 6 stdenv.mkDerivation rec { 7 pname = "super-productivity"; 8 + version = "7.2.1"; 9 10 src = fetchurl { 11 url = "https://github.com/johannesjo/super-productivity/releases/download/v${version}/superProductivity-${version}.AppImage"; 12 + sha256 = "93eeb56fe923c48a9384cde0633e98a9d9dc5c0869fce63b9724ff74bb400049"; 13 name = "${pname}-${version}.AppImage"; 14 }; 15
+3 -3
pkgs/applications/system/glances/default.nix
··· 9 10 buildPythonApplication rec { 11 pname = "glances"; 12 - version = "3.1.7"; 13 disabled = isPyPy; 14 15 src = fetchFromGitHub { 16 owner = "nicolargo"; 17 repo = "glances"; 18 rev = "v${version}"; 19 - sha256 = "sha256-82ZD32dqRYGbGM/uyaJ5VqVZbhDZthiEcTihkV43JOU="; 20 }; 21 22 # Some tests fail in the sandbox (they e.g. require access to /sys/class/power_supply): ··· 48 meta = with lib; { 49 homepage = "https://nicolargo.github.io/glances/"; 50 description = "Cross-platform curses-based monitoring tool"; 51 - changelog = "https://github.com/nicolargo/glances/releases/tag/v${version}"; 52 license = licenses.lgpl3Only; 53 maintainers = with maintainers; [ jonringer primeos koral ]; 54 };
··· 9 10 buildPythonApplication rec { 11 pname = "glances"; 12 + version = "3.2.0"; 13 disabled = isPyPy; 14 15 src = fetchFromGitHub { 16 owner = "nicolargo"; 17 repo = "glances"; 18 rev = "v${version}"; 19 + sha256 = "126xpx8i85giy3hkhqh0qcln9i1qj5bfciaqh9486rkl54xm8zsr"; 20 }; 21 22 # Some tests fail in the sandbox (they e.g. require access to /sys/class/power_supply): ··· 48 meta = with lib; { 49 homepage = "https://nicolargo.github.io/glances/"; 50 description = "Cross-platform curses-based monitoring tool"; 51 + changelog = "https://github.com/nicolargo/glances/blob/v${version}/NEWS.rst"; 52 license = licenses.lgpl3Only; 53 maintainers = with maintainers; [ jonringer primeos koral ]; 54 };
+1 -1
pkgs/applications/video/makemkv/default.nix
··· 72 license = licenses.unfree; 73 homepage = "http://makemkv.com"; 74 platforms = [ "x86_64-linux" ]; 75 - maintainers = with maintainers; [ danieldk titanous ]; 76 }; 77 }
··· 72 license = licenses.unfree; 73 homepage = "http://makemkv.com"; 74 platforms = [ "x86_64-linux" ]; 75 + maintainers = with maintainers; [ titanous ]; 76 }; 77 }
+2 -2
pkgs/applications/window-managers/sway/idle.nix
··· 1 { lib, stdenv, fetchFromGitHub 2 - , meson, ninja, pkg-config, scdoc 3 , wayland, wayland-protocols, systemd 4 }: 5 ··· 19 --replace "version: '1.5'" "version: '${version}'" 20 ''; 21 22 - nativeBuildInputs = [ meson ninja pkg-config scdoc ]; 23 buildInputs = [ wayland wayland-protocols systemd ]; 24 25 mesonFlags = [ "-Dman-pages=enabled" "-Dlogind=enabled" ];
··· 1 { lib, stdenv, fetchFromGitHub 2 + , meson, ninja, pkg-config, scdoc, wayland-scanner 3 , wayland, wayland-protocols, systemd 4 }: 5 ··· 19 --replace "version: '1.5'" "version: '${version}'" 20 ''; 21 22 + nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-scanner ]; 23 buildInputs = [ wayland wayland-protocols systemd ]; 24 25 mesonFlags = [ "-Dman-pages=enabled" "-Dlogind=enabled" ];
+2 -2
pkgs/applications/window-managers/sway/lock.nix
··· 1 { lib, stdenv, fetchFromGitHub 2 - , meson, ninja, pkg-config, scdoc 3 , wayland, wayland-protocols, libxkbcommon, cairo, gdk-pixbuf, pam 4 }: 5 ··· 19 --replace "version: '1.4'" "version: '${version}'" 20 ''; 21 22 - nativeBuildInputs = [ meson ninja pkg-config scdoc ]; 23 buildInputs = [ wayland wayland-protocols libxkbcommon cairo gdk-pixbuf pam ]; 24 25 mesonFlags = [
··· 1 { lib, stdenv, fetchFromGitHub 2 + , meson, ninja, pkg-config, scdoc, wayland-scanner 3 , wayland, wayland-protocols, libxkbcommon, cairo, gdk-pixbuf, pam 4 }: 5 ··· 19 --replace "version: '1.4'" "version: '${version}'" 20 ''; 21 22 + nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-scanner ]; 23 buildInputs = [ wayland wayland-protocols libxkbcommon cairo gdk-pixbuf pam ]; 24 25 mesonFlags = [
+2 -1
pkgs/build-support/docker/default.nix
··· 117 --tmpdir=$TMPDIR \ 118 --override-os ${os} \ 119 --override-arch ${arch} \ 120 - copy "$sourceURL" "docker-archive://$out:$destNameTag" 121 ''; 122 123 # We need to sum layer.tar, not a directory, hence tarsum instead of nix-hash.
··· 117 --tmpdir=$TMPDIR \ 118 --override-os ${os} \ 119 --override-arch ${arch} \ 120 + copy "$sourceURL" "docker-archive://$out:$destNameTag" \ 121 + | cat # pipe through cat to force-disable progress bar 122 ''; 123 124 # We need to sum layer.tar, not a directory, hence tarsum instead of nix-hash.
+1 -1
pkgs/data/misc/fedora-backgrounds/generic.nix
··· 38 description = "A set of default and supplemental wallpapers for Fedora"; 39 license = licenses.cc-by-sa-40; 40 platforms = platforms.unix; 41 - maintainers = with maintainers; [ danieldk ]; 42 }; 43 }
··· 38 description = "A set of default and supplemental wallpapers for Fedora"; 39 license = licenses.cc-by-sa-40; 40 platforms = platforms.unix; 41 + maintainers = with maintainers; [ ]; 42 }; 43 }
+1 -1
pkgs/development/compilers/llvm/rocm/clang.nix
··· 65 description = "ROCm fork of the clang C/C++/Objective-C/Objective-C++ LLVM compiler frontend"; 66 homepage = "https://llvm.org/"; 67 license = with licenses; [ ncsa ]; 68 - maintainers = with maintainers; [ danieldk ]; 69 platforms = platforms.linux; 70 }; 71 }
··· 65 description = "ROCm fork of the clang C/C++/Objective-C/Objective-C++ LLVM compiler frontend"; 66 homepage = "https://llvm.org/"; 67 license = with licenses; [ ncsa ]; 68 + maintainers = with maintainers; [ ]; 69 platforms = platforms.linux; 70 }; 71 }
+1 -1
pkgs/development/compilers/llvm/rocm/lld/default.nix
··· 39 description = "ROCm fork of the LLVM Linker"; 40 homepage = "https://github.com/RadeonOpenCompute/llvm-project"; 41 license = licenses.ncsa; 42 - maintainers = with maintainers; [ danieldk ]; 43 platforms = platforms.linux; 44 }; 45 }
··· 39 description = "ROCm fork of the LLVM Linker"; 40 homepage = "https://github.com/RadeonOpenCompute/llvm-project"; 41 license = licenses.ncsa; 42 + maintainers = with maintainers; [ ]; 43 platforms = platforms.linux; 44 }; 45 }
+1 -1
pkgs/development/compilers/llvm/rocm/llvm/default.nix
··· 91 description = "ROCm fork of the LLVM compiler infrastructure"; 92 homepage = "https://github.com/RadeonOpenCompute/llvm-project"; 93 license = with licenses; [ ncsa ]; 94 - maintainers = with maintainers; [ danieldk ]; 95 platforms = platforms.linux; 96 }; 97 }
··· 91 description = "ROCm fork of the LLVM compiler infrastructure"; 92 homepage = "https://github.com/RadeonOpenCompute/llvm-project"; 93 license = with licenses; [ ncsa ]; 94 + maintainers = with maintainers; [ ]; 95 platforms = platforms.linux; 96 }; 97 }
+2
pkgs/development/haskell-modules/generic-builder.nix
··· 53 , enableParallelBuilding ? true 54 , maintainers ? null 55 , changelog ? null 56 , doCoverage ? false 57 , doHaddock ? !(ghc.isHaLVM or false) 58 , passthru ? {} ··· 666 // optionalAttrs (args ? hydraPlatforms) { inherit hydraPlatforms; } 667 // optionalAttrs (args ? badPlatforms) { inherit badPlatforms; } 668 // optionalAttrs (args ? changelog) { inherit changelog; } 669 ; 670 671 }
··· 53 , enableParallelBuilding ? true 54 , maintainers ? null 55 , changelog ? null 56 + , mainProgram ? null 57 , doCoverage ? false 58 , doHaddock ? !(ghc.isHaLVM or false) 59 , passthru ? {} ··· 667 // optionalAttrs (args ? hydraPlatforms) { inherit hydraPlatforms; } 668 // optionalAttrs (args ? badPlatforms) { inherit badPlatforms; } 669 // optionalAttrs (args ? changelog) { inherit changelog; } 670 + // optionalAttrs (args ? mainProgram) { inherit mainProgram; } 671 ; 672 673 }
+1 -1
pkgs/development/libraries/amdvlk/default.nix
··· 85 changelog = "https://github.com/GPUOpen-Drivers/AMDVLK/releases/tag/v-${version}"; 86 license = licenses.mit; 87 platforms = [ "x86_64-linux" "i686-linux" ]; 88 - maintainers = with maintainers; [ danieldk Flakebi ]; 89 }; 90 }
··· 85 changelog = "https://github.com/GPUOpen-Drivers/AMDVLK/releases/tag/v-${version}"; 86 license = licenses.mit; 87 platforms = [ "x86_64-linux" "i686-linux" ]; 88 + maintainers = with maintainers; [ Flakebi ]; 89 }; 90 }
+22
pkgs/development/libraries/libbaseencode/default.nix
···
··· 1 + { stdenv, lib, fetchFromGitHub, cmake }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "libbaseencode"; 5 + version = "1.0.11"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "paolostivanin"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1f52yh052z8k90d1ag6nk01p1gf4i1zxp1daw8mashs8avqr2m7g"; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + 16 + meta = with lib; { 17 + description = "Library written in C for encoding and decoding data using base32 or base64 (RFC-4648)"; 18 + homepage = "https://github.com/paolostivanin/libbaseencode"; 19 + license = licenses.asl20; 20 + maintainers = with maintainers; [ alexbakker ]; 21 + }; 22 + }
+23
pkgs/development/libraries/libcotp/default.nix
···
··· 1 + { stdenv, lib, fetchFromGitHub, cmake, pkg-config, libgcrypt, libbaseencode }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "libcotp"; 5 + version = "1.2.3"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "paolostivanin"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1qq4shwiz1if9vys052dnsbm4dfw1ynlj6nsb0v4zjly3ndspfsk"; 12 + }; 13 + 14 + buildInputs = [ libbaseencode libgcrypt ]; 15 + nativeBuildInputs = [ cmake pkg-config ]; 16 + 17 + meta = with lib; { 18 + description = "C library that generates TOTP and HOTP"; 19 + homepage = "https://github.com/paolostivanin/libcotp"; 20 + license = licenses.asl20; 21 + maintainers = with maintainers; [ alexbakker ]; 22 + }; 23 + }
+1 -1
pkgs/development/libraries/rocclr/default.nix
··· 55 description = "Radeon Open Compute common language runtime"; 56 homepage = "https://github.com/ROCm-Developer-Tools/ROCclr"; 57 license = licenses.mit; 58 - maintainers = with maintainers; [ danieldk ]; 59 # rocclr seems to have some AArch64 ifdefs, but does not seem 60 # to be supported yet by the build infrastructure. Recheck in 61 # the future.
··· 55 description = "Radeon Open Compute common language runtime"; 56 homepage = "https://github.com/ROCm-Developer-Tools/ROCclr"; 57 license = licenses.mit; 58 + maintainers = with maintainers; [ ]; 59 # rocclr seems to have some AArch64 ifdefs, but does not seem 60 # to be supported yet by the build infrastructure. Recheck in 61 # the future.
+1 -1
pkgs/development/libraries/rocm-comgr/default.nix
··· 40 description = "APIs for compiling and inspecting AMDGPU code objects"; 41 homepage = "https://github.com/RadeonOpenCompute/ROCm-CompilerSupport/tree/amd-stg-open/lib/comgr"; 42 license = licenses.ncsa; 43 - maintainers = with maintainers; [ danieldk ]; 44 platforms = platforms.linux; 45 }; 46 }
··· 40 description = "APIs for compiling and inspecting AMDGPU code objects"; 41 homepage = "https://github.com/RadeonOpenCompute/ROCm-CompilerSupport/tree/amd-stg-open/lib/comgr"; 42 license = licenses.ncsa; 43 + maintainers = with maintainers; [ ]; 44 platforms = platforms.linux; 45 }; 46 }
+1 -1
pkgs/development/libraries/rocm-device-libs/default.nix
··· 34 description = "Set of AMD-specific device-side language runtime libraries"; 35 homepage = "https://github.com/RadeonOpenCompute/ROCm-Device-Libs"; 36 license = licenses.ncsa; 37 - maintainers = with maintainers; [ danieldk ]; 38 platforms = platforms.linux; 39 }; 40 }
··· 34 description = "Set of AMD-specific device-side language runtime libraries"; 35 homepage = "https://github.com/RadeonOpenCompute/ROCm-Device-Libs"; 36 license = licenses.ncsa; 37 + maintainers = with maintainers; [ ]; 38 platforms = platforms.linux; 39 }; 40 }
+1 -1
pkgs/development/libraries/rocm-opencl-icd/default.nix
··· 14 meta = with lib; { 15 description = "OpenCL ICD definition for AMD GPUs using the ROCm stack"; 16 license = licenses.mit; 17 - maintainers = with maintainers; [ danieldk ]; 18 platforms = platforms.linux; 19 }; 20 }
··· 14 meta = with lib; { 15 description = "OpenCL ICD definition for AMD GPUs using the ROCm stack"; 16 license = licenses.mit; 17 + maintainers = with maintainers; [ ]; 18 platforms = platforms.linux; 19 }; 20 }
+1 -1
pkgs/development/libraries/rocm-opencl-runtime/default.nix
··· 77 description = "OpenCL runtime for AMD GPUs, part of the ROCm stack"; 78 homepage = "https://github.com/RadeonOpenCompute/ROCm-OpenCL-Runtime"; 79 license = with licenses; [ asl20 mit ]; 80 - maintainers = with maintainers; [ danieldk ]; 81 platforms = platforms.linux; 82 }; 83 }
··· 77 description = "OpenCL runtime for AMD GPUs, part of the ROCm stack"; 78 homepage = "https://github.com/RadeonOpenCompute/ROCm-OpenCL-Runtime"; 79 license = with licenses; [ asl20 mit ]; 80 + maintainers = with maintainers; [ ]; 81 platforms = platforms.linux; 82 }; 83 }
+1 -1
pkgs/development/libraries/rocm-runtime/default.nix
··· 43 description = "Platform runtime for ROCm"; 44 homepage = "https://github.com/RadeonOpenCompute/ROCR-Runtime"; 45 license = with licenses; [ ncsa ]; 46 - maintainers = with maintainers; [ danieldk ]; 47 }; 48 }
··· 43 description = "Platform runtime for ROCm"; 44 homepage = "https://github.com/RadeonOpenCompute/ROCR-Runtime"; 45 license = with licenses; [ ncsa ]; 46 + maintainers = with maintainers; [ ]; 47 }; 48 }
+1 -1
pkgs/development/libraries/rocm-thunk/default.nix
··· 32 description = "Radeon open compute thunk interface"; 33 homepage = "https://github.com/RadeonOpenCompute/ROCT-Thunk-Interface"; 34 license = with licenses; [ bsd2 mit ]; 35 - maintainers = with maintainers; [ danieldk ]; 36 }; 37 }
··· 32 description = "Radeon open compute thunk interface"; 33 homepage = "https://github.com/RadeonOpenCompute/ROCT-Thunk-Interface"; 34 license = with licenses; [ bsd2 mit ]; 35 + maintainers = with maintainers; [ ]; 36 }; 37 }
-52
pkgs/development/python-modules/dftfit/default.nix
··· 1 - { lib 2 - , fetchPypi 3 - , buildPythonPackage 4 - , pymatgen 5 - , marshmallow 6 - , pyyaml 7 - , pygmo 8 - , pandas 9 - , scipy 10 - , numpy 11 - , scikit-learn 12 - , lammps-cython 13 - , pymatgen-lammps 14 - , pytestrunner 15 - , isPy3k 16 - }: 17 - 18 - buildPythonPackage rec { 19 - pname = "dftfit"; 20 - version = "0.5.1"; 21 - disabled = (!isPy3k); 22 - 23 - src = fetchPypi { 24 - inherit pname version; 25 - sha256 = "4dcbde48948835dcf2d49d6628c9df5747a8ec505d517e374b8d6c7fe95892df"; 26 - }; 27 - 28 - buildInputs = [ pytestrunner ]; 29 - propagatedBuildInputs = [ 30 - pymatgen 31 - marshmallow 32 - pyyaml 33 - pygmo 34 - pandas 35 - scipy 36 - numpy 37 - scikit-learn 38 - lammps-cython 39 - pymatgen-lammps 40 - ]; 41 - 42 - # tests require git lfs download. and is quite large so skip tests 43 - doCheck = false; 44 - pythonImportsCheck = [ "dftfit" ]; 45 - 46 - meta = { 47 - description = "Ab-Initio Molecular Dynamics Potential Development"; 48 - homepage = "https://gitlab.com/costrouc/dftfit"; 49 - license = lib.licenses.mit; 50 - maintainers = with lib.maintainers; [ costrouc ]; 51 - }; 52 - }
···
+2 -2
pkgs/development/python-modules/enaml/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "enaml"; 15 - version = "0.11.2"; 16 17 src = fetchFromGitHub { 18 owner = "nucleic"; 19 repo = pname; 20 rev = version; 21 - sha256 = "1in5qa5j96qs3gsv8yaxs1l6dbm69xhzvc0pbzg0dd9kpqxfdy1j"; 22 }; 23 24 # qt bindings cannot be found during tests
··· 12 13 buildPythonPackage rec { 14 pname = "enaml"; 15 + version = "0.13.0"; 16 17 src = fetchFromGitHub { 18 owner = "nucleic"; 19 repo = pname; 20 rev = version; 21 + sha256 = "sha256-8ZahvFDYW7xUTSTZP1UXnQBCg9RVUywoO7EbqtTQPJI="; 22 }; 23 24 # qt bindings cannot be found during tests
-53
pkgs/development/python-modules/lammps-cython/default.nix
··· 1 - { lib 2 - , fetchurl 3 - , buildPythonPackage 4 - , lammps-mpi 5 - , mpi 6 - , mpi4py 7 - , numpy 8 - , cython 9 - , pymatgen 10 - , ase 11 - , pytestrunner 12 - , isPy3k 13 - }: 14 - 15 - buildPythonPackage rec { 16 - pname = "lammps-cython"; 17 - version = "0.5.7"; 18 - disabled = (!isPy3k); 19 - 20 - src = fetchurl { 21 - url = "https://gitlab.com/costrouc/${pname}/-/archive/v${version}/${pname}-v${version}.tar.gz"; 22 - sha256 = "1wj9scmjdl00af13b5ihfccrjpikrdgkzd88ialam1nkxvxi42bl"; 23 - }; 24 - 25 - buildInputs = [ cython pytestrunner ]; 26 - propagatedBuildInputs = [ mpi4py pymatgen ase numpy ]; 27 - 28 - preBuild = '' 29 - echo "Creating lammps.cfg file..." 30 - cat << EOF > lammps.cfg 31 - [lammps] 32 - lammps_include_dir = ${lammps-mpi}/include 33 - lammps_library_dir = ${lammps-mpi}/lib 34 - lammps_library = lammps_mpi 35 - 36 - [mpi] 37 - mpi_include_dir = ${mpi}/include 38 - mpi_library_dir = ${mpi}/lib 39 - mpi_library = mpi 40 - EOF 41 - ''; 42 - 43 - pythonImportsCheck = [ "lammps" ]; 44 - 45 - meta = { 46 - description = "Pythonic Wrapper to LAMMPS using cython"; 47 - homepage = "https://gitlab.com/costrouc/lammps-cython"; 48 - license = lib.licenses.mit; 49 - maintainers = with lib.maintainers; [ costrouc ]; 50 - # fails import check 51 - broken = true; 52 - }; 53 - }
···
+1 -1
pkgs/development/python-modules/selenium/default.nix
··· 49 ''; 50 51 passthru.tests = { 52 - testing-bitwarden = nixosTests.bitwarden; 53 }; 54 55 meta = with lib; {
··· 49 ''; 50 51 passthru.tests = { 52 + testing-vaultwarden = nixosTests.vaultwarden; 53 }; 54 55 meta = with lib; {
+2 -2
pkgs/development/python-modules/zha-quirks/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "zha-quirks"; 12 - version = "0.0.57"; 13 14 src = fetchFromGitHub { 15 owner = "zigpy"; 16 repo = "zha-device-handlers"; 17 rev = version; 18 - sha256 = "sha256-ajdluj6UIzjJUK30GtoM+e5lsMQRKnn3FPNEg+RS/DM="; 19 }; 20 21 propagatedBuildInputs = [
··· 9 10 buildPythonPackage rec { 11 pname = "zha-quirks"; 12 + version = "0.0.58"; 13 14 src = fetchFromGitHub { 15 owner = "zigpy"; 16 repo = "zha-device-handlers"; 17 rev = version; 18 + sha256 = "sha256-QU5ssbnT3/gioQ3vM9zvlbwxqSWyKIylsV9NuFkNe+Q="; 19 }; 20 21 propagatedBuildInputs = [
+1 -1
pkgs/development/tools/build-managers/rocm-cmake/default.nix
··· 17 description = "CMake modules for common build tasks for the ROCm stack"; 18 homepage = "https://github.com/RadeonOpenCompute/rocm-cmake"; 19 license = licenses.mit; 20 - maintainers = with maintainers; [ danieldk ]; 21 platforms = platforms.unix; 22 }; 23 }
··· 17 description = "CMake modules for common build tasks for the ROCm stack"; 18 homepage = "https://github.com/RadeonOpenCompute/rocm-cmake"; 19 license = licenses.mit; 20 + maintainers = with maintainers; [ ]; 21 platforms = platforms.unix; 22 }; 23 }
+2 -5
pkgs/development/tools/open-policy-agent/default.nix
··· 2 3 buildGoModule rec { 4 pname = "open-policy-agent"; 5 - version = "0.29.4"; 6 7 src = fetchFromGitHub { 8 owner = "open-policy-agent"; ··· 10 rev = "v${version}"; 11 sha256 = "sha256-AjNr+t30ftF92+cEfvt8iHBDVD/SO52ojJRLAkYF9l4="; 12 }; 13 - 14 vendorSha256 = null; 15 16 subPackages = [ "." ]; 17 18 - preBuild = '' 19 - buildFlagsArray+=("-ldflags" "-s -w -X github.com/open-policy-agent/opa/version.Version=${version}") 20 - ''; 21 22 doInstallCheck = true; 23 installCheckPhase = ''
··· 2 3 buildGoModule rec { 4 pname = "open-policy-agent"; 5 + version = "0.30.0"; 6 7 src = fetchFromGitHub { 8 owner = "open-policy-agent"; ··· 10 rev = "v${version}"; 11 sha256 = "sha256-AjNr+t30ftF92+cEfvt8iHBDVD/SO52ojJRLAkYF9l4="; 12 }; 13 vendorSha256 = null; 14 15 subPackages = [ "." ]; 16 17 + ldflags = [ "-s" "-w" "-X github.com/open-policy-agent/opa/version.Version=${version}" ]; 18 19 doInstallCheck = true; 20 installCheckPhase = ''
+32
pkgs/development/tools/tapview/default.nix
···
··· 1 + { asciidoctor 2 + , fetchFromGitLab 3 + , lib 4 + , stdenv 5 + }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "tapview"; 9 + version = "1.1"; 10 + 11 + nativeBuildInputs = [ asciidoctor ]; 12 + 13 + src = fetchFromGitLab { 14 + owner = "esr"; 15 + repo = pname; 16 + rev = version; 17 + sha256 = "sha256-inrxICNglZU/tup+YnHaDiVss32K2OXht/7f8lOZI4g="; 18 + }; 19 + 20 + # Remove unecessary `echo` checks: `/bin/echo` fails, and `echo -n` works as expected. 21 + patches = [ ./dont_check_echo.patch ]; 22 + 23 + makeFlags = [ "prefix=$(out)" ]; 24 + 25 + meta = with lib; { 26 + description = "A minimalist pure consumer for TAP (Test Anything Protocol)"; 27 + homepage = "https://gitlab.com/esr/tapview"; 28 + license = licenses.bsd2; 29 + platforms = platforms.all; 30 + maintainers = with maintainers; [ pamplemousse ]; 31 + }; 32 + }
+44
pkgs/development/tools/tapview/dont_check_echo.patch
···
··· 1 + diff --git a/tapview b/tapview 2 + index ad6a33a66d1..4cf9545d42f 100644 3 + --- a/tapview 4 + +++ b/tapview 5 + @@ -13,21 +13,6 @@ 6 + # 7 + # This is version 1.1 8 + # A newer version may be available at https://gitlab.com/esr/tapview 9 + -# 10 + -# POSIX allows but does not mandate that -n suppresses emission of a 11 + -# trailing newline in echo. Thus, some shell builtin echos don't do 12 + -# that. Cope gracefully. 13 + -# shellcheck disable=SC2039 14 + -if [ "$(echo -n "a"; echo "b")" != "ab" ] 15 + -then 16 + - ECHO="echo" 17 + -elif [ "$(/bin/echo -n "a"; /bin/echo "b")" = "ab" ] 18 + -then 19 + - ECHO="/bin/echo" 20 + -else 21 + - echo "tapview: bailing out, your echo lacks -n support." 22 + - exit 3 23 + -fi 24 + 25 + OK="." 26 + FAIL="F" 27 + @@ -37,7 +22,7 @@ TODO_OK="u" 28 + 29 + ship_char() { 30 + # shellcheck disable=SC2039 31 + - "${ECHO}" -n "$1" 32 + + echo -n "$1" 33 + } 34 + 35 + ship_line() { 36 + @@ -155,7 +140,7 @@ do 37 + fi 38 + done 39 + 40 + -/bin/echo "" 41 + +echo "" 42 + 43 + if [ -z "$expect" ] 44 + then
+2 -2
pkgs/os-specific/linux/bpftrace/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "bpftrace"; 9 - version = "0.12.1"; 10 11 src = fetchFromGitHub { 12 owner = "iovisor"; 13 repo = "bpftrace"; 14 rev = "v${version}"; 15 - sha256 = "sha256-DZO47AH506DBVH/AuvOF3JfpRxv/D/lmzVg8WOH9Dqo="; 16 }; 17 18 buildInputs = with llvmPackages;
··· 6 7 stdenv.mkDerivation rec { 8 pname = "bpftrace"; 9 + version = "0.13.0"; 10 11 src = fetchFromGitHub { 12 owner = "iovisor"; 13 repo = "bpftrace"; 14 rev = "v${version}"; 15 + sha256 = "sha256-BKWBdFzj0j7rAfG30A0fwyYCpOG/5NFRPODW46EP1u0="; 16 }; 17 18 buildInputs = with llvmPackages;
+3
pkgs/servers/coturn/default.nix
··· 8 , libprom 9 , libpromhttp 10 , libmicrohttpd 11 }: 12 13 stdenv.mkDerivation rec { ··· 33 patches = [ 34 ./pure-configure.patch 35 ]; 36 37 meta = with lib; { 38 homepage = "https://coturn.net/";
··· 8 , libprom 9 , libpromhttp 10 , libmicrohttpd 11 + , nixosTests 12 }: 13 14 stdenv.mkDerivation rec { ··· 34 patches = [ 35 ./pure-configure.patch 36 ]; 37 + 38 + passthru.tests.coturn = nixosTests.coturn; 39 40 meta = with lib; { 41 homepage = "https://coturn.net/";
+7 -13
pkgs/servers/sip/freeswitch/default.nix
··· 1 - { fetchFromGitHub, fetchpatch, stdenv, lib, pkg-config, autoreconfHook 2 , ncurses, gnutls, readline 3 , openssl, perl, sqlite, libjpeg, speex, pcre, libuuid 4 , ldns, libedit, yasm, which, libsndfile, libtiff ··· 88 89 stdenv.mkDerivation rec { 90 pname = "freeswitch"; 91 - version = "1.10.5"; 92 src = fetchFromGitHub { 93 owner = "signalwire"; 94 repo = pname; 95 rev = "v${version}"; 96 - sha256 = "18dhyb19k28dcm1i8mhqvvgm2phsrmrwyjmfn79glk8pdlalvcha"; 97 }; 98 99 - patches = [ 100 - # https://github.com/signalwire/freeswitch/pull/812 fix mod_spandsp, mod_gsmopen build, drop when updating from 1.10.5 101 - (fetchpatch { 102 - url = "https://github.com/signalwire/freeswitch/commit/51fba83ed3ed2d9753d8e6b13e13001aca50b493.patch"; 103 - sha256 = "0h2bmifsyyasxjka3pczbmqym1chvz91fmb589njrdbwpkjyvqh3"; 104 - }) 105 - ]; 106 postPatch = '' 107 patchShebangs libs/libvpx/build/make/rtcd.pl 108 substituteInPlace libs/libvpx/build/make/configure.sh \ ··· 117 done 118 ''; 119 120 - nativeBuildInputs = [ pkg-config autoreconfHook ]; 121 buildInputs = [ 122 - openssl ncurses gnutls readline perl libjpeg 123 - sqlite pcre speex ldns libedit yasm which 124 libsndfile libtiff 125 libuuid 126 ]
··· 1 + { fetchFromGitHub, stdenv, lib, pkg-config, autoreconfHook 2 , ncurses, gnutls, readline 3 , openssl, perl, sqlite, libjpeg, speex, pcre, libuuid 4 , ldns, libedit, yasm, which, libsndfile, libtiff ··· 88 89 stdenv.mkDerivation rec { 90 pname = "freeswitch"; 91 + version = "1.10.6"; 92 src = fetchFromGitHub { 93 owner = "signalwire"; 94 repo = pname; 95 rev = "v${version}"; 96 + sha256 = "1i5n06pds3kvzhhzfwvhwxnvcb2p2fcr8k52157aplm2i7prl4q2"; 97 }; 98 99 postPatch = '' 100 patchShebangs libs/libvpx/build/make/rtcd.pl 101 substituteInPlace libs/libvpx/build/make/configure.sh \ ··· 110 done 111 ''; 112 113 + strictDeps = true; 114 + nativeBuildInputs = [ pkg-config autoreconfHook perl which yasm ]; 115 buildInputs = [ 116 + openssl ncurses gnutls readline libjpeg 117 + sqlite pcre speex ldns libedit 118 libsndfile libtiff 119 libuuid 120 ]
+2 -2
pkgs/tools/admin/exoscale-cli/default.nix
··· 2 3 buildGoPackage rec { 4 pname = "exoscale-cli"; 5 - version = "1.32.2"; 6 7 src = fetchFromGitHub { 8 owner = "exoscale"; 9 repo = "cli"; 10 rev = "v${version}"; 11 - sha256 = "sha256-Yx+GA959AB6m62hDlZKYjsuT9Y9TJbIdzUVBMM8OgTg="; 12 }; 13 14 goPackagePath = "github.com/exoscale/cli";
··· 2 3 buildGoPackage rec { 4 pname = "exoscale-cli"; 5 + version = "1.34.0"; 6 7 src = fetchFromGitHub { 8 owner = "exoscale"; 9 repo = "cli"; 10 rev = "v${version}"; 11 + sha256 = "sha256-Gu9o1aUDlhcEZPZZsfVF0FnlzT1DvbEXMXjnOxhY8tY="; 12 }; 13 14 goPackagePath = "github.com/exoscale/cli";
+1 -1
pkgs/tools/misc/broot/default.nix
··· 75 meta = with lib; { 76 description = "An interactive tree view, a fuzzy search, a balanced BFS descent and customizable commands"; 77 homepage = "https://dystroy.org/broot/"; 78 - maintainers = with maintainers; [ danieldk ]; 79 license = with licenses; [ mit ]; 80 }; 81 }
··· 75 meta = with lib; { 76 description = "An interactive tree view, a fuzzy search, a balanced BFS descent and customizable commands"; 77 homepage = "https://dystroy.org/broot/"; 78 + maintainers = with maintainers; [ ]; 79 license = with licenses; [ mit ]; 80 }; 81 }
+5 -2
pkgs/tools/misc/mslink/default.nix
··· 1 - { stdenv 2 , lib 3 , fetchurl 4 }: 5 6 - stdenv.mkDerivation rec { 7 pname = "mslink"; 8 version = "1.3"; 9 ··· 17 ''; 18 19 installPhase = '' 20 install -D mslink $out/bin/mslink 21 ''; 22
··· 1 + { gccStdenv 2 , lib 3 , fetchurl 4 }: 5 6 + gccStdenv.mkDerivation rec { 7 pname = "mslink"; 8 version = "1.3"; 9 ··· 17 ''; 18 19 installPhase = '' 20 + if [[ "$(uname)" == "Darwin" ]]; then 21 + mv mslink.exe mslink 22 + fi 23 install -D mslink $out/bin/mslink 24 ''; 25
+8 -7
pkgs/tools/security/bitwarden_rs/default.nix pkgs/tools/security/vaultwarden/default.nix
··· 1 - { lib, stdenv, rustPlatform, fetchFromGitHub, nixosTests 2 , pkg-config, openssl 3 , libiconv, Security, CoreServices 4 , dbBackend ? "sqlite", libmysqlclient, postgresql }: ··· 7 featuresFlag = "--features ${dbBackend}"; 8 9 in rustPlatform.buildRustPackage rec { 10 - pname = "bitwarden_rs"; 11 - version = "1.20.0"; 12 13 src = fetchFromGitHub { 14 owner = "dani-garcia"; 15 repo = pname; 16 rev = version; 17 - sha256 = "1ncy4iwmdzdp8rv1gc5i4s1rp97d94n4l4bh08v6w4zdpx0zn8b9"; 18 }; 19 20 nativeBuildInputs = [ pkg-config ]; 21 buildInputs = with lib; [ openssl ] 22 ++ optionals stdenv.isDarwin [ libiconv Security CoreServices ] ··· 25 26 RUSTC_BOOTSTRAP = 1; 27 28 - cargoSha256 = "0vdi792bzqxj8g215r9r5anzs4qhqsm6sjzwpj1l9861bn7j4xsz"; 29 cargoBuildFlags = [ featuresFlag ]; 30 31 checkPhase = '' ··· 35 runHook postCheck 36 ''; 37 38 - passthru.tests = nixosTests.bitwarden; 39 40 meta = with lib; { 41 description = "Unofficial Bitwarden compatible server written in Rust"; 42 - homepage = "https://github.com/dani-garcia/bitwarden_rs"; 43 license = licenses.gpl3Only; 44 maintainers = with maintainers; [ msteen ]; 45 };
··· 1 + { lib, stdenv, rustPlatform, fetchFromGitHub, fetchurl, nixosTests 2 , pkg-config, openssl 3 , libiconv, Security, CoreServices 4 , dbBackend ? "sqlite", libmysqlclient, postgresql }: ··· 7 featuresFlag = "--features ${dbBackend}"; 8 9 in rustPlatform.buildRustPackage rec { 10 + pname = "vaultwarden"; 11 + version = "1.22.1"; 12 13 src = fetchFromGitHub { 14 owner = "dani-garcia"; 15 repo = pname; 16 rev = version; 17 + sha256 = "sha256-aXbnNO3mTAgE1yNx7YVDo1vPpO8ACZpBGHQ633fNZ3k="; 18 }; 19 20 + cargoSha256 = "sha256-SFzq3OU0a0s3zlEzUkqGdZb/knYafqDamLy4ghH4i8I="; 21 + 22 nativeBuildInputs = [ pkg-config ]; 23 buildInputs = with lib; [ openssl ] 24 ++ optionals stdenv.isDarwin [ libiconv Security CoreServices ] ··· 27 28 RUSTC_BOOTSTRAP = 1; 29 30 cargoBuildFlags = [ featuresFlag ]; 31 32 checkPhase = '' ··· 36 runHook postCheck 37 ''; 38 39 + passthru.tests = nixosTests.vaultwarden; 40 41 meta = with lib; { 42 description = "Unofficial Bitwarden compatible server written in Rust"; 43 + homepage = "https://github.com/dani-garcia/vaultwarden"; 44 license = licenses.gpl3Only; 45 maintainers = with maintainers; [ msteen ]; 46 };
+5 -5
pkgs/tools/security/bitwarden_rs/vault.nix pkgs/tools/security/vaultwarden/vault.nix
··· 1 { lib, stdenv, fetchurl, nixosTests }: 2 3 stdenv.mkDerivation rec { 4 - pname = "bitwarden_rs-vault"; 5 version = "2.19.0"; 6 7 src = fetchurl { ··· 10 }; 11 12 buildCommand = '' 13 - mkdir -p $out/share/bitwarden_rs/ 14 - cd $out/share/bitwarden_rs/ 15 tar xf $src 16 mv web-vault vault 17 ''; 18 19 - passthru.tests = nixosTests.bitwarden; 20 21 meta = with lib; { 22 - description = "Integrates the web vault into bitwarden_rs"; 23 homepage = "https://github.com/dani-garcia/bw_web_builds"; 24 platforms = platforms.all; 25 license = licenses.gpl3Plus;
··· 1 { lib, stdenv, fetchurl, nixosTests }: 2 3 stdenv.mkDerivation rec { 4 + pname = "vaultwarden-vault"; 5 version = "2.19.0"; 6 7 src = fetchurl { ··· 10 }; 11 12 buildCommand = '' 13 + mkdir -p $out/share/vaultwarden/ 14 + cd $out/share/vaultwarden/ 15 tar xf $src 16 mv web-vault vault 17 ''; 18 19 + passthru.tests = nixosTests.vaultwarden; 20 21 meta = with lib; { 22 + description = "Integrates the web vault into vaultwarden"; 23 homepage = "https://github.com/dani-garcia/bw_web_builds"; 24 platforms = platforms.all; 25 license = licenses.gpl3Plus;
+2 -2
pkgs/tools/security/cfssl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "cfssl"; 5 - version = "1.5.0"; 6 7 src = fetchFromGitHub { 8 owner = "cloudflare"; 9 repo = "cfssl"; 10 rev = "v${version}"; 11 - sha256 = "1yzxz2l7h2d3f8j6l9xlm7g9659gsa17zf4q0883s0jh3l3xgs5n"; 12 }; 13 14 subPackages = [
··· 2 3 buildGoModule rec { 4 pname = "cfssl"; 5 + version = "1.6.0"; 6 7 src = fetchFromGitHub { 8 owner = "cloudflare"; 9 repo = "cfssl"; 10 rev = "v${version}"; 11 + sha256 = "sha256-29HEaW5LCoHcuJrfVUN2hnsRtaSTrvIBo8ok2UJbfuQ="; 12 }; 13 14 subPackages = [
+1 -1
pkgs/tools/system/rocm-smi/default.nix
··· 46 description = "System management interface for AMD GPUs supported by ROCm"; 47 homepage = "https://github.com/RadeonOpenCompute/ROC-smi"; 48 license = with licenses; [ mit ]; 49 - maintainers = with maintainers; [ danieldk ]; 50 platforms = [ "x86_64-linux" ]; 51 }; 52 }
··· 46 description = "System management interface for AMD GPUs supported by ROCm"; 47 homepage = "https://github.com/RadeonOpenCompute/ROC-smi"; 48 license = with licenses; [ mit ]; 49 + maintainers = with maintainers; [ ]; 50 platforms = [ "x86_64-linux" ]; 51 }; 52 }
+1 -1
pkgs/tools/text/hottext/default.nix
··· 67 68 nimFlags = [ "-d:release" ] ++ map (lib: "--path:${lib}/src") nimLibs; 69 70 - HOTTEXT_FONT_PATH = "${gentium}/share/fonts/truetype/GentiumPlus-R.ttf"; 71 72 buildPhase = '' 73 runHook preBuild
··· 67 68 nimFlags = [ "-d:release" ] ++ map (lib: "--path:${lib}/src") nimLibs; 69 70 + HOTTEXT_FONT_PATH = "${gentium}/share/fonts/truetype/GentiumPlus-Regular.ttf"; 71 72 buildPhase = '' 73 runHook preBuild
+2 -2
pkgs/tools/text/languagetool/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "LanguageTool"; 5 - version = "5.3"; 6 7 src = fetchzip { 8 url = "https://www.languagetool.org/download/${pname}-${version}.zip"; 9 - sha256 = "1km20ajqb65vkhkrf94zy5srcss66ix8padp7ng59pa8pj11wmi2"; 10 }; 11 nativeBuildInputs = [ makeWrapper ]; 12 buildInputs = [ jre ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "LanguageTool"; 5 + version = "5.4"; 6 7 src = fetchzip { 8 url = "https://www.languagetool.org/download/${pname}-${version}.zip"; 9 + sha256 = "sha256-2khadADfzwkW+J0uafPWJ6xUQRSQDm8seiBHueQGmKI="; 10 }; 11 nativeBuildInputs = [ makeWrapper ]; 12 buildInputs = [ jre ];
+37
pkgs/tools/wayland/wayland-proxy-virtwl/default.nix
···
··· 1 + { lib 2 + , fetchFromGitHub 3 + , ocamlPackages 4 + }: 5 + 6 + ocamlPackages.buildDunePackage rec { 7 + pname = "wayland-proxy-virtwl"; 8 + version = "unstable-2021-04-15"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "talex5"; 12 + repo = pname; 13 + rev = "09321a28f3d4c0fa7e41ebb3014106b62090b649"; 14 + sha256 = "03rc2jp5d2y9y7mfis6kk9gchd49gvq0jg6fq5gi9r21ckb4k5v4"; 15 + }; 16 + 17 + postPatch = '' 18 + # no need to vendor 19 + rm -r ocaml-wayland 20 + ''; 21 + 22 + useDune2 = true; 23 + minimumOCamlVersion = "4.08"; 24 + 25 + buildInputs = with ocamlPackages; [ 26 + wayland 27 + cmdliner 28 + logs 29 + ]; 30 + 31 + meta = { 32 + homepage = "https://github.com/talex5/wayland-virtwl-proxy"; 33 + description = "Proxy Wayland connections across a VM boundary"; 34 + license = lib.licenses.asl20; 35 + maintainers = [ lib.maintainers.sternenseemann ]; 36 + }; 37 + }
+8
pkgs/top-level/aliases.nix
··· 88 bittorrentSync = throw "bittorrentSync has been deprecated by resilio-sync."; # added 2019-06-03 89 bittorrentSync14 = throw "bittorrentSync14 has been deprecated by resilio-sync."; # added 2019-06-03 90 bittorrentSync20 = throw "bittorrentSync20 has been deprecated by resilio-sync."; # added 2019-06-03 91 bs1770gain = throw "bs1770gain has been removed from nixpkgs, as it had no maintainer or reverse dependencies."; # added 2021-01-02 92 btc1 = throw "btc1 has been removed, it was abandoned by upstream"; # added 2020-11-03 93 buildPerlPackage = perlPackages.buildPerlPackage; # added 2018-10-12
··· 88 bittorrentSync = throw "bittorrentSync has been deprecated by resilio-sync."; # added 2019-06-03 89 bittorrentSync14 = throw "bittorrentSync14 has been deprecated by resilio-sync."; # added 2019-06-03 90 bittorrentSync20 = throw "bittorrentSync20 has been deprecated by resilio-sync."; # added 2019-06-03 91 + 92 + # bitwarden_rs renamed to vaultwarden with release 1.21.0 (2021-04-30) 93 + bitwarden_rs = vaultwarden; 94 + bitwarden_rs-sqlite = vaultwarden-sqlite; 95 + bitwarden_rs-mysql = vaultwarden-mysql; 96 + bitwarden_rs-postgresql = vaultwarden-postgresql; 97 + bitwarden_rs-vault = vaultwarden-vault; 98 + 99 bs1770gain = throw "bs1770gain has been removed from nixpkgs, as it had no maintainer or reverse dependencies."; # added 2021-01-02 100 btc1 = throw "btc1 has been removed, it was abandoned by upstream"; # added 2020-11-03 101 buildPerlPackage = perlPackages.buildPerlPackage; # added 2018-10-12
+19 -9
pkgs/top-level/all-packages.nix
··· 474 475 pkger = callPackage ../development/libraries/pkger { }; 476 477 run = callPackage ../development/tools/run { }; 478 479 mod = callPackage ../development/tools/mod { }; ··· 1309 bitwarden = callPackage ../tools/security/bitwarden { }; 1310 1311 inherit (nodePackages) bitwarden-cli; 1312 - 1313 - bitwarden_rs = callPackage ../tools/security/bitwarden_rs { 1314 - inherit (darwin.apple_sdk.frameworks) Security CoreServices; 1315 - }; 1316 - bitwarden_rs-sqlite = bitwarden_rs; 1317 - bitwarden_rs-mysql = bitwarden_rs.override { dbBackend = "mysql"; }; 1318 - bitwarden_rs-postgresql = bitwarden_rs.override { dbBackend = "postgresql"; }; 1319 - 1320 - bitwarden_rs-vault = callPackage ../tools/security/bitwarden_rs/vault.nix { }; 1321 1322 bkyml = callPackage ../tools/misc/bkyml { }; 1323 ··· 2300 swaycwd = callPackage ../tools/wayland/swaycwd { }; 2301 2302 wayland-utils = callPackage ../tools/wayland/wayland-utils { }; 2303 2304 wev = callPackage ../tools/wayland/wev { }; 2305 ··· 7672 7673 otfcc = callPackage ../tools/misc/otfcc { }; 7674 7675 otpw = callPackage ../os-specific/linux/otpw { }; 7676 7677 ovftool = callPackage ../tools/virtualization/ovftool { }; ··· 16035 inherit (ocaml-ng.ocamlPackages) bap ocaml findlib ctypes; 16036 }; 16037 16038 libbass = (callPackage ../development/libraries/audio/libbass { }).bass; 16039 libbass_fx = (callPackage ../development/libraries/audio/libbass { }).bass_fx; 16040 ··· 16147 libctb = callPackage ../development/libraries/libctb { }; 16148 16149 libctemplate = callPackage ../development/libraries/libctemplate { }; 16150 16151 libcouchbase = callPackage ../development/libraries/libcouchbase { }; 16152 ··· 31572 vaultenv = haskellPackages.vaultenv; 31573 31574 vazir-code-font = callPackage ../data/fonts/vazir-code-font { }; 31575 31576 vazir-fonts = callPackage ../data/fonts/vazir-fonts { }; 31577
··· 474 475 pkger = callPackage ../development/libraries/pkger { }; 476 477 + tapview = callPackage ../development/tools/tapview { }; 478 + 479 run = callPackage ../development/tools/run { }; 480 481 mod = callPackage ../development/tools/mod { }; ··· 1311 bitwarden = callPackage ../tools/security/bitwarden { }; 1312 1313 inherit (nodePackages) bitwarden-cli; 1314 1315 bkyml = callPackage ../tools/misc/bkyml { }; 1316 ··· 2293 swaycwd = callPackage ../tools/wayland/swaycwd { }; 2294 2295 wayland-utils = callPackage ../tools/wayland/wayland-utils { }; 2296 + 2297 + wayland-proxy-virtwl = callPackage ../tools/wayland/wayland-proxy-virtwl { }; 2298 2299 wev = callPackage ../tools/wayland/wev { }; 2300 ··· 7667 7668 otfcc = callPackage ../tools/misc/otfcc { }; 7669 7670 + otpclient = callPackage ../applications/misc/otpclient { }; 7671 + 7672 otpw = callPackage ../os-specific/linux/otpw { }; 7673 7674 ovftool = callPackage ../tools/virtualization/ovftool { }; ··· 16032 inherit (ocaml-ng.ocamlPackages) bap ocaml findlib ctypes; 16033 }; 16034 16035 + libbaseencode = callPackage ../development/libraries/libbaseencode { }; 16036 + 16037 libbass = (callPackage ../development/libraries/audio/libbass { }).bass; 16038 libbass_fx = (callPackage ../development/libraries/audio/libbass { }).bass_fx; 16039 ··· 16146 libctb = callPackage ../development/libraries/libctb { }; 16147 16148 libctemplate = callPackage ../development/libraries/libctemplate { }; 16149 + 16150 + libcotp = callPackage ../development/libraries/libcotp { }; 16151 16152 libcouchbase = callPackage ../development/libraries/libcouchbase { }; 16153 ··· 31573 vaultenv = haskellPackages.vaultenv; 31574 31575 vazir-code-font = callPackage ../data/fonts/vazir-code-font { }; 31576 + 31577 + vaultwarden = callPackage ../tools/security/vaultwarden { 31578 + inherit (darwin.apple_sdk.frameworks) Security CoreServices; 31579 + }; 31580 + vaultwarden-sqlite = vaultwarden; 31581 + vaultwarden-mysql = vaultwarden.override { dbBackend = "mysql"; }; 31582 + vaultwarden-postgresql = vaultwarden.override { dbBackend = "postgresql"; }; 31583 + 31584 + vaultwarden-vault = callPackage ../tools/security/vaultwarden/vault.nix { }; 31585 31586 vazir-fonts = callPackage ../data/fonts/vazir-fonts { }; 31587
-4
pkgs/top-level/python-packages.nix
··· 1905 1906 devpi-common = callPackage ../development/python-modules/devpi-common { }; 1907 1908 - dftfit = callPackage ../development/python-modules/dftfit { }; 1909 - 1910 diagrams = callPackage ../development/python-modules/diagrams { }; 1911 1912 diceware = callPackage ../development/python-modules/diceware { }; ··· 3913 labgrid = callPackage ../development/python-modules/labgrid { }; 3914 3915 labmath = callPackage ../development/python-modules/labmath { }; 3916 - 3917 - lammps-cython = callPackage ../development/python-modules/lammps-cython { }; 3918 3919 langcodes = callPackage ../development/python-modules/langcodes { }; 3920
··· 1905 1906 devpi-common = callPackage ../development/python-modules/devpi-common { }; 1907 1908 diagrams = callPackage ../development/python-modules/diagrams { }; 1909 1910 diceware = callPackage ../development/python-modules/diceware { }; ··· 3911 labgrid = callPackage ../development/python-modules/labgrid { }; 3912 3913 labmath = callPackage ../development/python-modules/labmath { }; 3914 3915 langcodes = callPackage ../development/python-modules/langcodes { }; 3916