Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
6d75bf65 cfe1e451

+373 -106
+7
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 238 <link xlink:href="options.html#opt-services.headscale.enable">services.headscale</link> 239 </para> 240 </listitem> 241 </itemizedlist> 242 </section> 243 <section xml:id="sec-release-22.05-incompatibilities">
··· 238 <link xlink:href="options.html#opt-services.headscale.enable">services.headscale</link> 239 </para> 240 </listitem> 241 + <listitem> 242 + <para> 243 + <link xlink:href="https://0xerr0r.github.io/blocky/">blocky</link>, 244 + fast and lightweight DNS proxy as ad-blocker for local network 245 + with many features. 246 + </para> 247 + </listitem> 248 </itemizedlist> 249 </section> 250 <section xml:id="sec-release-22.05-incompatibilities">
+2
nixos/doc/manual/release-notes/rl-2205.section.md
··· 71 72 - [headscale](https://github.com/juanfont/headscale), an Open Source implementation of the [Tailscale](https://tailscale.io) Control Server. Available as [services.headscale](options.html#opt-services.headscale.enable) 73 74 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 75 76 ## Backward Incompatibilities {#sec-release-22.05-incompatibilities}
··· 71 72 - [headscale](https://github.com/juanfont/headscale), an Open Source implementation of the [Tailscale](https://tailscale.io) Control Server. Available as [services.headscale](options.html#opt-services.headscale.enable) 73 74 + - [blocky](https://0xerr0r.github.io/blocky/), fast and lightweight DNS proxy as ad-blocker for local network with many features. 75 + 76 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 77 78 ## Backward Incompatibilities {#sec-release-22.05-incompatibilities}
+8 -1
nixos/lib/test-driver/test_driver/machine.py
··· 241 cdrom: Optional[str] = None, 242 usb: Optional[str] = None, 243 bios: Optional[str] = None, 244 qemuFlags: Optional[str] = None, 245 ): 246 - self._cmd = "qemu-kvm -m 384" 247 248 # networking 249 net_backend = "-netdev user,id=net0" ··· 381 cdrom=args.get("cdrom"), 382 usb=args.get("usb"), 383 bios=args.get("bios"), 384 qemuFlags=args.get("qemuFlags"), 385 ) 386
··· 241 cdrom: Optional[str] = None, 242 usb: Optional[str] = None, 243 bios: Optional[str] = None, 244 + qemuBinary: Optional[str] = None, 245 qemuFlags: Optional[str] = None, 246 ): 247 + if qemuBinary is not None: 248 + self._cmd = qemuBinary 249 + else: 250 + self._cmd = "qemu-kvm" 251 + 252 + self._cmd += " -m 384" 253 254 # networking 255 net_backend = "-netdev user,id=net0" ··· 387 cdrom=args.get("cdrom"), 388 usb=args.get("usb"), 389 bios=args.get("bios"), 390 + qemuBinary=args.get("qemuBinary"), 391 qemuFlags=args.get("qemuFlags"), 392 ) 393
+1
nixos/modules/module-list.nix
··· 718 ./services/networking/bird.nix 719 ./services/networking/bitlbee.nix 720 ./services/networking/blockbook-frontend.nix 721 ./services/networking/charybdis.nix 722 ./services/networking/cjdns.nix 723 ./services/networking/cntlm.nix
··· 718 ./services/networking/bird.nix 719 ./services/networking/bitlbee.nix 720 ./services/networking/blockbook-frontend.nix 721 + ./services/networking/blocky.nix 722 ./services/networking/charybdis.nix 723 ./services/networking/cjdns.nix 724 ./services/networking/cntlm.nix
+5 -3
nixos/modules/services/misc/airsonic.nix
··· 39 default = "127.0.0.1"; 40 description = '' 41 The host name or IP address on which to bind Airsonic. 42 - Only relevant if you have multiple network interfaces and want 43 - to make Airsonic available on only one of them. The default value 44 - will bind Airsonic to all available network interfaces. 45 ''; 46 }; 47
··· 39 default = "127.0.0.1"; 40 description = '' 41 The host name or IP address on which to bind Airsonic. 42 + The default value is appropriate for first launch, when the 43 + default credentials are easy to guess. It is also appropriate 44 + if you intend to use the virtualhost option in the service 45 + module. In other cases, you may want to change this to a 46 + specific IP or 0.0.0.0 to listen on all interfaces. 47 ''; 48 }; 49
+40
nixos/modules/services/networking/blocky.nix
···
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.blocky; 7 + 8 + format = pkgs.formats.yaml { }; 9 + configFile = format.generate "config.yaml" cfg.settings; 10 + in 11 + { 12 + options.services.blocky = { 13 + enable = mkEnableOption "Fast and lightweight DNS proxy as ad-blocker for local network with many features"; 14 + 15 + settings = mkOption { 16 + type = format.type; 17 + default = { }; 18 + description = '' 19 + Blocky configuration. Refer to 20 + <link xlink:href="https://0xerr0r.github.io/blocky/configuration/"/> 21 + for details on supported values. 22 + ''; 23 + }; 24 + }; 25 + 26 + config = mkIf cfg.enable { 27 + systemd.services.blocky = { 28 + description = "A DNS proxy and ad-blocker for the local network"; 29 + wantedBy = [ "multi-user.target" ]; 30 + 31 + serviceConfig = { 32 + DynamicUser = true; 33 + ExecStart = "${pkgs.blocky}/bin/blocky --config ${configFile}"; 34 + 35 + AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; 36 + CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; 37 + }; 38 + }; 39 + }; 40 + }
+1
nixos/tests/all-tests.nix
··· 52 bitcoind = handleTest ./bitcoind.nix {}; 53 bittorrent = handleTest ./bittorrent.nix {}; 54 blockbook-frontend = handleTest ./blockbook-frontend.nix {}; 55 boot = handleTestOn ["x86_64-linux" "aarch64-linux"] ./boot.nix {}; 56 boot-stage1 = handleTest ./boot-stage1.nix {}; 57 borgbackup = handleTest ./borgbackup.nix {};
··· 52 bitcoind = handleTest ./bitcoind.nix {}; 53 bittorrent = handleTest ./bittorrent.nix {}; 54 blockbook-frontend = handleTest ./blockbook-frontend.nix {}; 55 + blocky = handleTest ./blocky.nix {}; 56 boot = handleTestOn ["x86_64-linux" "aarch64-linux"] ./boot.nix {}; 57 boot-stage1 = handleTest ./boot-stage1.nix {}; 58 borgbackup = handleTest ./borgbackup.nix {};
+34
nixos/tests/blocky.nix
···
··· 1 + import ./make-test-python.nix { 2 + name = "blocky"; 3 + 4 + nodes = { 5 + server = { pkgs, ... }: { 6 + environment.systemPackages = [ pkgs.dnsutils ]; 7 + services.blocky = { 8 + enable = true; 9 + 10 + settings = { 11 + customDNS = { 12 + mapping = { 13 + "printer.lan" = "192.168.178.3,2001:0db8:85a3:08d3:1319:8a2e:0370:7344"; 14 + }; 15 + }; 16 + upstream = { 17 + default = [ "8.8.8.8" "1.1.1.1" ]; 18 + }; 19 + port = 53; 20 + httpPort = 5000; 21 + logLevel = "info"; 22 + }; 23 + }; 24 + }; 25 + }; 26 + 27 + testScript = '' 28 + with subtest("Service test"): 29 + server.wait_for_unit("blocky.service") 30 + server.wait_for_open_port(53) 31 + server.wait_for_open_port(5000) 32 + server.succeed("dig @127.0.0.1 +short -x 192.168.178.3 | grep -qF printer.lan") 33 + ''; 34 + }
+3
pkgs/applications/audio/orca-c/default.nix
··· 13 14 postPatch = '' 15 patchShebangs tool 16 ''; 17 18 installPhase = ''
··· 13 14 postPatch = '' 15 patchShebangs tool 16 + sed -i tool \ 17 + -e 's@ncurses_dir=.*@ncurses_dir="${ncurses}"@' \ 18 + -e 's@portmidi_dir=.*@portmidi_dir="${portmidi}"@' tool 19 ''; 20 21 installPhase = ''
+9 -2
pkgs/applications/graphics/geeqie/default.nix
··· 1 { lib, stdenv, fetchFromGitHub, pkg-config, autoconf, automake, gettext, intltool 2 , gtk3, lcms2, exiv2, libchamplain, clutter-gtk, ffmpegthumbnailer, fbida 3 , wrapGAppsHook, fetchpatch, bash, doxygen 4 }: 5 6 stdenv.mkDerivation rec { 7 pname = "geeqie"; 8 - version = "1.7.1"; 9 10 src = fetchFromGitHub { 11 owner = "BestImageViewer"; 12 repo = "geeqie"; 13 rev = "v${version}"; 14 - sha256 = "sha256-0E1TeAhkiK+hFJ4oMoeZLvfRehTzdGF3AtEVwf/MaF8="; 15 }; 16 17 patches = [ ··· 46 ''; 47 48 enableParallelBuilding = true; 49 50 meta = with lib; { 51 description = "Lightweight GTK based image viewer";
··· 1 { lib, stdenv, fetchFromGitHub, pkg-config, autoconf, automake, gettext, intltool 2 , gtk3, lcms2, exiv2, libchamplain, clutter-gtk, ffmpegthumbnailer, fbida 3 , wrapGAppsHook, fetchpatch, bash, doxygen 4 + , nix-update-script 5 }: 6 7 stdenv.mkDerivation rec { 8 pname = "geeqie"; 9 + version = "1.7.2"; 10 11 src = fetchFromGitHub { 12 owner = "BestImageViewer"; 13 repo = "geeqie"; 14 rev = "v${version}"; 15 + sha256 = "sha256-Abr7trlms6bxOAqE6xNKRv51TBGNilNdBhUZUg7OTKY="; 16 }; 17 18 patches = [ ··· 47 ''; 48 49 enableParallelBuilding = true; 50 + 51 + passthru = { 52 + updateScript = nix-update-script { 53 + attrPath = pname; 54 + }; 55 + }; 56 57 meta = with lib; { 58 description = "Lightweight GTK based image viewer";
+3 -3
pkgs/applications/graphics/gscan2pdf/default.nix
··· 10 11 perlPackages.buildPerlPackage rec { 12 pname = "gscan2pdf"; 13 - version = "2.12.4"; 14 15 src = fetchurl { 16 - url = "mirror://sourceforge/gscan2pdf/${version}/${pname}-${version}.tar.xz"; 17 - sha256 = "sha256-UrBt0QkSk7IP4mZYFoxFNJQ1Qmcb53CemvlYfsxjZ/s="; 18 }; 19 20 nativeBuildInputs = [ wrapGAppsHook ];
··· 10 11 perlPackages.buildPerlPackage rec { 12 pname = "gscan2pdf"; 13 + version = "2.12.5"; 14 15 src = fetchurl { 16 + url = "mirror://sourceforge/gscan2pdf/gscan2pdf-${version}.tar.xz"; 17 + sha256 = "sha256-MFWW9DTJ/svtgN3fbw+zeGpgg3pgIoC9jZ1HkG5p6sc="; 18 }; 19 20 nativeBuildInputs = [ wrapGAppsHook ];
+2 -2
pkgs/applications/misc/logseq/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "logseq"; 5 - version = "0.5.4"; 6 7 src = fetchurl { 8 url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; 9 - sha256 = "PGrx2JBYmp5vQ8jLpOfiT1T1+SNeRt0W5oHUjHNKuBE="; 10 name = "${pname}-${version}.AppImage"; 11 }; 12
··· 2 3 stdenv.mkDerivation rec { 4 pname = "logseq"; 5 + version = "0.5.9"; 6 7 src = fetchurl { 8 url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; 9 + sha256 = "e47aaabcd940b54962625e224961e9b95b7f18b99724adbb6334cdc549617389"; 10 name = "${pname}-${version}.AppImage"; 11 }; 12
+2 -2
pkgs/applications/misc/p2pool/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "p2pool"; 17 - version = "1.6"; 18 19 src = fetchFromGitHub { 20 owner = "SChernykh"; 21 repo = "p2pool"; 22 rev = "v${version}"; 23 - sha256 = "sha256-SumAHliY2cX2Q1umyw0ljCFmgnGKKHqoEFGglNJ/Bfg="; 24 fetchSubmodules = true; 25 }; 26
··· 14 15 stdenv.mkDerivation rec { 16 pname = "p2pool"; 17 + version = "1.7"; 18 19 src = fetchFromGitHub { 20 owner = "SChernykh"; 21 repo = "p2pool"; 22 rev = "v${version}"; 23 + sha256 = "sha256-ohfC10U7srs5IrFWPF5AKPwXPHaRxlYRK4ZZ0pE8tEs="; 24 fetchSubmodules = true; 25 }; 26
+3
pkgs/applications/networking/blocky/default.nix
··· 1 { buildGoModule 2 , fetchFromGitHub 3 , lib 4 }: 5 6 buildGoModule rec { ··· 27 license = licenses.asl20; 28 maintainers = with maintainers; [ ratsclub ]; 29 }; 30 }
··· 1 { buildGoModule 2 , fetchFromGitHub 3 , lib 4 + , nixosTests 5 }: 6 7 buildGoModule rec { ··· 28 license = licenses.asl20; 29 maintainers = with maintainers; [ ratsclub ]; 30 }; 31 + 32 + passthru.tests = { inherit (nixosTests) blocky; }; 33 }
+5 -5
pkgs/applications/networking/browsers/firefox/librewolf/src.json
··· 1 { 2 - "packageVersion": "97.0-2", 3 "source": { 4 - "rev": "97.0-2", 5 - "sha256": "00fb7xr6hrcyh3s7g52fs6f7a1iggpibj0xafblnl7118fh73g25" 6 }, 7 "firefox": { 8 - "version": "97.0", 9 - "sha512": "a913695a42cb06ee9bda2a20e65cc573e40ca93e9f75b7ee0a43ebd1935b371e7e80d5fc8d5f126ad0712ab848635a8624bbeed43807e5c179537aa32c884186" 10 } 11 }
··· 1 { 2 + "packageVersion": "97.0.1-1", 3 "source": { 4 + "rev": "97.0.1-1", 5 + "sha256": "10gbnkmyivawwqn3gf5c98l49b03j70gbniaar8bfl80j8av0v5j" 6 }, 7 "firefox": { 8 + "version": "97.0.1", 9 + "sha512": "8620aace77167593aab5acd230860eb3e67eeddc49c0aad0491b5dc20bd0ddb6089dbb8975aed241426f57b2ad772238b04d03b95390175f580cbd80bb6d5f6c" 10 } 11 }
+3 -3
pkgs/applications/networking/cluster/kube-score/default.nix
··· 2 3 buildGoModule rec { 4 pname = "kube-score"; 5 - version = "1.13.0"; 6 7 src = fetchFromGitHub { 8 owner = "zegl"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-QAtsXNmR+Sg9xmvP7x6b2jAJkUcL/sMYk8i5CSzjVos="; 12 }; 13 14 - vendorSha256 = "sha256-kPYvkovzQDmoB67TZHCKZ5jtW6pN3gHxBPKAU8prbgo="; 15 16 meta = with lib; { 17 description = "Kubernetes object analysis with recommendations for improved reliability and security";
··· 2 3 buildGoModule rec { 4 pname = "kube-score"; 5 + version = "1.14.0"; 6 7 src = fetchFromGitHub { 8 owner = "zegl"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-6/+S1aj2qoUPz+6+8Z4Z5dpfyOi/DnrLLUpPgBn/OxU="; 12 }; 13 14 + vendorSha256 = "sha256-0Zi62FmX4rFl3os2ehtussSSUPJtxLq7622CEdeKZCs="; 15 16 meta = with lib; { 17 description = "Kubernetes object analysis with recommendations for improved reliability and security";
+2 -2
pkgs/applications/networking/instant-messengers/session-desktop-appimage/default.nix
··· 5 6 appimageTools.wrapType2 rec { 7 pname = "session-desktop-appimage"; 8 - version = "1.7.6"; 9 src = fetchurl { 10 url = "https://github.com/oxen-io/session-desktop/releases/download/v${version}/session-desktop-linux-x86_64-${version}.AppImage"; 11 - sha256 = "PNjUslqLcSxkRSXFpesBr2sfre4wetZWfUQTjywdClU="; 12 }; 13 14 meta = with lib; {
··· 5 6 appimageTools.wrapType2 rec { 7 pname = "session-desktop-appimage"; 8 + version = "1.7.7"; 9 src = fetchurl { 10 url = "https://github.com/oxen-io/session-desktop/releases/download/v${version}/session-desktop-linux-x86_64-${version}.AppImage"; 11 + sha256 = "iMJk7/Q3Kh2KwLs0m+DAPVv471iPZcsIs4+YCSbmeIo="; 12 }; 13 14 meta = with lib; {
+2 -2
pkgs/applications/networking/mailreaders/evolution/evolution/default.nix
··· 42 43 stdenv.mkDerivation rec { 44 pname = "evolution"; 45 - version = "3.42.3"; 46 47 src = fetchurl { 48 url = "mirror://gnome/sources/evolution/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 49 - sha256 = "RGKeagIojsEApm/VlBOgaLa5zWJL7TJVqimhZuom0LY="; 50 }; 51 52 nativeBuildInputs = [
··· 42 43 stdenv.mkDerivation rec { 44 pname = "evolution"; 45 + version = "3.42.4"; 46 47 src = fetchurl { 48 url = "mirror://gnome/sources/evolution/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 49 + sha256 = "+oprem1GsinbXfIv3nZCVFIjV/4b7NexjlNt/piJCmU="; 50 }; 51 52 nativeBuildInputs = [
+2 -1
pkgs/applications/science/logic/coq/default.nix
··· 130 131 nativeBuildInputs = [ pkg-config ] 132 ++ optional buildIde copyDesktopItems 133 ++ optional (!versionAtLeast "8.6") gnumake42; 134 buildInputs = [ ncurses ] ++ ocamlBuildInputs 135 ++ optionals buildIde 136 (if versionAtLeast "8.10" 137 - then [ ocamlPackages.lablgtk3-sourceview3 glib gnome.adwaita-icon-theme wrapGAppsHook ] 138 else [ ocamlPackages.lablgtk ]) 139 ++ optional (versionAtLeast "8.14") ocamlPackages.dune_2 140 ;
··· 130 131 nativeBuildInputs = [ pkg-config ] 132 ++ optional buildIde copyDesktopItems 133 + ++ optional (buildIde && versionAtLeast "8.10") wrapGAppsHook 134 ++ optional (!versionAtLeast "8.6") gnumake42; 135 buildInputs = [ ncurses ] ++ ocamlBuildInputs 136 ++ optionals buildIde 137 (if versionAtLeast "8.10" 138 + then [ ocamlPackages.lablgtk3-sourceview3 glib gnome.adwaita-icon-theme ] 139 else [ ocamlPackages.lablgtk ]) 140 ++ optional (versionAtLeast "8.14") ocamlPackages.dune_2 141 ;
+3 -3
pkgs/applications/version-management/mercurial/default.nix
··· 21 22 self = python3Packages.buildPythonApplication rec { 23 pname = "mercurial"; 24 - version = "6.0.2"; 25 26 src = fetchurl { 27 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 28 - sha256 = "sha256-X7TDbThWKS6/WEBR1ZMG2WrYqjK1U3RSsdnEdvlasRo="; 29 }; 30 31 format = "other"; ··· 35 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 36 inherit src; 37 name = "${pname}-${version}"; 38 - sha256 = "sha256-rIG57oPCTUz4HNJyuMBPlKTSh02ecF5052Q1P9wGq1s="; 39 sourceRoot = "${pname}-${version}/rust"; 40 } else null; 41 cargoRoot = if rustSupport then "rust" else null;
··· 21 22 self = python3Packages.buildPythonApplication rec { 23 pname = "mercurial"; 24 + version = "6.0.3"; 25 26 src = fetchurl { 27 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 28 + sha256 = "sha256-Z/E2R6RlF6K1Z83Lc8mHIdddNqBDLeuxUCK3f5wTgzM="; 29 }; 30 31 format = "other"; ··· 35 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 36 inherit src; 37 name = "${pname}-${version}"; 38 + sha256 = "sha256-i4WROxezeqLX4hTdcPrqsf6dBqsNZz6fFAPzItYuklE="; 39 sourceRoot = "${pname}-${version}/rust"; 40 } else null; 41 cargoRoot = if rustSupport then "rust" else null;
+2 -2
pkgs/desktops/cinnamon/nemo/default.nix
··· 24 25 stdenv.mkDerivation rec { 26 pname = "nemo"; 27 - version = "5.2.3"; 28 29 # TODO: add plugins support (see https://github.com/NixOS/nixpkgs/issues/78327) 30 ··· 32 owner = "linuxmint"; 33 repo = pname; 34 rev = version; 35 - sha256 = "sha256-kPxwWciNf4KQx3JG1qPQcZJeOa4B+udMyQmH8A7JcfQ="; 36 }; 37 38 outputs = [ "out" "dev" ];
··· 24 25 stdenv.mkDerivation rec { 26 pname = "nemo"; 27 + version = "5.2.4"; 28 29 # TODO: add plugins support (see https://github.com/NixOS/nixpkgs/issues/78327) 30 ··· 32 owner = "linuxmint"; 33 repo = pname; 34 rev = version; 35 + sha256 = "sha256-v63dFiBKtLCmRnwJ6u814lSv+tfPG+IIJtcWCnOEZjk="; 36 }; 37 38 outputs = [ "out" "dev" ];
+5 -5
pkgs/development/compilers/swift/default.nix
··· 52 # - integration-tests 53 54 versions = { 55 - swift = "5.5.2"; 56 yams = "4.0.2"; 57 argumentParser = "0.4.3"; 58 format = "swift-5.5-branch"; ··· 79 80 swift = fetchSwiftRelease { 81 repo = "swift"; 82 - sha256 = "1a9ja3r6ap4cappbvlk18krlvwi0q75z21j5yx5rhbnw4ihh7lda"; 83 }; 84 cmark = fetchSwiftRelease { 85 repo = "swift-cmark"; ··· 99 }; 100 swiftpm = fetchSwiftRelease { 101 repo = "swift-package-manager"; 102 - sha256 = "0hdjvb2asfi6h3x9bjssxkc3bgjn3idlmyga3dl3lscfq88hjxr9"; 103 }; 104 syntax = fetchSwiftRelease { 105 repo = "swift-syntax"; ··· 111 }; 112 corelibsFoundation = fetchSwiftRelease { 113 repo = "swift-corelibs-foundation"; 114 - sha256 = "1f7qcdx8597gwqa9pwl38d31w6w4d84c5hadj4ycj99msrm2f32x"; 115 }; 116 corelibsLibdispatch = fetchSwiftRelease { 117 repo = "swift-corelibs-libdispatch"; ··· 128 }; 129 llvmProject = fetchSwiftRelease { 130 repo = "llvm-project"; 131 - sha256 = "1gvqps5f9jh6lbhcjh1fyzp3bc0h9chbljzaspcrdi2qp878prlx"; 132 }; 133 134 # Projects that have their own versions during each release
··· 52 # - integration-tests 53 54 versions = { 55 + swift = "5.5.3"; 56 yams = "4.0.2"; 57 argumentParser = "0.4.3"; 58 format = "swift-5.5-branch"; ··· 79 80 swift = fetchSwiftRelease { 81 repo = "swift"; 82 + sha256 = "0ma96sfvwiv2f4qhzrvcwxi9igzd80930gnaw4r7ra4w190cnag7"; 83 }; 84 cmark = fetchSwiftRelease { 85 repo = "swift-cmark"; ··· 99 }; 100 swiftpm = fetchSwiftRelease { 101 repo = "swift-package-manager"; 102 + sha256 = "0z90mg837jzwh516pypn48r3wsjf0lqymsyigdhgr7j2sgcckrr1"; 103 }; 104 syntax = fetchSwiftRelease { 105 repo = "swift-syntax"; ··· 111 }; 112 corelibsFoundation = fetchSwiftRelease { 113 repo = "swift-corelibs-foundation"; 114 + sha256 = "06gkdliihl1l86jx5khzwkjmjk45fq290x033rscramzcdxh7d1b"; 115 }; 116 corelibsLibdispatch = fetchSwiftRelease { 117 repo = "swift-corelibs-libdispatch"; ··· 128 }; 129 llvmProject = fetchSwiftRelease { 130 repo = "llvm-project"; 131 + sha256 = "18rn5xg5hpxxsacs0ygjmjpzpc8pq85898kknzc0s0z5m55h45z8"; 132 }; 133 134 # Projects that have their own versions during each release
+33 -2
pkgs/development/interpreters/racket/default.nix
··· 78 # fail to detect its variant at runtime. 79 # See: https://github.com/NixOS/nixpkgs/issues/114993#issuecomment-812951247 80 ./force-cs-variant.patch 81 ]; 82 83 preConfigure = '' ··· 90 --replace /bin/rm ${coreutils}/bin/rm \ 91 --replace /bin/true ${coreutils}/bin/true 92 done 93 mkdir src/build 94 cd src/build 95 96 - gappsWrapperArgs+=("--prefix" "LD_LIBRARY_PATH" ":" ${LD_LIBRARY_PATH}) 97 ''; 98 99 shared = if stdenv.isDarwin then "dylib" else "shared"; ··· 119 homepage = "https://racket-lang.org/"; 120 license = with licenses; [ asl20 /* or */ mit ]; 121 maintainers = with maintainers; [ kkallio henrytill vrthra ]; 122 - platforms = [ "x86_64-darwin" "x86_64-linux" "aarch64-linux" ]; 123 }; 124 }
··· 78 # fail to detect its variant at runtime. 79 # See: https://github.com/NixOS/nixpkgs/issues/114993#issuecomment-812951247 80 ./force-cs-variant.patch 81 + 82 + # The entry point binary $out/bin/racket is codesigned at least once. The 83 + # following error is triggered as a result. 84 + # (error 'add-ad-hoc-signature "file already has a signature") 85 + # We always remove the existing signature then call add-ad-hoc-signature to 86 + # circumvent this error. 87 + ./force-remove-codesign-then-add.patch 88 ]; 89 90 preConfigure = '' ··· 97 --replace /bin/rm ${coreutils}/bin/rm \ 98 --replace /bin/true ${coreutils}/bin/true 99 done 100 + 101 + # The configure script forces using `libtool -o` as AR on Darwin. But, the 102 + # `-o` option is only available from Apple libtool. GNU ar works here. 103 + substituteInPlace src/ChezScheme/zlib/configure \ 104 + --replace 'ARFLAGS="-o"' 'AR=ar; ARFLAGS="rc"' 105 + 106 mkdir src/build 107 cd src/build 108 109 + '' + lib.optionalString stdenv.isLinux '' 110 + gappsWrapperArgs+=("--prefix" "LD_LIBRARY_PATH" ":" ${libPath}) 111 + '' + lib.optionalString stdenv.isDarwin '' 112 + gappsWrapperArgs+=("--prefix" "DYLD_LIBRARY_PATH" ":" ${libPath}) 113 + '' 114 + ; 115 + 116 + preBuild = lib.optionalString stdenv.isDarwin '' 117 + # Cannot set DYLD_LIBRARY_PATH as an attr of this drv, becasue dynamic 118 + # linker environment variables like this are purged. 119 + # See: https://apple.stackexchange.com/a/212954/167199 120 + 121 + # Make builders feed it to dlopen(...). Do not expose all of $libPath to 122 + # DYLD_LIBRARY_PATH as the order of looking up symbols like 123 + # `__cg_jpeg_resync_to_restart` will be messed up. Our libJPEG.dyllib 124 + # expects it from our libTIFF.dylib, but instead it could not be found from 125 + # the system `libTIFF.dylib`. DYLD_FALLBACK_LIBRARY_PATH has its own problem 126 + # , too. 127 + export DYLD_FALLBACK_LIBRARY_PATH="${libPath}" 128 ''; 129 130 shared = if stdenv.isDarwin then "dylib" else "shared"; ··· 150 homepage = "https://racket-lang.org/"; 151 license = with licenses; [ asl20 /* or */ mit ]; 152 maintainers = with maintainers; [ kkallio henrytill vrthra ]; 153 + platforms = [ "x86_64-darwin" "x86_64-linux" "aarch64-linux" "aarch64-darwin" ]; 154 }; 155 }
+11
pkgs/development/interpreters/racket/force-remove-codesign-then-add.patch
···
··· 1 + --- old/src/mac/codesign.rkt 2022-01-08 18:25:53.000000000 -0500 2 + +++ new/src/mac/codesign.rkt 2022-02-15 15:49:51.000000000 -0500 3 + @@ -17,6 +17,5 @@ 4 + #:args (file) 5 + file)) 6 + 7 + -(if remove? 8 + - (remove-signature file) 9 + - (add-ad-hoc-signature file)) 10 + +(remove-signature file) 11 + +(add-ad-hoc-signature file)
+1 -1
pkgs/development/interpreters/racket/minimal.nix
··· 14 as well as libraries that live in collections. In particular, raco 15 and the pkg library are still bundled. 16 ''; 17 - platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" ]; 18 broken = false; # Minimal build does not require working FFI 19 }; 20 })
··· 14 as well as libraries that live in collections. In particular, raco 15 and the pkg library are still bundled. 16 ''; 17 + platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" ]; 18 broken = false; # Minimal build does not require working FFI 19 }; 20 })
+10 -1
pkgs/development/libraries/exiv2/default.nix
··· 11 , graphviz 12 , libxslt 13 , libiconv 14 }: 15 16 stdenv.mkDerivation rec { 17 pname = "exiv2"; 18 version = "0.27.5"; 19 20 - outputs = [ "out" "dev" "doc" "man" ]; 21 22 src = fetchFromGitHub { 23 owner = "exiv2"; ··· 32 gettext 33 graphviz 34 libxslt 35 ]; 36 37 buildInputs = lib.optional stdenv.isDarwin libiconv; ··· 94 rm * 95 mv .exiv2 exiv2 96 ) 97 ''; 98 99 meta = with lib; { 100 homepage = "https://www.exiv2.org/";
··· 11 , graphviz 12 , libxslt 13 , libiconv 14 + , removeReferencesTo 15 }: 16 17 stdenv.mkDerivation rec { 18 pname = "exiv2"; 19 version = "0.27.5"; 20 21 + outputs = [ "out" "lib" "dev" "doc" "man" "static" ]; 22 23 src = fetchFromGitHub { 24 owner = "exiv2"; ··· 33 gettext 34 graphviz 35 libxslt 36 + removeReferencesTo 37 ]; 38 39 buildInputs = lib.optional stdenv.isDarwin libiconv; ··· 96 rm * 97 mv .exiv2 exiv2 98 ) 99 + 100 + mkdir -p $static/lib 101 + mv $lib/lib/*.a $static/lib/ 102 + 103 + remove-references-to -t ${stdenv.cc.cc} $lib/lib/*.so.*.*.* $out/bin/exiv2 $static/lib/*.a 104 ''; 105 + 106 + disallowedReferences = [ stdenv.cc.cc ]; 107 108 meta = with lib; { 109 homepage = "https://www.exiv2.org/";
+2 -2
pkgs/development/libraries/qtstyleplugin-kvantum/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "qtstyleplugin-kvantum"; 7 - version = "1.0.0"; 8 9 src = fetchFromGitHub { 10 owner = "tsujan"; 11 repo = "Kvantum"; 12 rev = "V${version}"; 13 - sha256 = "0yvxj7r9z890nfq5cadw7ys144c2mnvaplvx4v4ndv7238b741l8"; 14 }; 15 16 nativeBuildInputs = [
··· 4 5 stdenv.mkDerivation rec { 6 pname = "qtstyleplugin-kvantum"; 7 + version = "1.0.1"; 8 9 src = fetchFromGitHub { 10 owner = "tsujan"; 11 repo = "Kvantum"; 12 rev = "V${version}"; 13 + sha256 = "0k3j74klvd386ijsd4j09ccxlhga54z4pgnh36s9cv3rs7ab39qm"; 14 }; 15 16 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-bigquery/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "google-cloud-bigquery"; 21 - version = "2.32.0"; 22 format = "setuptools"; 23 24 src = fetchPypi { 25 inherit pname version; 26 - sha256 = "sha256-84Y6xCk/CkWF5ERh2CuR+SOXIe8z/JV11AG02n3BJ70="; 27 }; 28 29 propagatedBuildInputs = [
··· 18 19 buildPythonPackage rec { 20 pname = "google-cloud-bigquery"; 21 + version = "2.33.0"; 22 format = "setuptools"; 23 24 src = fetchPypi { 25 inherit pname version; 26 + sha256 = "sha256-4VIlDMUmpwWE+AIAZs7L3y+i35hEF7a76/+Wqtwy498="; 27 }; 28 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-error-reporting/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "google-cloud-error-reporting"; 15 - version = "1.4.1"; 16 17 src = fetchPypi { 18 inherit pname version; 19 - sha256 = "4a72a65586178daaacf6bbc4b718db0765b99a719fce88a95c2be4f82689b7c1"; 20 }; 21 22 postPatch = ''
··· 12 13 buildPythonPackage rec { 14 pname = "google-cloud-error-reporting"; 15 + version = "1.5.0"; 16 17 src = fetchPypi { 18 inherit pname version; 19 + sha256 = "sha256-qvhZU7T2fHA2uRyXJjRxqeEAFwShH+TpGwICczgX7Sk="; 20 }; 21 22 postPatch = ''
+6
pkgs/development/python-modules/httpx-socks/default.nix
··· 56 "httpx_socks" 57 ]; 58 59 meta = with lib; { 60 description = "Proxy (HTTP, SOCKS) transports for httpx"; 61 homepage = "https://github.com/romis2012/httpx-socks";
··· 56 "httpx_socks" 57 ]; 58 59 + disabledTests = [ 60 + # Tests don't work in the sandbox 61 + "test_proxy" 62 + "test_secure_proxy" 63 + ]; 64 + 65 meta = with lib; { 66 description = "Proxy (HTTP, SOCKS) transports for httpx"; 67 homepage = "https://github.com/romis2012/httpx-socks";
+12 -10
pkgs/development/python-modules/pyinsteon/default.nix
··· 1 { lib 2 - , buildPythonPackage 3 - , fetchFromGitHub 4 , aiofiles 5 , aiohttp 6 , async_generator 7 , pypubsub 8 , pyserial 9 , pyserial-asyncio 10 - , pyyaml 11 , pytestCheckHook 12 , pythonOlder 13 - , pytest-cov 14 - , pytest-asyncio 15 - , pytest-timeout 16 }: 17 18 buildPythonPackage rec { 19 pname = "pyinsteon"; 20 version = "1.0.15"; 21 disabled = pythonOlder "3.6"; 22 23 src = fetchFromGitHub { 24 owner = pname; 25 repo = pname; 26 rev = version; 27 - sha256 = "sha256-bR+2885JdGoVHBIZQG8iF0OXsECew7m5N9vopKtGp3I="; 28 }; 29 30 propagatedBuildInputs = [ 31 aiofiles 32 aiohttp 33 - async_generator 34 pypubsub 35 pyserial 36 pyserial-asyncio ··· 38 ]; 39 40 checkInputs = [ 41 pytest-asyncio 42 - pytest-cov 43 pytest-timeout 44 pytestCheckHook 45 ]; 46 47 - pythonImportsCheck = [ "pyinsteon" ]; 48 49 meta = with lib; { 50 description = "Python library to support Insteon home automation projects";
··· 1 { lib 2 , aiofiles 3 , aiohttp 4 , async_generator 5 + , buildPythonPackage 6 + , fetchFromGitHub 7 , pypubsub 8 , pyserial 9 , pyserial-asyncio 10 + , pytest-asyncio 11 + , pytest-timeout 12 , pytestCheckHook 13 , pythonOlder 14 + , pyyaml 15 }: 16 17 buildPythonPackage rec { 18 pname = "pyinsteon"; 19 version = "1.0.15"; 20 + format = "setuptools"; 21 + 22 disabled = pythonOlder "3.6"; 23 24 src = fetchFromGitHub { 25 owner = pname; 26 repo = pname; 27 rev = version; 28 + hash = "sha256-bR+2885JdGoVHBIZQG8iF0OXsECew7m5N9vopKtGp3I="; 29 }; 30 31 propagatedBuildInputs = [ 32 aiofiles 33 aiohttp 34 pypubsub 35 pyserial 36 pyserial-asyncio ··· 38 ]; 39 40 checkInputs = [ 41 + async_generator 42 pytest-asyncio 43 pytest-timeout 44 pytestCheckHook 45 ]; 46 47 + pythonImportsCheck = [ 48 + "pyinsteon" 49 + ]; 50 51 meta = with lib; { 52 description = "Python library to support Insteon home automation projects";
+17
pkgs/development/python-modules/python-manilaclient/default.nix
··· 1 { lib 2 , buildPythonApplication 3 , fetchPypi 4 , pbr 5 , oslo-config 6 , oslo-log 7 , oslo-serialization ··· 9 , prettytable 10 , requests 11 , simplejson 12 , Babel 13 , osc-lib 14 , python-keystoneclient ··· 25 sha256 = "sha256-6iAed0mtEYHguYq4Rlh4YWT8E5hNqBYPcnG9/8RMspo="; 26 }; 27 28 propagatedBuildInputs = [ 29 pbr 30 oslo-config ··· 39 python-keystoneclient 40 debtcollector 41 ]; 42 43 # Checks moved to 'passthru.tests' to workaround infinite recursion 44 doCheck = false;
··· 1 { lib 2 , buildPythonApplication 3 , fetchPypi 4 + , installShellFiles 5 , pbr 6 + , openstackdocstheme 7 , oslo-config 8 , oslo-log 9 , oslo-serialization ··· 11 , prettytable 12 , requests 13 , simplejson 14 + , sphinx 15 + , sphinxcontrib-programoutput 16 , Babel 17 , osc-lib 18 , python-keystoneclient ··· 29 sha256 = "sha256-6iAed0mtEYHguYq4Rlh4YWT8E5hNqBYPcnG9/8RMspo="; 30 }; 31 32 + nativeBuildInputs = [ 33 + installShellFiles 34 + openstackdocstheme 35 + sphinx 36 + sphinxcontrib-programoutput 37 + ]; 38 + 39 propagatedBuildInputs = [ 40 pbr 41 oslo-config ··· 50 python-keystoneclient 51 debtcollector 52 ]; 53 + 54 + postInstall = '' 55 + export PATH=$out/bin:$PATH 56 + sphinx-build -a -E -d doc/build/doctrees -b man doc/source doc/build/man 57 + installManPage doc/build/man/python-manilaclient.1 58 + ''; 59 60 # Checks moved to 'passthru.tests' to workaround infinite recursion 61 doCheck = false;
+2 -2
pkgs/development/python-modules/simplefix/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "simplefix"; 5 - version = "1.0.14"; 6 7 src = fetchFromGitHub { 8 repo = "simplefix"; 9 owner = "da4089"; 10 rev = "v${version}"; 11 - sha256 = "1qccb63w6swq7brp0zinkkngpazmb25r21adry5cq6nniqs5g5zx"; 12 }; 13 14 checkPhase = ''
··· 2 3 buildPythonPackage rec { 4 pname = "simplefix"; 5 + version = "1.0.15"; 6 7 src = fetchFromGitHub { 8 repo = "simplefix"; 9 owner = "da4089"; 10 rev = "v${version}"; 11 + sha256 = "sha256-GQHMotxNRuRv6zXhrD02T+aFgfYe3RnvUGADsBeSPbA="; 12 }; 13 14 checkPhase = ''
+32
pkgs/development/python-modules/sphinxcontrib-programoutput/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , sphinx 5 + , sphinxcontrib-serializinghtml 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "sphinxcontrib-programoutput"; 10 + version = "0.17"; 11 + 12 + src = fetchPypi { 13 + inherit pname version; 14 + sha256 = "sha256-MA7puMrug1XSXMdLTRx+/RLmCNKtFl4xQdMeb7wVK38="; 15 + }; 16 + 17 + buildInputs = [ 18 + sphinx 19 + ]; 20 + 21 + # fails to import sphinxcontrib.serializinghtml 22 + doCheck = false; 23 + 24 + pythonImportsCheck = [ "sphinxcontrib.programoutput" ]; 25 + 26 + meta = with lib; { 27 + description = "Sphinx extension to include program output"; 28 + homepage = "https://github.com/NextThought/sphinxcontrib-programoutput"; 29 + license = licenses.bsd2; 30 + maintainers = with maintainers; [ SuperSandro2000 ]; 31 + }; 32 + }
+1 -1
pkgs/development/tools/analysis/radare2/default.nix
··· 62 ''; 63 64 postFixup = lib.optionalString stdenv.isDarwin '' 65 - for file in $out/bin/rasm2 $out/bin/ragg2 $out/bin/rabin2 $out/lib/libr_asm.${version}.dylib; do 66 install_name_tool -change libcapstone.4.dylib ${capstone}/lib/libcapstone.4.dylib $file 67 done 68 '';
··· 62 ''; 63 64 postFixup = lib.optionalString stdenv.isDarwin '' 65 + for file in $out/bin/rasm2 $out/bin/ragg2 $out/bin/rabin2 $out/lib/libr_asm.${version}.dylib $out/lib/libr_anal.${version}.dylib; do 66 install_name_tool -change libcapstone.4.dylib ${capstone}/lib/libcapstone.4.dylib $file 67 done 68 '';
+13 -9
pkgs/development/tools/buf/default.nix
··· 10 11 buildGoModule rec { 12 pname = "buf"; 13 - version = "1.0.0-rc12"; 14 15 src = fetchFromGitHub { 16 owner = "bufbuild"; 17 repo = pname; 18 rev = "v${version}"; 19 - sha256 = "sha256-UqyWQdlCDTSjW348f87W7g2kwB5nzIOviSE5/1T1soY="; 20 }; 21 - vendorSha256 = "sha256-qBgGZTok3G0Pgku76uiV9bZperhiSNoWSrzxrHe4QXw="; 22 23 patches = [ 24 # Skip a test that requires networking to be available to work. ··· 27 ./skip_test_requiring_dotgit.patch 28 ]; 29 30 - nativeBuildInputs = [ protobuf installShellFiles ]; 31 - # Required for TestGitCloner 32 - checkInputs = [ git ]; 33 34 ldflags = [ "-s" "-w" ]; 35 36 preCheck = '' 37 # The tests need access to some of the built utilities 38 export PATH="$PATH:$GOPATH/bin" ··· 55 56 # Completions 57 installShellCompletion --cmd buf \ 58 - --bash <($GOPATH/bin/buf bash-completion) \ 59 - --fish <($GOPATH/bin/buf fish-completion) \ 60 - --zsh <($GOPATH/bin/buf zsh-completion) 61 62 # Man Pages 63 mkdir man && $GOPATH/bin/buf manpages man
··· 10 11 buildGoModule rec { 12 pname = "buf"; 13 + version = "1.0.0"; 14 15 src = fetchFromGitHub { 16 owner = "bufbuild"; 17 repo = pname; 18 rev = "v${version}"; 19 + sha256 = "sha256-jJaob2eaozMFRsXwW6ulgM5De3UmpLZddTHwq6PnaeE="; 20 }; 21 + 22 + vendorSha256 = "sha256-wPnrkfv6pJB6tkZo2oeMbWHbF9njGh1ZEWu8tkHDhGo="; 23 24 patches = [ 25 # Skip a test that requires networking to be available to work. ··· 28 ./skip_test_requiring_dotgit.patch 29 ]; 30 31 + nativeBuildInputs = [ installShellFiles ]; 32 33 ldflags = [ "-s" "-w" ]; 34 35 + checkInputs = [ 36 + git # Required for TestGitCloner 37 + protobuf # Required for buftesting.GetProtocFilePaths 38 + ]; 39 + 40 preCheck = '' 41 # The tests need access to some of the built utilities 42 export PATH="$PATH:$GOPATH/bin" ··· 59 60 # Completions 61 installShellCompletion --cmd buf \ 62 + --bash <($GOPATH/bin/buf completion bash) \ 63 + --fish <($GOPATH/bin/buf completion fish) \ 64 + --zsh <($GOPATH/bin/buf completion zsh) 65 66 # Man Pages 67 mkdir man && $GOPATH/bin/buf manpages man
+2 -2
pkgs/development/tools/ko/default.nix
··· 7 8 buildGoModule rec { 9 pname = "ko"; 10 - version = "0.9.3"; 11 12 src = fetchFromGitHub { 13 owner = "google"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-cIrlhhk5Lt0Qt7q7rKw8EXrJqZWZEjrEUyHOvHiT6bs="; 17 }; 18 vendorSha256 = null; 19
··· 7 8 buildGoModule rec { 9 pname = "ko"; 10 + version = "0.10.0"; 11 12 src = fetchFromGitHub { 13 owner = "google"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-Xhe5WNHQ+Oa1m/6VwC3zCwWzXRc1spSfPp4jySsOcuU="; 17 }; 18 vendorSha256 = null; 19
+3 -3
pkgs/development/tools/stylua/default.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "stylua"; 11 - version = "0.12.2"; 12 13 src = fetchFromGitHub { 14 owner = "johnnymorganz"; 15 repo = pname; 16 rev = "v${version}"; 17 - sha256 = "sha256-Nry6P4nwcCmvJ4kdzeGEkaP1fm2LgnAwrINTBFK23tY="; 18 }; 19 20 - cargoSha256 = "sha256-i5wOGPOe1lDZknrVzZGxC8dUgTGiZJSzLqkxSRt0mQ8="; 21 22 buildFeatures = lib.optional lua52Support "lua52" 23 ++ lib.optional luauSupport "luau";
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "stylua"; 11 + version = "0.12.3"; 12 13 src = fetchFromGitHub { 14 owner = "johnnymorganz"; 15 repo = pname; 16 rev = "v${version}"; 17 + sha256 = "sha256-bgfG1cPhauU85FG/ZX1n2KqfydMeh92q347UsREkOGo="; 18 }; 19 20 + cargoSha256 = "sha256-njZTD6O67v787Z1tJ7G0QzxJLhqU2sfpOVw6r4woE9s="; 21 22 buildFeatures = lib.optional lua52Support "lua52" 23 ++ lib.optional luauSupport "luau";
+53 -8
pkgs/games/mudlet/default.nix
··· 1 - { fetchFromGitHub, lib, stdenv, wrapQtAppsHook, git, pcre, pugixml, qtbase, libsForQt5, libsecret, qtmultimedia, qttools, yajl, libzip, hunspell 2 - , boost, libGLU, lua, cmake, which, pkg-config, }: 3 4 let 5 luaEnv = lua.withPackages(ps: with ps; [ ··· 8 in 9 stdenv.mkDerivation rec { 10 pname = "mudlet"; 11 - version = "4.12.0"; 12 13 src = fetchFromGitHub { 14 owner = "Mudlet"; 15 repo = "Mudlet"; 16 rev = "Mudlet-${version}"; 17 fetchSubmodules = true; 18 - sha256 = "023plm5mwm15xikmdh1mq3gx1n7y4a0r0kw9fvk3rvm9brm78hzp"; 19 }; 20 21 - nativeBuildInputs = [ pkg-config cmake wrapQtAppsHook git qttools which ]; 22 buildInputs = [ 23 - pcre pugixml qtbase libsForQt5.qtkeychain qtmultimedia luaEnv libsecret libzip libGLU yajl boost hunspell 24 ]; 25 26 WITH_FONTS = "NO"; 27 WITH_UPDATER = "NO"; 28 29 installPhase = '' 30 mkdir -pv $out/lib 31 cp 3rdparty/edbee-lib/edbee-lib/qslog/lib/libQsLog.so $out/lib 32 mkdir -pv $out/bin ··· 41 cp -r ../mudlet.png $out/share/pixmaps/ 42 43 makeQtWrapper $out/mudlet $out/bin/mudlet \ 44 --prefix LD_LIBRARY_PATH : "${libsForQt5.qtkeychain}/lib/" \ 45 --run "cd $out"; 46 ''; 47 48 meta = with lib; { 49 description = "Crossplatform mud client"; 50 - homepage = "https://mudlet.org"; 51 maintainers = [ maintainers.wyvie maintainers.pstn ]; 52 platforms = platforms.linux; 53 - license = licenses.gpl2; 54 }; 55 }
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , cmake 5 + , git 6 + , pkg-config 7 + , qttools 8 + , which 9 + , wrapQtAppsHook 10 + , boost 11 + , hunspell 12 + , libGLU 13 + , libsForQt5 14 + , libsecret 15 + , libzip 16 + , lua 17 + , pcre 18 + , pugixml 19 + , qtbase 20 + , qtmultimedia 21 + , yajl 22 + }: 23 24 let 25 luaEnv = lua.withPackages(ps: with ps; [ ··· 28 in 29 stdenv.mkDerivation rec { 30 pname = "mudlet"; 31 + version = "4.15.1"; 32 33 src = fetchFromGitHub { 34 owner = "Mudlet"; 35 repo = "Mudlet"; 36 rev = "Mudlet-${version}"; 37 fetchSubmodules = true; 38 + hash = "sha256-GnTQc0Jh4YaQnfy7fYsTCACczlzWCQ+auKYoU9ET83M="; 39 }; 40 41 + nativeBuildInputs = [ 42 + cmake 43 + git 44 + pkg-config 45 + qttools 46 + which 47 + wrapQtAppsHook 48 + ]; 49 + 50 buildInputs = [ 51 + boost 52 + hunspell 53 + libGLU 54 + libsForQt5.qtkeychain 55 + libsecret 56 + libzip 57 + luaEnv 58 + pcre 59 + pugixml 60 + qtbase 61 + qtmultimedia 62 + yajl 63 ]; 64 65 WITH_FONTS = "NO"; 66 WITH_UPDATER = "NO"; 67 68 installPhase = '' 69 + runHook preInstall 70 + 71 mkdir -pv $out/lib 72 cp 3rdparty/edbee-lib/edbee-lib/qslog/lib/libQsLog.so $out/lib 73 mkdir -pv $out/bin ··· 82 cp -r ../mudlet.png $out/share/pixmaps/ 83 84 makeQtWrapper $out/mudlet $out/bin/mudlet \ 85 + --set LUA_CPATH "${luaEnv}/lib/lua/${lua.luaversion}/?.so" \ 86 + --prefix LUA_PATH : "$NIX_LUA_PATH" \ 87 --prefix LD_LIBRARY_PATH : "${libsForQt5.qtkeychain}/lib/" \ 88 --run "cd $out"; 89 + 90 + runHook postInstall 91 ''; 92 93 meta = with lib; { 94 description = "Crossplatform mud client"; 95 + homepage = "https://www.mudlet.org/"; 96 maintainers = [ maintainers.wyvie maintainers.pstn ]; 97 platforms = platforms.linux; 98 + license = licenses.gpl2Plus; 99 }; 100 }
+4 -4
pkgs/os-specific/linux/apparmor/default.nix
··· 304 meta = apparmor-meta "kernel patches"; 305 }; 306 307 - # Generate generic AppArmor rules in a file, 308 - # from the closure of given rootPaths. 309 - # To be included in an AppArmor profile like so: 310 - # include "$(apparmorRulesFromClosure {} [pkgs.hello]}" 311 apparmorRulesFromClosure = 312 { # The store path of the derivation is given in $path 313 additionalRules ? []
··· 304 meta = apparmor-meta "kernel patches"; 305 }; 306 307 + # Generate generic AppArmor rules in a file, from the closure of given 308 + # rootPaths. To be included in an AppArmor profile like so: 309 + # 310 + # include "${apparmorRulesFromClosure { } [ pkgs.hello ]}" 311 apparmorRulesFromClosure = 312 { # The store path of the derivation is given in $path 313 additionalRules ? []
+4 -4
pkgs/servers/monitoring/grafana/default.nix
··· 2 3 buildGoModule rec { 4 pname = "grafana"; 5 - version = "8.3.6"; 6 7 excludedPackages = "\\(alert_webhook_listener\\|clean-swagger\\|release_publisher\\|slow_proxy\\|slow_proxy_mac\\|macaron\\)"; 8 ··· 10 rev = "v${version}"; 11 owner = "grafana"; 12 repo = "grafana"; 13 - sha256 = "sha256-XYgSXgZJKsVYMtlvMq84OuQBbrbFJUh6m/lKCbOlzus="; 14 }; 15 16 srcStatic = fetchurl { 17 url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz"; 18 - sha256 = "sha256-8gR95+xCJD3e25WxbmtXBMsS7HdbB+vwrcZ9sApSxFk="; 19 }; 20 21 - vendorSha256 = "sha256:0bj9a45jciaayqlrakdndzjdw4x600xw48wwy1id4n50h2mkrbp8"; 22 23 nativeBuildInputs = [ wire ]; 24
··· 2 3 buildGoModule rec { 4 pname = "grafana"; 5 + version = "8.4.1"; 6 7 excludedPackages = "\\(alert_webhook_listener\\|clean-swagger\\|release_publisher\\|slow_proxy\\|slow_proxy_mac\\|macaron\\)"; 8 ··· 10 rev = "v${version}"; 11 owner = "grafana"; 12 repo = "grafana"; 13 + sha256 = "sha256-RVEgqFEwvXTHE8Kvc1q+0o+V3mEHtURQR/7x3Qcmtpg="; 14 }; 15 16 srcStatic = fetchurl { 17 url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz"; 18 + sha256 = "sha256-RTupkQ9LlppJeyfmgGMztMW2m+sJXkJuDAdtpcyRGe0="; 19 }; 20 21 + vendorSha256 = "sha256-RugV5cHlpR739CA1C/7FkXasvkv18m7pPsK6mxfSkC0="; 22 23 nativeBuildInputs = [ wire ]; 24
+4 -4
pkgs/servers/ombi/default.nix
··· 10 "Unsupported system: ${stdenv.hostPlatform.system}"); 11 12 hash = { 13 - x64-linux_hash = "sha256-BLtoT6UHsur+jFp4KBlE10/Z/V6RDy0k16H10IC98WQ="; 14 - arm64-linux_hash = "sha256-s8EV/VqiUXWRTNxacx4sy6r+TIAqkqhESAYYa9s0uAQ="; 15 - x64-osx_hash = "sha256-woXFYmX+499NTtWmmGBpZ12PxTUazJ8klA6IPQIDjLE="; 16 }."${arch}-${os}_hash"; 17 18 in stdenv.mkDerivation rec { 19 pname = "ombi"; 20 - version = "4.3.3"; 21 22 sourceRoot = "."; 23
··· 10 "Unsupported system: ${stdenv.hostPlatform.system}"); 11 12 hash = { 13 + x64-linux_hash = "sha256-O/dfLZst7RFnqDZj8UX6ejL2EBjGnCBY3e8JB3peRgY="; 14 + arm64-linux_hash = "sha256-DkCOK1A7L1gMqY/XPIJFFz7qvUvxA6aJa24Hrh3dT/U="; 15 + x64-osx_hash = "sha256-4N0/FTVhxUooauhh+7u527aViSBILiCb+a4cI17QTAg="; 16 }."${arch}-${os}_hash"; 17 18 in stdenv.mkDerivation rec { 19 pname = "ombi"; 20 + version = "4.10.2"; 21 22 sourceRoot = "."; 23
+2 -2
pkgs/servers/ombi/update.sh
··· 15 16 url="https://github.com/Ombi-app/Ombi/releases/download/v$version/$os-$arch.tar.gz" 17 hash=$(nix-prefetch-url --type sha256 $url) 18 - sriHash="$(nix --extra-experimental-features nix-command hash to-sri --type sha256 $hash)" 19 20 sed -i "s|$hashKey = \"[a-zA-Z0-9\/+-=]*\";|$hashKey = \"$sriHash\";|g" "$dirname/default.nix" 21 } ··· 25 sed -i "s/version = \"[0-9.]*\";/version = \"$1\";/g" "$dirname/default.nix" 26 } 27 28 - currentVersion=$(cd $dirname && nix eval --raw '(with import ../../.. {}; ombi.version)') 29 30 latestTag=$(curl https://api.github.com/repos/Ombi-App/Ombi/releases/latest | jq -r ".tag_name") 31 latestVersion="$(expr $latestTag : 'v\(.*\)')"
··· 15 16 url="https://github.com/Ombi-app/Ombi/releases/download/v$version/$os-$arch.tar.gz" 17 hash=$(nix-prefetch-url --type sha256 $url) 18 + sriHash="$(nix hash to-sri --type sha256 $hash)" 19 20 sed -i "s|$hashKey = \"[a-zA-Z0-9\/+-=]*\";|$hashKey = \"$sriHash\";|g" "$dirname/default.nix" 21 } ··· 25 sed -i "s/version = \"[0-9.]*\";/version = \"$1\";/g" "$dirname/default.nix" 26 } 27 28 + currentVersion=$(cd $dirname && nix eval --raw -f ../../.. ombi.version) 29 30 latestTag=$(curl https://api.github.com/repos/Ombi-App/Ombi/releases/latest | jq -r ".tag_name") 31 latestVersion="$(expr $latestTag : 'v\(.*\)')"
+3 -3
pkgs/tools/admin/fits-cloudctl/default.nix
··· 5 6 buildGoModule rec { 7 pname = "fits-cloudctl"; 8 - version = "0.10.7"; 9 10 src = fetchFromGitHub { 11 owner = "fi-ts"; 12 repo = "cloudctl"; 13 rev = "v${version}"; 14 - sha256 = "sha256-oqG9E1sSmpV2S7ywLCBRFs9d3Tbv5uxrbRh5DwpktkA="; 15 }; 16 17 - vendorSha256 = "sha256-+2KgRGQIkTHbVzFIv0FVLWuDegk7pZ/H+u07A1PjM/4="; 18 19 meta = with lib; { 20 description = "Command-line client for FI-TS Finance Cloud Native services";
··· 5 6 buildGoModule rec { 7 pname = "fits-cloudctl"; 8 + version = "0.10.8"; 9 10 src = fetchFromGitHub { 11 owner = "fi-ts"; 12 repo = "cloudctl"; 13 rev = "v${version}"; 14 + sha256 = "sha256-vqzHZ7DW4ev5soFMcafgL/81k6vCsm6Ds5yto/VheX8="; 15 }; 16 17 + vendorSha256 = "sha256-f35Asf9l6ZfixpjMGzesTsxmANreilMxH2CULMH3b2o="; 18 19 meta = with lib; { 20 description = "Command-line client for FI-TS Finance Cloud Native services";
+3 -3
pkgs/tools/security/kbs2/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "kbs2"; 5 - version = "0.4.0"; 6 7 src = fetchFromGitHub { 8 owner = "woodruffw"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "1bipphrzfz4dfzaqn1q60qazs7ylcx0b34gyl4q6d6jivsrhi8a4"; 12 }; 13 14 - cargoSha256 = "0r254k85hqf2v8kdhwld8k7b350qjvkwfw2v22ikk2b41b2g4gbw"; 15 16 nativeBuildInputs = [ installShellFiles ] 17 ++ lib.optionals stdenv.isLinux [ python3 ];
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "kbs2"; 5 + version = "0.5.1"; 6 7 src = fetchFromGitHub { 8 owner = "woodruffw"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-GKjumkeo7aAYaECa6NoXCiXU2kqekBX3wCysRz8seW4="; 12 }; 13 14 + cargoSha256 = "sha256-rJ110kd18V2VGj0AHix3/vI09FG2kJ+TTOYKIthIrjQ="; 15 16 nativeBuildInputs = [ installShellFiles ] 17 ++ lib.optionals stdenv.isLinux [ python3 ];
+4 -4
pkgs/tools/security/rekor/default.nix
··· 4 generic = { pname, packageToBuild, description }: 5 buildGoModule rec { 6 inherit pname; 7 - version = "0.4.0"; 8 9 src = fetchFromGitHub { 10 owner = "sigstore"; 11 repo = "rekor"; 12 rev = "v${version}"; 13 - sha256 = "sha256-15p4hm4Cvs/yLaQIcxctVdMKRWPjIIFwBcbru6QcjXo="; 14 }; 15 16 - vendorSha256 = "sha256-XCCO4Vamzj5pJFmu1A8mpTLlVAtocrn20myYJVWtBrY="; 17 18 nativeBuildInputs = [ installShellFiles ]; 19 20 subPackages = [ packageToBuild ]; 21 22 - ldflags = [ "-s" "-w" "-X github.com/sigstore/rekor/${packageToBuild}/app.GitVersion=v${version}" ]; 23 24 postInstall = '' 25 installShellCompletion --cmd ${pname} \
··· 4 generic = { pname, packageToBuild, description }: 5 buildGoModule rec { 6 inherit pname; 7 + version = "0.5.0"; 8 9 src = fetchFromGitHub { 10 owner = "sigstore"; 11 repo = "rekor"; 12 rev = "v${version}"; 13 + sha256 = "sha256-y8klkb0hyITxLhcNWF7RYRVwF8rclDKzQF/MJs6y//Y="; 14 }; 15 16 + vendorSha256 = "sha256-0PPdnE3ND/YNIk50XkgBROpe5OhFiFre5Lwsml02DQU="; 17 18 nativeBuildInputs = [ installShellFiles ]; 19 20 subPackages = [ packageToBuild ]; 21 22 + ldflags = [ "-s" "-w" "-X github.com/sigstore/rekor/pkg/api.GitVersion=v${version}" ]; 23 24 postInstall = '' 25 installShellCompletion --cmd ${pname} \
+1 -1
pkgs/top-level/all-packages.nix
··· 1238 lilo = callPackage ../tools/misc/lilo { }; 1239 1240 logseq = callPackage ../applications/misc/logseq { 1241 - electron = electron_16; 1242 }; 1243 1244 natls = callPackage ../tools/misc/natls { };
··· 1238 lilo = callPackage ../tools/misc/lilo { }; 1239 1240 logseq = callPackage ../applications/misc/logseq { 1241 + electron = electron_15; 1242 }; 1243 1244 natls = callPackage ../tools/misc/natls { };
+2
pkgs/top-level/python-packages.nix
··· 9332 inherit (pkgs) plantuml; 9333 }; 9334 9335 sphinxcontrib-qthelp = callPackage ../development/python-modules/sphinxcontrib-qthelp { }; 9336 9337 sphinxcontrib-serializinghtml = callPackage ../development/python-modules/sphinxcontrib-serializinghtml { };
··· 9332 inherit (pkgs) plantuml; 9333 }; 9334 9335 + sphinxcontrib-programoutput = callPackage ../development/python-modules/sphinxcontrib-programoutput { }; 9336 + 9337 sphinxcontrib-qthelp = callPackage ../development/python-modules/sphinxcontrib-qthelp { }; 9338 9339 sphinxcontrib-serializinghtml = callPackage ../development/python-modules/sphinxcontrib-serializinghtml { };