Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 6d833d00 3fb2e481

+370 -339
+6
maintainers/maintainer-list.nix
··· 12667 fingerprint = "3586 3350 BFEA C101 DB1A 4AF0 1F81 112D 62A9 ADCE"; 12668 }]; 12669 }; 12670 qknight = { 12671 email = "js@lastlog.de"; 12672 github = "qknight";
··· 12667 fingerprint = "3586 3350 BFEA C101 DB1A 4AF0 1F81 112D 62A9 ADCE"; 12668 }]; 12669 }; 12670 + qjoly = { 12671 + email = "github@thoughtless.eu"; 12672 + github = "qjoly"; 12673 + githubId = 82603435; 12674 + name = "Quentin JOLY"; 12675 + }; 12676 qknight = { 12677 email = "js@lastlog.de"; 12678 github = "qknight";
+59 -43
nixos/modules/services/security/kanidm.nix
··· 7 serverConfigFile = settingsFormat.generate "server.toml" (filterConfig cfg.serverSettings); 8 clientConfigFile = settingsFormat.generate "kanidm-config.toml" (filterConfig cfg.clientSettings); 9 unixConfigFile = settingsFormat.generate "kanidm-unixd.toml" (filterConfig cfg.unixSettings); 10 11 defaultServiceConfig = { 12 BindReadOnlyPaths = [ ··· 16 "-/etc/hosts" 17 "-/etc/localtime" 18 ]; 19 - CapabilityBoundingSet = ""; 20 # ProtectClock= adds DeviceAllow=char-rtc r 21 DeviceAllow = ""; 22 # Implies ProtectSystem=strict, which re-mounts all paths ··· 216 description = "kanidm identity management daemon"; 217 wantedBy = [ "multi-user.target" ]; 218 after = [ "network.target" ]; 219 - serviceConfig = defaultServiceConfig // { 220 - StateDirectory = "kanidm"; 221 - StateDirectoryMode = "0700"; 222 - ExecStart = "${pkgs.kanidm}/bin/kanidmd server -c ${serverConfigFile}"; 223 - User = "kanidm"; 224 - Group = "kanidm"; 225 226 - AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; 227 - CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; 228 - # This would otherwise override the CAP_NET_BIND_SERVICE capability. 229 - PrivateUsers = false; 230 - # Port needs to be exposed to the host network 231 - PrivateNetwork = false; 232 - RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 233 - TemporaryFileSystem = "/:ro"; 234 - }; 235 environment.RUST_LOG = "info"; 236 }; 237 ··· 240 wantedBy = [ "multi-user.target" ]; 241 after = [ "network.target" ]; 242 restartTriggers = [ unixConfigFile clientConfigFile ]; 243 - serviceConfig = defaultServiceConfig // { 244 - CacheDirectory = "kanidm-unixd"; 245 - CacheDirectoryMode = "0700"; 246 - RuntimeDirectory = "kanidm-unixd"; 247 - ExecStart = "${pkgs.kanidm}/bin/kanidm_unixd"; 248 - User = "kanidm-unixd"; 249 - Group = "kanidm-unixd"; 250 251 - BindReadOnlyPaths = [ 252 - "/nix/store" 253 - "-/etc/resolv.conf" 254 - "-/etc/nsswitch.conf" 255 - "-/etc/hosts" 256 - "-/etc/localtime" 257 - "-/etc/kanidm" 258 - "-/etc/static/kanidm" 259 - "-/etc/ssl" 260 - "-/etc/static/ssl" 261 - ]; 262 - BindPaths = [ 263 - # To create the socket 264 - "/run/kanidm-unixd:/var/run/kanidm-unixd" 265 - ]; 266 - # Needs to connect to kanidmd 267 - PrivateNetwork = false; 268 - RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ]; 269 - TemporaryFileSystem = "/:ro"; 270 - }; 271 environment.RUST_LOG = "info"; 272 }; 273
··· 7 serverConfigFile = settingsFormat.generate "server.toml" (filterConfig cfg.serverSettings); 8 clientConfigFile = settingsFormat.generate "kanidm-config.toml" (filterConfig cfg.clientSettings); 9 unixConfigFile = settingsFormat.generate "kanidm-unixd.toml" (filterConfig cfg.unixSettings); 10 + certPaths = builtins.map builtins.dirOf [ cfg.serverSettings.tls_chain cfg.serverSettings.tls_key ]; 11 + 12 + # Merge bind mount paths and remove paths where a prefix is already mounted. 13 + # This makes sure that if e.g. the tls_chain is in the nix store and /nix/store is alread in the mount 14 + # paths, no new bind mount is added. Adding subpaths caused problems on ofborg. 15 + hasPrefixInList = list: newPath: lib.any (path: lib.hasPrefix (builtins.toString path) (builtins.toString newPath)) list; 16 + mergePaths = lib.foldl' (merged: newPath: let 17 + # If the new path is a prefix to some existing path, we need to filter it out 18 + filteredPaths = lib.filter (p: !lib.hasPrefix (builtins.toString newPath) (builtins.toString p)) merged; 19 + # If a prefix of the new path is already in the list, do not add it 20 + filteredNew = if hasPrefixInList filteredPaths newPath then [] else [ newPath ]; 21 + in filteredPaths ++ filteredNew) []; 22 23 defaultServiceConfig = { 24 BindReadOnlyPaths = [ ··· 28 "-/etc/hosts" 29 "-/etc/localtime" 30 ]; 31 + CapabilityBoundingSet = []; 32 # ProtectClock= adds DeviceAllow=char-rtc r 33 DeviceAllow = ""; 34 # Implies ProtectSystem=strict, which re-mounts all paths ··· 228 description = "kanidm identity management daemon"; 229 wantedBy = [ "multi-user.target" ]; 230 after = [ "network.target" ]; 231 + serviceConfig = lib.mkMerge [ 232 + # Merge paths and ignore existing prefixes needs to sidestep mkMerge 233 + (defaultServiceConfig // { 234 + BindReadOnlyPaths = mergePaths (defaultServiceConfig.BindReadOnlyPaths ++ certPaths); 235 + }) 236 + { 237 + StateDirectory = "kanidm"; 238 + StateDirectoryMode = "0700"; 239 + ExecStart = "${pkgs.kanidm}/bin/kanidmd server -c ${serverConfigFile}"; 240 + User = "kanidm"; 241 + Group = "kanidm"; 242 243 + AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; 244 + CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; 245 + # This would otherwise override the CAP_NET_BIND_SERVICE capability. 246 + PrivateUsers = lib.mkForce false; 247 + # Port needs to be exposed to the host network 248 + PrivateNetwork = lib.mkForce false; 249 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 250 + TemporaryFileSystem = "/:ro"; 251 + } 252 + ]; 253 environment.RUST_LOG = "info"; 254 }; 255 ··· 258 wantedBy = [ "multi-user.target" ]; 259 after = [ "network.target" ]; 260 restartTriggers = [ unixConfigFile clientConfigFile ]; 261 + serviceConfig = lib.mkMerge [ 262 + defaultServiceConfig 263 + { 264 + CacheDirectory = "kanidm-unixd"; 265 + CacheDirectoryMode = "0700"; 266 + RuntimeDirectory = "kanidm-unixd"; 267 + ExecStart = "${pkgs.kanidm}/bin/kanidm_unixd"; 268 + User = "kanidm-unixd"; 269 + Group = "kanidm-unixd"; 270 271 + BindReadOnlyPaths = [ 272 + "-/etc/kanidm" 273 + "-/etc/static/kanidm" 274 + "-/etc/ssl" 275 + "-/etc/static/ssl" 276 + ]; 277 + BindPaths = [ 278 + # To create the socket 279 + "/run/kanidm-unixd:/var/run/kanidm-unixd" 280 + ]; 281 + # Needs to connect to kanidmd 282 + PrivateNetwork = lib.mkForce false; 283 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ]; 284 + TemporaryFileSystem = "/:ro"; 285 + } 286 + ]; 287 environment.RUST_LOG = "info"; 288 }; 289
+2 -2
nixos/tests/kanidm.nix
··· 44 }; 45 }; 46 47 - networking.hosts."${nodes.server.config.networking.primaryIPAddress}" = [ serverDomain ]; 48 49 security.pki.certificateFiles = [ certs.ca.cert ]; 50 }; ··· 56 # We need access to the config file in the test script. 57 filteredConfig = pkgs.lib.converge 58 (pkgs.lib.filterAttrsRecursive (_: v: v != null)) 59 - nodes.server.config.services.kanidm.serverSettings; 60 serverConfigFile = (pkgs.formats.toml { }).generate "server.toml" filteredConfig; 61 62 in
··· 44 }; 45 }; 46 47 + networking.hosts."${nodes.server.networking.primaryIPAddress}" = [ serverDomain ]; 48 49 security.pki.certificateFiles = [ certs.ca.cert ]; 50 }; ··· 56 # We need access to the config file in the test script. 57 filteredConfig = pkgs.lib.converge 58 (pkgs.lib.filterAttrsRecursive (_: v: v != null)) 59 + nodes.server.services.kanidm.serverSettings; 60 serverConfigFile = (pkgs.formats.toml { }).generate "server.toml" filteredConfig; 61 62 in
+2 -2
pkgs/applications/misc/logseq/default.nix
··· 10 11 stdenv.mkDerivation rec { 12 pname = "logseq"; 13 - version = "0.9.2"; 14 15 src = fetchurl { 16 url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; 17 - hash = "sha256-nXNzUHZXh2NGcg/OXRKhag/BWLB/YOAkCPITiBiMIIE="; 18 name = "${pname}-${version}.AppImage"; 19 }; 20
··· 10 11 stdenv.mkDerivation rec { 12 pname = "logseq"; 13 + version = "0.9.3"; 14 15 src = fetchurl { 16 url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; 17 + hash = "sha256-hwBTS6hjD66SPOPctcS2esybnVrgw77fFpt8phGt334="; 18 name = "${pname}-${version}.AppImage"; 19 }; 20
+3 -3
pkgs/applications/networking/cluster/fn-cli/default.nix
··· 2 3 buildGoModule rec { 4 pname = "fn"; 5 - version = "0.6.23"; 6 7 src = fetchFromGitHub { 8 owner = "fnproject"; 9 repo = "cli"; 10 rev = version; 11 - hash = "sha256-3g8S3cJ3RC06rvPMyQSKf8L4DkDTZ0Oe+6eh+rwyqg8="; 12 }; 13 14 - vendorSha256 = null; 15 16 subPackages = ["."]; 17
··· 2 3 buildGoModule rec { 4 pname = "fn"; 5 + version = "0.6.24"; 6 7 src = fetchFromGitHub { 8 owner = "fnproject"; 9 repo = "cli"; 10 rev = version; 11 + hash = "sha256-em9Bfrk7jJdmg3N+zH0VTpCdKPEOBK8vc297V5vmKzM="; 12 }; 13 14 + vendorHash = null; 15 16 subPackages = ["."]; 17
+3 -3
pkgs/applications/networking/cluster/helm/default.nix
··· 2 3 buildGoModule rec { 4 pname = "kubernetes-helm"; 5 - version = "3.11.2"; 6 7 src = fetchFromGitHub { 8 owner = "helm"; 9 repo = "helm"; 10 rev = "v${version}"; 11 - sha256 = "sha256-aUzVICPCxAUoPvnE7pqz+bscfukbEwB+iGmXAYuQ/eE="; 12 }; 13 - vendorSha256 = "sha256-Hf4ElC3H5sJkzKFELeDygTmfuqBHLqRhaHG1bfnqigM="; 14 15 subPackages = [ "cmd/helm" ]; 16 ldflags = [
··· 2 3 buildGoModule rec { 4 pname = "kubernetes-helm"; 5 + version = "3.11.3"; 6 7 src = fetchFromGitHub { 8 owner = "helm"; 9 repo = "helm"; 10 rev = "v${version}"; 11 + sha256 = "sha256-BIjbSHs0sOLYB+26EHy9f3YJtUYnzgdADIXB4n45Rv0="; 12 }; 13 + vendorHash = "sha256-uz3ZqCcT+rmhNCO+y3PuCXWjTxUx8u3XDgcJxt7A37g="; 14 15 subPackages = [ "cmd/helm" ]; 16 ldflags = [
+3 -3
pkgs/applications/networking/cluster/linkerd/default.nix
··· 2 3 (callPackage ./generic.nix { }) { 4 channel = "stable"; 5 - version = "2.12.4"; 6 - sha256 = "1nl831xjhxyw1r2zvdxy3455sfn1cnn6970n02q7aalmqgz9rpdd"; 7 - vendorSha256 = "sha256-c7x2vNO6ap5Ecx4+1hKy6PImFuclSQqvkBKr0LPdX4M="; 8 }
··· 2 3 (callPackage ./generic.nix { }) { 4 channel = "stable"; 5 + version = "2.13.1"; 6 + sha256 = "1qsf2d4haqs93qf88f2vvjsgm5a5gnmivkdpdbvpwy0q8bd8rfnj"; 7 + vendorSha256 = "sha256-6KuXEKuQJvRNUM+6Uo+J9D3eHI+1tt62C5XZsEDwkTc="; 8 }
+30
pkgs/applications/networking/cluster/nova/default.nix
···
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "nova"; 5 + version = "3.6.2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "FairwindsOps"; 9 + repo = pname; 10 + rev = version; 11 + hash = "sha256-l2HBjM5DyeWkdAwQGzPp+A3UuXXc0OTizInsVL0k/0I="; 12 + }; 13 + 14 + vendorHash = "sha256-YvYfSb2ZC86S2osFRG7Ep9nrgYJV0tB8fBgZQZ07t2U="; 15 + 16 + ldflags = [ "-X main.version=${version}" "-s" "-w" ]; 17 + 18 + meta = with lib; { 19 + description = "Find outdated or deprecated Helm charts running in your cluster"; 20 + longDescription = '' 21 + Nova scans your cluster for installed Helm charts, then 22 + cross-checks them against all known Helm repositories. If it 23 + finds an updated version of the chart you're using, or notices 24 + your current version is deprecated, it will let you know. 25 + ''; 26 + homepage = "https://nova.docs.fairwinds.com/"; 27 + license = licenses.asl20; 28 + maintainers = with maintainers; [ qjoly ]; 29 + }; 30 + }
+3 -3
pkgs/applications/networking/cluster/pluto/default.nix
··· 2 3 buildGoModule rec { 4 pname = "pluto"; 5 - version = "5.16.0"; 6 7 src = fetchFromGitHub { 8 owner = "FairwindsOps"; 9 repo = "pluto"; 10 rev = "v${version}"; 11 - sha256 = "sha256-M5zTnzuei/sECvRe89Dau72iIUuMtaLJyYTGeEF4GPo="; 12 }; 13 14 - vendorHash = "sha256-3wtE2Cz+AVF+zfsLH/+6KMHPihYcuYsrzTguHNnwT+U="; 15 16 ldflags = [ 17 "-w" "-s"
··· 2 3 buildGoModule rec { 4 pname = "pluto"; 5 + version = "5.16.1"; 6 7 src = fetchFromGitHub { 8 owner = "FairwindsOps"; 9 repo = "pluto"; 10 rev = "v${version}"; 11 + sha256 = "sha256-UCq+aMUffvDWmPtSSc/PNbrak1LGWQe8Oe340O5q6LM="; 12 }; 13 14 + vendorHash = "sha256-0VFCZ+U0W21tF35148Valpc7fDXkC9dPpz1O0+4D30U="; 15 16 ldflags = [ 17 "-w" "-s"
+27 -27
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 119 "vendorHash": "sha256-t6Hg1FLCd4dh6d3J0uNsNKKnz5T8/yoIXFo7bRO+XHM=" 120 }, 121 "azuread": { 122 - "hash": "sha256-qFDCGj1ZhLnqG3Vg1bI+cdbExIbmDZaig9VYg6caWd0=", 123 "homepage": "https://registry.terraform.io/providers/hashicorp/azuread", 124 "owner": "hashicorp", 125 "repo": "terraform-provider-azuread", 126 - "rev": "v2.37.1", 127 "spdx": "MPL-2.0", 128 "vendorHash": null 129 }, ··· 218 "vendorHash": "sha256-w7Rsr3UgijW/3RMKzhMyWCvn5b1R1oqRs87/ZPO7jHs=" 219 }, 220 "cloudflare": { 221 - "hash": "sha256-dhSjFeTkbiG/Gx/DS1WzW2b31u3apfXX4Safh29e6Fw=", 222 "homepage": "https://registry.terraform.io/providers/cloudflare/cloudflare", 223 "owner": "cloudflare", 224 "repo": "terraform-provider-cloudflare", 225 - "rev": "v4.3.0", 226 "spdx": "MPL-2.0", 227 - "vendorHash": "sha256-sgJ1HhhWQpvOGFVEC43pymBKyVcqdn8jLlW5fR21mFE=" 228 }, 229 "cloudfoundry": { 230 "hash": "sha256-MKhsUGuDpKfYFf9Vk0uVrP/Z4hnQyO+2WiqWXO9EAC0=", ··· 354 "vendorHash": "sha256-oVTanZpCWs05HwyIKW2ajiBPz1HXOFzBAt5Us+EtTRw=" 355 }, 356 "equinix": { 357 - "hash": "sha256-zyRPpAaDgjRafn5RcrzmbVTzO6gGS1HMmvLR8VFdKow=", 358 "homepage": "https://registry.terraform.io/providers/equinix/equinix", 359 "owner": "equinix", 360 "repo": "terraform-provider-equinix", 361 - "rev": "v1.13.0", 362 "spdx": "MIT", 363 - "vendorHash": "sha256-Zi2e/Vg9iKTrU8Mb37Y8xHYIBL+IfDnWMUUg5Vqrbfo=" 364 }, 365 "exoscale": { 366 "hash": "sha256-XbuVvVOv8k7T/7smr73+lvhFMxKtJkaLN3WgvTWIkrA=", ··· 381 "vendorHash": "sha256-E1gzdES/YVxQq2J47E2zosvud2C/ViBeQ8+RfNHMBAg=" 382 }, 383 "fastly": { 384 - "hash": "sha256-YKF4aW+K5JffPd5b3Kh540ml0uc9q5WSvcNgj9g6/Bk=", 385 "homepage": "https://registry.terraform.io/providers/fastly/fastly", 386 "owner": "fastly", 387 "repo": "terraform-provider-fastly", 388 - "rev": "v4.2.0", 389 "spdx": "MPL-2.0", 390 "vendorHash": null 391 }, ··· 437 "vendorHash": "sha256-s4FynUO6bT+8uZYkecbQCtFw1jFTAAYUkSzONI6Ba9g=" 438 }, 439 "google": { 440 - "hash": "sha256-vfcRR8EKR/axaD2RJ+3r3B1pmX1XSBYTBYPmwUTx3E8=", 441 "homepage": "https://registry.terraform.io/providers/hashicorp/google", 442 "owner": "hashicorp", 443 "proxyVendor": true, 444 "repo": "terraform-provider-google", 445 - "rev": "v4.62.0", 446 "spdx": "MPL-2.0", 447 "vendorHash": "sha256-Xm1P6P2tMLqjV9QFX6D7koBPzg4umTH6jCQesyt0A/A=" 448 }, 449 "google-beta": { 450 - "hash": "sha256-PksNHhTzIuZxTzFRheiNutEnQSJ2WRu/IgF+8b1w9Eg=", 451 "homepage": "https://registry.terraform.io/providers/hashicorp/google-beta", 452 "owner": "hashicorp", 453 "proxyVendor": true, 454 "repo": "terraform-provider-google-beta", 455 - "rev": "v4.62.0", 456 "spdx": "MPL-2.0", 457 "vendorHash": "sha256-Xm1P6P2tMLqjV9QFX6D7koBPzg4umTH6jCQesyt0A/A=" 458 }, ··· 810 "vendorHash": "sha256-LRIfxQGwG988HE5fftGl6JmBG7tTknvmgpm4Fu1NbWI=" 811 }, 812 "oci": { 813 - "hash": "sha256-27vdHG/FRWGPZclW9Q0z/6ntY+of/5/PGIsKsePhF4k=", 814 "homepage": "https://registry.terraform.io/providers/oracle/oci", 815 "owner": "oracle", 816 "repo": "terraform-provider-oci", 817 - "rev": "v4.116.0", 818 "spdx": "MPL-2.0", 819 "vendorHash": null 820 }, ··· 963 "vendorHash": null 964 }, 965 "scaleway": { 966 - "hash": "sha256-QIrIL0vqiZafggdfWchlSOzLRDCF5Zubh6MqwOzfr3Y=", 967 "homepage": "https://registry.terraform.io/providers/scaleway/scaleway", 968 "owner": "scaleway", 969 "repo": "terraform-provider-scaleway", 970 - "rev": "v2.16.3", 971 "spdx": "MPL-2.0", 972 - "vendorHash": "sha256-KUbE00fajvs4p8QxmuKV5IoRfCdWtfZTrOftcRAPSws=" 973 }, 974 "secret": { 975 "hash": "sha256-MmAnA/4SAPqLY/gYcJSTnEttQTsDd2kEdkQjQj6Bb+A=", ··· 1026 "vendorHash": null 1027 }, 1028 "snowflake": { 1029 - "hash": "sha256-IAS0IJwWBmZi0x32ZMWFRyiiPZrnL6z1SGQ3AxuFAd8=", 1030 "homepage": "https://registry.terraform.io/providers/Snowflake-Labs/snowflake", 1031 "owner": "Snowflake-Labs", 1032 "repo": "terraform-provider-snowflake", 1033 - "rev": "v0.61.0", 1034 "spdx": "MIT", 1035 - "vendorHash": "sha256-INAtZefgxjNpf/PWGLn8SS2PxKu3SBhY+06cEnr9V3g=" 1036 }, 1037 "sops": { 1038 "hash": "sha256-D1Yzs8hDimMP9y8ZRbizEhic3vGtLcZjOVSuSMUAqPk=", ··· 1098 "vendorHash": "sha256-GkmUKSnqkabwGCl22/90529BWb0oJaIJHYHlS/h3KNY=" 1099 }, 1100 "tencentcloud": { 1101 - "hash": "sha256-j1PffTicdXiit3D+dX9HzkBZFmf8Ch7LxNVU3XGi5uY=", 1102 "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", 1103 "owner": "tencentcloudstack", 1104 "repo": "terraform-provider-tencentcloud", 1105 - "rev": "v1.80.3", 1106 "spdx": "MPL-2.0", 1107 "vendorHash": null 1108 }, 1109 "tfe": { 1110 - "hash": "sha256-K0l9oaYkgilz47ErUxio9oJtPHQTWZnKdPpjRZ1SDhg=", 1111 "homepage": "https://registry.terraform.io/providers/hashicorp/tfe", 1112 "owner": "hashicorp", 1113 "repo": "terraform-provider-tfe", 1114 - "rev": "v0.43.0", 1115 "spdx": "MPL-2.0", 1116 - "vendorHash": "sha256-plYy3INLi/SeKu7R0lDLY1CvRDU7bmZsQKzFtMc2Wu4=" 1117 }, 1118 "thunder": { 1119 "hash": "sha256-amGtmE1i68K0ehhYBJ6wwcdUPuVGSWoVdYAb1PwhlAs=",
··· 119 "vendorHash": "sha256-t6Hg1FLCd4dh6d3J0uNsNKKnz5T8/yoIXFo7bRO+XHM=" 120 }, 121 "azuread": { 122 + "hash": "sha256-bCnCj2pEd29aQVePGeaTbVhH6sF/Y+lj94SEw1+tROc=", 123 "homepage": "https://registry.terraform.io/providers/hashicorp/azuread", 124 "owner": "hashicorp", 125 "repo": "terraform-provider-azuread", 126 + "rev": "v2.37.2", 127 "spdx": "MPL-2.0", 128 "vendorHash": null 129 }, ··· 218 "vendorHash": "sha256-w7Rsr3UgijW/3RMKzhMyWCvn5b1R1oqRs87/ZPO7jHs=" 219 }, 220 "cloudflare": { 221 + "hash": "sha256-DDoPVceQpRTN23JaQ79uXrEStBgtb7WWrKBIVpIpok4=", 222 "homepage": "https://registry.terraform.io/providers/cloudflare/cloudflare", 223 "owner": "cloudflare", 224 "repo": "terraform-provider-cloudflare", 225 + "rev": "v4.4.0", 226 "spdx": "MPL-2.0", 227 + "vendorHash": "sha256-b7h8CI1NeFAAXGdDsZ4CRXcomceoijon8IGriqP6tko=" 228 }, 229 "cloudfoundry": { 230 "hash": "sha256-MKhsUGuDpKfYFf9Vk0uVrP/Z4hnQyO+2WiqWXO9EAC0=", ··· 354 "vendorHash": "sha256-oVTanZpCWs05HwyIKW2ajiBPz1HXOFzBAt5Us+EtTRw=" 355 }, 356 "equinix": { 357 + "hash": "sha256-GGJNfHizFc+wXNo7u/mqtonIs5D/S8RydBsIkftNcjc=", 358 "homepage": "https://registry.terraform.io/providers/equinix/equinix", 359 "owner": "equinix", 360 "repo": "terraform-provider-equinix", 361 + "rev": "v1.14.0", 362 "spdx": "MIT", 363 + "vendorHash": "sha256-rJev48aS0nd8DRWmUN4i0LgDYvfjdfoO67N6AiWeg+k=" 364 }, 365 "exoscale": { 366 "hash": "sha256-XbuVvVOv8k7T/7smr73+lvhFMxKtJkaLN3WgvTWIkrA=", ··· 381 "vendorHash": "sha256-E1gzdES/YVxQq2J47E2zosvud2C/ViBeQ8+RfNHMBAg=" 382 }, 383 "fastly": { 384 + "hash": "sha256-Z38tG5Of+nYuIT3IxY/hxbV0HIgkITBnaXcr3oYIf6Y=", 385 "homepage": "https://registry.terraform.io/providers/fastly/fastly", 386 "owner": "fastly", 387 "repo": "terraform-provider-fastly", 388 + "rev": "v4.3.0", 389 "spdx": "MPL-2.0", 390 "vendorHash": null 391 }, ··· 437 "vendorHash": "sha256-s4FynUO6bT+8uZYkecbQCtFw1jFTAAYUkSzONI6Ba9g=" 438 }, 439 "google": { 440 + "hash": "sha256-rF68NnqyEY4BWl+oLOxfTaQw5zEGs6Ue/L9DwzsJ46M=", 441 "homepage": "https://registry.terraform.io/providers/hashicorp/google", 442 "owner": "hashicorp", 443 "proxyVendor": true, 444 "repo": "terraform-provider-google", 445 + "rev": "v4.62.1", 446 "spdx": "MPL-2.0", 447 "vendorHash": "sha256-Xm1P6P2tMLqjV9QFX6D7koBPzg4umTH6jCQesyt0A/A=" 448 }, 449 "google-beta": { 450 + "hash": "sha256-/wcNrCMaXjameyE3o09N+bPjL8r627BJy1vYy1u2iAI=", 451 "homepage": "https://registry.terraform.io/providers/hashicorp/google-beta", 452 "owner": "hashicorp", 453 "proxyVendor": true, 454 "repo": "terraform-provider-google-beta", 455 + "rev": "v4.62.1", 456 "spdx": "MPL-2.0", 457 "vendorHash": "sha256-Xm1P6P2tMLqjV9QFX6D7koBPzg4umTH6jCQesyt0A/A=" 458 }, ··· 810 "vendorHash": "sha256-LRIfxQGwG988HE5fftGl6JmBG7tTknvmgpm4Fu1NbWI=" 811 }, 812 "oci": { 813 + "hash": "sha256-9Qcwxi8TojsDIWeyqwQcagTeTwKS/hkPukjeHANHGfU=", 814 "homepage": "https://registry.terraform.io/providers/oracle/oci", 815 "owner": "oracle", 816 "repo": "terraform-provider-oci", 817 + "rev": "v4.117.0", 818 "spdx": "MPL-2.0", 819 "vendorHash": null 820 }, ··· 963 "vendorHash": null 964 }, 965 "scaleway": { 966 + "hash": "sha256-b0prqlZNPrg0YjvLk3RdJ+4C6eL4Tzdzt7Berp6G32c=", 967 "homepage": "https://registry.terraform.io/providers/scaleway/scaleway", 968 "owner": "scaleway", 969 "repo": "terraform-provider-scaleway", 970 + "rev": "v2.17.0", 971 "spdx": "MPL-2.0", 972 + "vendorHash": "sha256-tnZy6uN/lZaW4d6uo/quVAuEZZrXEX7qLAas0GauRJI=" 973 }, 974 "secret": { 975 "hash": "sha256-MmAnA/4SAPqLY/gYcJSTnEttQTsDd2kEdkQjQj6Bb+A=", ··· 1026 "vendorHash": null 1027 }, 1028 "snowflake": { 1029 + "hash": "sha256-/9TTK33XwMW8izM35y9sOZOKFc6/HC2/CCnX3JMzY3I=", 1030 "homepage": "https://registry.terraform.io/providers/Snowflake-Labs/snowflake", 1031 "owner": "Snowflake-Labs", 1032 "repo": "terraform-provider-snowflake", 1033 + "rev": "v0.62.0", 1034 "spdx": "MIT", 1035 + "vendorHash": "sha256-3Ry+XQxF39lXr3Ev+KOx0GatVbD0Sjs9Jai1VPjEDBE=" 1036 }, 1037 "sops": { 1038 "hash": "sha256-D1Yzs8hDimMP9y8ZRbizEhic3vGtLcZjOVSuSMUAqPk=", ··· 1098 "vendorHash": "sha256-GkmUKSnqkabwGCl22/90529BWb0oJaIJHYHlS/h3KNY=" 1099 }, 1100 "tencentcloud": { 1101 + "hash": "sha256-soskWCOJaPzm2m2ocv3N8hb52Jz/T3xw/sW9hCSsf2s=", 1102 "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", 1103 "owner": "tencentcloudstack", 1104 "repo": "terraform-provider-tencentcloud", 1105 + "rev": "v1.80.4", 1106 "spdx": "MPL-2.0", 1107 "vendorHash": null 1108 }, 1109 "tfe": { 1110 + "hash": "sha256-y2QBMxn8sXwtL1wASypbARLn80T2eVJuawoQ0XQlK38=", 1111 "homepage": "https://registry.terraform.io/providers/hashicorp/tfe", 1112 "owner": "hashicorp", 1113 "repo": "terraform-provider-tfe", 1114 + "rev": "v0.44.0", 1115 "spdx": "MPL-2.0", 1116 + "vendorHash": "sha256-vKIbswlWQUIPeaFRAMPGygM/UlWiRIr66NuTNfnpGpc=" 1117 }, 1118 "thunder": { 1119 "hash": "sha256-amGtmE1i68K0ehhYBJ6wwcdUPuVGSWoVdYAb1PwhlAs=",
+5 -2
pkgs/applications/networking/dnscontrol/default.nix
··· 1 - { lib, fetchFromGitHub, buildGoModule }: 2 3 buildGoModule rec { 4 pname = "dnscontrol"; ··· 13 14 vendorHash = "sha256-BE/UnJw5elHYmyB+quN89ZkrlMcTjaVN0T2+h8cpPS8="; 15 16 - ldflags = [ "-s" "-w" ]; 17 18 preCheck = '' 19 # requires network ··· 23 meta = with lib; { 24 description = "Synchronize your DNS to multiple providers from a simple DSL"; 25 homepage = "https://stackexchange.github.io/dnscontrol/"; 26 license = licenses.mit; 27 maintainers = with maintainers; [ mmahut SuperSandro2000 ]; 28 };
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 3 buildGoModule rec { 4 pname = "dnscontrol"; ··· 13 14 vendorHash = "sha256-BE/UnJw5elHYmyB+quN89ZkrlMcTjaVN0T2+h8cpPS8="; 15 16 + subPackages = [ "." ]; 17 + 18 + ldflags = [ "-s" "-w" "-X=main.Version=${version}" ]; 19 20 preCheck = '' 21 # requires network ··· 25 meta = with lib; { 26 description = "Synchronize your DNS to multiple providers from a simple DSL"; 27 homepage = "https://stackexchange.github.io/dnscontrol/"; 28 + changelog = "https://github.com/StackExchange/dnscontrol/releases/tag/${src.rev}"; 29 license = licenses.mit; 30 maintainers = with maintainers; [ mmahut SuperSandro2000 ]; 31 };
+5 -4
pkgs/applications/science/biology/tandem-aligner/default.nix
··· 6 , zlib 7 }: 8 9 - stdenv.mkDerivation { 10 pname = "TandemAligner"; 11 - version = "unstable-2022-09-17"; 12 13 src = fetchFromGitHub { 14 owner = "seryrzu"; 15 repo = "tandem_aligner"; 16 - rev = "ac6004f108ad20477045f4d0b037d96051a9df70"; 17 hash = "sha256-iMDj1HZ8LzmZckuAM3lbG3eSJSd/5JGVA6SBs7+AgX8="; 18 }; 19 ··· 58 meta = { 59 description = "A parameter-free algorithm for sequence alignment"; 60 homepage = "https://github.com/seryrzu/tandem_aligner"; 61 license = lib.licenses.bsd3; 62 maintainers = with lib.maintainers; [ amesgen ]; 63 platforms = lib.platforms.linux; 64 mainProgram = "tandem_aligner"; 65 }; 66 - }
··· 6 , zlib 7 }: 8 9 + stdenv.mkDerivation (finalAttrs: { 10 pname = "TandemAligner"; 11 + version = "0.1"; 12 13 src = fetchFromGitHub { 14 owner = "seryrzu"; 15 repo = "tandem_aligner"; 16 + rev = "v${finalAttrs.version}"; 17 hash = "sha256-iMDj1HZ8LzmZckuAM3lbG3eSJSd/5JGVA6SBs7+AgX8="; 18 }; 19 ··· 58 meta = { 59 description = "A parameter-free algorithm for sequence alignment"; 60 homepage = "https://github.com/seryrzu/tandem_aligner"; 61 + changelog = "https://github.com/seryrzu/tandem_aligner/releases/tag/v${finalAttrs.version}"; 62 license = lib.licenses.bsd3; 63 maintainers = with lib.maintainers; [ amesgen ]; 64 platforms = lib.platforms.linux; 65 mainProgram = "tandem_aligner"; 66 }; 67 + })
+2 -2
pkgs/applications/version-management/git-machete/default.nix
··· 12 13 buildPythonApplication rec { 14 pname = "git-machete"; 15 - version = "3.16.3"; 16 17 src = fetchFromGitHub { 18 owner = "virtuslab"; 19 repo = pname; 20 rev = "v${version}"; 21 - hash = "sha256-pd+ZK34dPSCwl8bOwH388NZ6QNIlU5TqL7EabsWw7kk="; 22 }; 23 24 nativeBuildInputs = [ installShellFiles ];
··· 12 13 buildPythonApplication rec { 14 pname = "git-machete"; 15 + version = "3.17.0"; 16 17 src = fetchFromGitHub { 18 owner = "virtuslab"; 19 repo = pname; 20 rev = "v${version}"; 21 + hash = "sha256-F+2xbfMsc6izL0f8EjDfGaJs17xDNQn8/k8mvnLYzcM="; 22 }; 23 24 nativeBuildInputs = [ installShellFiles ];
+17 -6
pkgs/applications/video/filebot/default.nix
··· 1 - { lib, stdenv, fetchurl, openjdk17, makeWrapper, autoPatchelfHook 2 , zlib, libzen, libmediainfo, curlWithGnuTls, libmms, glib 3 }: 4 5 - stdenv.mkDerivation rec { 6 pname = "filebot"; 7 - version = "5.0.1"; 8 9 src = fetchurl { 10 - url = "https://web.archive.org/web/20220305095926/https://get.filebot.net/filebot/FileBot_${version}/FileBot_${version}-portable.tar.xz"; 11 - sha256 = "sha256-0d0+o8ZiF1m83AasjoxUDNtUSquy69wFY1m1oYeybFw="; 12 }; 13 14 unpackPhase = "tar xvf $src"; ··· 17 18 buildInputs = [ zlib libzen libmediainfo curlWithGnuTls libmms glib ]; 19 20 dontBuild = true; 21 installPhase = '' 22 mkdir -p $out/opt $out/bin ··· 25 # Filebot writes to $APP_DATA, which fails due to read-only filesystem. Using current user .local directory instead. 26 substituteInPlace $out/opt/filebot.sh \ 27 --replace 'APP_DATA="$FILEBOT_HOME/data/$(id -u)"' 'APP_DATA=''${XDG_DATA_HOME:-$HOME/.local/share}/filebot/data' \ 28 - --replace '$FILEBOT_HOME/data/.license' '$APP_DATA/.license' 29 wrapProgram $out/opt/filebot.sh \ 30 --prefix PATH : ${lib.makeBinPath [ openjdk17 ]} 31 # Expose the binary in bin to make runnable.
··· 1 + { lib, stdenv, fetchurl, coreutils, openjdk17, makeWrapper, autoPatchelfHook 2 , zlib, libzen, libmediainfo, curlWithGnuTls, libmms, glib 3 }: 4 5 + let 6 + lanterna = fetchurl { 7 + url = "https://search.maven.org/remotecontent?filepath=com/googlecode/lanterna/lanterna/3.1.1/lanterna-3.1.1.jar"; 8 + hash = "sha256-7zxCeXYW5v9ritnvkwRpPKdgSptCmkT3HJOaNgQHUmQ="; 9 + }; 10 + in stdenv.mkDerivation rec { 11 pname = "filebot"; 12 + version = "5.0.2"; 13 14 src = fetchurl { 15 + url = "https://web.archive.org/web/20230418205553/https://get.filebot.net/filebot/FileBot_${version}/FileBot_${version}-portable.tar.xz"; 16 + hash = "sha256-XnzBXZy/gNA8qf7XairoviRmdQiXHbW19BgbHL52SP0="; 17 }; 18 19 unpackPhase = "tar xvf $src"; ··· 22 23 buildInputs = [ zlib libzen libmediainfo curlWithGnuTls libmms glib ]; 24 25 + postPatch = '' 26 + # replace lanterna.jar to be able to specify `com.googlecode.lanterna.terminal.UnixTerminal.sttyCommand` 27 + cp ${lanterna} jar/lanterna.jar 28 + ''; 29 + 30 dontBuild = true; 31 installPhase = '' 32 mkdir -p $out/opt $out/bin ··· 35 # Filebot writes to $APP_DATA, which fails due to read-only filesystem. Using current user .local directory instead. 36 substituteInPlace $out/opt/filebot.sh \ 37 --replace 'APP_DATA="$FILEBOT_HOME/data/$(id -u)"' 'APP_DATA=''${XDG_DATA_HOME:-$HOME/.local/share}/filebot/data' \ 38 + --replace '$FILEBOT_HOME/data/.license' '$APP_DATA/.license' \ 39 + --replace '-jar "$FILEBOT_HOME/jar/filebot.jar"' '-Dcom.googlecode.lanterna.terminal.UnixTerminal.sttyCommand=${coreutils}/bin/stty -jar "$FILEBOT_HOME/jar/filebot.jar"' 40 wrapProgram $out/opt/filebot.sh \ 41 --prefix PATH : ${lib.makeBinPath [ openjdk17 ]} 42 # Expose the binary in bin to make runnable.
+46
pkgs/data/fonts/whatsapp-emoji/default.nix
···
··· 1 + { stdenvNoCC 2 + , lib 3 + , fetchFromGitHub 4 + , imagemagick 5 + , nix-update-script 6 + , pngquant 7 + , python3Packages 8 + , which 9 + , zopfli 10 + }: 11 + 12 + stdenvNoCC.mkDerivation rec { 13 + pname = "whatsapp-emoji-linux"; 14 + version = "2.22.8.79-1"; 15 + 16 + src = fetchFromGitHub { 17 + rev = "refs/tags/${version}"; 18 + owner = "dmlls"; 19 + repo = "whatsapp-emoji-linux"; 20 + hash = "sha256-AYdyNZYskBNT3v2wl+M0BAYi5piwmrVIDfucSZ3nfTE="; 21 + }; 22 + 23 + makeFlags = [ 24 + "PREFIX=$(out)" 25 + ]; 26 + 27 + enableParallelBuilding = true; 28 + 29 + nativeBuildInputs = [ 30 + imagemagick 31 + pngquant 32 + python3Packages.nototools 33 + which 34 + zopfli 35 + ]; 36 + 37 + passthru.updateScript = nix-update-script { }; 38 + 39 + meta = { 40 + description = "WhatsApp Emoji for GNU/Linux"; 41 + homepage = "https://github.com/dmlls/whatsapp-emoji-linux"; 42 + maintainers = [ lib.maintainers.lucasew ]; 43 + sourceProvenance = [ lib.sourceTypes.fromSource ]; 44 + license = lib.licenses.unfree; 45 + }; 46 + }
+7 -5
pkgs/desktops/deepin/core/dde-file-manager/default.nix
··· 8 , dde-qt-dbus-factory 9 , docparser 10 , dde-dock 11 - , deepin-movie-reborn 12 , cmake 13 , qttools 14 , qtx11extras ··· 43 44 stdenv.mkDerivation rec { 45 pname = "dde-file-manager"; 46 - version = "6.0.14"; 47 48 src = fetchFromGitHub { 49 owner = "linuxdeepin"; 50 repo = pname; 51 rev = version; 52 - sha256 = "sha256-88Ddc3986hyFMA0bYCxiupASI+pGLqjb3igOHLA8Q/g="; 53 }; 54 55 nativeBuildInputs = [ ··· 91 buildInputs = [ 92 dtkwidget 93 qt5platform-plugins 94 - qt5integration 95 deepin-pdfium 96 util-dfm 97 dde-qt-dbus-factory 98 glibmm 99 docparser 100 dde-dock 101 - deepin-movie-reborn 102 qtx11extras 103 qtmultimedia 104 kcodecs ··· 126 ]; 127 128 enableParallelBuilding = true; 129 130 preFixup = '' 131 qtWrapperArgs+=("''${gappsWrapperArgs[@]}")
··· 8 , dde-qt-dbus-factory 9 , docparser 10 , dde-dock 11 , cmake 12 , qttools 13 , qtx11extras ··· 42 43 stdenv.mkDerivation rec { 44 pname = "dde-file-manager"; 45 + version = "6.0.15"; 46 47 src = fetchFromGitHub { 48 owner = "linuxdeepin"; 49 repo = pname; 50 rev = version; 51 + sha256 = "sha256-tG3Wl1AvwWhHmIIHgexv3mVVrmOwNrwn8k/sD4+WZzk="; 52 }; 53 54 nativeBuildInputs = [ ··· 90 buildInputs = [ 91 dtkwidget 92 qt5platform-plugins 93 deepin-pdfium 94 util-dfm 95 dde-qt-dbus-factory 96 glibmm 97 docparser 98 dde-dock 99 qtx11extras 100 qtmultimedia 101 kcodecs ··· 123 ]; 124 125 enableParallelBuilding = true; 126 + 127 + # qt5integration must be placed before qtsvg in QT_PLUGIN_PATH 128 + qtWrapperArgs = [ 129 + "--prefix QT_PLUGIN_PATH : ${qt5integration}/${qtbase.qtPluginPrefix}" 130 + ]; 131 132 preFixup = '' 133 qtWrapperArgs+=("''${gappsWrapperArgs[@]}")
+31 -34
pkgs/desktops/deepin/go-package/dde-daemon/0003-search-in-XDG-directories.patch
··· 1 - From 528f590c0c81728c324444fd76e0f7113a2e3dc4 Mon Sep 17 00:00:00 2001 2 - From: rewine <lhongxu@outlook.com> 3 - Date: Wed, 5 Apr 2023 23:41:25 +0800 4 Subject: [PATCH 3/4] search-in-XDG-directories 5 6 --- 7 accounts/manager.go | 5 ++++- 8 accounts/user.go | 8 +++++++- 9 appearance/fsnotify.go | 21 +++++++++++++++++---- 10 apps/utils.go | 3 ++- 11 - dock/desktop_file_path.go | 6 ++++++ 12 gesture/config.go | 4 ++-- 13 keybinding/shortcuts/system_shortcut.go | 4 +++- 14 mime/app_info.go | 7 ++++++- 15 system/gesture/config.go | 4 +++- 16 - 9 files changed, 50 insertions(+), 12 deletions(-) 17 18 diff --git a/accounts/manager.go b/accounts/manager.go 19 - index a5abb157..3fd7c153 100644 20 --- a/accounts/manager.go 21 +++ b/accounts/manager.go 22 @@ -15,6 +15,7 @@ import ( ··· 40 41 type InterfaceConfig struct { 42 diff --git a/accounts/user.go b/accounts/user.go 43 - index 99138941..56a7731a 100644 44 --- a/accounts/user.go 45 +++ b/accounts/user.go 46 @@ -15,6 +15,7 @@ import ( ··· 51 dbus "github.com/godbus/dbus" 52 "github.com/linuxdeepin/dde-daemon/accounts/users" 53 authenticate "github.com/linuxdeepin/go-dbus-factory/com.deepin.daemon.authenticate" 54 - @@ -645,7 +646,12 @@ func getUserSession(homeDir string) string { 55 } 56 57 func getSessionList() []string { ··· 119 120 m.watchDirs(iconDirs) 121 } 122 diff --git a/apps/utils.go b/apps/utils.go 123 index 8863d6c2..dd6f8e16 100644 124 --- a/apps/utils.go ··· 140 } 141 142 // get user home 143 - diff --git a/dock/desktop_file_path.go b/dock/desktop_file_path.go 144 - index 7adc9f55..e1a97679 100644 145 - --- a/dock/desktop_file_path.go 146 - +++ b/dock/desktop_file_path.go 147 - @@ -7,6 +7,8 @@ package dock 148 - import ( 149 - "path/filepath" 150 - "strings" 151 - + 152 - + "github.com/adrg/xdg" 153 - ) 154 - 155 - var pathDirCodeMap map[string]string 156 - @@ -20,6 +22,10 @@ func initPathDirCodeMap() { 157 - "/usr/local/share/applications/": "/L@", 158 - } 159 - 160 - + for _, dataPath := range xdg.DataDirs { 161 - + pathDirCodeMap[dataPath] = "/S@" 162 - + } 163 - + 164 - dir := filepath.Join(homeDir, ".local/share/applications") 165 - dir = addDirTrailingSlash(dir) 166 - pathDirCodeMap[dir] = "/H@" 167 diff --git a/gesture/config.go b/gesture/config.go 168 index bfbd4db7..4ce9d641 100644 169 --- a/gesture/config.go ··· 190 gsKeyTouchPadEnabled = "touch-pad-enabled" 191 gsKeyTouchScreenEnabled = "touch-screen-enabled" 192 diff --git a/keybinding/shortcuts/system_shortcut.go b/keybinding/shortcuts/system_shortcut.go 193 - index d33a69f6..c3138099 100644 194 --- a/keybinding/shortcuts/system_shortcut.go 195 +++ b/keybinding/shortcuts/system_shortcut.go 196 @@ -10,6 +10,7 @@ import ( ··· 253 + return filepath; 254 } 255 -- 256 - 2.39.2 257
··· 1 + From a0667a7e82b3176e64122f4d68c43de4fa350780 Mon Sep 17 00:00:00 2001 2 + From: rewine <luhongxu@deepin.org> 3 + Date: Tue, 18 Apr 2023 17:04:36 +0800 4 Subject: [PATCH 3/4] search-in-XDG-directories 5 6 --- 7 accounts/manager.go | 5 ++++- 8 accounts/user.go | 8 +++++++- 9 appearance/fsnotify.go | 21 +++++++++++++++++---- 10 + appearance/ifc.go | 3 ++- 11 apps/utils.go | 3 ++- 12 gesture/config.go | 4 ++-- 13 keybinding/shortcuts/system_shortcut.go | 4 +++- 14 mime/app_info.go | 7 ++++++- 15 system/gesture/config.go | 4 +++- 16 + 9 files changed, 46 insertions(+), 13 deletions(-) 17 18 diff --git a/accounts/manager.go b/accounts/manager.go 19 + index 22c26ce7..009d9dd9 100644 20 --- a/accounts/manager.go 21 +++ b/accounts/manager.go 22 @@ -15,6 +15,7 @@ import ( ··· 40 41 type InterfaceConfig struct { 42 diff --git a/accounts/user.go b/accounts/user.go 43 + index 900033c6..f8827fb2 100644 44 --- a/accounts/user.go 45 +++ b/accounts/user.go 46 @@ -15,6 +15,7 @@ import ( ··· 51 dbus "github.com/godbus/dbus" 52 "github.com/linuxdeepin/dde-daemon/accounts/users" 53 authenticate "github.com/linuxdeepin/go-dbus-factory/com.deepin.daemon.authenticate" 54 + @@ -649,7 +650,12 @@ func getUserSession(homeDir string) string { 55 } 56 57 func getSessionList() []string { ··· 119 120 m.watchDirs(iconDirs) 121 } 122 + diff --git a/appearance/ifc.go b/appearance/ifc.go 123 + index f0bf32a3..6d60ffe4 100644 124 + --- a/appearance/ifc.go 125 + +++ b/appearance/ifc.go 126 + @@ -10,6 +10,7 @@ import ( 127 + "strconv" 128 + "strings" 129 + 130 + + "github.com/adrg/xdg" 131 + "github.com/godbus/dbus" 132 + "github.com/linuxdeepin/dde-daemon/appearance/fonts" 133 + "github.com/linuxdeepin/dde-daemon/appearance/subthemes" 134 + @@ -265,7 +266,7 @@ func (m *Manager) thumbnail(ty, name string) (string, error) { 135 + case TypeGtkTheme: 136 + fName, ok := gtkThumbnailMap[name] 137 + if ok { 138 + - return filepath.Join("/usr/share/dde-daemon/appearance", fName+".svg"), nil 139 + + return xdg.SearchDataFile(filepath.Join("dde-daemon/appearance", fName+".svg")) 140 + } 141 + return subthemes.GetGtkThumbnail(name) 142 + case TypeIconTheme: 143 diff --git a/apps/utils.go b/apps/utils.go 144 index 8863d6c2..dd6f8e16 100644 145 --- a/apps/utils.go ··· 161 } 162 163 // get user home 164 diff --git a/gesture/config.go b/gesture/config.go 165 index bfbd4db7..4ce9d641 100644 166 --- a/gesture/config.go ··· 187 gsKeyTouchPadEnabled = "touch-pad-enabled" 188 gsKeyTouchScreenEnabled = "touch-screen-enabled" 189 diff --git a/keybinding/shortcuts/system_shortcut.go b/keybinding/shortcuts/system_shortcut.go 190 + index eaec22b5..95e1b222 100644 191 --- a/keybinding/shortcuts/system_shortcut.go 192 +++ b/keybinding/shortcuts/system_shortcut.go 193 @@ -10,6 +10,7 @@ import ( ··· 250 + return filepath; 251 } 252 -- 253 + 2.38.1 254
+3
pkgs/desktops/deepin/go-package/dde-daemon/default.nix
··· 58 ]; 59 60 postPatch = '' 61 substituteInPlace session/eventlog/{app_event.go,login_event.go} accounts/users/users_test.go \ 62 --replace "/bin/bash" "${runtimeShell}" 63
··· 58 ]; 59 60 postPatch = '' 61 + substituteInPlace dock/desktop_file_path.go \ 62 + --replace "/usr/share" "/run/current-system/sw/share" 63 + 64 substituteInPlace session/eventlog/{app_event.go,login_event.go} accounts/users/users_test.go \ 65 --replace "/bin/bash" "${runtimeShell}" 66
+2 -2
pkgs/desktops/xfce/core/tumbler/default.nix
··· 15 mkXfceDerivation { 16 category = "xfce"; 17 pname = "tumbler"; 18 - version = "4.18.0"; 19 20 - sha256 = "sha256-qxbS0PMhwVk2I3fbblJEeIuI72xSWVsQx5SslhOvg+c="; 21 22 buildInputs = [ 23 libxfce4util
··· 15 mkXfceDerivation { 16 category = "xfce"; 17 pname = "tumbler"; 18 + version = "4.18.1"; 19 20 + sha256 = "sha256-hn77W8IsvwNc9xSuDe9rXw9499olOvvJ2P7q+26HIG8="; 21 22 buildInputs = [ 23 libxfce4util
+2 -2
pkgs/desktops/xfce/core/xfconf/default.nix
··· 3 mkXfceDerivation { 4 category = "xfce"; 5 pname = "xfconf"; 6 - version = "4.18.0"; 7 8 - sha256 = "sha256-8zl2EWV1DRHsH0QUNa13OKvfIVDVOhIO0FCMbU978Js="; 9 10 nativeBuildInputs = [ gobject-introspection vala ]; 11
··· 3 mkXfceDerivation { 4 category = "xfce"; 5 pname = "xfconf"; 6 + version = "4.18.1"; 7 8 + sha256 = "sha256-HS+FzzTTAH8lzBBai3ESdnuvvvZW/vAVSmGe57mwcoo="; 9 10 nativeBuildInputs = [ gobject-introspection vala ]; 11
+4 -2
pkgs/desktops/xfce/panel-plugins/xfce4-genmon-plugin/default.nix
··· 5 , intltool 6 , libxfce4util 7 , xfce4-panel 8 , libxfce4ui 9 , gtk3 10 , gitUpdater ··· 14 category = "panel-plugins"; 15 in stdenv.mkDerivation rec { 16 pname = "xfce4-genmon-plugin"; 17 - version = "4.1.1"; 18 19 src = fetchurl { 20 url = "mirror://xfce/src/${category}/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.bz2"; 21 - sha256 = "sha256-shGf0P8Z+ik7l+yXsN6OJBeZ4IuGIYUVFnxWi9m1ATU="; 22 }; 23 24 nativeBuildInputs = [ ··· 30 libxfce4util 31 libxfce4ui 32 xfce4-panel 33 gtk3 34 ]; 35
··· 5 , intltool 6 , libxfce4util 7 , xfce4-panel 8 + , xfconf 9 , libxfce4ui 10 , gtk3 11 , gitUpdater ··· 15 category = "panel-plugins"; 16 in stdenv.mkDerivation rec { 17 pname = "xfce4-genmon-plugin"; 18 + version = "4.2.0"; 19 20 src = fetchurl { 21 url = "mirror://xfce/src/${category}/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.bz2"; 22 + sha256 = "sha256-lI0I7l8hQIR/EJtTG8HUzGJoSWkT6nYA08WtiQJaA2I="; 23 }; 24 25 nativeBuildInputs = [ ··· 31 libxfce4util 32 libxfce4ui 33 xfce4-panel 34 + xfconf 35 gtk3 36 ]; 37
+17 -4
pkgs/desktops/xfce/panel-plugins/xfce4-timer-plugin/default.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, intltool, libxfce4util, xfce4-panel, libxfce4ui, gtk3, hicolor-icon-theme, gitUpdater }: 2 3 let 4 category = "panel-plugins"; 5 in 6 7 stdenv.mkDerivation rec { 8 - pname = "xfce4-timer-plugin"; 9 - version = "1.7.1"; 10 11 src = fetchurl { 12 url = "mirror://xfce/src/${category}/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.bz2"; 13 - sha256 = "sha256-S1LSkRsZSelFlxvmUzFV7mupnHcHjqx/1DsPKuyoJOM="; 14 }; 15 16 nativeBuildInputs = [ ··· 22 libxfce4util 23 libxfce4ui 24 xfce4-panel 25 gtk3 26 hicolor-icon-theme 27 ];
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , pkg-config 5 + , intltool 6 + , libxfce4util 7 + , xfce4-panel 8 + , libxfce4ui 9 + , glib 10 + , gtk3 11 + , hicolor-icon-theme 12 + , gitUpdater 13 + }: 14 15 let 16 category = "panel-plugins"; 17 in 18 19 stdenv.mkDerivation rec { 20 + pname = "xfce4-timer-plugin"; 21 + version = "1.7.2"; 22 23 src = fetchurl { 24 url = "mirror://xfce/src/${category}/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.bz2"; 25 + sha256 = "sha256-/rO4wtOVBegWaDVAoyJr172ocMy8tMfQ9qv+7/XFi30="; 26 }; 27 28 nativeBuildInputs = [ ··· 34 libxfce4util 35 libxfce4ui 36 xfce4-panel 37 + glib 38 gtk3 39 hicolor-icon-theme 40 ];
+6 -3
pkgs/development/libraries/enchant/2.x.nix
··· 1 - { lib, stdenv 2 , fetchurl 3 , aspell 4 , pkg-config 5 , glib 6 , hunspell ··· 11 12 stdenv.mkDerivation rec { 13 pname = "enchant"; 14 - version = "2.3.3"; 15 16 outputs = [ "out" "dev" ]; 17 18 src = fetchurl { 19 url = "https://github.com/AbiWord/${pname}/releases/download/v${version}/${pname}-${version}.tar.gz"; 20 - sha256 = "sha256-PaEhA/Ec9Jw88v0s4wF1dcUyGkieW5v6gd2R7EE/OJE="; 21 }; 22 23 nativeBuildInputs = [ 24 pkg-config 25 ]; 26
··· 1 + { stdenv 2 + , lib 3 , fetchurl 4 , aspell 5 + , groff 6 , pkg-config 7 , glib 8 , hunspell ··· 13 14 stdenv.mkDerivation rec { 15 pname = "enchant"; 16 + version = "2.3.4"; 17 18 outputs = [ "out" "dev" ]; 19 20 src = fetchurl { 21 url = "https://github.com/AbiWord/${pname}/releases/download/v${version}/${pname}-${version}.tar.gz"; 22 + sha256 = "sha256-H34mdE2xyaD+ph0hafTlwc5DXPjCcxw34+QFQRnplKA="; 23 }; 24 25 nativeBuildInputs = [ 26 + groff 27 pkg-config 28 ]; 29
+2 -2
pkgs/development/libraries/httplib/default.nix
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "httplib"; 8 - version = "0.12.1"; 9 10 src = fetchFromGitHub { 11 owner = "yhirose"; 12 repo = "cpp-httplib"; 13 rev = "v${version}"; 14 - hash = "sha256-F0MXuScZP2kmyCWv+DVXOB9rRk2T7hMgum7Zbs8X7QI="; 15 }; 16 17 # Header-only library.
··· 5 6 stdenvNoCC.mkDerivation rec { 7 pname = "httplib"; 8 + version = "0.12.2"; 9 10 src = fetchFromGitHub { 11 owner = "yhirose"; 12 repo = "cpp-httplib"; 13 rev = "v${version}"; 14 + hash = "sha256-mpHw9fzGpYz04rgnfG/qTNrXIf6q+vFfIsjb56kJsLg="; 15 }; 16 17 # Header-only library.
+5 -2
pkgs/development/ocaml-modules/facile/default.nix
··· 1 { lib, fetchurl, buildDunePackage, ocaml }: 2 3 buildDunePackage rec { 4 pname = "facile"; 5 version = "1.1.4"; ··· 11 12 doCheck = true; 13 14 - useDune2 = lib.versionAtLeast ocaml.version "4.12"; 15 - postPatch = lib.optionalString useDune2 "dune upgrade"; 16 17 meta = { 18 homepage = "http://opti.recherche.enac.fr/facile/";
··· 1 { lib, fetchurl, buildDunePackage, ocaml }: 2 3 + lib.throwIf (lib.versionAtLeast ocaml.version "5.0") 4 + "facile is not available for OCaml ≥ 5.0" 5 + 6 buildDunePackage rec { 7 pname = "facile"; 8 version = "1.1.4"; ··· 14 15 doCheck = true; 16 17 + duneVersion = if lib.versionAtLeast ocaml.version "4.12" then "2" else "1"; 18 + postPatch = lib.optionalString (duneVersion != "1") "dune upgrade"; 19 20 meta = { 21 homepage = "http://opti.recherche.enac.fr/facile/";
+5 -2
pkgs/development/ocaml-modules/nonstd/default.nix
··· 1 { lib, fetchzip, buildDunePackage, ocaml }: 2 3 buildDunePackage rec { 4 pname = "nonstd"; 5 version = "0.0.3"; ··· 11 sha256 = "0ccjwcriwm8fv29ij1cnbc9win054kb6pfga3ygzdbjpjb778j46"; 12 }; 13 14 - useDune2 = lib.versionAtLeast ocaml.version "4.12"; 15 - postPatch = lib.optionalString useDune2 "dune upgrade"; 16 doCheck = true; 17 18 meta = with lib; {
··· 1 { lib, fetchzip, buildDunePackage, ocaml }: 2 3 + lib.throwIf (lib.versionAtLeast ocaml.version "5.0") 4 + "nonstd is not available for OCaml ≥ 5.0" 5 + 6 buildDunePackage rec { 7 pname = "nonstd"; 8 version = "0.0.3"; ··· 14 sha256 = "0ccjwcriwm8fv29ij1cnbc9win054kb6pfga3ygzdbjpjb778j46"; 15 }; 16 17 + duneVersion = if lib.versionAtLeast ocaml.version "4.12" then "2" else "1"; 18 + postPatch = lib.optionalString (duneVersion != "1") "dune upgrade"; 19 doCheck = true; 20 21 meta = with lib; {
+2 -2
pkgs/development/python-modules/execnb/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "execnb"; 12 - version = "0.1.4"; 13 format = "setuptools"; 14 disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "sha256-y9gSvzJA8Fsh56HbA8SszlozsBBfTLfgWGDXm9uSBvA="; 19 }; 20 21 propagatedBuildInputs = [ fastcore traitlets ipython ];
··· 9 10 buildPythonPackage rec { 11 pname = "execnb"; 12 + version = "0.1.5"; 13 format = "setuptools"; 14 disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "sha256-nuAp4OMAfA3u3DJyORjFw7y7ZLsLCKEfxSFIXqNh+k0="; 19 }; 20 21 propagatedBuildInputs = [ fastcore traitlets ipython ];
+2 -2
pkgs/development/python-modules/iocextract/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "iocextract"; 11 - version = "1.15.1"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "InQuest"; 18 repo = "python-iocextract"; 19 rev = "refs/tags/v${version}"; 20 - hash = "sha256-muto8lr3sP44bLFIoAuPeS8pRv7pNP1JFKaAJV01TZY="; 21 }; 22 23 propagatedBuildInputs = [
··· 8 9 buildPythonPackage rec { 10 pname = "iocextract"; 11 + version = "1.15.2"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "InQuest"; 18 repo = "python-iocextract"; 19 rev = "refs/tags/v${version}"; 20 + hash = "sha256-l0TGi3Y3/Dcwyp80eRWYYlDaDDJdpc31fcxdYEVvQas="; 21 }; 22 23 propagatedBuildInputs = [
+3 -3
pkgs/development/python-modules/niaclass/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "niaclass"; 16 - version = "0.1.3"; 17 format = "pyproject"; 18 19 disabled = pythonOlder "3.7"; ··· 21 src = fetchFromGitHub { 22 owner = "lukapecnik"; 23 repo = "NiaClass"; 24 - rev = version; 25 - sha256 = "sha256-BDGDcIlunnaH3J9sEuDrwWsBR4Wjcy6Kxpxy9Dr6BlM="; 26 }; 27 28 nativeBuildInputs = [
··· 13 14 buildPythonPackage rec { 15 pname = "niaclass"; 16 + version = "0.1.4"; 17 format = "pyproject"; 18 19 disabled = pythonOlder "3.7"; ··· 21 src = fetchFromGitHub { 22 owner = "lukapecnik"; 23 repo = "NiaClass"; 24 + rev = "refs/tags/${version}"; 25 + sha256 = "sha256-md1e/cOIOQKoB760E5hjzjCsC5tS1CzgqAPTeVtrmuo="; 26 }; 27 28 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/renault-api/default.nix
··· 16 17 buildPythonPackage rec { 18 pname = "renault-api"; 19 - version = "0.1.12"; 20 format = "pyproject"; 21 22 disabled = pythonOlder "3.7"; ··· 25 owner = "hacf-fr"; 26 repo = pname; 27 rev = "refs/tags/v${version}"; 28 - hash = "sha256-uSyqAs0JqrsFuMpfuILoIGxLL+HVOGI/euCZziCgEdQ="; 29 }; 30 31 nativeBuildInputs = [
··· 16 17 buildPythonPackage rec { 18 pname = "renault-api"; 19 + version = "0.1.13"; 20 format = "pyproject"; 21 22 disabled = pythonOlder "3.7"; ··· 25 owner = "hacf-fr"; 26 repo = pname; 27 rev = "refs/tags/v${version}"; 28 + hash = "sha256-BpPow6fZGAk0kzcEo5tOleyVMNUOl7RE2I5y76ntNRM="; 29 }; 30 31 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/snakeviz/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "snakeviz"; 5 - version = "2.1.1"; 6 7 src = fetchPypi { 8 inherit pname version; 9 - sha256 = "0d96c006304f095cb4b3fb7ed98bb866ca35a7ca4ab9020bbc27d295ee4c94d9"; 10 }; 11 12 # Upstream doesn't run tests from setup.py
··· 2 3 buildPythonPackage rec { 4 pname = "snakeviz"; 5 + version = "2.1.2"; 6 7 src = fetchPypi { 8 inherit pname version; 9 + sha256 = "sha256-K4qRmrtefpKv41EnhguMJ2sqeXvv/OLayGFPmM/4byE="; 10 }; 11 12 # Upstream doesn't run tests from setup.py
+2 -2
pkgs/development/tools/analysis/flow/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "flow"; 5 - version = "0.203.1"; 6 7 src = fetchFromGitHub { 8 owner = "facebook"; 9 repo = "flow"; 10 rev = "v${version}"; 11 - sha256 = "sha256-y06RI2g7W37HyY+wgGab6hoaskdq45NBxCFZYQmmctE="; 12 }; 13 14 postPatch = ''
··· 2 3 stdenv.mkDerivation rec { 4 pname = "flow"; 5 + version = "0.204.0"; 6 7 src = fetchFromGitHub { 8 owner = "facebook"; 9 repo = "flow"; 10 rev = "v${version}"; 11 + sha256 = "sha256-263ZbEDGiZI/2dSLxs966+wtSHG2QMnTtzJ7hPQ4Ix8="; 12 }; 13 14 postPatch = ''
+2 -2
pkgs/development/tools/cloud-nuke/default.nix
··· 2 3 buildGoModule rec { 4 pname = "cloud-nuke"; 5 - version = "0.29.2"; 6 7 src = fetchFromGitHub { 8 owner = "gruntwork-io"; 9 repo = pname; 10 rev = "v${version}"; 11 - hash = "sha256-hf86r5Q9fvk+vJsOjm6tqj6hT1eZpf8gtOmHA6wKwr0="; 12 }; 13 14 vendorHash = "sha256-6+uQAEp+fRlRrwfJR0eDMXs0mEQwzWadLxCrXrDREhs=";
··· 2 3 buildGoModule rec { 4 pname = "cloud-nuke"; 5 + version = "0.29.4"; 6 7 src = fetchFromGitHub { 8 owner = "gruntwork-io"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-qQrgeUmsCOLlmeU4kwtovo/3cK9Vqzeng7W9M+j+hdk="; 12 }; 13 14 vendorHash = "sha256-6+uQAEp+fRlRrwfJR0eDMXs0mEQwzWadLxCrXrDREhs=";
+2 -2
pkgs/development/tools/database/mermerd/default.nix
··· 5 6 buildGoModule rec { 7 pname = "mermerd"; 8 - version = "0.6.1"; 9 10 src = fetchFromGitHub { 11 owner = "KarnerTh"; 12 repo = "mermerd"; 13 rev = "refs/tags/v${version}"; 14 - hash = "sha256-8GXI5UEDGx5E+YzcAoguvKeNTwpC5ftReIvrKGg31ZA="; 15 }; 16 17 vendorHash = "sha256-RSCpkQymvUvY2bOkjhsyKnDa3vezUjC33Nwv0+O4OOQ=";
··· 5 6 buildGoModule rec { 7 pname = "mermerd"; 8 + version = "0.7.0"; 9 10 src = fetchFromGitHub { 11 owner = "KarnerTh"; 12 repo = "mermerd"; 13 rev = "refs/tags/v${version}"; 14 + hash = "sha256-nlertvmuP9Fiuc4uVrgKzfxjOY/sE9udKZLe51t0GEY="; 15 }; 16 17 vendorHash = "sha256-RSCpkQymvUvY2bOkjhsyKnDa3vezUjC33Nwv0+O4OOQ=";
+2 -2
pkgs/development/tools/jet/default.nix
··· 2 3 buildGraalvmNativeImage rec { 4 pname = "jet"; 5 - version = "0.4.23"; 6 7 src = fetchurl { 8 url = "https://github.com/borkdude/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; 9 - sha256 = "sha256-ijqMyzmF1C3+5oT3ho1MSkoGuFJGvjhh7WWF/JDV/j8="; 10 }; 11 12 extraNativeImageBuildArgs = [
··· 2 3 buildGraalvmNativeImage rec { 4 pname = "jet"; 5 + version = "0.4.24"; 6 7 src = fetchurl { 8 url = "https://github.com/borkdude/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; 9 + sha256 = "sha256-8UIPDq+POe5Ss4H8ecHkheYKul4FpGzQgWGQ0N7h41M="; 10 }; 11 12 extraNativeImageBuildArgs = [
+10 -122
pkgs/development/tools/ruff/Cargo.lock
··· 154 checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a" 155 156 [[package]] 157 - name = "block-buffer" 158 - version = "0.10.3" 159 - source = "registry+https://github.com/rust-lang/crates.io-index" 160 - checksum = "69cce20737498f97b993470a6e536b8523f0af7892a4f928cceb1ac5e52ebe7e" 161 - dependencies = [ 162 - "generic-array", 163 - ] 164 - 165 - [[package]] 166 name = "bstr" 167 version = "0.2.17" 168 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 447 checksum = "5827cebf4670468b8772dd191856768aedcb1b0278a04f989f7766351917b9dc" 448 449 [[package]] 450 - name = "cpufeatures" 451 - version = "0.2.5" 452 - source = "registry+https://github.com/rust-lang/crates.io-index" 453 - checksum = "28d997bd5e24a5928dd43e46dc529867e207907fe0b239c3477d924f7f2ca320" 454 - dependencies = [ 455 - "libc", 456 - ] 457 - 458 - [[package]] 459 name = "crc32fast" 460 version = "1.3.2" 461 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 550 checksum = "7a81dae078cea95a014a339291cec439d2f232ebe854a9d672b796c6afafa9b7" 551 552 [[package]] 553 - name = "crypto-common" 554 - version = "0.1.6" 555 - source = "registry+https://github.com/rust-lang/crates.io-index" 556 - checksum = "1bfb12502f3fc46cca1bb51ac28df9d618d813cdc3d2f25b9fe775a34af26bb3" 557 - dependencies = [ 558 - "generic-array", 559 - "typenum", 560 - ] 561 - 562 - [[package]] 563 name = "ctor" 564 version = "0.1.26" 565 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 626 checksum = "6184e33543162437515c2e2b48714794e37845ec9851711914eec9d308f6ebe8" 627 628 [[package]] 629 - name = "digest" 630 - version = "0.10.6" 631 - source = "registry+https://github.com/rust-lang/crates.io-index" 632 - checksum = "8168378f4e5023e7218c89c891c0fd8ecdb5e5e4f18cb78f38cf245dd021e76f" 633 - dependencies = [ 634 - "block-buffer", 635 - "crypto-common", 636 - ] 637 - 638 - [[package]] 639 name = "dirs" 640 version = "4.0.0" 641 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 774 775 [[package]] 776 name = "flake8-to-ruff" 777 - version = "0.0.261" 778 dependencies = [ 779 "anyhow", 780 "clap 4.1.8", ··· 826 ] 827 828 [[package]] 829 - name = "generic-array" 830 - version = "0.14.6" 831 - source = "registry+https://github.com/rust-lang/crates.io-index" 832 - checksum = "bff49e947297f3312447abdca79f45f4738097cc82b06e72054d2223f601f1b9" 833 - dependencies = [ 834 - "typenum", 835 - "version_check", 836 - ] 837 - 838 - [[package]] 839 name = "getrandom" 840 version = "0.2.8" 841 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1018 "console", 1019 "lazy_static", 1020 "linked-hash-map", 1021 - "pest", 1022 - "pest_derive", 1023 - "serde", 1024 "similar", 1025 "yaml-rust", 1026 ] ··· 1561 checksum = "478c572c3d73181ff3c2539045f6eb99e5491218eae919370993b890cdbdd98e" 1562 1563 [[package]] 1564 - name = "pest" 1565 - version = "2.5.5" 1566 - source = "registry+https://github.com/rust-lang/crates.io-index" 1567 - checksum = "028accff104c4e513bad663bbcd2ad7cfd5304144404c31ed0a77ac103d00660" 1568 - dependencies = [ 1569 - "thiserror", 1570 - "ucd-trie", 1571 - ] 1572 - 1573 - [[package]] 1574 - name = "pest_derive" 1575 - version = "2.5.5" 1576 - source = "registry+https://github.com/rust-lang/crates.io-index" 1577 - checksum = "2ac3922aac69a40733080f53c1ce7f91dcf57e1a5f6c52f421fadec7fbdc4b69" 1578 - dependencies = [ 1579 - "pest", 1580 - "pest_generator", 1581 - ] 1582 - 1583 - [[package]] 1584 - name = "pest_generator" 1585 - version = "2.5.5" 1586 - source = "registry+https://github.com/rust-lang/crates.io-index" 1587 - checksum = "d06646e185566b5961b4058dd107e0a7f56e77c3f484549fb119867773c0f202" 1588 - dependencies = [ 1589 - "pest", 1590 - "pest_meta", 1591 - "proc-macro2", 1592 - "quote", 1593 - "syn", 1594 - ] 1595 - 1596 - [[package]] 1597 - name = "pest_meta" 1598 - version = "2.5.5" 1599 - source = "registry+https://github.com/rust-lang/crates.io-index" 1600 - checksum = "e6f60b2ba541577e2a0c307c8f39d1439108120eb7903adeb6497fa880c59616" 1601 - dependencies = [ 1602 - "once_cell", 1603 - "pest", 1604 - "sha2", 1605 - ] 1606 - 1607 - [[package]] 1608 name = "petgraph" 1609 version = "0.6.3" 1610 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1977 1978 [[package]] 1979 name = "ruff" 1980 - version = "0.0.261" 1981 dependencies = [ 1982 "anyhow", 1983 "bitflags", 1984 "chrono", ··· 2004 "pathdiff", 2005 "pep440_rs", 2006 "pretty_assertions", 2007 "regex", 2008 "result-like", 2009 "ruff_cache", ··· 2013 "ruff_python_semantic", 2014 "ruff_python_stdlib", 2015 "ruff_rustpython", 2016 "rustc-hash", 2017 "rustpython-common", 2018 "rustpython-parser", ··· 2021 "serde", 2022 "serde_json", 2023 "shellexpand", 2024 "smallvec", 2025 "strum", 2026 "strum_macros", ··· 2040 "mimalloc", 2041 "once_cell", 2042 "ruff", 2043 "serde", 2044 "serde_json", 2045 "tikv-jemallocator", ··· 2060 2061 [[package]] 2062 name = "ruff_cli" 2063 - version = "0.0.261" 2064 dependencies = [ 2065 "annotate-snippets 0.9.1", 2066 "anyhow", ··· 2082 "mimalloc", 2083 "notify", 2084 "path-absolutize", 2085 - "quick-junit", 2086 "rayon", 2087 "regex", 2088 "ruff", ··· 2176 "once_cell", 2177 "regex", 2178 "ruff_rustpython", 2179 "rustc-hash", 2180 "rustpython-common", 2181 "rustpython-parser", ··· 2544 ] 2545 2546 [[package]] 2547 - name = "sha2" 2548 - version = "0.10.6" 2549 - source = "registry+https://github.com/rust-lang/crates.io-index" 2550 - checksum = "82e6b795fe2e3b1e845bafcb27aa35405c4d47cdfc92af5fc8d3002f76cebdc0" 2551 - dependencies = [ 2552 - "cfg-if", 2553 - "cpufeatures", 2554 - "digest", 2555 - ] 2556 - 2557 - [[package]] 2558 name = "shellexpand" 2559 version = "3.0.0" 2560 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2935 version = "2.0.2" 2936 source = "registry+https://github.com/rust-lang/crates.io-index" 2937 checksum = "6af6ae20167a9ece4bcb41af5b80f8a1f1df981f6391189ce00fd257af04126a" 2938 - 2939 - [[package]] 2940 - name = "typenum" 2941 - version = "1.16.0" 2942 - source = "registry+https://github.com/rust-lang/crates.io-index" 2943 - checksum = "497961ef93d974e23eb6f433eb5fe1b7930b659f06d12dec6fc44a8f554c0bba" 2944 - 2945 - [[package]] 2946 - name = "ucd-trie" 2947 - version = "0.1.5" 2948 - source = "registry+https://github.com/rust-lang/crates.io-index" 2949 - checksum = "9e79c4d996edb816c91e4308506774452e55e95c3c9de07b6729e17e15a5ef81" 2950 2951 [[package]] 2952 name = "unic-char-property"
··· 154 checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a" 155 156 [[package]] 157 name = "bstr" 158 version = "0.2.17" 159 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 438 checksum = "5827cebf4670468b8772dd191856768aedcb1b0278a04f989f7766351917b9dc" 439 440 [[package]] 441 name = "crc32fast" 442 version = "1.3.2" 443 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 532 checksum = "7a81dae078cea95a014a339291cec439d2f232ebe854a9d672b796c6afafa9b7" 533 534 [[package]] 535 name = "ctor" 536 version = "0.1.26" 537 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 598 checksum = "6184e33543162437515c2e2b48714794e37845ec9851711914eec9d308f6ebe8" 599 600 [[package]] 601 name = "dirs" 602 version = "4.0.0" 603 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 736 737 [[package]] 738 name = "flake8-to-ruff" 739 + version = "0.0.262" 740 dependencies = [ 741 "anyhow", 742 "clap 4.1.8", ··· 788 ] 789 790 [[package]] 791 name = "getrandom" 792 version = "0.2.8" 793 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 970 "console", 971 "lazy_static", 972 "linked-hash-map", 973 "similar", 974 "yaml-rust", 975 ] ··· 1510 checksum = "478c572c3d73181ff3c2539045f6eb99e5491218eae919370993b890cdbdd98e" 1511 1512 [[package]] 1513 name = "petgraph" 1514 version = "0.6.3" 1515 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1882 1883 [[package]] 1884 name = "ruff" 1885 + version = "0.0.262" 1886 dependencies = [ 1887 + "annotate-snippets 0.9.1", 1888 "anyhow", 1889 "bitflags", 1890 "chrono", ··· 1910 "pathdiff", 1911 "pep440_rs", 1912 "pretty_assertions", 1913 + "quick-junit", 1914 "regex", 1915 "result-like", 1916 "ruff_cache", ··· 1920 "ruff_python_semantic", 1921 "ruff_python_stdlib", 1922 "ruff_rustpython", 1923 + "ruff_text_size", 1924 "rustc-hash", 1925 "rustpython-common", 1926 "rustpython-parser", ··· 1929 "serde", 1930 "serde_json", 1931 "shellexpand", 1932 + "similar", 1933 "smallvec", 1934 "strum", 1935 "strum_macros", ··· 1949 "mimalloc", 1950 "once_cell", 1951 "ruff", 1952 + "ruff_python_ast", 1953 + "rustpython-parser", 1954 "serde", 1955 "serde_json", 1956 "tikv-jemallocator", ··· 1971 1972 [[package]] 1973 name = "ruff_cli" 1974 + version = "0.0.262" 1975 dependencies = [ 1976 "annotate-snippets 0.9.1", 1977 "anyhow", ··· 1993 "mimalloc", 1994 "notify", 1995 "path-absolutize", 1996 "rayon", 1997 "regex", 1998 "ruff", ··· 2086 "once_cell", 2087 "regex", 2088 "ruff_rustpython", 2089 + "ruff_text_size", 2090 "rustc-hash", 2091 "rustpython-common", 2092 "rustpython-parser", ··· 2455 ] 2456 2457 [[package]] 2458 name = "shellexpand" 2459 version = "3.0.0" 2460 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2835 version = "2.0.2" 2836 source = "registry+https://github.com/rust-lang/crates.io-index" 2837 checksum = "6af6ae20167a9ece4bcb41af5b80f8a1f1df981f6391189ce00fd257af04126a" 2838 2839 [[package]] 2840 name = "unic-char-property"
+2 -2
pkgs/development/tools/ruff/default.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "ruff"; 11 - version = "0.0.261"; 12 13 src = fetchFromGitHub { 14 owner = "charliermarsh"; 15 repo = pname; 16 rev = "v${version}"; 17 - hash = "sha256-YFhMrmZ1Zv4nIWWxq6A7PU0VYayugmJKbbkz+AdGJ+I="; 18 }; 19 20 # We have to use importCargoLock here because `cargo vendor` currently doesn't support workspace
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "ruff"; 11 + version = "0.0.262"; 12 13 src = fetchFromGitHub { 14 owner = "charliermarsh"; 15 repo = pname; 16 rev = "v${version}"; 17 + hash = "sha256-G+Cz/5dL/5kOOJ1fGGecwGOiONYdwFWOPQ5KV0W2DVA="; 18 }; 19 20 # We have to use importCargoLock here because `cargo vendor` currently doesn't support workspace
+3 -3
pkgs/development/tools/rust/cargo-chef/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cargo-chef"; 5 - version = "0.1.52"; 6 7 src = fetchCrate { 8 inherit pname version; 9 - sha256 = "sha256-eUFQT2zYABRtTqWxMi+AyU1ZHdt8+B1nMC0Sz6IK6+w="; 10 }; 11 12 - cargoHash = "sha256-uzuITRUvAOsuFaq+dkO8tRyozwUt4xB/3BP3mNCxr2g="; 13 14 meta = with lib; { 15 description = "A cargo-subcommand to speed up Rust Docker builds using Docker layer caching";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cargo-chef"; 5 + version = "0.1.56"; 6 7 src = fetchCrate { 8 inherit pname version; 9 + sha256 = "sha256-WsK4hdV20IcG2bF8LumeII8e91330zCtR0+A3EPYtAk="; 10 }; 11 12 + cargoHash = "sha256-L/4m47TJHGSOC8/94qnjea5Febck7RtPaVVYi4/Pn5s="; 13 14 meta = with lib; { 15 description = "A cargo-subcommand to speed up Rust Docker builds using Docker layer caching";
+2 -2
pkgs/os-specific/linux/ksmbd-tools/default.nix
··· 13 14 stdenv.mkDerivation rec { 15 pname = "ksmbd-tools"; 16 - version = "3.4.7"; 17 18 src = fetchFromGitHub { 19 owner = "cifsd-team"; 20 repo = pname; 21 rev = version; 22 - sha256 = "sha256-uYJhjxarAqJC/aY8UUy7sjhA89LVoCG6B7/APkE0ouk="; 23 }; 24 25 buildInputs = [ glib libnl ] ++ lib.optional withKerberos libkrb5;
··· 13 14 stdenv.mkDerivation rec { 15 pname = "ksmbd-tools"; 16 + version = "3.4.8"; 17 18 src = fetchFromGitHub { 19 owner = "cifsd-team"; 20 repo = pname; 21 rev = version; 22 + sha256 = "sha256-R/OWZekAGtDxE71MrzjWsdpaWGBu0c+VP0VkPro6GEo="; 23 }; 24 25 buildInputs = [ glib libnl ] ++ lib.optional withKerberos libkrb5;
+1 -1
pkgs/os-specific/linux/systemd/default.nix
··· 737 738 tests = { 739 inherit (nixosTests) switchTest; 740 - cross = pkgsCross.aarch64-multiplatform.systemd; 741 }; 742 }; 743
··· 737 738 tests = { 739 inherit (nixosTests) switchTest; 740 + cross = pkgsCross.${if stdenv.buildPlatform.isAarch64 then "gnu64" else "aarch64-multiplatform"}.systemd; 741 }; 742 }; 743
+3 -3
pkgs/servers/irc/ergochat/default.nix
··· 2 3 buildGoModule rec { 4 pname = "ergo"; 5 - version = "2.11.0"; 6 7 src = fetchFromGitHub { 8 owner = "ergochat"; 9 repo = "ergo"; 10 rev = "v${version}"; 11 - sha256 = "sha256-sZ2HSfYa7Xiu7dw8dUgqaf/tCh66bLlrXC+46J5i3iQ="; 12 }; 13 14 - vendorSha256 = null; 15 16 passthru.tests.ergochat = nixosTests.ergochat; 17
··· 2 3 buildGoModule rec { 4 pname = "ergo"; 5 + version = "2.11.1"; 6 7 src = fetchFromGitHub { 8 owner = "ergochat"; 9 repo = "ergo"; 10 rev = "v${version}"; 11 + sha256 = "sha256-LBKGwtprhtDHaghnU6YPQ4Pf2fqD8VN7OV9gzvFgLPY="; 12 }; 13 14 + vendorHash = null; 15 16 passthru.tests.ergochat = nixosTests.ergochat; 17
+3 -3
pkgs/servers/monitoring/grafana-dash-n-grab/default.nix
··· 2 3 buildGoModule rec { 4 pname = "grafana-dash-n-grab"; 5 - version = "0.3.1"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "esnet"; 10 repo = "gdg"; 11 - sha256 = "sha256-M4V4ybOizXCLxTTuS17M0y2tRmjQmTIBdXVbumzOoeA="; 12 }; 13 14 - vendorSha256 = "sha256-pXo80Tean5OkQ0Sv2+/RlRnAtaClwGP7tuDC2irsh+E="; 15 16 ldflags = [ 17 "-s"
··· 2 3 buildGoModule rec { 4 pname = "grafana-dash-n-grab"; 5 + version = "0.4.3"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "esnet"; 10 repo = "gdg"; 11 + sha256 = "sha256-L7EFDLCbXp8ooQY9QxbfT0ooL1oC+z8LwpEvH4CvivE="; 12 }; 13 14 + vendorHash = "sha256-7K2NTpknzJvKOfJ4gruV99BIvgtGgsre8ybqWTQ09tQ="; 15 16 ldflags = [ 17 "-s"
+3 -3
pkgs/servers/monitoring/prometheus/artifactory-exporter.nix
··· 6 7 buildGoModule rec { 8 pname = "artifactory_exporter"; 9 - version = "1.12.0"; 10 rev = "v${version}"; 11 12 src = fetchFromGitHub { 13 owner = "peimanja"; 14 repo = pname; 15 rev = rev; 16 - hash = "sha256-EFjWDoWPePbPX9j4vuI41TAlGcFRlUyPpSvJriZdR0U="; 17 }; 18 19 - vendorHash = "sha256-5yzBKgjJCv4tgdBS6XmZUq1ebbka0LOuv6BARWO7kQg="; 20 21 subPackages = [ "." ]; 22
··· 6 7 buildGoModule rec { 8 pname = "artifactory_exporter"; 9 + version = "1.13.0"; 10 rev = "v${version}"; 11 12 src = fetchFromGitHub { 13 owner = "peimanja"; 14 repo = pname; 15 rev = rev; 16 + hash = "sha256-URavjOb0OEFul4jM3VR0buIMXmNU7nLJ0R3e8vRUWQ8="; 17 }; 18 19 + vendorHash = "sha256-Gin134G4NPK8M2E2RrgH62ieiuCw15jwm9SJg03w9ts="; 20 21 subPackages = [ "." ]; 22
+3 -3
pkgs/servers/sftpgo/default.nix
··· 6 7 buildGoModule rec { 8 pname = "sftpgo"; 9 - version = "2.4.4"; 10 11 src = fetchFromGitHub { 12 owner = "drakkan"; 13 repo = "sftpgo"; 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-gB3r7Q4M4pXHB9cfCRU8hMccWaJ170es0CJfbo/7lsg="; 16 }; 17 18 - vendorHash = "sha256-og3mn0iYl6aubcSAUohqG4ZSqdBB4AQYZtpKfbp7kcQ="; 19 20 ldflags = [ 21 "-s"
··· 6 7 buildGoModule rec { 8 pname = "sftpgo"; 9 + version = "2.4.5"; 10 11 src = fetchFromGitHub { 12 owner = "drakkan"; 13 repo = "sftpgo"; 14 rev = "refs/tags/v${version}"; 15 + hash = "sha256-r7vnUzI0NBXe1bFLB3k/fl9+4Sby2W0WsN7SSqaPUgc="; 16 }; 17 18 + vendorHash = "sha256-MAx5ue2YpEtkglPMHr+fep1Scw/ST2D6zkKVNWUbF0c="; 19 20 ldflags = [ 21 "-s"
+1 -1
pkgs/test/make-binary-wrapper/default.nix
··· 52 "prefix" 53 "suffix" 54 ] makeGoldenTest // lib.optionalAttrs (! stdenv.isDarwin) { 55 - cross = pkgsCross.aarch64-multiplatform.callPackage ./cross.nix { }; 56 }; 57 in 58
··· 52 "prefix" 53 "suffix" 54 ] makeGoldenTest // lib.optionalAttrs (! stdenv.isDarwin) { 55 + cross = pkgsCross.${if stdenv.buildPlatform.isAarch64 then "gnu64" else "aarch64-multiplatform"}.callPackage ./cross.nix { }; 56 }; 57 in 58
+4 -4
pkgs/tools/compression/unzrip/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "unzrip"; 10 - version = "unstable-2023-03-13"; 11 12 src = fetchFromGitHub { 13 owner = "quininer"; 14 repo = "unzrip"; 15 - rev = "bd2dffd43c3235857500190571602f3ce58c5f70"; 16 - hash = "sha256-Ih47xF4JYQf10RuTnfJJGUAJwyxDxCAdTTCdwGf4i/U="; 17 }; 18 19 - cargoHash = "sha256-11UESSKvTcr6Wa0cASRSQ55kBbRL5AelI6thv3oi0sI="; 20 21 nativeBuildInputs = [ 22 pkg-config
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "unzrip"; 10 + version = "unstable-2023-04-16"; 11 12 src = fetchFromGitHub { 13 owner = "quininer"; 14 repo = "unzrip"; 15 + rev = "14ba4b4c9ff9c80444ecef762d665acaa5aecfce"; 16 + hash = "sha256-QYu4PXWQGagj7r8lLs0IngIXzt6B8uq2qonycaGDg6g="; 17 }; 18 19 + cargoHash = "sha256-9CjKSdd+E2frI8VvdOawYQ3u+KF22xw9kBpnAufRUG0="; 20 21 nativeBuildInputs = [ 22 pkg-config
+3 -3
pkgs/tools/filesystems/tar2ext4/default.nix
··· 2 3 buildGoModule rec { 4 pname = "tar2ext4"; 5 - version = "0.9.6"; 6 7 src = fetchFromGitHub { 8 owner = "microsoft"; 9 repo = "hcsshim"; 10 rev = "v${version}"; 11 - sha256 = "sha256-sBcagAFjmnLfPFYwOhWIt6bnEXyOKYobvMI2rQf4S5A="; 12 }; 13 14 sourceRoot = "source/cmd/tar2ext4"; 15 - vendorSha256 = null; 16 17 meta = with lib; { 18 description = "Convert a tar archive to an ext4 image";
··· 2 3 buildGoModule rec { 4 pname = "tar2ext4"; 5 + version = "0.9.8"; 6 7 src = fetchFromGitHub { 8 owner = "microsoft"; 9 repo = "hcsshim"; 10 rev = "v${version}"; 11 + sha256 = "sha256-CvXn5b1kEZ2gYqfKSFRNzqkyOAcfcI1/3etRJTKwqog="; 12 }; 13 14 sourceRoot = "source/cmd/tar2ext4"; 15 + vendorHash = null; 16 17 meta = with lib; { 18 description = "Convert a tar archive to an ext4 image";
+2 -2
pkgs/tools/misc/pspg/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "pspg"; 5 - version = "5.7.4"; 6 7 src = fetchFromGitHub { 8 owner = "okbob"; 9 repo = pname; 10 rev = version; 11 - sha256 = "sha256-HZ771Q1UXnRds6o3EnZMyeu7Lt3IDFVFiUTc5snU0Bo="; 12 }; 13 14 nativeBuildInputs = [ pkg-config installShellFiles ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "pspg"; 5 + version = "5.7.5"; 6 7 src = fetchFromGitHub { 8 owner = "okbob"; 9 repo = pname; 10 rev = version; 11 + sha256 = "sha256-5XHT3Z40PUPO0c6bghDX547E6uEhBLZ6uRhJObVQazo="; 12 }; 13 14 nativeBuildInputs = [ pkg-config installShellFiles ];
+2 -2
pkgs/tools/misc/tmux-mem-cpu-load/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tmux-mem-cpu-load"; 5 - version = "3.6.2"; 6 7 src = fetchFromGitHub { 8 owner = "thewtex"; 9 repo = "tmux-mem-cpu-load"; 10 rev = "v${version}"; 11 - sha256 = "sha256-PQFR0mkt6OhtFlIrJXriNv+aoI9d7Y6y2tBEZrKkRU8="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tmux-mem-cpu-load"; 5 + version = "3.7.0"; 6 7 src = fetchFromGitHub { 8 owner = "thewtex"; 9 repo = "tmux-mem-cpu-load"; 10 rev = "v${version}"; 11 + sha256 = "sha256-4uSCYH31LO/69pxeur8byp9gYG6gaMYIiUxTmd7pag0="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
+3 -3
pkgs/tools/security/gopass/jsonapi.nix
··· 8 9 buildGoModule rec { 10 pname = "gopass-jsonapi"; 11 - version = "1.15.4"; 12 13 src = fetchFromGitHub { 14 owner = "gopasspw"; 15 repo = "gopass-jsonapi"; 16 rev = "v${version}"; 17 - hash = "sha256-gizUFoe+oAmEKHMlua/zsR+fUltGw2cp98XAgXzCm0U="; 18 }; 19 20 - vendorHash = "sha256-vMrP6rC0uPsRyFZdU2E9mPp031eob+36NcGueNP1Y7o="; 21 22 subPackages = [ "." ]; 23
··· 8 9 buildGoModule rec { 10 pname = "gopass-jsonapi"; 11 + version = "1.15.5"; 12 13 src = fetchFromGitHub { 14 owner = "gopasspw"; 15 repo = "gopass-jsonapi"; 16 rev = "v${version}"; 17 + hash = "sha256-ZSX5g1agmnPU8Nlmptr3GVrjtPPKbDxouSjz9ulSW44="; 18 }; 19 20 + vendorHash = "sha256-JWOBGTJFzihoznYFzcgjayAzNof6Ob5u3Jfx2a6zwEk="; 21 22 subPackages = [ "." ]; 23
+2 -2
pkgs/tools/security/vals/default.nix
··· 2 3 buildGoModule rec { 4 pname = "vals"; 5 - version = "0.24.0"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "variantdev"; 10 repo = pname; 11 - sha256 = "sha256-qUcNwpmWoJkrT4ClW8uq2ufFEgmiZQcDG446SSO6mR0="; 12 }; 13 14 vendorHash = "sha256-6DJiqDEgEHQbyIt4iShoBnagBvspd3W3vD56/FGjESs=";
··· 2 3 buildGoModule rec { 4 pname = "vals"; 5 + version = "0.25.0"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "variantdev"; 10 repo = pname; 11 + sha256 = "sha256-MofzTQM/dREw9b+IzjvexKoYZZ/ptbdWICROtwYK4X8="; 12 }; 13 14 vendorHash = "sha256-6DJiqDEgEHQbyIt4iShoBnagBvspd3W3vD56/FGjESs=";
+3 -3
pkgs/tools/virtualization/shipyard/default.nix
··· 2 3 buildGoModule rec { 4 pname = "shipyard"; 5 - version = "0.4.14"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "shipyard-run"; 10 repo = pname; 11 - sha256 = "sha256-uXpFLUTRm0urNd9dAUGqoC3vRkTvZd2kG+C9NkXFt/4="; 12 }; 13 - vendorSha256 = "sha256-ATXM3+mi/R+/jS6Ds89J75nDVnc3d8iOGhjD3KQZkkA="; 14 15 ldflags = [ 16 "-s" "-w" "-X main.version=${version}"
··· 2 3 buildGoModule rec { 4 pname = "shipyard"; 5 + version = "0.5.2"; 6 7 src = fetchFromGitHub { 8 rev = "v${version}"; 9 owner = "shipyard-run"; 10 repo = pname; 11 + sha256 = "sha256-Fd0R067YGdigG9SyWjXQYyQEnJM7Oug7Qkb0v+zK09g="; 12 }; 13 + vendorHash = "sha256-aE58XYgEWdPtq+DZKtn8Jbw2YIiiJSPutmVEOsG7urk="; 14 15 ldflags = [ 16 "-s" "-w" "-X main.version=${version}"
+4
pkgs/top-level/all-packages.nix
··· 10306 10307 nomad-pack = callPackage ../applications/networking/cluster/nomad-pack { }; 10308 10309 nomino = callPackage ../tools/misc/nomino { }; 10310 10311 nb = callPackage ../tools/misc/nb { }; ··· 28642 vistafonts-cht = callPackage ../data/fonts/vista-fonts-cht { }; 28643 28644 vollkorn = callPackage ../data/fonts/vollkorn { }; 28645 28646 weather-icons = callPackage ../data/fonts/weather-icons { }; 28647
··· 10306 10307 nomad-pack = callPackage ../applications/networking/cluster/nomad-pack { }; 10308 10309 + nova = callPackage ../applications/networking/cluster/nova { }; 10310 + 10311 nomino = callPackage ../tools/misc/nomino { }; 10312 10313 nb = callPackage ../tools/misc/nb { }; ··· 28644 vistafonts-cht = callPackage ../data/fonts/vista-fonts-cht { }; 28645 28646 vollkorn = callPackage ../data/fonts/vollkorn { }; 28647 + 28648 + whatsapp-emoji-font = callPackage ../data/fonts/whatsapp-emoji { }; 28649 28650 weather-icons = callPackage ../data/fonts/weather-icons { }; 28651