lol

Merge master into haskell-updates

authored by

github-actions[bot] and committed by
GitHub
70706e07 257171f0

+1617 -897
+13 -1
flake.nix
··· 27 27 # We set it to null, to remove the "legacy" entrypoint's 28 28 # non-hermetic default. 29 29 system = null; 30 - } // args 30 + 31 + modules = args.modules ++ [ 32 + # This module is injected here since it exposes the nixpkgs self-path in as 33 + # constrained of contexts as possible to avoid more things depending on it and 34 + # introducing unnecessary potential fragility to changes in flakes itself. 35 + # 36 + # See: failed attempt to make pkgs.path not copy when using flakes: 37 + # https://github.com/NixOS/nixpkgs/pull/153594#issuecomment-1023287913 38 + ({ config, pkgs, lib, ... }: { 39 + config.nixpkgs.flake.source = self.outPath; 40 + }) 41 + ]; 42 + } // builtins.removeAttrs args [ "modules" ] 31 43 ); 32 44 }); 33 45
+21
maintainers/maintainer-list.nix
··· 1743 1743 githubId = 113123021; 1744 1744 name = "Ashvith Shetty"; 1745 1745 }; 1746 + asininemonkey = { 1747 + email = "nixpkgs@asininemonkey.com"; 1748 + github = "asininemonkey"; 1749 + githubId = 65740649; 1750 + name = "Jose Cardoso"; 1751 + }; 1746 1752 aske = { 1747 1753 email = "aske@fmap.me"; 1748 1754 github = "aske"; ··· 1754 1760 github = "asppsa"; 1755 1761 githubId = 453170; 1756 1762 name = "Alastair Pharo"; 1763 + }; 1764 + aspulse = { 1765 + email = "contact@aspulse.dev"; 1766 + github = "aspulse"; 1767 + githubId = 84216737; 1768 + name = "AsPulse / あすぱる"; 1769 + keys = [{ 1770 + fingerprint = "C919 E69E A7C0 E147 9E0F C26E 1EDA D0C6 70BD 062D"; 1771 + }]; 1757 1772 }; 1758 1773 astavie = { 1759 1774 email = "astavie@pm.me"; ··· 15925 15940 github = "rardiol"; 15926 15941 githubId = 11351304; 15927 15942 name = "Ricardo Ardissone"; 15943 + }; 15944 + raroh73 = { 15945 + email = "me@raroh73.com"; 15946 + github = "Raroh73"; 15947 + githubId = 96078496; 15948 + name = "Raroh73"; 15928 15949 }; 15929 15950 rasendubi = { 15930 15951 email = "rasen.dubi@gmail.com";
-1
maintainers/team-list.nix
··· 342 342 imincik 343 343 nh2 344 344 nialov 345 - r-burns 346 345 sikmir 347 346 willcohen 348 347 ];
+14
nixos/doc/manual/release-notes/rl-2405.section.md
··· 20 20 - This can be disabled through the `environment.stub-ld.enable` option. 21 21 - If you use `programs.nix-ld.enable`, no changes are needed. The stub will be disabled automatically. 22 22 23 + - On flake-based NixOS configurations using `nixpkgs.lib.nixosSystem`, NixOS will automatically set `NIX_PATH` and the system-wide flake registry (`/etc/nix/registry.json`) to point `<nixpkgs>` and the unqualified flake path `nixpkgs` to the version of nixpkgs used to build the system. 24 + 25 + This makes `nix run nixpkgs#hello` and `nix-build '<nixpkgs>' -A hello` work out of the box with no added configuration, reusing dependencies already on the system. 26 + 27 + This may be undesirable if nix commands are not going to be run on the built system since it adds nixpkgs to the system closure. For such closure-size-constrained non-interactive systems, this setting should be disabled. 28 + 29 + To disable this, set [nixpkgs.flake.setNixPath](#opt-nixpkgs.flake.setNixPath) and [nixpkgs.flake.setFlakeRegistry](#opt-nixpkgs.flake.setFlakeRegistry) to false. 30 + 23 31 - Julia environments can now be built with arbitrary packages from the ecosystem using the `.withPackages` function. For example: `julia.withPackages ["Plots"]`. 24 32 25 33 - A new option `systemd.sysusers.enable` was added. If enabled, users and ··· 111 119 112 120 - `nitter` requires a `guest_accounts.jsonl` to be provided as a path or loaded into the default location at `/var/lib/nitter/guest_accounts.jsonl`. See [Guest Account Branch Deployment](https://github.com/zedeus/nitter/wiki/Guest-Account-Branch-Deployment) for details. 113 121 122 + - `boot.supportedFilesystems` and `boot.initrd.supportedFilesystems` are now attribute sets instead of lists. Assignment from lists as done previously is still supported, but checking whether a filesystem is enabled must now by done using `supportedFilesystems.fs or false` instead of using `lib.elem "fs" supportedFilesystems` as was done previously. 123 + 114 124 - `services.aria2.rpcSecret` has been replaced with `services.aria2.rpcSecretFile`. 115 125 This was done so that secrets aren't stored in the world-readable nix store. 116 126 To migrate, you will have create a file with the same exact string, and change ··· 172 182 - The vendored third party libraries have been mostly removed from `cudaPackages.nsight_systems`, which we now only ship for `cudaPackages_11_8` and later due to outdated dependencies. Users comfortable with the vendored dependencies may use `overrideAttrs` to amend the `postPatch` phase and the `meta.broken` correspondingly. Alternatively, one could package the deprecated `boost170` locally, as required for `cudaPackages_11_4.nsight_systems`. 173 183 174 184 - The `cudaPackages` package scope has been updated to `cudaPackages_12`. 185 + 186 + - Ada packages (libraries and tools) have been moved into the `gnatPackages` scope. `gnatPackages` uses the default GNAT compiler, `gnat12Packages` and `gnat13Packages` use the respective matching compiler version. 187 + 188 + - `spark2014` has been renamed to `gnatprove`. A version of `gnatprove` matching different GNAT versions is available from the different `gnatPackages` sets. 175 189 176 190 - `services.resolved.fallbackDns` can now be used to disable the upstream fallback servers entirely by setting it to an empty list. To get the previous behaviour of the upstream defaults set it to null, the new default, instead. 177 191
+16 -11
nixos/modules/hardware/printers.nix
··· 2 2 with lib; 3 3 let 4 4 cfg = config.hardware.printers; 5 - ppdOptionsString = options: optionalString (options != {}) 6 - (concatStringsSep " " 7 - (mapAttrsToList (name: value: "-o '${name}'='${value}'") options) 8 - ); 9 - ensurePrinter = p: '' 10 - ${pkgs.cups}/bin/lpadmin -p '${p.name}' -E \ 11 - ${optionalString (p.location != null) "-L '${p.location}'"} \ 12 - ${optionalString (p.description != null) "-D '${p.description}'"} \ 13 - -v '${p.deviceUri}' \ 14 - -m '${p.model}' \ 15 - ${ppdOptionsString p.ppdOptions} 5 + 6 + ensurePrinter = p: let 7 + args = cli.toGNUCommandLineShell {} ({ 8 + p = p.name; 9 + v = p.deviceUri; 10 + m = p.model; 11 + } // optionalAttrs (p.location != null) { 12 + L = p.location; 13 + } // optionalAttrs (p.description != null) { 14 + D = p.description; 15 + } // optionalAttrs (p.ppdOptions != {}) { 16 + o = mapAttrsToList (name: value: "'${name}'='${value}'") p.ppdOptions; 17 + }); 18 + in '' 19 + ${pkgs.cups}/bin/lpadmin ${args} -E 16 20 ''; 21 + 17 22 ensureDefaultPrinter = name: '' 18 23 ${pkgs.cups}/bin/lpadmin -d '${name}' 19 24 '';
+2 -10
nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel-no-zfs.nix
··· 1 - { pkgs, ... }: 1 + { lib, ... }: 2 2 3 3 { 4 4 imports = [ ./installation-cd-minimal-new-kernel.nix ]; 5 5 6 - # Makes `availableOn` fail for zfs, see <nixos/modules/profiles/base.nix>. 7 - # This is a workaround since we cannot remove the `"zfs"` string from `supportedFilesystems`. 8 - # The proper fix would be to make `supportedFilesystems` an attrset with true/false which we 9 - # could then `lib.mkForce false` 10 - nixpkgs.overlays = [(final: super: { 11 - zfs = super.zfs.overrideAttrs(_: { 12 - meta.platforms = []; 13 - }); 14 - })]; 6 + boot.supportedFilesystems.zfs = lib.mkForce false; 15 7 }
+2 -10
nixos/modules/installer/sd-card/sd-image-aarch64-new-kernel-no-zfs-installer.nix
··· 1 - { pkgs, ... }: 1 + { lib, ... }: 2 2 3 3 { 4 4 imports = [ ./sd-image-aarch64-new-kernel-installer.nix ]; 5 5 6 - # Makes `availableOn` fail for zfs, see <nixos/modules/profiles/base.nix>. 7 - # This is a workaround since we cannot remove the `"zfs"` string from `supportedFilesystems`. 8 - # The proper fix would be to make `supportedFilesystems` an attrset with true/false which we 9 - # could then `lib.mkForce false` 10 - nixpkgs.overlays = [(final: super: { 11 - zfs = super.zfs.overrideAttrs(_: { 12 - meta.platforms = []; 13 - }); 14 - })]; 6 + boot.supportedFilesystems.zfs = lib.mkForce false; 15 7 }
+105
nixos/modules/misc/nixpkgs-flake.nix
··· 1 + { config, options, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.nixpkgs.flake; 7 + in 8 + { 9 + options.nixpkgs.flake = { 10 + source = mkOption { 11 + # In newer Nix versions, particularly with lazy trees, outPath of 12 + # flakes becomes a Nix-language path object. We deliberately allow this 13 + # to gracefully come through the interface in discussion with @roberth. 14 + # 15 + # See: https://github.com/NixOS/nixpkgs/pull/278522#discussion_r1460292639 16 + type = types.nullOr (types.either types.str types.path); 17 + 18 + default = null; 19 + defaultText = "if (using nixpkgsFlake.lib.nixosSystem) then self.outPath else null"; 20 + 21 + example = ''builtins.fetchTarball { name = "source"; sha256 = "${lib.fakeHash}"; url = "https://github.com/nixos/nixpkgs/archive/somecommit.tar.gz"; }''; 22 + 23 + description = mdDoc '' 24 + The path to the nixpkgs sources used to build the system. This is automatically set up to be 25 + the store path of the nixpkgs flake used to build the system if using 26 + `nixpkgs.lib.nixosSystem`, and is otherwise null by default. 27 + 28 + This can also be optionally set if the NixOS system is not built with a flake but still uses 29 + pinned sources: set this to the store path for the nixpkgs sources used to build the system, 30 + as may be obtained by `builtins.fetchTarball`, for example. 31 + 32 + Note: the name of the store path must be "source" due to 33 + <https://github.com/NixOS/nix/issues/7075>. 34 + ''; 35 + }; 36 + 37 + setNixPath = mkOption { 38 + type = types.bool; 39 + 40 + default = cfg.source != null; 41 + defaultText = "config.nixpkgs.flake.source != null"; 42 + 43 + description = mdDoc '' 44 + Whether to set {env}`NIX_PATH` to include `nixpkgs=flake:nixpkgs` such that `<nixpkgs>` 45 + lookups receive the version of nixpkgs that the system was built with, in concert with 46 + {option}`nixpkgs.flake.setFlakeRegistry`. 47 + 48 + This is on by default for NixOS configurations built with flakes. 49 + 50 + This makes {command}`nix-build '<nixpkgs>' -A hello` work out of the box on flake systems. 51 + 52 + Note that this option makes the NixOS closure depend on the nixpkgs sources, which may add 53 + undesired closure size if the system will not have any nix commands run on it. 54 + ''; 55 + }; 56 + 57 + setFlakeRegistry = mkOption { 58 + type = types.bool; 59 + 60 + default = cfg.source != null; 61 + defaultText = "config.nixpkgs.flake.source != null"; 62 + 63 + description = mdDoc '' 64 + Whether to pin nixpkgs in the system-wide flake registry (`/etc/nix/registry.json`) to the 65 + store path of the sources of nixpkgs used to build the NixOS system. 66 + 67 + This is on by default for NixOS configurations built with flakes. 68 + 69 + This option makes {command}`nix run nixpkgs#hello` reuse dependencies from the system, avoid 70 + refetching nixpkgs, and have a consistent result every time. 71 + 72 + Note that this option makes the NixOS closure depend on the nixpkgs sources, which may add 73 + undesired closure size if the system will not have any nix commands run on it. 74 + ''; 75 + }; 76 + }; 77 + 78 + config = mkIf (cfg.source != null) (mkMerge [ 79 + { 80 + assertions = [ 81 + { 82 + assertion = cfg.setNixPath -> cfg.setFlakeRegistry; 83 + message = '' 84 + Setting `nixpkgs.flake.setNixPath` requires that `nixpkgs.flake.setFlakeRegistry` also 85 + be set, since it is implemented in terms of indirection through the flake registry. 86 + ''; 87 + } 88 + ]; 89 + } 90 + (mkIf cfg.setFlakeRegistry { 91 + nix.registry.nixpkgs.to = mkDefault { 92 + type = "path"; 93 + path = cfg.source; 94 + }; 95 + }) 96 + (mkIf cfg.setNixPath { 97 + # N.B. This does not include nixos-config in NIX_PATH unlike modules/config/nix-channel.nix 98 + # because we would need some kind of evil shim taking the *calling* flake's self path, 99 + # perhaps, to ever make that work (in order to know where the Nix expr for the system came 100 + # from and how to call it). 101 + nix.nixPath = mkDefault ([ "nixpkgs=flake:nixpkgs" ] 102 + ++ optional config.nix.channel.enable "/nix/var/nix/profiles/per-user/root/channels"); 103 + }) 104 + ]); 105 + }
+1
nixos/modules/module-list.nix
··· 133 133 ./misc/meta.nix 134 134 ./misc/nixops-autoluks.nix 135 135 ./misc/nixpkgs.nix 136 + ./misc/nixpkgs-flake.nix 136 137 ./misc/passthru.nix 137 138 ./misc/version.nix 138 139 ./misc/wordlist.nix
+3 -5
nixos/modules/system/boot/stage-1.nix
··· 3 3 # the modules necessary to mount the root file system, then calls the 4 4 # init in the root file system to start the second boot stage. 5 5 6 - { config, lib, utils, pkgs, ... }: 6 + { config, options, lib, utils, pkgs, ... }: 7 7 8 8 with lib; 9 9 ··· 636 636 }; 637 637 638 638 boot.initrd.supportedFilesystems = mkOption { 639 - default = [ ]; 640 - example = [ "btrfs" ]; 641 - type = types.listOf types.str; 642 - description = lib.mdDoc "Names of supported filesystem types in the initial ramdisk."; 639 + default = { }; 640 + inherit (options.boot.supportedFilesystems) example type description; 643 641 }; 644 642 645 643 boot.initrd.verbose = mkOption {
+17 -4
nixos/modules/tasks/filesystems.nix
··· 246 246 }; 247 247 248 248 boot.supportedFilesystems = mkOption { 249 - default = [ ]; 250 - example = [ "btrfs" ]; 251 - type = types.listOf types.str; 252 - description = lib.mdDoc "Names of supported filesystem types."; 249 + default = { }; 250 + example = lib.literalExpression '' 251 + { 252 + btrfs = true; 253 + zfs = lib.mkForce false; 254 + } 255 + ''; 256 + type = types.coercedTo 257 + (types.listOf types.str) 258 + (enabled: lib.listToAttrs (map (fs: lib.nameValuePair fs true) enabled)) 259 + (types.attrsOf types.bool); 260 + description = lib.mdDoc '' 261 + Names of supported filesystem types, or an attribute set of file system types 262 + and their state. The set form may be used together with `lib.mkForce` to 263 + explicitly disable support for specific filesystems, e.g. to disable ZFS 264 + with an unsupported kernel. 265 + ''; 253 266 }; 254 267 255 268 boot.specialFileSystems = mkOption {
+2 -2
nixos/modules/tasks/filesystems/apfs.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "apfs") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.apfs or false; 8 8 9 9 in 10 10 11 11 { 12 - config = mkIf (any (fs: fs == "apfs") config.boot.supportedFilesystems) { 12 + config = mkIf (config.boot.supportedFilesystems.apfs or false) { 13 13 14 14 system.fsPackages = [ pkgs.apfsprogs ]; 15 15
+2 -2
nixos/modules/tasks/filesystems/bcachefs.nix
··· 118 118 in 119 119 120 120 { 121 - config = lib.mkIf (lib.elem "bcachefs" config.boot.supportedFilesystems) (lib.mkMerge [ 121 + config = lib.mkIf (config.boot.supportedFilesystems.bcachefs or false) (lib.mkMerge [ 122 122 { 123 123 inherit assertions; 124 124 # needed for systemd-remount-fs ··· 133 133 }; 134 134 } 135 135 136 - (lib.mkIf ((lib.elem "bcachefs" config.boot.initrd.supportedFilesystems) || (bootFs != {})) { 136 + (lib.mkIf ((config.boot.initrd.supportedFilesystems.bcachefs or false) || (bootFs != {})) { 137 137 inherit assertions; 138 138 # chacha20 and poly1305 are required only for decryption attempts 139 139 boot.initrd.availableKernelModules = [ "bcachefs" "sha256" "chacha20" "poly1305" ];
+2 -2
nixos/modules/tasks/filesystems/btrfs.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "btrfs") config.boot.initrd.supportedFilesystems; 8 - inSystem = any (fs: fs == "btrfs") config.boot.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.btrfs or false; 8 + inSystem = config.boot.supportedFilesystems.btrfs or false; 9 9 10 10 cfgScrub = config.services.btrfs.autoScrub; 11 11
+2 -2
nixos/modules/tasks/filesystems/cifs.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "cifs") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.cifs or false; 8 8 9 9 in 10 10 11 11 { 12 12 config = { 13 13 14 - system.fsPackages = mkIf (any (fs: fs == "cifs") config.boot.supportedFilesystems) [ pkgs.cifs-utils ]; 14 + system.fsPackages = mkIf (config.boot.supportedFilesystems.cifs or false) [ pkgs.cifs-utils ]; 15 15 16 16 boot.initrd.availableKernelModules = mkIf inInitrd 17 17 [ "cifs" "nls_utf8" "hmac" "md4" "ecb" "des_generic" "sha256" ];
+1 -1
nixos/modules/tasks/filesystems/ecryptfs.nix
··· 4 4 with lib; 5 5 6 6 { 7 - config = mkIf (any (fs: fs == "ecryptfs") config.boot.supportedFilesystems) { 7 + config = mkIf (config.boot.supportedFilesystems.ecryptfs or false) { 8 8 system.fsPackages = [ pkgs.ecryptfs ]; 9 9 security.wrappers = { 10 10 "mount.ecryptfs_private" =
+2 -2
nixos/modules/tasks/filesystems/erofs.nix
··· 2 2 3 3 let 4 4 5 - inInitrd = lib.any (fs: fs == "erofs") config.boot.initrd.supportedFilesystems; 6 - inSystem = lib.any (fs: fs == "erofs") config.boot.supportedFilesystems; 5 + inInitrd = config.boot.initrd.supportedFilesystems.erofs or false; 6 + inSystem = config.boot.supportedFilesystems.erofs or false; 7 7 8 8 in 9 9
+1 -1
nixos/modules/tasks/filesystems/exfat.nix
··· 3 3 with lib; 4 4 5 5 { 6 - config = mkIf (any (fs: fs == "exfat") config.boot.supportedFilesystems) { 6 + config = mkIf (config.boot.supportedFilesystems.exfat or false) { 7 7 system.fsPackages = if config.boot.kernelPackages.kernelOlder "5.7" then [ 8 8 pkgs.exfat # FUSE 9 9 ] else [
+4 -2
nixos/modules/tasks/filesystems/ext.nix
··· 2 2 3 3 let 4 4 5 - inInitrd = lib.any (fs: fs == "ext2" || fs == "ext3" || fs == "ext4") config.boot.initrd.supportedFilesystems; 6 - inSystem = lib.any (fs: fs == "ext2" || fs == "ext3" || fs == "ext4") config.boot.supportedFilesystems; 5 + hasExtX = s: s.ext2 or s.ext3 or s.ext4 or false; 6 + 7 + inInitrd = hasExtX config.boot.initrd.supportedFilesystems; 8 + inSystem = hasExtX config.boot.supportedFilesystems; 7 9 8 10 in 9 11
+2 -3
nixos/modules/tasks/filesystems/f2fs.nix
··· 3 3 with lib; 4 4 5 5 let 6 - inInitrd = any (fs: fs == "f2fs") config.boot.initrd.supportedFilesystems; 7 - fileSystems = filter (x: x.fsType == "f2fs") config.system.build.fileSystems; 6 + inInitrd = config.boot.initrd.supportedFilesystems.f2fs or false; 8 7 in 9 8 { 10 - config = mkIf (any (fs: fs == "f2fs") config.boot.supportedFilesystems) { 9 + config = mkIf (config.boot.supportedFilesystems.f2fs or false) { 11 10 12 11 system.fsPackages = [ pkgs.f2fs-tools ]; 13 12
+1 -1
nixos/modules/tasks/filesystems/glusterfs.nix
··· 3 3 with lib; 4 4 5 5 { 6 - config = mkIf (any (fs: fs == "glusterfs") config.boot.supportedFilesystems) { 6 + config = mkIf (config.boot.supportedFilesystems.glusterfs or false) { 7 7 8 8 system.fsPackages = [ pkgs.glusterfs ]; 9 9
+2 -2
nixos/modules/tasks/filesystems/jfs.nix
··· 3 3 with lib; 4 4 5 5 let 6 - inInitrd = any (fs: fs == "jfs") config.boot.initrd.supportedFilesystems; 6 + inInitrd = config.boot.initrd.supportedFilesystems.jfs or false; 7 7 in 8 8 { 9 - config = mkIf (any (fs: fs == "jfs") config.boot.supportedFilesystems) { 9 + config = mkIf (config.boot.supportedFilesystems.jfs or false) { 10 10 11 11 system.fsPackages = [ pkgs.jfsutils ]; 12 12
+2 -2
nixos/modules/tasks/filesystems/nfs.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "nfs") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.nfs or false; 8 8 9 9 nfsStateDir = "/var/lib/nfs"; 10 10 ··· 58 58 59 59 ###### implementation 60 60 61 - config = mkIf (any (fs: fs == "nfs" || fs == "nfs4") config.boot.supportedFilesystems) { 61 + config = mkIf (config.boot.supportedFilesystems.nfs or config.boot.supportedFilesystems.nfs4 or false) { 62 62 63 63 services.rpcbind.enable = true; 64 64
+1 -1
nixos/modules/tasks/filesystems/ntfs.nix
··· 3 3 with lib; 4 4 5 5 { 6 - config = mkIf (any (fs: fs == "ntfs" || fs == "ntfs-3g") config.boot.supportedFilesystems) { 6 + config = mkIf (config.boot.supportedFilesystems.ntfs or config.boot.supportedFilesystems.ntfs-3g or false) { 7 7 8 8 system.fsPackages = [ pkgs.ntfs3g ]; 9 9
+2 -2
nixos/modules/tasks/filesystems/reiserfs.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "reiserfs") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.reiserfs or false; 8 8 9 9 in 10 10 11 11 { 12 - config = mkIf (any (fs: fs == "reiserfs") config.boot.supportedFilesystems) { 12 + config = mkIf (config.boot.supportedFilesystems.reiserfs or false) { 13 13 14 14 system.fsPackages = [ pkgs.reiserfsprogs ]; 15 15
+1 -1
nixos/modules/tasks/filesystems/squashfs.nix
··· 2 2 3 3 let 4 4 5 - inInitrd = lib.any (fs: fs == "squashfs") config.boot.initrd.supportedFilesystems; 5 + inInitrd = config.boot.initrd.supportedFilesystems.squashfs or false; 6 6 7 7 in 8 8
+7 -3
nixos/modules/tasks/filesystems/sshfs.nix
··· 1 1 { config, lib, pkgs, ... }: 2 2 3 3 { 4 - config = lib.mkIf (lib.any (fs: fs == "sshfs" || fs == "fuse.sshfs") config.boot.supportedFilesystems) { 5 - system.fsPackages = [ pkgs.sshfs ]; 6 - }; 4 + config = lib.mkIf 5 + (config.boot.supportedFilesystems.sshfs 6 + or config.boot.supportedFilesystems."fuse.sshfs" 7 + or false) 8 + { 9 + system.fsPackages = [ pkgs.sshfs ]; 10 + }; 7 11 }
+2 -2
nixos/modules/tasks/filesystems/unionfs-fuse.nix
··· 3 3 { 4 4 config = lib.mkMerge [ 5 5 6 - (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.initrd.supportedFilesystems) { 6 + (lib.mkIf (config.boot.initrd.supportedFilesystems.unionfs-fuse or false) { 7 7 boot.initrd.kernelModules = [ "fuse" ]; 8 8 9 9 boot.initrd.extraUtilsCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' ··· 35 35 }; 36 36 }) 37 37 38 - (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.supportedFilesystems) { 38 + (lib.mkIf (config.boot.supportedFilesystems.unionfs-fuse or false) { 39 39 system.fsPackages = [ pkgs.unionfs-fuse ]; 40 40 }) 41 41
+2 -2
nixos/modules/tasks/filesystems/vboxsf.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "vboxsf") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.vboxsf or false; 8 8 9 9 package = pkgs.runCommand "mount.vboxsf" { preferLocalBuild = true; } '' 10 10 mkdir -p $out/bin ··· 13 13 in 14 14 15 15 { 16 - config = mkIf (any (fs: fs == "vboxsf") config.boot.supportedFilesystems) { 16 + config = mkIf (config.boot.supportedFilesystems.vboxsf or false) { 17 17 18 18 system.fsPackages = [ package ]; 19 19
+2 -2
nixos/modules/tasks/filesystems/vfat.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "vfat") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.vfat or false; 8 8 9 9 in 10 10 11 11 { 12 - config = mkIf (any (fs: fs == "vfat") config.boot.supportedFilesystems) { 12 + config = mkIf (config.boot.supportedFilesystems.vfat or false) { 13 13 14 14 system.fsPackages = [ pkgs.dosfstools pkgs.mtools ]; 15 15
+2 -2
nixos/modules/tasks/filesystems/xfs.nix
··· 4 4 5 5 let 6 6 7 - inInitrd = any (fs: fs == "xfs") config.boot.initrd.supportedFilesystems; 7 + inInitrd = config.boot.initrd.supportedFilesystems.xfs or false; 8 8 9 9 in 10 10 11 11 { 12 - config = mkIf (any (fs: fs == "xfs") config.boot.supportedFilesystems) { 12 + config = mkIf (config.boot.supportedFilesystems.xfs or false) { 13 13 14 14 system.fsPackages = [ pkgs.xfsprogs.bin ]; 15 15
+2 -2
nixos/modules/tasks/filesystems/zfs.nix
··· 20 20 clevisDatasets = map (e: e.device) (filter (e: e.device != null && (hasAttr e.device config.boot.initrd.clevis.devices) && e.fsType == "zfs" && (fsNeededForBoot e)) config.system.build.fileSystems); 21 21 22 22 23 - inInitrd = any (fs: fs == "zfs") config.boot.initrd.supportedFilesystems; 24 - inSystem = any (fs: fs == "zfs") config.boot.supportedFilesystems; 23 + inInitrd = config.boot.initrd.supportedFilesystems.zfs or false; 24 + inSystem = config.boot.supportedFilesystems.zfs or false; 25 25 26 26 autosnapPkg = pkgs.zfstools.override { 27 27 zfs = cfgZfs.package;
+1 -1
nixos/modules/virtualisation/cri-o.nix
··· 6 6 7 7 crioPackage = pkgs.cri-o.override { 8 8 extraPackages = cfg.extraPackages 9 - ++ lib.optional (builtins.elem "zfs" config.boot.supportedFilesystems) config.boot.zfs.package; 9 + ++ lib.optional (config.boot.supportedFilesystems.zfs or false) config.boot.zfs.package; 10 10 }; 11 11 12 12 format = pkgs.formats.toml { };
-1
nixos/modules/virtualisation/hyperv-image.nix
··· 60 60 boot.growPartition = true; 61 61 62 62 boot.loader.grub = { 63 - version = 2; 64 63 device = "nodev"; 65 64 efiSupport = true; 66 65 efiInstallAsRemovable = true;
-1
nixos/modules/virtualisation/linode-config.nix
··· 59 59 60 60 grub = { 61 61 enable = true; 62 - version = 2; 63 62 forceInstall = true; 64 63 device = "nodev"; 65 64
+4 -1
nixos/modules/virtualisation/oci-containers.nix
··· 252 252 text = '' 253 253 ${cfg.backend} rm -f ${name} || true 254 254 ${optionalString (isValidLogin container.login) '' 255 + # try logging in, if it fails, check if image exists locally 255 256 ${cfg.backend} login \ 256 257 ${container.login.registry} \ 257 258 --username ${container.login.username} \ 258 - --password-stdin < ${container.login.passwordFile} 259 + --password-stdin < ${container.login.passwordFile} \ 260 + || ${cfg.backend} image inspect ${container.image} >/dev/null \ 261 + || { echo "image doesn't exist locally and login failed" >&2 ; exit 1; } 259 262 ''} 260 263 ${optionalString (container.imageFile != null) '' 261 264 ${cfg.backend} load -i ${container.imageFile}
+1 -1
nixos/modules/virtualisation/podman/default.nix
··· 9 9 extraPackages = cfg.extraPackages 10 10 # setuid shadow 11 11 ++ [ "/run/wrappers" ] 12 - ++ lib.optional (builtins.elem "zfs" config.boot.supportedFilesystems) config.boot.zfs.package; 12 + ++ lib.optional (config.boot.supportedFilesystems.zfs or false) config.boot.zfs.package; 13 13 }); 14 14 15 15 # Provides a fake "docker" binary mapping to podman
-1
nixos/modules/virtualisation/vmware-image.nix
··· 80 80 boot.growPartition = true; 81 81 82 82 boot.loader.grub = { 83 - version = 2; 84 83 device = "nodev"; 85 84 efiSupport = true; 86 85 efiInstallAsRemovable = true;
+1 -2
nixos/tests/installer.nix
··· 526 526 curl 527 527 ] 528 528 ++ optionals (bootLoader == "grub") (let 529 - zfsSupport = lib.any (x: x == "zfs") 530 - (extraInstallerConfig.boot.supportedFilesystems or []); 529 + zfsSupport = extraInstallerConfig.boot.supportedFilesystems.zfs or false; 531 530 in [ 532 531 (pkgs.grub2.override { inherit zfsSupport; }) 533 532 (pkgs.grub2_efi.override { inherit zfsSupport; })
+3 -3
pkgs/applications/audio/go-musicfox/default.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "go-musicfox"; 12 - version = "4.3.0"; 12 + version = "4.3.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "go-musicfox"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - hash = "sha256-JDR3D3tILT0q9jqcZmbfQC3yn7cmaSL/GEpCguqCFXI="; 18 + hash = "sha256-QZHuQAOnthSm7Kb82i3NUWTnKk+9OMHV5vzOU72inX0="; 19 19 }; 20 20 21 21 deleteVendor = true; 22 22 23 - vendorHash = "sha256-ILO4v4ii1l9JokXG7R3vuN7i5hDi/hLHTFiClA2vdf0="; 23 + vendorHash = "sha256-6DeoxpjVfykBI3fJAJpMZwJ4VTooIbxGpk5+SW198hU="; 24 24 25 25 subPackages = [ "cmd/musicfox.go" ]; 26 26
+2 -2
pkgs/applications/audio/kid3/default.nix
··· 28 28 29 29 stdenv.mkDerivation (finalAttrs: { 30 30 pname = "kid3"; 31 - version = "3.9.4"; 31 + version = "3.9.5"; 32 32 33 33 src = fetchurl { 34 34 url = "mirror://kde/stable/kid3/${finalAttrs.version}/kid3-${finalAttrs.version}.tar.xz"; 35 - hash = "sha256-xBCWDpYiXeChxIiMPqHG3CyiRau2kUdDJtzcPtvWpSA="; 35 + hash = "sha256-pCT+3eNcF247RDNEIqrUOEhBh3LaAgdR0A0IdOXOgUU="; 36 36 }; 37 37 38 38 nativeBuildInputs = [
+2 -2
pkgs/applications/audio/snapcast/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchpatch, cmake, pkg-config 2 - , alsa-lib, asio, avahi, boost179, flac, libogg, libvorbis, soxr 2 + , alsa-lib, asio, avahi, boost179, flac, libogg, libvorbis, libopus, soxr 3 3 , IOKit, AudioToolbox 4 4 , aixlog, popl 5 5 , pulseaudioSupport ? false, libpulseaudio ··· 32 32 # not needed 33 33 buildInputs = [ 34 34 boost179 35 - asio avahi flac libogg libvorbis 35 + asio avahi flac libogg libvorbis libopus 36 36 aixlog popl soxr 37 37 ] ++ lib.optional pulseaudioSupport libpulseaudio 38 38 ++ lib.optional stdenv.isLinux alsa-lib
+9 -2
pkgs/applications/blockchains/ton/default.nix
··· 6 6 , pkg-config 7 7 , gperf 8 8 , libmicrohttpd 9 + , libsodium 9 10 , openssl 10 11 , readline 12 + , secp256k1 11 13 , zlib 12 14 , nix-update-script 13 15 }: 14 16 15 17 stdenv.mkDerivation rec { 16 18 pname = "ton"; 17 - version = "2023.10"; 19 + version = "2024.01"; 18 20 19 21 src = fetchFromGitHub { 20 22 owner = "ton-blockchain"; 21 23 repo = "ton"; 22 24 rev = "v${version}"; 23 - sha256 = "sha256-K1RhhW7EvwYV7/ng3NPjSGdHEQvJZ7K97YXd7s5wghc="; 25 + hash = "sha256-nZ7yel+lTNO5zFzN711tLwAvqpf5qaYOxERwApnMVOs="; 24 26 fetchSubmodules = true; 25 27 }; 26 28 ··· 35 37 buildInputs = [ 36 38 gperf 37 39 libmicrohttpd 40 + libsodium 38 41 openssl 39 42 readline 43 + secp256k1 40 44 zlib 41 45 ]; 42 46 43 47 passthru.updateScript = nix-update-script { }; 44 48 45 49 meta = with lib; { 50 + # The build fails on darwin as: 51 + # error: aligned allocation function of type 'void *(std::size_t, std::align_val_t)' is only available on macOS 10.13 or newer 52 + broken = stdenv.isDarwin; 46 53 description = "A fully decentralized layer-1 blockchain designed by Telegram"; 47 54 homepage = "https://ton.org/"; 48 55 changelog = "https://github.com/ton-blockchain/ton/blob/v${version}/Changelog.md";
+1 -1
pkgs/applications/editors/emacs/elisp-packages/elpa-packages.nix
··· 88 88 ]; 89 89 90 90 buildInputs = [ 91 - pkgs.gnatcoll-xref 91 + pkgs.gnatPackages.gnatcoll-xref 92 92 ]; 93 93 94 94 buildPhase = ''
+1
pkgs/applications/editors/neovim/build-neovim-plugin.nix
··· 33 33 nativeBuildInputs = oa.nativeBuildInputs or [] ++ [ 34 34 lua.pkgs.luarocksMoveDataFolder 35 35 ]; 36 + version = "${originalLuaDrv.version}-unstable-${oa.version}"; 36 37 })); 37 38 in 38 39 finalDrv
+2 -2
pkgs/applications/editors/notepad-next/default.nix
··· 2 2 3 3 mkDerivation rec { 4 4 pname = "notepad-next"; 5 - version = "0.6.4"; 5 + version = "0.7"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "dail8859"; 9 9 repo = "NotepadNext"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-m8+kM9uz3gJ3kvpgZdoonSvYlh/f1WiGZlB8JKMTXh4="; 11 + sha256 = "sha256-I2bS8oT/TGf6fuXpTwOKo2MaUo0jLFIU/DfW9h1toOk="; 12 12 # External dependencies - https://github.com/dail8859/NotepadNext/issues/135 13 13 fetchSubmodules = true; 14 14 };
+48
pkgs/applications/editors/vscode/extensions/default.nix
··· 955 955 956 956 contextmapper.context-mapper-vscode-extension = callPackage ./contextmapper.context-mapper-vscode-extension { }; 957 957 958 + continue.continue = buildVscodeMarketplaceExtension { 959 + mktplcRef = 960 + let 961 + sources = { 962 + "x86_64-linux" = { 963 + arch = "linux-x64"; 964 + sha256 = "05kh6sf3jv3510q33chf8s5n1kfp9wcm7650va7mcrdkfr9g8ysq"; 965 + }; 966 + "x86_64-darwin" = { 967 + arch = "darwin-x64"; 968 + sha256 = "0242h9kq47qvs1xynr5x8dzxkc5pwgb6km0iqpyy9kydg8ng1vp3"; 969 + }; 970 + "aarch64-linux" = { 971 + arch = "linux-arm64"; 972 + sha256 = "1qm3f2lh8mi3hnyp2bmx7j2lir6fmbbxkzh6b8zf579khhbapnaz"; 973 + }; 974 + "aarch64-darwin" = { 975 + arch = "darwin-arm64"; 976 + sha256 = "18w22z1c5qgkpw2zlwmi9gs9dx1pcm51f0r8my7ynnvgl6mp12sg"; 977 + }; 978 + }; 979 + in 980 + { 981 + name = "continue"; 982 + publisher = "Continue"; 983 + version = "0.8.12"; 984 + } // sources.${stdenv.system}; 985 + nativeBuildInputs = [ 986 + autoPatchelfHook 987 + ]; 988 + buildInputs = [ 989 + stdenv.cc.cc.lib 990 + ]; 991 + postInstall = '' 992 + cd "$out/$installPrefix" 993 + substituteInPlace "out/extension.js" \ 994 + --replace-fail 'await showTutorial();' '//await showTutorial();' 995 + ''; 996 + meta = { 997 + description = "Open-source autopilot for software development - bring the power of ChatGPT to your IDE"; 998 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=Continue.continue"; 999 + homepage = "https://github.com/continuedev/continue"; 1000 + license = lib.licenses.asl20; 1001 + maintainers = [ lib.maintainers.raroh73 ]; 1002 + platforms = [ "x86_64-linux" "x86_64-darwin" "aarch64-darwin" "aarch64-linux" ]; 1003 + }; 1004 + }; 1005 + 958 1006 coolbear.systemd-unit-file = buildVscodeMarketplaceExtension { 959 1007 mktplcRef = { 960 1008 publisher = "coolbear";
+2 -2
pkgs/applications/emulators/bsnes/ares/default.nix
··· 22 22 23 23 stdenv.mkDerivation (finalAttrs: { 24 24 pname = "ares"; 25 - version = "135"; 25 + version = "136"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "ares-emulator"; 29 29 repo = "ares"; 30 30 rev = "v${finalAttrs.version}"; 31 - hash = "sha256-SZhsMKjNxmT2eHsXAZcyMGoMhwWGgvXpDeZGGVn58Sc="; 31 + hash = "sha256-Hks/MWusPiBVdb5L+53qtR6VmXG/P4rDzsvHxLeA8Do="; 32 32 }; 33 33 34 34 patches = [
+2 -2
pkgs/applications/graphics/upscayl/default.nix
··· 4 4 lib, 5 5 }: let 6 6 pname = "upscayl"; 7 - version = "2.9.8"; 7 + version = "2.9.9"; 8 8 9 9 src = fetchurl { 10 10 url = "https://github.com/upscayl/upscayl/releases/download/v${version}/upscayl-${version}-linux.AppImage"; 11 - hash = "sha256-hLK9AX87WbJdKTV/rzEzNeaUWeDz1+bvp/R2LkjHp+w="; 11 + hash = "sha256-33jJRMvRQxL7rPJ6VigEKcDhge46CAA0jJUOhzEyWzA="; 12 12 }; 13 13 14 14 appimageContents = appimageTools.extractType2 {
+6 -2
pkgs/applications/kde/kcachegrind.nix
··· 2 2 mkDerivation, lib, 3 3 extra-cmake-modules, kdoctools, 4 4 karchive, ki18n, kio, perl, python3, php, qttools, 5 - kdbusaddons 5 + kdbusaddons, makeBinaryWrapper, graphviz 6 6 }: 7 7 8 8 mkDerivation { ··· 13 13 license = with lib.licenses; [ gpl2 ]; 14 14 maintainers = with lib.maintainers; [ orivej ]; 15 15 }; 16 - nativeBuildInputs = [ extra-cmake-modules kdoctools ]; 16 + nativeBuildInputs = [ extra-cmake-modules kdoctools makeBinaryWrapper ]; 17 17 buildInputs = [ karchive ki18n kio perl python3 php qttools kdbusaddons ]; 18 + postInstall = '' 19 + wrapProgram $out/bin/kcachegrind \ 20 + --suffix PATH : "${lib.makeBinPath [ graphviz ]}" 21 + ''; 18 22 }
+5 -1
pkgs/applications/misc/blender/default.nix
··· 1 - { config, stdenv, lib, fetchurl, fetchzip, boost, cmake, ffmpeg, gettext, glew 1 + { config, stdenv, lib, fetchurl, fetchzip, fetchpatch, boost, cmake, ffmpeg, gettext, glew 2 2 , libepoxy, libXi, libX11, libXext, libXrender 3 3 , libjpeg, libpng, libsamplerate, libsndfile 4 4 , libtiff, libwebp, libGLU, libGL, openal, opencolorio, openexr, openimagedenoise, openimageio, openjpeg, python310Packages ··· 47 47 48 48 patches = [ 49 49 ./draco.patch 50 + (fetchpatch { 51 + url = "https://projects.blender.org/blender/blender/commit/cf4365e555a759d5b3225bce77858374cb07faad.diff"; 52 + hash = "sha256-Nypd04yFSHYa7RBa8kNmoApqJrU4qpaOle3tkj44d4g="; 53 + }) 50 54 ] ++ lib.optional stdenv.isDarwin ./darwin.patch; 51 55 52 56 nativeBuildInputs =
+3 -3
pkgs/applications/misc/gimoji/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "gimoji"; 10 - version = "0.7.3"; 10 + version = "0.7.6"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "zeenix"; 14 14 repo = "gimoji"; 15 15 rev = version; 16 - hash = "sha256-xQ02jmPuu1IHkQCCJn2FVPcJRbwN+k8FhsZyDX0oHaw="; 16 + hash = "sha256-ipsEFZGC3JYOeNVI4AUb2c/9tt+TTIbeXuJ15ShEH6U="; 17 17 }; 18 18 19 - cargoHash = "sha256-DSLIH6swVQXHrqKBxlrhNTG5maRmUi6Ndmuuv0Vo3Ak="; 19 + cargoHash = "sha256-786OPEaIHQtgUHlkjLprKfJ7VoeSW+IzHto3XXZ6Fu8="; 20 20 21 21 buildInputs = lib.optionals stdenv.isDarwin [ 22 22 darwin.apple_sdk.frameworks.AppKit
+6 -3
pkgs/applications/misc/yubioath-flutter/default.nix
··· 13 13 14 14 flutter.buildFlutterApplication rec { 15 15 pname = "yubioath-flutter"; 16 - version = "6.3.1"; 16 + version = "6.4.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "Yubico"; 20 20 repo = "yubioath-flutter"; 21 21 rev = version; 22 - hash = "sha256-XgRIX2Iv5niJw2NSBPwM0K4uF5sPj9c+Xj4oHtAQSbU="; 22 + hash = "sha256-aXUnmKEUCi0rsVr3HVhEk6xa1z9HMsH+0AIY531hqiU="; 23 23 }; 24 24 25 25 passthru.helper = python3.pkgs.callPackage ./helper.nix { inherit src version meta; }; 26 26 27 27 pubspecLock = lib.importJSON ./pubspec.lock.json; 28 + gitHashes = { 29 + window_manager = "sha256-mLX51nbWFccsAfcqLQIYDjYz69y9wAz4U1RZ8TIYSj0="; 30 + }; 28 31 29 32 postPatch = '' 30 33 rm -f pubspec.lock 31 34 32 35 substituteInPlace linux/CMakeLists.txt \ 33 - --replace "../build/linux/helper" "${passthru.helper}/libexec/helper" 36 + --replace-fail "../build/linux/helper" "${passthru.helper}/libexec/helper" 34 37 ''; 35 38 36 39 preInstall = ''
+26 -25
pkgs/applications/misc/yubioath-flutter/pubspec.lock.json
··· 134 134 "dependency": "transitive", 135 135 "description": { 136 136 "name": "build_runner_core", 137 - "sha256": "c9e32d21dd6626b5c163d48b037ce906bbe428bc23ab77bcd77bb21e593b6185", 137 + "sha256": "4ae8ffe5ac758da294ecf1802f2aff01558d8b1b00616aa7538ea9a8a5d50799", 138 138 "url": "https://pub.dev" 139 139 }, 140 140 "source": "hosted", 141 - "version": "7.2.11" 141 + "version": "7.3.0" 142 142 }, 143 143 "built_collection": { 144 144 "dependency": "transitive", ··· 154 154 "dependency": "transitive", 155 155 "description": { 156 156 "name": "built_value", 157 - "sha256": "c9aabae0718ec394e5bc3c7272e6bb0dc0b32201a08fe185ec1d8401d3e39309", 157 + "sha256": "a3ec2e0f967bc47f69f95009bb93db936288d61d5343b9436e378b28a2f830c6", 158 158 "url": "https://pub.dev" 159 159 }, 160 160 "source": "hosted", 161 - "version": "8.8.1" 161 + "version": "8.9.0" 162 162 }, 163 163 "characters": { 164 164 "dependency": "transitive", ··· 264 264 "dependency": "direct dev", 265 265 "description": { 266 266 "name": "custom_lint", 267 - "sha256": "dfb893ff17c83cf08676c6b64df11d3e53d80590978d7c1fb242afff3ba6dedb", 267 + "sha256": "f89ff83efdba7c8996e86bb3bad0b759d58f9b19ae4d0e277a386ddd8b481217", 268 268 "url": "https://pub.dev" 269 269 }, 270 270 "source": "hosted", 271 - "version": "0.5.8" 271 + "version": "0.6.0" 272 272 }, 273 273 "custom_lint_builder": { 274 274 "dependency": "direct dev", 275 275 "description": { 276 276 "name": "custom_lint_builder", 277 - "sha256": "8df6634b38a36a6c6cb74a9c0eb02e9ba0b0ab89b29e38e6daa86e8ed2c6288d", 277 + "sha256": "9cdd9987feaa6925ec5f98d64de4fbbb5d94248ff77bbf2489366efad6c4baef", 278 278 "url": "https://pub.dev" 279 279 }, 280 280 "source": "hosted", 281 - "version": "0.5.8" 281 + "version": "0.6.0" 282 282 }, 283 283 "custom_lint_core": { 284 284 "dependency": "transitive", 285 285 "description": { 286 286 "name": "custom_lint_core", 287 - "sha256": "2b235be098d157e244f18ea905a15a18c16a205e30553888fac6544bbf52f03f", 287 + "sha256": "9003a91409c9f1db6e2e50b4870d1d5e802e5923b25f7261bf3cb3e11ea9d4fb", 288 288 "url": "https://pub.dev" 289 289 }, 290 290 "source": "hosted", 291 - "version": "0.5.8" 291 + "version": "0.6.0" 292 292 }, 293 293 "dart_style": { 294 294 "dependency": "transitive", ··· 402 402 "dependency": "direct main", 403 403 "description": { 404 404 "name": "flutter_riverpod", 405 - "sha256": "da9591d1f8d5881628ccd5c25c40e74fc3eef50ba45e40c3905a06e1712412d5", 405 + "sha256": "4bce556b7ecbfea26109638d5237684538d4abc509d253e6c5c4c5733b360098", 406 406 "url": "https://pub.dev" 407 407 }, 408 408 "source": "hosted", 409 - "version": "2.4.9" 409 + "version": "2.4.10" 410 410 }, 411 411 "flutter_test": { 412 412 "dependency": "direct dev", ··· 424 424 "dependency": "direct dev", 425 425 "description": { 426 426 "name": "freezed", 427 - "sha256": "6c5031daae12c7072b3a87eff98983076434b4889ef2a44384d0cae3f82372ba", 427 + "sha256": "57247f692f35f068cae297549a46a9a097100685c6780fe67177503eea5ed4e5", 428 428 "url": "https://pub.dev" 429 429 }, 430 430 "source": "hosted", 431 - "version": "2.4.6" 431 + "version": "2.4.7" 432 432 }, 433 433 "freezed_annotation": { 434 434 "dependency": "direct main", ··· 645 645 "dependency": "transitive", 646 646 "description": { 647 647 "name": "mime", 648 - "sha256": "e4ff8e8564c03f255408decd16e7899da1733852a9110a58fe6d1b817684a63e", 648 + "sha256": "2e123074287cc9fd6c09de8336dae606d1ddb88d9ac47358826db698c176a1f2", 649 649 "url": "https://pub.dev" 650 650 }, 651 651 "source": "hosted", 652 - "version": "1.0.4" 652 + "version": "1.0.5" 653 653 }, 654 654 "package_config": { 655 655 "dependency": "transitive", ··· 834 834 "dependency": "transitive", 835 835 "description": { 836 836 "name": "riverpod", 837 - "sha256": "942999ee48b899f8a46a860f1e13cee36f2f77609eb54c5b7a669bb20d550b11", 837 + "sha256": "548e2192eb7aeb826eb89387f814edb76594f3363e2c0bb99dd733d795ba3589", 838 838 "url": "https://pub.dev" 839 839 }, 840 840 "source": "hosted", 841 - "version": "2.4.9" 841 + "version": "2.5.0" 842 842 }, 843 843 "rxdart": { 844 844 "dependency": "transitive", ··· 1119 1119 "dependency": "direct main", 1120 1120 "description": { 1121 1121 "name": "url_launcher", 1122 - "sha256": "d25bb0ca00432a5e1ee40e69c36c85863addf7cc45e433769d61bed3fe81fd96", 1122 + "sha256": "c512655380d241a337521703af62d2c122bf7b77a46ff7dd750092aa9433499c", 1123 1123 "url": "https://pub.dev" 1124 1124 }, 1125 1125 "source": "hosted", 1126 - "version": "6.2.3" 1126 + "version": "6.2.4" 1127 1127 }, 1128 1128 "url_launcher_android": { 1129 1129 "dependency": "transitive", ··· 1308 1308 "window_manager": { 1309 1309 "dependency": "direct main", 1310 1310 "description": { 1311 - "name": "window_manager", 1312 - "sha256": "dcc865277f26a7dad263a47d0e405d77e21f12cb71f30333a52710a408690bd7", 1313 - "url": "https://pub.dev" 1311 + "path": ".", 1312 + "ref": "2272d45bcf46d7e2b452a038906fbc85df3ce83d", 1313 + "resolved-ref": "2272d45bcf46d7e2b452a038906fbc85df3ce83d", 1314 + "url": "https://github.com/fdennis/window_manager.git" 1314 1315 }, 1315 - "source": "hosted", 1316 - "version": "0.3.7" 1316 + "source": "git", 1317 + "version": "0.3.8" 1317 1318 }, 1318 1319 "xdg_directories": { 1319 1320 "dependency": "transitive",
+2 -2
pkgs/applications/networking/asn/default.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "asn"; 18 - version = "0.75.3"; 18 + version = "0.76.0"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "nitefood"; 22 22 repo = "asn"; 23 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-KOwXOGw6gv8YFTrFFkD6BNKChTIbD2Soy3gvvSzNQgM="; 24 + hash = "sha256-pdtRf9VKEdNg1UeYSaLNLm9O057dT+n5g3Dd0bcP4EI="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+2 -2
pkgs/applications/networking/cloudflared/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "cloudflared"; 10 - version = "2024.2.0"; 10 + version = "2024.2.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "cloudflare"; 14 14 repo = "cloudflared"; 15 15 rev = "refs/tags/${version}"; 16 - hash = "sha256-jcIHpRHcAgzzSKvZH9SLfu5Ake3zCgsSw1iv64yXW2E="; 16 + hash = "sha256-aSAwDz7QSYbHfDA+/usGh7xCxSq+kBTB3eqMBf5XEa8="; 17 17 }; 18 18 19 19 vendorHash = null;
+2 -2
pkgs/applications/networking/cluster/arkade/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "arkade"; 10 - version = "0.11.1"; 10 + version = "0.11.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "alexellis"; 14 14 repo = "arkade"; 15 15 rev = version; 16 - hash = "sha256-DsKc+AT+0vIaJftBFLqVXx/CJRNNgE/vzSxlHkCSJaI="; 16 + hash = "sha256-G8zWPz5pTDjfZJ8DtY1DQRGYMOsGhNXWZEgFYKM/y6I="; 17 17 }; 18 18 19 19 CGO_ENABLED = 0;
+2 -2
pkgs/applications/networking/cluster/kubetail/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "kubetail"; 5 - version = "1.6.18"; 5 + version = "1.6.19"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "johanhaleby"; 9 9 repo = "kubetail"; 10 10 rev = version; 11 - sha256 = "sha256-Gde5thEpMX3h0e1eoC8SeDdkZfa02CmQf3ELLMeEWGU="; 11 + sha256 = "sha256-s+rz30VWG4RijeJuRYEhCmgFDjaxJ+4twgXrGkNc5c8="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ installShellFiles makeWrapper ];
+2 -2
pkgs/applications/networking/cluster/vcluster/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vcluster"; 5 - version = "0.18.1"; 5 + version = "0.19.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "loft-sh"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-TJjMB7x8MOlr3GexsnOZBFPJovVkf4ByRn1aGprvZFQ="; 11 + hash = "sha256-W9BSLGUrW8Us+yYQLIz3oY8JKJSo43cL+oWQQf3xWJE="; 12 12 }; 13 13 14 14 vendorHash = null;
+2 -2
pkgs/applications/networking/instant-messengers/discord/default.nix
··· 4 4 if stdenv.isLinux then { 5 5 stable = "0.0.43"; 6 6 ptb = "0.0.71"; 7 - canary = "0.0.278"; 7 + canary = "0.0.282"; 8 8 development = "0.0.13"; 9 9 } else { 10 10 stable = "0.0.294"; ··· 25 25 }; 26 26 canary = fetchurl { 27 27 url = "https://dl-canary.discordapp.net/apps/linux/${version}/discord-canary-${version}.tar.gz"; 28 - hash = "sha256-ypnw/CDY02jD8xLpJvS4Y7GjahgvUhcmV7zSDaVkNpk="; 28 + hash = "sha256-+Ijl/yPa7DVzVKOWTxCu6FxIsschIqYa+tYBnnKdCBA="; 29 29 }; 30 30 development = fetchurl { 31 31 url = "https://dl-development.discordapp.net/apps/linux/${version}/discord-development-${version}.tar.gz";
+5 -5
pkgs/applications/networking/instant-messengers/mattermost-desktop/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchurl 4 - , electron_26 4 + , electron_27 5 5 , makeWrapper 6 6 }: 7 7 8 8 let 9 9 10 10 pname = "mattermost-desktop"; 11 - version = "5.5.1"; 11 + version = "5.6.0"; 12 12 13 13 srcs = { 14 14 "x86_64-linux" = { 15 15 url = "https://releases.mattermost.com/desktop/${version}/${pname}-${version}-linux-x64.tar.gz"; 16 - hash = "sha256-bRiO5gYM7nrnkbHBP3B9zAK2YV5POkc3stEsbZJ48VA="; 16 + hash = "sha256-KUF/zH18X+RS8AICBv53JTBpcaokzo92psyoQNmLF/Q="; 17 17 }; 18 18 19 19 "aarch64-linux" = { 20 20 url = "https://releases.mattermost.com/desktop/${version}/${pname}-${version}-linux-arm64.tar.gz"; 21 - hash = "sha256-Z4U6Jbwasra69QPHJ9/7WwMSxh0O9r4QIe/xC3WRf4w="; 21 + hash = "sha256-Zl5PalAles39qSMtt1cytfu4Mheud4+8TTkt7Ohdf/o="; 22 22 }; 23 23 }; 24 24 ··· 52 52 substituteInPlace $out/share/applications/Mattermost.desktop \ 53 53 --replace /share/mattermost-desktop/mattermost-desktop /bin/mattermost-desktop 54 54 55 - makeWrapper ${electron_26}/bin/electron $out/bin/${pname} \ 55 + makeWrapper '${lib.getExe electron_27}' $out/bin/${pname} \ 56 56 --add-flags $out/share/${pname}/app.asar 57 57 58 58 runHook postInstall
-2
pkgs/applications/networking/pyload-ng/default.nix
··· 21 21 postPatch = '' 22 22 # relax version bounds 23 23 sed -i 's/\([A-z0-9]*\)~=.*$/\1/' setup.cfg 24 - # not sure what Flask-Session2 is but flask-session works just fine 25 - sed -i '/Flask-Session2/d' setup.cfg 26 24 ''; 27 25 28 26 propagatedBuildInputs = with python3.pkgs; [
+3 -3
pkgs/applications/networking/sync/storj-uplink/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "storj-uplink"; 8 - version = "1.96.2"; 8 + version = "1.98.2"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "storj"; 12 12 repo = "storj"; 13 13 rev = "v${version}"; 14 - hash = "sha256-mQIrXDEfMMrubQyn90eu0k3isvnpaF237Tpd84HhUfU="; 14 + hash = "sha256-XnTrQIDUHdW9HwnYRigGFMGmcSCBhdoTXT4xlMCMeCw="; 15 15 }; 16 16 17 17 subPackages = [ "cmd/uplink" ]; 18 18 19 - vendorHash = "sha256-cUhdl0jqgkA89NeOdFSifR5LsTjeYifOXqBu3qCAovk="; 19 + vendorHash = "sha256-n7exLjiDyvnoKAKnJXo1Ag+jh1Ccb2eA3Yv5fg7gkDk="; 20 20 21 21 ldflags = [ "-s" "-w" ]; 22 22
+3 -3
pkgs/applications/networking/sync/wdt/default.nix
··· 14 14 15 15 stdenv.mkDerivation { 16 16 pname = "wdt"; 17 - version = "unstable-2023-12-01"; 17 + version = "unstable-2024-02-05"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "facebook"; 21 21 repo = "wdt"; 22 - rev = "66f17af009ef6eaf2707bb8bb511ba6bcf3d9bbe"; 23 - sha256 = "sha256-ucnFcpH9Duru35kRT769zMX2BMqufZJopd2srKPJkrU="; 22 + rev = "d94b2d5df6f1c803f9f3b8ed9247b752fa853865"; 23 + sha256 = "sha256-9TeJbZZq9uQ6KaEBFGDyIGcXgxi2y1aj55vxv5dAIzw="; 24 24 }; 25 25 26 26 nativeBuildInputs = [ cmake ];
+7 -77
pkgs/applications/office/paperless-ngx/default.nix
··· 22 22 }: 23 23 24 24 let 25 - version = "2.5.2"; 25 + version = "2.5.3"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "paperless-ngx"; 29 29 repo = "paperless-ngx"; 30 30 rev = "refs/tags/v${version}"; 31 - hash = "sha256-v6k9clKNBNb2MQp0BTrUL9zfY6SUKfzaaOycmV8RKyk="; 31 + hash = "sha256-fZ5grVZjCVkCH6doeqBLHPh9mPvHkiz+QXi/OyoJhR4="; 32 32 }; 33 33 34 34 python = python3; ··· 99 99 ]; 100 100 101 101 propagatedBuildInputs = with python.pkgs; [ 102 - amqp 103 - anyio 104 - asgiref 105 - async-timeout 106 - attrs 107 - autobahn 108 - automat 109 - billiard 110 102 bleach 111 - celery 112 - certifi 113 - cffi 103 + channels 114 104 channels-redis 115 - channels 116 - charset-normalizer 117 - click 118 - click-didyoumean 119 - click-plugins 120 - click-repl 121 - coloredlogs 122 105 concurrent-log-handler 123 - constantly 124 - cryptography 125 106 dateparser 107 + django 126 108 django-allauth 127 109 django-auditlog 128 110 django-celery-results ··· 132 114 django-filter 133 115 django-guardian 134 116 django-multiselectfield 135 - django 136 - djangorestframework-guardian2 137 117 djangorestframework 118 + djangorestframework-guardian2 138 119 drf-writable-nested 139 120 filelock 140 121 flower 141 122 gotenberg-client 142 123 gunicorn 143 - h11 144 - h2 145 - hiredis 146 - httptools 147 - httpx 148 - humanfriendly 149 - humanize 150 - hyperlink 151 - idna 152 124 imap-tools 153 - img2pdf 154 - incremental 155 - inotify-simple 156 125 inotifyrecursive 157 - joblib 158 126 langdetect 159 - lxml 160 - msgpack 161 127 mysqlclient 162 128 nltk 163 129 ocrmypdf 164 - packaging 165 130 pathvalidate 166 131 pdf2image 167 - pikepdf 168 - pillow 169 - pluggy 170 - portalocker 171 - prompt-toolkit 172 132 psycopg2 173 - pyasn1-modules 174 - pyasn1 175 - pycparser 176 - pyopenssl 177 133 python-dateutil 178 134 python-dotenv 135 + python-gnupg 179 136 python-ipware 180 137 python-magic 181 - python-gnupg 182 - pytz 183 - pyyaml 184 138 pyzbar 185 139 rapidfuzz 186 140 redis 187 - regex 188 - reportlab 189 - requests 190 141 scikit-learn 191 - scipy 192 142 setproctitle 193 - service-identity 194 - sniffio 195 - sqlparse 196 - threadpoolctl 197 143 tika-client 198 - tornado 199 144 tqdm 200 - twisted 201 - txaio 202 - tzdata 203 - tzlocal 204 - urllib3 205 145 uvicorn 206 - uvloop 207 - vine 208 146 watchdog 209 - watchfiles 210 - wcwidth 211 - webencodings 212 - websockets 213 147 whitenoise 214 148 whoosh 215 - zipp 216 - zope-interface 217 149 zxing-cpp 218 150 ] 219 151 ++ redis.optional-dependencies.hiredis 220 - ++ twisted.optional-dependencies.tls 221 152 ++ uvicorn.optional-dependencies.standard; 222 153 223 154 postBuild = '' ··· 262 193 pytest-rerunfailures 263 194 pytest-xdist 264 195 pytestCheckHook 265 - reportlab 266 196 ]; 267 197 268 198 pytestFlagsArray = [ ··· 280 210 281 211 # Disable unneeded code coverage test 282 212 substituteInPlace src/setup.cfg \ 283 - --replace "--cov --cov-report=html --cov-report=xml" "" 213 + --replace-fail "--cov --cov-report=html --cov-report=xml" "" 284 214 ''; 285 215 286 216 disabledTests = [
+2
pkgs/applications/radio/srsran/default.nix
··· 41 41 zeromq 42 42 ]; 43 43 44 + cmakeFlags = [ "-DENABLE_WERROR=OFF" ]; 45 + 44 46 meta = with lib; { 45 47 homepage = "https://www.srslte.com/"; 46 48 description = "Open-source 4G and 5G software radio suite.";
+4
pkgs/applications/science/biology/sortmerna/default.nix
··· 32 32 substituteInPlace src/sortmerna/CMakeLists.txt \ 33 33 --replace "target_link_libraries(sortmerna" \ 34 34 "target_link_libraries(sortmerna Threads::Threads" 35 + 36 + # Fix gcc-13 build by adding missing <cstdint> includes: 37 + # https://github.com/sortmerna/sortmerna/issues/412 38 + sed -e '1i #include <cstdint>' -i include/kseq_load.hpp 35 39 ''; 36 40 37 41 meta = with lib; {
+3
pkgs/applications/science/machine-learning/starspace/default.nix
··· 28 28 ''; 29 29 30 30 meta = with lib; { 31 + # Does not build against gcc-13. No development activity upstream 32 + # for past few years. 33 + broken = true; 31 34 description = "General-purpose neural model for efficient learning of entity embeddings"; 32 35 homepage = "https://ai.facebook.com/tools/starspace/"; 33 36 license = licenses.mit;
+5 -4
pkgs/applications/version-management/git-cliff/default.nix
··· 3 3 , fetchFromGitHub 4 4 , rustPlatform 5 5 , Security 6 + , SystemConfiguration 6 7 }: 7 8 8 9 rustPlatform.buildRustPackage rec { 9 10 pname = "git-cliff"; 10 - version = "1.4.0"; 11 + version = "2.0.4"; 11 12 12 13 src = fetchFromGitHub { 13 14 owner = "orhun"; 14 15 repo = "git-cliff"; 15 16 rev = "v${version}"; 16 - hash = "sha256-OK2eoWlqlpf/X8EGMnWTv9Gs5FkYvW5rmQDB/Mkbp60="; 17 + hash = "sha256-0ReMn37sYpS5uX9Nem7M9LthAvGNdJaAob+tEnjIrMw="; 17 18 }; 18 19 19 - cargoHash = "sha256-gtkpZKOaG5p79uJ9cbbGdiOX57bDFTf2/Bd8+WToJrw="; 20 + cargoHash = "sha256-xDIXXHoykEtRzWm5NDE1rcFgC4iFxhUPgwlvaoHmV6Y="; 20 21 21 22 # attempts to run the program on .git in src which is not deterministic 22 23 doCheck = false; 23 24 24 25 buildInputs = lib.optionals stdenv.isDarwin [ 25 - Security 26 + Security SystemConfiguration 26 27 ]; 27 28 28 29 meta = with lib; {
+2 -2
pkgs/applications/version-management/git-credential-oauth/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "git-credential-oauth"; 5 - version = "0.11.0"; 5 + version = "0.11.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "hickford"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-Zxdd4JhSoaAFx8neZqdOZSZEOTtupZHnX+5ziYxbw6s="; 11 + hash = "sha256-bqyoAAqli0L6Kf+W1sTh2vmmfaIj2OdpQyvQZnYOWWA="; 12 12 }; 13 13 14 14 ldflags = [
+3 -3
pkgs/applications/version-management/git-ignore/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "git-ignore"; 11 - version = "1.3.1"; 11 + version = "1.3.3"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "sondr3"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - hash = "sha256-kfc4LIFjLMltCn3BPaEfxc/yOZxFjYioyobTQZN/RmY="; 17 + hash = "sha256-OVKRNj3tRi/PGY1m4rdpmH87laYzTkCiwoBc3txVJ3U="; 18 18 }; 19 19 20 - cargoHash = "sha256-HoW10XzWIjxsqoKVKQkMf5in7pOODGnUM0cRZP1OJpg="; 20 + cargoHash = "sha256-dAQKL+sMThpTqBoN5MZvm8tQUJhaSH7lT8DwbjzFq40="; 21 21 22 22 nativeBuildInputs = [ 23 23 installShellFiles
+2 -2
pkgs/applications/video/kodi/addons/youtube/default.nix
··· 3 3 buildKodiAddon rec { 4 4 pname = "youtube"; 5 5 namespace = "plugin.video.youtube"; 6 - version = "7.0.2.2"; 6 + version = "7.0.3"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "anxdpanic"; 10 10 repo = "plugin.video.youtube"; 11 11 rev = "v${version}"; 12 - hash = "sha256-BUeE/8oQYBiq4XgIp4nv0hjEQz3nnkDWCnAf4kpptwk="; 12 + hash = "sha256-dD9jl/W8RDfYHv13TBniOeRyc4cocj8160BHWz3MKlE="; 13 13 }; 14 14 15 15 propagatedBuildInputs = [
+23 -29
pkgs/applications/video/vokoscreen-ng/default.nix
··· 1 - { lib 2 - , mkDerivation 3 - , fetchFromGitHub 4 - , pkg-config 5 - , qmake 6 - , qttools 7 - , gstreamer 8 - , libX11 9 - , pulseaudio 10 - , qtbase 11 - , qtmultimedia 12 - , qtx11extras 13 - 1 + { fetchFromGitHub 2 + , gst_all_1 3 + , gst-plugins-bad 14 4 , gst-plugins-base 15 5 , gst-plugins-good 16 - , gst-plugins-bad 17 6 , gst-plugins-ugly 18 - , wayland 7 + , gstreamer 8 + , lib 9 + , libX11 19 10 , pipewire 20 - , wrapQtAppsHook 11 + , pkg-config 12 + , pulseaudio 13 + , qt6 14 + , stdenv 15 + , wayland 21 16 }: 22 17 23 - mkDerivation rec { 18 + stdenv.mkDerivation rec { 24 19 pname = "vokoscreen-ng"; 25 - version = "3.8.0"; 20 + version = "4.0.0"; 26 21 27 22 src = fetchFromGitHub { 28 23 owner = "vkohaupt"; 29 24 repo = "vokoscreenNG"; 30 25 rev = version; 31 - sha256 = "sha256-4tQ/fLaAbjfc3mt2qJsW9scku/CGUs74SehDaZgLPj4="; 26 + hash = "sha256-Y6+R18Gf3ShqhsmZ4Okx02fSOOyilS6iKU5FW9wpxvY="; 32 27 }; 33 28 34 29 qmakeFlags = [ "src/vokoscreenNG.pro" ]; 35 30 36 - nativeBuildInputs = [ qttools pkg-config qmake wrapQtAppsHook ]; 31 + nativeBuildInputs = [ qt6.qttools pkg-config qt6.qmake qt6.wrapQtAppsHook ]; 37 32 buildInputs = [ 38 - gstreamer 33 + gst_all_1.gstreamer 39 34 libX11 40 35 pulseaudio 41 - qtbase 42 - qtmultimedia 43 - qtx11extras 36 + qt6.qtbase 37 + qt6.qtmultimedia 44 38 wayland 45 39 pipewire 46 - gst-plugins-base 47 - gst-plugins-good 48 - gst-plugins-bad 49 - gst-plugins-ugly 40 + gst_all_1.gst-plugins-base 41 + gst_all_1.gst-plugins-good 42 + gst_all_1.gst-plugins-bad 43 + gst_all_1.gst-plugins-ugly 50 44 ]; 51 45 52 46 postPatch = '' ··· 67 61 description = "User friendly Open Source screencaster for Linux and Windows"; 68 62 license = licenses.gpl2Plus; 69 63 homepage = "https://github.com/vkohaupt/vokoscreenNG"; 70 - maintainers = with maintainers; [ shamilton ]; 64 + maintainers = with maintainers; [ shamilton dietmarw ]; 71 65 platforms = platforms.linux; 72 66 mainProgram = "vokoscreenNG"; 73 67 };
+1 -1
pkgs/build-support/cc-wrapper/default.nix
··· 377 377 378 378 # this symlink points to the unwrapped gnat's output "out". It is used by 379 379 # our custom gprconfig compiler description to find GNAT's ada runtime. See 380 - # ../../development/tools/build-managers/gprbuild/{boot.nix, nixpkgs-gnat.xml} 380 + # ../../development/ada-modules/gprbuild/{boot.nix, nixpkgs-gnat.xml} 381 381 ln -sf ${cc} $out/nix-support/gprconfig-gnat-unwrapped 382 382 '' 383 383
+29
pkgs/by-name/ar/arcticons-sans/package.nix
··· 1 + { lib 2 + , stdenvNoCC 3 + , fetchzip 4 + }: 5 + 6 + stdenvNoCC.mkDerivation (finalAttrs: { 7 + pname = "arcticons-sans"; 8 + version = "0.580"; 9 + 10 + src = fetchzip { 11 + hash = "sha256-BRyYHOuz7zxD1zD4L4DmI9dFhGePmGFDqYmS0DIbvi8="; 12 + url = "https://github.com/arcticons-team/arcticons-font/archive/refs/tags/${finalAttrs.version}.zip"; 13 + }; 14 + 15 + installPhase = '' 16 + runHook preInstall 17 + 18 + install -D -m444 -t $out/share/fonts/opentype $src/*.otf 19 + 20 + runHook postInstall 21 + ''; 22 + 23 + meta = { 24 + description = "Arcticons Sans"; 25 + homepage = "https://github.com/arcticons-team/arcticons-font"; 26 + license = lib.licenses.ofl; 27 + maintainers = with lib.maintainers; [ asininemonkey ]; 28 + }; 29 + })
+2 -2
pkgs/by-name/bo/bonsai/package.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "bonsai"; 11 - version = "1.0.2"; 11 + version = "1.1.0"; 12 12 13 13 src = fetchFromSourcehut { 14 14 owner = "~stacyharper"; 15 15 repo = "bonsai"; 16 16 rev = "v${finalAttrs.version}"; 17 - hash = "sha256-Yosf07KUOQv4O5111tLGgI270g0KVGwzdTPtPOsTcP8="; 17 + hash = "sha256-Wsr76OQOIqRPCx/8GK9NovxxPZ3dEP8pSo8wgMK1Hfo="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+33
pkgs/by-name/gh/gh-poi/package.nix
··· 1 + { lib 2 + , fetchFromGitHub 3 + , buildGoModule 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "gh-poi"; 8 + version = "0.9.8"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "seachicken"; 12 + repo = "gh-poi"; 13 + rev = "v${version}"; 14 + hash = "sha256-QpUZxho9hzmgbCFgNxwwKi6hhfyqc4b/JYKH3rP4Eb8="; 15 + }; 16 + 17 + ldflags = [ "-s" "-w" ]; 18 + 19 + vendorHash = "sha256-D/YZLwwGJWCekq9mpfCECzJyJ/xSlg7fC6leJh+e8i0="; 20 + 21 + # Skip checks because some of test suites require fixture. 22 + # See: https://github.com/seachicken/gh-poi/blob/v0.9.8/.github/workflows/contract-test.yml#L28-L29 23 + doCheck = false; 24 + 25 + meta = with lib; { 26 + changelog = "https://github.com/seachicken/gh-poi/releases/tag/${src.rev}"; 27 + description = "GitHub CLI extension to safely clean up your local branches"; 28 + homepage = "https://github.com/seachicken/gh-poi"; 29 + license = licenses.mit; 30 + maintainers = with maintainers; [ aspulse ]; 31 + mainProgram = "gh-poi"; 32 + }; 33 + }
+4 -4
pkgs/by-name/he/helix-gpt/pin.json
··· 1 1 { 2 - "version": "0.27", 3 - "srcHash": "sha256-sGkK3SaQmzprgTiABgKfRZ3pUNFZNrt/8aNANH1RES8=", 2 + "version": "0.28", 3 + "srcHash": "sha256-vOXY8B5CRCEQX/NnBVNwmyRKSeDSliurClRPiJIAD3Y=", 4 4 "x86_64-linux": "sha256-h6wGkOfSbB8Rwm7eFvcowDdH1RdS6eFaxgf+SdYvYt8=", 5 - "x86_64-darwin": "sha256-A8T1FNPS1CguSmRyGl+i0o/DGy+LyTnKYKdNc8kTKS8=", 6 - "aarch64-darwin": "sha256-A8T1FNPS1CguSmRyGl+i0o/DGy+LyTnKYKdNc8kTKS8=" 5 + "x86_64-darwin": "sha256-lkURZs6nQpsZ7SGX+eLoBEXa9VdTQP795iHAGYyRaVs=", 6 + "aarch64-darwin": "sha256-lkURZs6nQpsZ7SGX+eLoBEXa9VdTQP795iHAGYyRaVs=" 7 7 }
+2 -2
pkgs/by-name/lu/lubelogger/package.nix
··· 6 6 7 7 buildDotnetModule rec { 8 8 pname = "lubelogger"; 9 - version = "1.2.1"; 9 + version = "1.2.2"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "hargata"; 13 13 repo = "lubelog"; 14 14 rev = "v${version}"; 15 - hash = "sha256-YxP8XmjYqxuTA2fIV1q7GBsrWPtLr02KkFl4UUNJ2p8="; 15 + hash = "sha256-eH8BWTUTzmVTOnn5svSfk8hqf8CjIpQdxoknlkgjVDY="; 16 16 }; 17 17 18 18 projectFile = "CarCareTracker.sln";
+2 -2
pkgs/by-name/oe/oelint-adv/package.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication rec { 8 8 pname = "oelint-adv"; 9 - version = "4.3.1"; 9 + version = "4.4.0"; 10 10 format = "setuptools"; 11 11 12 12 src = fetchPypi { 13 13 inherit version; 14 14 pname = "oelint_adv"; 15 - hash = "sha256-N8QNX6JuHVDKBLwGNwBROH8f+tcLrc1Mk21CiiOVHkI="; 15 + hash = "sha256-Sg7qn/yZUJEJdMmaGm27kyL+fKkUsZo25eExZPOem40="; 16 16 }; 17 17 18 18 propagatedBuildInputs = with python3.pkgs; [
+79
pkgs/by-name/ou/outfox/package.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , autoPatchelfHook 5 + , alsa-lib 6 + , freetype 7 + , libjack2 8 + , libglvnd 9 + , libpulseaudio 10 + , makeDesktopItem 11 + , makeWrapper 12 + }: 13 + 14 + stdenv.mkDerivation rec { 15 + pname = "outfox"; 16 + version = "0.5.0-pre042"; 17 + 18 + src = { 19 + i686-linux = fetchurl { 20 + url = "https://github.com/TeamRizu/OutFox/releases/download/OF5.0.0-042/OutFox-alpha-0.5.0-pre042-Linux-14.04-32bit-i386-i386-legacy-date-20231227.tar.gz"; 21 + sha256 = "sha256-NFjNoqJ7Fq4A7Y0k6oQcWjykV+/b/MiRtJ1p6qlZdjs="; 22 + }; 23 + x86_64-linux = fetchurl { 24 + url = "https://github.com/TeamRizu/OutFox/releases/download/OF5.0.0-042/OutFox-alpha-0.5.0-pre042-Linux-22.04-amd64-current-date-20231224.tar.gz"; 25 + hash = "sha256-dW+g/JYav3rUuI+nHDi6rXu/O5KYiEdk/HH82jgOUnI="; 26 + }; 27 + aarch64-linux = fetchurl { 28 + url = "https://github.com/TeamRizu/OutFox/releases/download/OF5.0.0-042/OutFox-alpha-0.5.0-pre042-Raspberry-Pi-Linux-18.04-arm64-arm64v8-modern-date-20231225.tar.gz"; 29 + hash = "sha256-7Qrq6t8KmUSIK4Rskkxw5l4UZ2vsb9/orzPegHySaJ4="; 30 + }; 31 + armv7l-linux = fetchurl { 32 + url = "https://github.com/TeamRizu/OutFox/releases/download/OF5.0.0-042/OutFox-alpha-0.5.0-pre042-Raspberry-Pi-Linux-14.04-arm32-arm32v7-legacy-date-20231227.tar.gz"; 33 + hash = "sha256-PRp7kuqFBRy7nextTCB+/poc+A9AX2EiQphx6aUfT8E="; 34 + }; 35 + }.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 36 + 37 + nativeBuildInputs = [ 38 + autoPatchelfHook 39 + makeWrapper 40 + ]; 41 + 42 + buildInputs = [ 43 + alsa-lib 44 + freetype 45 + libjack2 46 + libglvnd 47 + libpulseaudio 48 + ]; 49 + 50 + desktop = makeDesktopItem { 51 + name = "project-outfox"; 52 + desktopName = "Project OutFox"; 53 + genericName = "Rhythm game engine"; 54 + exec = "OutFox"; 55 + tryExec = "OutFox"; 56 + categories = [ "Game" ]; 57 + }; 58 + 59 + patchPhase = '' 60 + find ./Appearance -type f -executable -exec chmod -x {} \; 61 + ''; 62 + 63 + installPhase = '' 64 + mkdir -p $out/bin $out/share/OutFox $out/share/applications 65 + cp -r ./. $out/share/OutFox 66 + ln -s ${desktop}/share/applications/project-outfox.desktop $out/share/applications/project-outfox.desktop 67 + makeWrapper $out/share/OutFox/OutFox $out/bin/OutFox --argv0 68 + ''; 69 + 70 + meta = with lib; { 71 + description = "A rhythm game engine forked from StepMania"; 72 + homepage = "https://projectoutfox.com"; 73 + sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 74 + license = licenses.unfree; 75 + platforms = [ "x86_64-linux" "i686-linux" "aarch64-linux" "armv7l-linux" ]; 76 + maintainers = with maintainers; [ maxwell-lt ]; 77 + mainProgram = "OutFox"; 78 + }; 79 + }
+3 -3
pkgs/by-name/re/renode-dts2repl/package.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication { 8 8 pname = "renode-dts2repl"; 9 - version = "unstable-2024-02-19"; 9 + version = "unstable-2024-02-23"; 10 10 pyproject = true; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "antmicro"; 14 14 repo = "dts2repl"; 15 - rev = "d0bf509a04327bfe5a8542fdbcc71cf368bb9ac7"; 16 - hash = "sha256-era8iyKOk5JzemSWk20ojjtoRsjSA43uzQC1ZFXUkZc="; 15 + rev = "ae616f4f6a70a2f497c2a9ce8c9c64b34238e553"; 16 + hash = "sha256-2Q7hfXf9nCrmHxJ0S8njF5zIgcGXaRPPVogtsPgLLsI="; 17 17 }; 18 18 19 19 nativeBuildInputs = [
+2 -2
pkgs/by-name/sr/srm-cuarzo/package.nix
··· 14 14 }: 15 15 stdenv.mkDerivation (self: { 16 16 pname = "srm-cuarzo"; 17 - version = "0.5.2-1"; 17 + version = "0.5.3-1"; 18 18 rev = "v${self.version}"; 19 - hash = "sha256-FMd1v0K+H7DlSD0osmWrnuSKqQZxw3RUZq8JwZFm/f4="; 19 + hash = "sha256-KRp+rTpiUbOmUPE9vASwTF+c8TDveFnAEqptcGO5luc="; 20 20 21 21 src = fetchFromGitHub { 22 22 inherit (self) rev hash;
+3 -3
pkgs/by-name/ty/typos-lsp/package.nix
··· 4 4 }: 5 5 rustPlatform.buildRustPackage rec { 6 6 pname = "typos-lsp"; 7 - version = "0.1.12"; 7 + version = "0.1.13"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "tekumara"; 11 11 repo = "typos-lsp"; 12 12 rev = "refs/tags/v${version}"; 13 - hash = "sha256-LzemgHVCuLkLaJyyrJhIsOOn+OnYuiJsMSxITNz6R8g="; 13 + hash = "sha256-2nNOUeuDDBi7Ak7ATKYyRqmGwebk0JqIdHN6GV+v+aA="; 14 14 }; 15 15 16 - cargoHash = "sha256-LFRg/Y/nudrdPw/o3WUH6aM+ThE8N/HII5J0Ikid8GI="; 16 + cargoHash = "sha256-hQoxaavR4cefmpr+znXOs1OFJJ83mGk4TidFf13l7Ho="; 17 17 18 18 # fix for compilation on aarch64 19 19 # see https://github.com/NixOS/nixpkgs/issues/145726
+14 -9
pkgs/by-name/vi/vinegar/package.nix
··· 8 8 , xorg 9 9 , wayland 10 10 , vulkan-headers 11 - , wineWowPackages 11 + , wine64Packages 12 12 , fetchpatch 13 13 }: 14 14 let 15 15 # wine-staging doesn't support overrideAttrs for now 16 - wine = wineWowPackages.stagingFull.overrideDerivation (oldAttrs: { 16 + wine = wine64Packages.staging.overrideDerivation (oldAttrs: { 17 17 patches = 18 - (oldAttrs.patches or [ ]) 18 + (oldAttrs.patches or []) 19 19 ++ [ 20 20 # upstream issue: https://bugs.winehq.org/show_bug.cgi?id=55604 21 21 # Here are the currently applied patches for Roblox to run under WINE: 22 22 (fetchpatch { 23 - name = "vinegar-wine-segrevert.patch"; 24 - url = "https://raw.githubusercontent.com/flathub/org.vinegarhq.Vinegar/8fc153c492542a522d6cc2dff7d1af0e030a529a/patches/wine/temp.patch"; 25 - hash = "sha256-AnEBBhB8leKP0xCSr6UsQK7CN0NDbwqhe326tJ9dDjc="; 23 + name = "vinegar-wine-segregrevert.patch"; 24 + url = "https://raw.githubusercontent.com/flathub/org.vinegarhq.Vinegar/e24cb9dfa996bcfeaa46504c0375660fe271148d/patches/wine/segregrevert.patch"; 25 + hash = "sha256-+3Nld81nG3GufI4jAF6yrWfkJmsSCOku39rx0Hov29c="; 26 + }) 27 + (fetchpatch { 28 + name = "vinegar-wine-mouselock.patch"; 29 + url = "https://raw.githubusercontent.com/flathub/org.vinegarhq.Vinegar/e24cb9dfa996bcfeaa46504c0375660fe271148d/patches/wine/mouselock.patch"; 30 + hash = "sha256-0AGA4AQbxTL5BGVbm072moav7xVA3zpotYqM8pcEDa4="; 26 31 }) 27 32 ]; 28 33 }); 29 34 in 30 35 buildGoModule rec { 31 36 pname = "vinegar"; 32 - version = "1.6.1"; 37 + version = "1.7.3"; 33 38 34 39 src = fetchFromGitHub { 35 40 owner = "vinegarhq"; 36 41 repo = "vinegar"; 37 42 rev = "v${version}"; 38 - hash = "sha256-uRdWE5NwRVSuUZyU5B5u5DfJOxu/gUqwM682eORTDOs="; 43 + hash = "sha256-aKL+4jw/uMbbvLRCBHstCTrcQ1PTYSCwMNgXTvSvMeY="; 39 44 }; 40 45 41 - vendorHash = "sha256-Ex6PRd3rD2jbLXlY36koNvZF3P+gAZTE9hExIfOw9CE="; 46 + vendorHash = "sha256-OaMfWecOPQh6quXjYkZLyBDHZ9TINSA7Ue/Y0sz5ZYY="; 42 47 43 48 nativeBuildInputs = [ pkg-config makeBinaryWrapper ]; 44 49 buildInputs = [ libGL libxkbcommon xorg.libX11 xorg.libXcursor xorg.libXfixes wayland vulkan-headers wine ];
+96
pkgs/development/ada-modules/gnatprove/default.nix
··· 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , gnat 5 + , gnatcoll-core 6 + , gprbuild 7 + , python3 8 + , ocamlPackages 9 + , makeWrapper 10 + }: 11 + let 12 + gnat_version = lib.versions.major gnat.version; 13 + 14 + fetchSpark2014 = { rev, sha256 } : fetchFromGitHub { 15 + owner = "AdaCore"; 16 + repo = "spark2014"; 17 + fetchSubmodules = true; 18 + inherit rev sha256; 19 + }; 20 + 21 + spark2014 = { 22 + "12" = { 23 + src = fetchSpark2014 { 24 + rev = "ab34e07080a769b63beacc141707b5885c49d375"; # branch fsf-12 25 + sha256 = "sha256-7pe3eWitpxmqzjW6qEIEuN0qr2IR+kJ7Ssc9pTBcCD8="; 26 + }; 27 + commit_date = "2022-05-25"; 28 + }; 29 + "13" = { 30 + src = fetchSpark2014 { 31 + rev = "12db22e854defa9d1c993ef904af1e72330a68ca"; # branch fsf-13 32 + sha256 = "sha256-mZWP9yF1O4knCiXx8CqolnS+93bM+hTQy40cd0HZmwI="; 33 + }; 34 + commit_date = "2023-01-05"; 35 + }; 36 + }; 37 + 38 + thisSpark = spark2014.${gnat_version} or 39 + (builtins.throw "GNATprove depend on a specific GNAT version and can't be built using GNAT ${gnat_version}."); 40 + 41 + in 42 + stdenv.mkDerivation rec { 43 + pname = "gnatprove"; 44 + version = "fsf-${gnat_version}_${thisSpark.commit_date}"; 45 + 46 + src = thisSpark.src; 47 + 48 + nativeBuildInputs = [ 49 + gnat 50 + gprbuild 51 + python3 52 + ocamlPackages.ocaml 53 + makeWrapper 54 + ]; 55 + 56 + buildInputs = [ 57 + gnatcoll-core 58 + ocamlPackages.camlzip 59 + ocamlPackages.findlib 60 + ocamlPackages.menhir 61 + ocamlPackages.menhirLib 62 + ocamlPackages.num 63 + ocamlPackages.yojson 64 + ocamlPackages.zarith 65 + ]; 66 + 67 + propagatedBuildInputs = [ 68 + gprbuild 69 + ]; 70 + 71 + postPatch = '' 72 + # gnat2why/gnat_src points to the GNAT sources 73 + tar xf ${gnat.cc.src} gcc-${gnat.cc.version}/gcc/ada 74 + mv gcc-${gnat.cc.version}/gcc/ada gnat2why/gnat_src 75 + ''; 76 + 77 + configurePhase = '' 78 + make setup 79 + ''; 80 + 81 + installPhase = '' 82 + make install-all 83 + cp -a ./install/. $out 84 + mkdir $out/share/gpr 85 + ln -s $out/lib/gnat/* $out/share/gpr/ 86 + ''; 87 + 88 + meta = with lib; { 89 + description = "a software development technology specifically designed for engineering high-reliability applications"; 90 + homepage = "https://github.com/AdaCore/spark2014"; 91 + maintainers = [ maintainers.jiegec ]; 92 + license = licenses.gpl3; 93 + platforms = platforms.all; 94 + }; 95 + } 96 +
+13 -14
pkgs/development/compilers/chez/default.nix
··· 1 1 { lib, stdenv, fetchurl 2 2 , coreutils, cctools 3 - , ncurses, libiconv, libX11, libuuid 3 + , ncurses, libiconv, libX11, libuuid, testers 4 4 }: 5 5 6 6 stdenv.mkDerivation (finalAttrs: { 7 7 pname = "chez-scheme"; 8 - version = "9.6.4"; 8 + version = "10.0.0"; 9 9 10 10 src = fetchurl { 11 11 url = "https://github.com/cisco/ChezScheme/releases/download/v${finalAttrs.version}/csv${finalAttrs.version}.tar.gz"; 12 - hash = "sha256-9YJ2gvolnEeXX/4Hh4X7Vh5KXFT3ZDMe9mwyEyhDaF0="; 12 + hash = "sha256-03GZASte0ZhcQGnWqH/xjl4fWi3yfkApkfr0XcTyIyw="; 13 13 }; 14 14 15 15 nativeBuildInputs = lib.optional stdenv.isDarwin cctools; ··· 28 28 ** NixOS or in any chroot build. 29 29 */ 30 30 patchPhase = '' 31 - substituteInPlace ./configure \ 32 - --replace "git submodule init && git submodule update || exit 1" "true" 33 - 34 - substituteInPlace ./workarea \ 35 - --replace "/bin/ln" ln \ 36 - --replace "/bin/cp" cp 37 - 38 31 substituteInPlace ./makefiles/installsh \ 39 - --replace "/usr/bin/true" "${coreutils}/bin/true" 32 + --replace-warn "/usr/bin/true" "${coreutils}/bin/true" 40 33 41 34 substituteInPlace zlib/configure \ 42 - --replace "/usr/bin/libtool" libtool 35 + --replace-warn "/usr/bin/libtool" libtool 43 36 ''; 44 37 45 38 /* ··· 52 45 ** for. 53 46 */ 54 47 configurePhase = '' 55 - ./configure --threads --installprefix=$out --installman=$out/share/man 48 + ./configure --as-is --threads --installprefix=$out --installman=$out/share/man 56 49 ''; 57 50 58 51 /* ··· 64 57 65 58 setupHook = ./setup-hook.sh; 66 59 60 + passthru.tests = { 61 + version = testers.testVersion { 62 + package = finalAttrs.finalPackage; 63 + }; 64 + }; 65 + 67 66 meta = { 68 67 description = "A powerful and incredibly fast R6RS Scheme compiler"; 69 68 homepage = "https://cisco.github.io/ChezScheme/"; 70 69 license = lib.licenses.asl20; 71 70 maintainers = with lib.maintainers; [ thoughtpolice ]; 72 71 platforms = lib.platforms.unix; 73 - badPlatforms = [ "aarch64-linux" "aarch64-darwin" ]; 72 + mainProgram = "scheme"; 74 73 }; 75 74 })
+5
pkgs/development/compilers/ecl/default.nix
··· 65 65 66 66 hardeningDisable = [ "format" ]; 67 67 68 + # ECL’s ‘make check’ only works after install, making it a de-facto 69 + # installCheck. 70 + doInstallCheck = true; 71 + installCheckTarget = "check"; 72 + 68 73 postInstall = '' 69 74 sed -e 's/@[-a-zA-Z_]*@//g' -i $out/bin/ecl-config 70 75 wrapProgram "$out/bin/ecl" --prefix PATH ':' "${
+2
pkgs/development/compilers/sbcl/bootstrap.nix
··· 26 26 postFixup = lib.optionalString (!stdenv.isAarch32 && stdenv.isLinux) '' 27 27 patchelf --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) $out/share/sbcl/sbcl 28 28 ''; 29 + 30 + meta.sourceProvenance = [ lib.sourceTypes.binaryNativeCode ]; 29 31 }
+92 -50
pkgs/development/compilers/sbcl/default.nix
··· 1 - { lib, stdenv, callPackage, clisp, fetchurl, fetchpatch, writeText, zstd 1 + { lib, stdenv, callPackage, clisp, coreutils, fetchurl, strace, texinfo, which, writeText, zstd 2 2 , threadSupport ? (stdenv.hostPlatform.isx86 || "aarch64-linux" == stdenv.hostPlatform.system || "aarch64-darwin" == stdenv.hostPlatform.system) 3 3 , linkableRuntime ? stdenv.hostPlatform.isx86 4 4 , disableImmobileSpace ? false ··· 8 8 , purgeNixReferences ? false 9 9 , coreCompression ? lib.versionAtLeast version "2.2.6" 10 10 , markRegionGC ? lib.versionAtLeast version "2.4.0" 11 - , texinfo 12 11 , version 12 + # Set this to a lisp binary to use a custom bootstrap lisp compiler for 13 + # SBCL. Leave as null to use the default. This is useful for local development 14 + # of SBCL, because you can use your existing stock SBCL as a boostrap. On Hydra 15 + # of course we can’t do that because SBCL hasn’t been built yet, so we use 16 + # CLISP, but that’s much slower. 17 + , bootstrapLisp ? null 13 18 }: 14 19 15 20 let ··· 62 67 sbclBootstrap = callPackage ./bootstrap.nix { 63 68 cfg = bootstrapBinaries.${stdenv.hostPlatform.system}; 64 69 }; 65 - bootstrapLisp = 66 - if (builtins.hasAttr stdenv.hostPlatform.system bootstrapBinaries) 70 + bootstrapLisp' = 71 + if bootstrapLisp != null 72 + then bootstrapLisp 73 + else if (builtins.hasAttr stdenv.hostPlatform.system bootstrapBinaries) 67 74 then "${sbclBootstrap}/bin/sbcl --disable-debugger --no-userinit --no-sysinit" 68 75 else "${clisp}/bin/clisp -E UTF-8 --silent -norc"; 69 76 70 77 in 71 78 72 - stdenv.mkDerivation rec { 79 + stdenv.mkDerivation (self: rec { 73 80 pname = "sbcl"; 74 81 inherit version; 75 82 ··· 78 85 inherit (versionMap.${version}) sha256; 79 86 }; 80 87 81 - nativeBuildInputs = [ texinfo ]; 88 + nativeBuildInputs = [ 89 + texinfo 90 + ] ++ lib.optionals self.doCheck ( 91 + [ 92 + which 93 + ] ++ lib.optionals (builtins.elem stdenv.system strace.meta.platforms) [ 94 + strace 95 + ] 96 + ); 82 97 buildInputs = lib.optionals coreCompression [ zstd ]; 83 98 84 - patches = lib.optionals (version == "2.4.0") [ 99 + patches = [ 100 + ./search-for-binaries-in-PATH.patch 101 + ] ++ lib.optionals (version == "2.4.0") [ 85 102 ./fix-2.4.0-aarch64-darwin.patch 86 103 ]; 87 104 88 - postPatch = '' 89 - echo '"${version}.nixos"' > version.lisp-expr 90 - 91 - # SBCL checks whether files are up-to-date in many places.. 92 - # Unfortunately, same timestamp is not good enough 93 - sed -e 's@> x y@>= x y@' -i contrib/sb-aclrepl/repl.lisp 94 - #sed -e '/(date)/i((= date 2208988801) 2208988800)' -i contrib/asdf/asdf.lisp 95 - sed -i src/cold/slam.lisp -e \ 96 - '/file-write-date input/a)' 97 - sed -i src/cold/slam.lisp -e \ 98 - '/file-write-date output/i(or (and (= 2208988801 (file-write-date output)) (= 2208988801 (file-write-date input)))' 99 - sed -i src/code/target-load.lisp -e \ 100 - '/date defaulted-fasl/a)' 101 - sed -i src/code/target-load.lisp -e \ 102 - '/date defaulted-source/i(or (and (= 2208988801 (file-write-date defaulted-source-truename)) (= 2208988801 (file-write-date defaulted-fasl-truename)))' 103 - 104 - # Fix the tests 105 - sed -e '5,$d' -i contrib/sb-bsd-sockets/tests.lisp 106 - sed -e '5,$d' -i contrib/sb-simple-streams/*test*.lisp 105 + # I don’t know why these are failing (on ofBorg), and I’d rather just disable 106 + # them and move forward with the succeeding tests than block testing 107 + # altogether. One by one hopefully we can fix these (on ofBorg, 108 + # upstream--somehow some way) in due time. 109 + disabledTestFiles = lib.optionals (builtins.elem stdenv.hostPlatform.system [ 110 + "x86_64-linux" 111 + "aarch64-linux" 112 + ]) [ 113 + "foreign-stack-alignment.impure.lisp" 114 + # Floating point tests are fragile 115 + # https://sourceforge.net/p/sbcl/mailman/message/58728554/ 116 + "compiler.pure.lisp" 117 + "float.pure.lisp" 118 + ] ++ lib.optionals (stdenv.hostPlatform.system == "aarch64-linux") [ 119 + # This is failing on aarch64-linux on ofBorg. Not on my local machine nor on 120 + # a VM on my laptop. Not sure what’s wrong. 121 + "traceroot.impure.lisp" 122 + ]; 123 + postPatch = lib.optionalString (self.disabledTestFiles != [ ]) '' 124 + (cd tests ; rm -f ${lib.concatStringsSep " " self.disabledTestFiles}) 107 125 '' 108 - + (if purgeNixReferences 109 - then 110 - # This is the default location to look for the core; by default in $out/lib/sbcl 111 - '' 112 - sed 's@^\(#define SBCL_HOME\) .*$@\1 "/no-such-path"@' \ 113 - -i src/runtime/runtime.c 114 - '' 115 - else 116 - # Fix software version retrieval 117 - '' 118 - sed -e "s@/bin/uname@$(command -v uname)@g" -i src/code/*-os.lisp \ 119 - src/code/run-program.lisp 120 - '' 121 - ); 122 - 126 + + lib.optionalString purgeNixReferences '' 127 + # This is the default location to look for the core; by default in $out/lib/sbcl 128 + sed 's@^\(#define SBCL_HOME\) .*$@\1 "/no-such-path"@' \ 129 + -i src/runtime/runtime.c 130 + '' 131 + + '' 132 + ( 133 + shopt -s nullglob 134 + # Tests need patching regardless of purging of paths from the final 135 + # binary. There are some tricky files in nested directories which should 136 + # definitely NOT be patched this way, hence just a single * (and no 137 + # globstar). 138 + substituteInPlace ${if purgeNixReferences then "tests" else "{tests,src/code}"}/*.{lisp,sh} \ 139 + --replace-quiet /usr/bin/env "${coreutils}/bin/env" \ 140 + --replace-quiet /bin/uname "${coreutils}/bin/uname" \ 141 + --replace-quiet /bin/sh "${stdenv.shell}" 142 + ) 143 + ''; 123 144 124 145 preBuild = '' 125 146 export INSTALL_ROOT=$out ··· 138 159 optional (!threadSupport) "sb-thread" ++ 139 160 optionals disableImmobileSpace [ "immobile-space" "immobile-code" "compact-instance-header" ]; 140 161 141 - env.NIX_CFLAGS_COMPILE = toString (lib.optionals (lib.versionOlder version "2.1.10") [ 162 + buildArgs = [ 163 + "--prefix=$out" 164 + "--xc-host=${lib.escapeShellArg bootstrapLisp'}" 165 + ] ++ builtins.map (x: "--with-${x}") self.enableFeatures 166 + ++ builtins.map (x: "--without-${x}") self.disableFeatures 167 + ++ lib.optionals (stdenv.hostPlatform.system == "aarch64-darwin") [ 168 + "--arch=arm64" 169 + ]; 170 + 171 + env.NIX_CFLAGS_COMPILE = toString (lib.optionals (lib.versionOlder self.version "2.1.10") [ 142 172 # Workaround build failure on -fno-common toolchains like upstream 143 173 # clang-13. Without the change build fails as: 144 174 # duplicate symbol '_static_code_space_free_pointer' in: alloc.o traceroot.o ··· 151 181 buildPhase = '' 152 182 runHook preBuild 153 183 154 - sh make.sh --prefix=$out --xc-host="${bootstrapLisp}" ${ 155 - lib.concatStringsSep " " 156 - (builtins.map (x: "--with-${x}") enableFeatures ++ 157 - builtins.map (x: "--without-${x}") disableFeatures) 158 - } ${lib.optionalString (stdenv.hostPlatform.system == "aarch64-darwin") "--arch=arm64"} 184 + sh make.sh ${lib.concatStringsSep " " self.buildArgs} 159 185 (cd doc/manual ; make info) 160 186 161 187 runHook postBuild 162 188 ''; 163 189 190 + # Tests on ofBorg’s x86_64-darwin platforms are so unstable that a random one 191 + # will fail every other run. There’s a deeper problem here; we might as well 192 + # disable them entirely so at least the other platforms get to benefit from 193 + # testing. 194 + doCheck = stdenv.hostPlatform.system != "x86_64-darwin"; 195 + 196 + # From the INSTALL docs 197 + checkPhase = '' 198 + runHook preCheck 199 + 200 + (cd tests && sh run-tests.sh) 201 + 202 + runHook postCheck 203 + ''; 204 + 164 205 installPhase = '' 165 206 runHook preInstall 166 207 167 208 INSTALL_ROOT=$out sh install.sh 168 209 169 - runHook postInstall 170 210 '' 171 211 + lib.optionalString (!purgeNixReferences) '' 172 212 cp -r src $out/lib/sbcl ··· 176 216 '(("SYS:SRC;**;*.*.*" #P"$out/lib/sbcl/src/**/*.*") 177 217 ("SYS:CONTRIB;**;*.*.*" #P"$out/lib/sbcl/contrib/**/*.*"))) 178 218 EOF 219 + '' + '' 220 + runHook postInstall 179 221 ''; 180 222 181 223 setupHook = lib.optional purgeNixReferences (writeText "setupHook.sh" '' ··· 186 228 ''); 187 229 188 230 meta = with lib; { 189 - description = "Lisp compiler"; 231 + description = "Common Lisp compiler"; 190 232 homepage = "https://sbcl.org"; 191 233 license = licenses.publicDomain; # and FreeBSD 192 234 maintainers = lib.teams.lisp.members; ··· 198 240 "aarch64-linux" 199 241 ]; 200 242 }; 201 - } 243 + })
+108
pkgs/development/compilers/sbcl/search-for-binaries-in-PATH.patch
··· 1 + From 35856b09e3606361b17f21225c759632be1cdf34 Mon Sep 17 00:00:00 2001 2 + From: Hraban Luyat <hraban@0brg.net> 3 + Date: Wed, 24 Jan 2024 14:58:53 -0500 4 + Subject: [PATCH] Search for binaries in tests in PATH, not /usr/bin 5 + MIME-Version: 1.0 6 + Content-Type: text/plain; charset=UTF-8 7 + Content-Transfer-Encoding: 8bit 8 + 9 + Same as 8ed662fbfeb5dde35eb265f390b55b01f79f70c1 but for tests, and for more 10 + than just ‘cat’. For the same reasons as that diff. 11 + --- 12 + tests/run-program.impure.lisp | 18 ++++++++++-------- 13 + tests/run-program.test.sh | 9 ++++----- 14 + 2 files changed, 14 insertions(+), 13 deletions(-) 15 + 16 + diff --git a/tests/run-program.impure.lisp b/tests/run-program.impure.lisp 17 + index 0eab8884c..b07d1e4fb 100644 18 + --- a/tests/run-program.impure.lisp 19 + +++ b/tests/run-program.impure.lisp 20 + @@ -15,7 +15,7 @@ 21 + 22 + (defun bin-pwd-ignoring-result () 23 + (let ((initially-open-fds (directory "/proc/self/fd/*" :resolve-symlinks nil))) 24 + - (sb-ext:run-program "/usr/bin/pwd" nil :input :stream :output :stream :wait nil) 25 + + (sb-ext:run-program "pwd" nil :search t :input :stream :output :stream :wait nil) 26 + (length initially-open-fds))) 27 + 28 + (with-test (:name (run-program :autoclose-streams) 29 + @@ -49,7 +49,7 @@ 30 + (with-test (:name (run-program :cat 2) 31 + :skipped-on (or (not :sb-thread) :win32)) 32 + ;; Tests that reading from a FIFO is interruptible. 33 + - (let* ((process (run-program "/bin/cat" '() 34 + + (let* ((process (run-program "cat" '() :search t 35 + :wait nil :output :stream :input :stream)) 36 + (in (process-input process)) 37 + (out (process-output process)) 38 + @@ -167,7 +167,7 @@ 39 + (defparameter *cat-out* (make-synonym-stream '*cat-out-pipe*))) 40 + 41 + (with-test (:name (run-program :cat 5) :fails-on :win32) 42 + - (let ((cat (run-program "/bin/cat" nil :input *cat-in* :output *cat-out* 43 + + (let ((cat (run-program "cat" nil :search t :input *cat-in* :output *cat-out* 44 + :wait nil))) 45 + (dolist (test '("This is a test!" 46 + "This is another test!" 47 + @@ -310,14 +310,16 @@ 48 + (let ((had-error-p nil)) 49 + (flet ((barf (&optional (format :default)) 50 + (with-output-to-string (stream) 51 + - (run-program #-netbsd "/usr/bin/perl" #+netbsd "/usr/pkg/bin/perl" 52 + + (run-program #-netbsd "perl" #+netbsd "/usr/pkg/bin/perl" 53 + '("-e" "print \"\\x20\\xfe\\xff\\x0a\"") 54 + + :search #-netbsd t #+netbsd nil 55 + :output stream 56 + :external-format format))) 57 + (no-barf () 58 + (with-output-to-string (stream) 59 + - (run-program "/bin/echo" 60 + + (run-program "echo" 61 + '("This is a test") 62 + + :search t 63 + :output stream)))) 64 + (handler-case 65 + (barf :utf-8) 66 + @@ -353,9 +355,9 @@ 67 + ;; If the permitted inputs are :ANY then leave it be 68 + (listp (symbol-value 'run-tests::*allowed-inputs*))) 69 + (push (namestring file) (symbol-value 'run-tests::*allowed-inputs*))) 70 + - (assert (null (run-program "/bin/cat" '() :input file))) 71 + - (assert (null (run-program "/bin/cat" '() :output #.(or *compile-file-truename* 72 + - *load-truename*) 73 + + (assert (null (run-program "cat" '() :search t :input file))) 74 + + (assert (null (run-program "cat" '() :search t :output #.(or *compile-file-truename* 75 + + *load-truename*) 76 + :if-output-exists nil))))) 77 + 78 + 79 + diff --git a/tests/run-program.test.sh b/tests/run-program.test.sh 80 + index 48eaef889..c926e5a05 100755 81 + --- a/tests/run-program.test.sh 82 + +++ b/tests/run-program.test.sh 83 + @@ -39,9 +39,8 @@ run_sbcl --eval "(defvar *exit-ok* $EXIT_LISP_WIN)" <<'EOF' 84 + (assert (not (zerop (sb-ext:process-exit-code 85 + (sb-ext:run-program "false" () :search t :wait t))))) 86 + (let ((string (with-output-to-string (stream) 87 + - (our-run-program "/bin/echo" 88 + - '("foo" "bar") 89 + - :output stream)))) 90 + + (run-program "echo" '("foo" "bar") 91 + + :search t :output stream)))) 92 + (assert (string= string "foo bar 93 + "))) 94 + (format t ";;; Smoke tests: PASS~%") 95 + @@ -103,8 +102,8 @@ run_sbcl --eval "(defvar *exit-ok* $EXIT_LISP_WIN)" <<'EOF' 96 + ;; make sure that a stream input argument is basically reasonable. 97 + (let ((string (let ((i (make-string-input-stream "abcdef"))) 98 + (with-output-to-string (stream) 99 + - (our-run-program "/bin/cat" () 100 + - :input i :output stream))))) 101 + + (run-program "cat" () 102 + + :search t :input i :output stream))))) 103 + (assert (= (length string) 6)) 104 + (assert (string= string "abcdef"))) 105 + 106 + -- 107 + 2.43.0 108 +
+5
pkgs/development/embedded/platformio/core.nix
··· 43 43 }) 44 44 ]; 45 45 46 + postPatch = '' 47 + # Disable update checks at runtime 48 + substituteInPlace platformio/maintenance.py --replace-fail ' check_platformio_upgrade()' "" 49 + ''; 50 + 46 51 nativeBuildInputs = [ 47 52 installShellFiles 48 53 pythonRelaxDepsHook
+6 -6
pkgs/development/haskell-modules/configuration-common.nix
··· 364 364 365 365 # Manually maintained 366 366 cachix-api = overrideCabal (drv: { 367 - version = "1.7"; 367 + version = "1.7.1"; 368 368 src = pkgs.fetchFromGitHub { 369 369 owner = "cachix"; 370 370 repo = "cachix"; 371 - rev = "v1.7"; 372 - sha256 = "sha256-d9BohugsKajvjNgt+VyXHuDdLOFKr9mhwpdUNkpIP3s="; 371 + rev = "v1.7.1"; 372 + sha256 = "sha256-neN8zGZuGXnLVdQw468z67o96mn8o1p4WGqPINl+NjU="; 373 373 }; 374 374 postUnpack = "sourceRoot=$sourceRoot/cachix-api"; 375 375 }) super.cachix-api; 376 376 cachix = (overrideCabal (drv: { 377 - version = "1.7"; 377 + version = "1.7.1"; 378 378 src = pkgs.fetchFromGitHub { 379 379 owner = "cachix"; 380 380 repo = "cachix"; 381 - rev = "v1.7"; 382 - sha256 = "sha256-d9BohugsKajvjNgt+VyXHuDdLOFKr9mhwpdUNkpIP3s="; 381 + rev = "v1.7.1"; 382 + sha256 = "sha256-neN8zGZuGXnLVdQw468z67o96mn8o1p4WGqPINl+NjU="; 383 383 }; 384 384 postUnpack = "sourceRoot=$sourceRoot/cachix"; 385 385 }) (lib.pipe
pkgs/development/libraries/ada/gnatcoll/bindings.nix pkgs/development/ada-modules/gnatcoll/bindings.nix
pkgs/development/libraries/ada/gnatcoll/core.nix pkgs/development/ada-modules/gnatcoll/core.nix
pkgs/development/libraries/ada/gnatcoll/db.nix pkgs/development/ada-modules/gnatcoll/db.nix
-67
pkgs/development/libraries/ada/spark2014/default.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchFromGitHub 4 - , gnat12 5 - , gnatcoll-core 6 - , gprbuild 7 - , python3 8 - , ocamlPackages 9 - , makeWrapper 10 - }: 11 - 12 - stdenv.mkDerivation rec { 13 - pname = "spark2014"; 14 - version = "unstable-2022-05-25"; 15 - 16 - src = fetchFromGitHub { 17 - owner = "AdaCore"; 18 - repo = "spark2014"; 19 - # commit on fsf-12 branch 20 - rev = "ab34e07080a769b63beacc141707b5885c49d375"; 21 - sha256 = "sha256-7pe3eWitpxmqzjW6qEIEuN0qr2IR+kJ7Ssc9pTBcCD8="; 22 - fetchSubmodules = true; 23 - }; 24 - 25 - nativeBuildInputs = [ 26 - gnat12 27 - gprbuild 28 - python3 29 - ocamlPackages.ocaml 30 - makeWrapper 31 - ]; 32 - 33 - buildInputs = [ 34 - gnatcoll-core 35 - ocamlPackages.camlzip 36 - ocamlPackages.findlib 37 - ocamlPackages.menhir 38 - ocamlPackages.menhirLib 39 - ocamlPackages.num 40 - ocamlPackages.yojson 41 - ocamlPackages.zarith 42 - ]; 43 - 44 - postPatch = '' 45 - # gnat2why/gnat_src points to the GNAT sources 46 - tar xf ${gnat12.cc.src} gcc-${gnat12.cc.version}/gcc/ada 47 - mv gcc-${gnat12.cc.version}/gcc/ada gnat2why/gnat_src 48 - ''; 49 - 50 - configurePhase = '' 51 - make setup 52 - ''; 53 - 54 - installPhase = '' 55 - make install-all 56 - cp -a ./install/. $out 57 - ''; 58 - 59 - meta = with lib; { 60 - description = "a software development technology specifically designed for engineering high-reliability applications"; 61 - homepage = "https://github.com/AdaCore/spark2014"; 62 - maintainers = [ maintainers.jiegec ]; 63 - license = licenses.gpl3; 64 - platforms = platforms.all; 65 - }; 66 - } 67 -
pkgs/development/libraries/ada/xmlada/default.nix pkgs/development/ada-modules/xmlada/default.nix
+2 -15
pkgs/development/libraries/icu/default.nix
··· 2 2 3 3 let 4 4 make-icu = (import ./make-icu.nix) { 5 - inherit stdenv lib fetchurl fixDarwinDylibNames testers; 5 + inherit stdenv lib buildPackages fetchurl fixDarwinDylibNames testers; 6 6 }; 7 7 in 8 8 { 9 9 icu74 = make-icu { 10 10 version = "74.2"; 11 11 hash = "sha256-aNsIIhKpbW9T411g9H04uWLp+dIHp0z6x4Apro/14Iw="; 12 - nativeBuildRoot = buildPackages.icu74.override { buildRootOnly = true; }; 13 12 }; 14 13 icu73 = make-icu { 15 14 version = "73.2"; 16 15 hash = "sha256-gYqAcS7TyqzZtlIwXgGvx/oWfm8ulJltpEuQwqtgTOE="; 17 - nativeBuildRoot = buildPackages.icu73.override { buildRootOnly = true; }; 18 16 }; 19 17 icu72 = make-icu { 20 18 version = "72.1"; 21 19 hash = "sha256-otLTghcJKn7VZjXjRGf5L5drNw4gGCrTJe3qZoGnHWg="; 22 - nativeBuildRoot = buildPackages.icu72.override { buildRootOnly = true; }; 23 20 }; 24 21 icu71 = make-icu { 25 22 version = "71.1"; 26 23 hash = "sha256-Z6fm5R9h+vEwa2k1Mz4TssSKvY2m0vRs5q3KJLHiHr8="; 27 - nativeBuildRoot = buildPackages.icu71.override { buildRootOnly = true; }; 28 24 }; 29 25 icu70 = make-icu { 30 26 version = "70.1"; 31 27 hash = "sha256-jSBUKMF78Tu1NTAGae0oszihV7HAGuZtMdDT4tR8P9U="; 32 - nativeBuildRoot = buildPackages.icu70.override { buildRootOnly = true; }; 33 28 }; 34 29 icu69 = make-icu { 35 30 version = "69.1"; 36 31 hash = "sha256-TLp7es0dPELES7DBS+ZjcJjH+vKzMM6Ha8XzuRXQl0U="; 37 - nativeBuildRoot = buildPackages.icu69.override { buildRootOnly = true; }; 38 32 }; 39 33 icu68 = make-icu { 40 34 version = "68.2"; 41 35 hash = "sha256-x5GT3uOQeiGZuClqk7UsXLdDMsJvPRZyaUh2gNR51iU="; 42 - nativeBuildRoot = buildPackages.icu68.override { buildRootOnly = true; }; 43 36 }; 44 37 icu67 = make-icu { 45 38 version = "67.1"; 46 39 hash = "sha256-lKgM1vJRpTvSqZf28bWsZlP+eR36tm4esCJ3QPuG1dw="; 47 - nativeBuildRoot = buildPackages.icu67.override { buildRootOnly = true; }; 48 40 }; 49 41 icu66 = make-icu { 50 42 version = "66.1"; 51 43 hash = "sha256-UqPyIJq5VVnBzwoU8kM4AB84lhW/AOJYXvPbxD7PCi4="; 52 - nativeBuildRoot = buildPackages.icu66.override { buildRootOnly = true; }; 53 44 }; 54 45 icu64 = make-icu { 55 46 version = "64.2"; 56 47 hash = "sha256-Yn1dhHjm2W/IyQ/tSFEjkHmlYaaoueSLCJLyToLTHWw="; 57 - nativeBuildRoot = buildPackages.icu64.override { buildRootOnly = true; }; 58 48 }; 59 49 icu63 = make-icu { 60 50 version = "63.1"; 61 51 hash = "sha256-BcSQtpRU/OWGC36OKCEjFnSvChHX7y/r6poyUSmYy50="; 62 - nativeBuildRoot = buildPackages.icu63.override { buildRootOnly = true; }; 63 52 patches = [ 64 53 # https://bugzilla.mozilla.org/show_bug.cgi?id=1499398 65 54 (fetchpatch { ··· 72 61 icu60 = make-icu { 73 62 version = "60.2"; 74 63 hash = "sha256-8HPqjzW5JtcLsz5ld1CKpkKosxaoA/Eb4grzhIEdtBg="; 75 - nativeBuildRoot = buildPackages.icu60.override { buildRootOnly = true; }; 76 64 }; 77 65 icu58 = make-icu { 78 66 version = "58.2"; 79 67 hash = "sha256-KwpEEBU6myDeDiDH2LZgSacq7yRLU2g9DXUhNxaD2gw="; 80 - nativeBuildRoot = buildPackages.icu58.override { buildRootOnly = true; }; 81 68 patches = [ 82 69 (fetchurl { 83 70 url = "http://bugs.icu-project.org/trac/changeset/39484?format=diff"; ··· 87 74 ]; 88 75 patchFlags = [ "-p4" ]; 89 76 }; 90 - } 77 + }
+10 -11
pkgs/development/libraries/icu/make-icu.nix
··· 1 - { stdenv, lib, fetchurl, fixDarwinDylibNames, testers }: 1 + { stdenv, lib, buildPackages, fetchurl, fixDarwinDylibNames, testers }: 2 2 3 - { version, hash, patches ? [], patchFlags ? [] 4 - # Cross-compiled icu4c requires a build-root of a native compile 5 - , buildRootOnly ? false, nativeBuildRoot 6 - }: 3 + { version, hash, patches ? [], patchFlags ? [] }: 7 4 8 5 let 6 + # Cross-compiled icu4c requires a build-root of a native compile 7 + nativeBuildRoot = buildPackages."icu${lib.versions.major version}".buildRootOnly; 8 + 9 9 pname = "icu4c"; 10 10 11 11 baseAttrs = { ··· 99 99 ''; 100 100 }; 101 101 102 - attrs = if buildRootOnly 103 - then buildRootOnlyAttrs 104 - else realAttrs; 102 + mkWithAttrs = attrs: stdenv.mkDerivation (finalAttrs: attrs // { 103 + passthru.tests.pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 104 + passthru.buildRootOnly = mkWithAttrs buildRootOnlyAttrs; 105 + }); 105 106 in 106 - stdenv.mkDerivation (finalAttrs: attrs // { 107 - passthru.tests.pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 108 - }) 107 + mkWithAttrs realAttrs
+2 -2
pkgs/development/libraries/leatherman/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "leatherman"; 5 - version = "1.12.11"; 5 + version = "1.12.12"; 6 6 7 7 src = fetchFromGitHub { 8 - sha256 = "sha256-XB5qIXPe1Tu+cfxuL+HAfR9QQNiUY/noO51CVEz9hsU="; 8 + sha256 = "sha256-V/AMdJ3ldlgBaO8gS0FOqb5tTdRGGW/+3LZq/TKkdog="; 9 9 rev = version; 10 10 repo = "leatherman"; 11 11 owner = "puppetlabs";
+119 -83
pkgs/development/libraries/opencv/4.x.nix
··· 2 2 , stdenv 3 3 , fetchurl 4 4 , fetchFromGitHub 5 - , fetchpatch 6 5 , cmake 7 6 , pkg-config 8 7 , unzip 9 8 , zlib 10 - , pcre 9 + , pcre2 11 10 , hdf5 12 11 , boost 12 + , glib 13 13 , gflags 14 14 , protobuf_21 15 15 , config ··· 35 35 , eigen 36 36 , enableBlas ? true 37 37 , blas 38 + , enableVA ? !stdenv.isDarwin 39 + , libva 38 40 , enableContrib ? true 39 41 40 42 , enableCuda ? config.cudaSupport ··· 58 60 , enableFfmpeg ? true 59 61 , ffmpeg 60 62 , enableGStreamer ? true 63 + , elfutils 61 64 , gst_all_1 65 + , orc 66 + , libunwind 67 + , zstd 62 68 , enableTesseract ? false 63 69 , tesseract 64 70 , leptonica ··· 85 91 }@inputs: 86 92 87 93 let 88 - version = "4.7.0"; 94 + version = "4.9.0"; 89 95 90 96 # It's necessary to consistently use backendStdenv when building with CUDA 91 97 # support, otherwise we get libstdc++ errors downstream ··· 96 102 owner = "opencv"; 97 103 repo = "opencv"; 98 104 rev = version; 99 - sha256 = "sha256-jUeGsu8+jzzCnIFbVMCW8DcUeGv/t1yCY/WXyW+uGDI="; 105 + hash = "sha256-3qqu4xlRyMbPKHHTIT+iRRGtpFlcv0NU8GNZpgjdi6k="; 100 106 }; 101 107 102 108 contribSrc = fetchFromGitHub { 103 109 owner = "opencv"; 104 110 repo = "opencv_contrib"; 105 111 rev = version; 106 - sha256 = "sha256-meya0J3RdOIeMM46e/6IOVwrKn3t/c0rhwP2WQaybkE="; 112 + hash = "sha256-K74Ghk4uDqj4OWEzDxT2R3ERi+jkAWZszzezRenfuZ8="; 107 113 }; 108 114 109 115 testDataSrc = fetchFromGitHub { 110 116 owner = "opencv"; 111 117 repo = "opencv_extra"; 112 118 rev = version; 113 - sha256 = "sha256-6hAdJdaUgtRGQanQKuY/q6fcXWXFZ3K/oLbGxvksry0="; 119 + hash = "sha256-pActKi7aN5EOZq2Fpf5mALnZq71c037/R3Q6wJ4uCfQ="; 114 120 }; 115 121 116 122 # Contrib must be built in order to enable Tesseract support: ··· 121 127 src = fetchFromGitHub { 122 128 owner = "opencv"; 123 129 repo = "opencv_3rdparty"; 124 - rev = "a56b6ac6f030c312b2dce17430eef13aed9af274"; 125 - sha256 = "1msbkc3zixx61rcg6a04i1bcfhw1phgsrh93glq1n80hgsk3nbjq"; 130 + rev = "0cc4aa06bf2bef4b05d237c69a5a96b9cd0cb85a"; 131 + hash = "sha256-/kHivOgCkY9YdcRRaVgytXal3ChE9xFfGAB0CfFO5ec="; 126 132 } + "/ippicv"; 127 - files = let name = platform: "ippicv_2019_${platform}_general_20180723.tgz"; in 133 + files = let name = platform: "ippicv_2021.10.0_${platform}_20230919_general.tgz"; in 128 134 if effectiveStdenv.hostPlatform.system == "x86_64-linux" then 129 - { ${name "lnx_intel64"} = "c0bd78adb4156bbf552c1dfe90599607"; } 135 + { ${name "lnx_intel64"} = "606a19b207ebedfe42d59fd916cc4850"; } 130 136 else if effectiveStdenv.hostPlatform.system == "i686-linux" then 131 - { ${name "lnx_ia32"} = "4f38432c30bfd6423164b7a24bbc98a0"; } 137 + { ${name "lnx_ia32"} = "ea08487b810baad2f68aca87b74a2db9"; } 132 138 else if effectiveStdenv.hostPlatform.system == "x86_64-darwin" then 133 - { ${name "mac_intel64"} = "fe6b2bb75ae0e3f19ad3ae1a31dfa4a2"; } 139 + { ${name "mac_intel64"} = "14f01c5a4780bfae9dde9b0aaf5e56fc"; } 134 140 else 135 141 throw "ICV is not available for this platform (or not yet supported by this package)"; 136 142 dst = ".cache/ippicv"; ··· 142 148 owner = "opencv"; 143 149 repo = "opencv_3rdparty"; 144 150 rev = "fccf7cd6a4b12079f73bbfb21745f9babcd4eb1d"; 145 - sha256 = "0r9fam8dplyqqsd3qgpnnfgf9l7lj44di19rxwbm8mxiw0rlcdvy"; 151 + hash = "sha256-fjdGM+CxV1QX7zmF2AiR9NDknrP2PjyaxtjT21BVLmU="; 146 152 }; 147 153 files = { 148 154 "vgg_generated_48.i" = "e8d0dcd54d1bcfdc29203d011a797179"; ··· 179 185 owner = "opencv"; 180 186 repo = "opencv_3rdparty"; 181 187 rev = "8afa57abc8229d611c4937165d20e2a2d9fc5a12"; 182 - sha256 = "061lsvqdidq9xa2hwrcvwi9ixflr2c2lfpc8drr159g68zi8bp4v"; 188 + hash = "sha256-m9yF4kfmpRJybohdRwUTmboeU+SbZQ6F6gm32PDWNBg="; 183 189 }; 184 190 files = { 185 191 "face_landmark_model.dat" = "7505c44ca4eb54b4ab1e4777cb96ac05"; ··· 191 197 ade = rec { 192 198 src = fetchurl { 193 199 url = "https://github.com/opencv/ade/archive/${name}"; 194 - sha256 = "sha256-TjLRbFbC7MDY9PxIy560ryviBI58cbQwqgc7A7uOHkg="; 200 + hash = "sha256-WG/GudVpkO10kOJhoKXFMj672kggvyRYCIpezal3wcE="; 195 201 }; 196 - name = "v0.1.2a.zip"; 197 - md5 = "fa4b3e25167319cb0fa9432ef8281945"; 202 + name = "v0.1.2d.zip"; 203 + md5 = "dbb095a8bf3008e91edbbf45d8d34885"; 198 204 dst = ".cache/ade"; 199 205 }; 200 206 ··· 204 210 owner = "opencv"; 205 211 repo = "opencv_3rdparty"; 206 212 rev = "a8b69ccc738421293254aec5ddb38bd523503252"; 207 - sha256 = "sha256-/n6zHwf0Rdc4v9o4rmETzow/HTv+81DnHP+nL56XiTY="; 213 + hash = "sha256-/n6zHwf0Rdc4v9o4rmETzow/HTv+81DnHP+nL56XiTY="; 208 214 }; 209 215 files = { 210 216 "detect.caffemodel" = "238e2b2d6f3c18d6c3a30de0c31e23cf"; ··· 260 266 patches = [ 261 267 ./cmake-don-t-use-OpenCVFindOpenEXR.patch 262 268 ] ++ lib.optionals enableContrib [ 263 - (fetchpatch { 264 - name = "CVE-2023-2617.patch"; 265 - url = "https://github.com/opencv/opencv_contrib/commit/ccc277247ac1a7aef0a90353edcdec35fbc5903c.patch"; 266 - stripLen = 2; 267 - extraPrefix = [ "opencv_contrib/" ]; 268 - sha256 = "sha256-drZ+DVn+Pk4zAZJ+LgX5u3Tz7MU0AEI/73EVvxDP3AU="; 269 - }) 270 - (fetchpatch { 271 - name = "CVE-2023-2618.patch"; 272 - url = "https://github.com/opencv/opencv_contrib/commit/ec406fa4748fb4b0630c1b986469e7918d5e8953.patch"; 273 - stripLen = 2; 274 - extraPrefix = [ "opencv_contrib/" ]; 275 - sha256 = "sha256-cB5Tsh2fDOsc0BNtSzd6U/QoCjkd9yMW1QutUU69JJ0="; 276 - }) 277 269 ] ++ lib.optional enableCuda ./cuda_opt_flow.patch; 278 270 279 271 # This prevents cmake from using libraries in impure paths (which ··· 300 292 echo '"(build info elided)"' > modules/core/version_string.inc 301 293 ''; 302 294 303 - buildInputs = [ zlib pcre boost gflags protobuf_21 ] 304 - ++ lib.optional enablePython pythonPackages.python 305 - ++ lib.optional (effectiveStdenv.buildPlatform == effectiveStdenv.hostPlatform) hdf5 306 - ++ lib.optional enableGtk2 gtk2 307 - ++ lib.optional enableGtk3 gtk3 308 - ++ lib.optional enableVtk vtk 309 - ++ lib.optional enableJPEG libjpeg 310 - ++ lib.optional enablePNG libpng 311 - ++ lib.optional enableTIFF libtiff 312 - ++ lib.optional enableWebP libwebp 313 - ++ lib.optionals enableEXR [ openexr ilmbase ] 314 - ++ lib.optional enableJPEG2000 openjpeg 315 - ++ lib.optional enableFfmpeg ffmpeg 316 - ++ lib.optionals (enableFfmpeg && effectiveStdenv.isDarwin) 317 - [ VideoDecodeAcceleration bzip2 ] 318 - ++ lib.optionals enableGStreamer (with gst_all_1; [ gstreamer gst-plugins-base gst-plugins-good ]) 319 - ++ lib.optional enableOvis ogre 320 - ++ lib.optional enableGPhoto2 libgphoto2 321 - ++ lib.optional enableDC1394 libdc1394 322 - ++ lib.optional enableEigen eigen 323 - ++ lib.optional enableBlas blas.provider 295 + buildInputs = [ 296 + boost 297 + gflags 298 + glib 299 + pcre2 300 + protobuf_21 301 + zlib 302 + ] ++ lib.optionals enablePython [ 303 + pythonPackages.python 304 + ] ++ lib.optionals (effectiveStdenv.buildPlatform == effectiveStdenv.hostPlatform) [ 305 + hdf5 306 + ] ++ lib.optionals enableGtk2 [ 307 + gtk2 308 + ] ++ lib.optionals enableGtk3 [ 309 + gtk3 310 + ] ++ lib.optionals enableVtk [ 311 + vtk 312 + ] ++ lib.optionals enableJPEG [ 313 + libjpeg 314 + ] ++ lib.optionals enablePNG [ 315 + libpng 316 + ] ++ lib.optionals enableTIFF [ 317 + libtiff 318 + ] ++ lib.optionals enableWebP [ 319 + libwebp 320 + ] ++ lib.optionals enableEXR [ 321 + openexr 322 + ilmbase 323 + ] ++ lib.optionals enableJPEG2000 [ 324 + openjpeg 325 + ] ++ lib.optionals enableFfmpeg [ 326 + ffmpeg 327 + ] ++ lib.optionals (enableFfmpeg && effectiveStdenv.isDarwin) [ 328 + bzip2 329 + VideoDecodeAcceleration 330 + ] ++ lib.optionals (enableGStreamer && effectiveStdenv.isLinux) (with gst_all_1; [ 331 + elfutils 332 + gst-plugins-base 333 + gst-plugins-good 334 + gstreamer 335 + libunwind 336 + orc 337 + zstd 338 + ]) ++ lib.optionals enableOvis [ 339 + ogre 340 + ] ++ lib.optionals enableGPhoto2 [ 341 + libgphoto2 342 + ] ++ lib.optionals enableDC1394 [ 343 + libdc1394 344 + ] ++ lib.optionals enableEigen [ 345 + eigen 346 + ] ++ lib.optionals enableVA [ 347 + libva 348 + ] ++ lib.optionals enableBlas [ 349 + blas.provider 350 + ] ++ lib.optionals enableTesseract [ 324 351 # There is seemingly no compile-time flag for Tesseract. It's 325 352 # simply enabled automatically if contrib is built, and it detects 326 353 # tesseract & leptonica. 327 - ++ lib.optionals enableTesseract [ tesseract leptonica ] 328 - ++ lib.optional enableTbb tbb 329 - ++ lib.optionals effectiveStdenv.isDarwin [ 330 - bzip2 AVFoundation Cocoa VideoDecodeAcceleration CoreMedia MediaToolbox Accelerate 331 - ] 332 - ++ lib.optionals enableDocs [ doxygen graphviz-nox ] 333 - ++ lib.optionals enableCuda (with cudaPackages; [ 334 - cuda_cudart.lib 335 - cuda_cudart.dev 336 - cuda_cccl.dev # <thrust/*> 337 - libnpp.dev # npp.h 338 - libnpp.lib 339 - libnpp.static 340 - nvidia-optical-flow-sdk 341 - ] ++ lib.optionals enableCublas [ 342 - # May start using the default $out instead once 343 - # https://github.com/NixOS/nixpkgs/issues/271792 344 - # has been addressed 345 - libcublas.static 346 - libcublas.lib 347 - libcublas.dev # cublas_v2.h 348 - ] ++ lib.optionals enableCudnn [ 349 - cudnn.dev # cudnn.h 350 - cudnn.lib 351 - cudnn.static 352 - ] ++ lib.optionals enableCufft [ 353 - libcufft.dev # cufft.h 354 - libcufft.lib 355 - libcufft.static 356 - ]); 354 + tesseract 355 + leptonica 356 + ] ++ lib.optionals enableTbb [ 357 + tbb 358 + ] ++ lib.optionals effectiveStdenv.isDarwin [ 359 + bzip2 360 + AVFoundation 361 + Cocoa 362 + VideoDecodeAcceleration 363 + CoreMedia 364 + MediaToolbox 365 + Accelerate 366 + ] ++ lib.optionals enableDocs [ 367 + doxygen 368 + graphviz-nox 369 + ] ++ lib.optionals enableCuda (with cudaPackages; [ 370 + cuda_cudart.lib 371 + cuda_cudart.dev 372 + cuda_cccl.dev # <thrust/*> 373 + libnpp.dev # npp.h 374 + libnpp.lib 375 + libnpp.static 376 + nvidia-optical-flow-sdk 377 + ] ++ lib.optionals enableCublas [ 378 + # May start using the default $out instead once 379 + # https://github.com/NixOS/nixpkgs/issues/271792 380 + # has been addressed 381 + libcublas.static 382 + libcublas.lib 383 + libcublas.dev # cublas_v2.h 384 + ] ++ lib.optionals enableCudnn [ 385 + cudnn.dev # cudnn.h 386 + cudnn.lib 387 + cudnn.static 388 + ] ++ lib.optionals enableCufft [ 389 + libcufft.dev # cufft.h 390 + libcufft.lib 391 + libcufft.static 392 + ]); 357 393 358 394 propagatedBuildInputs = lib.optionals enablePython [ pythonPackages.numpy ]; 359 395
+2 -2
pkgs/development/libraries/physics/rivet/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "rivet"; 5 - version = "3.1.9"; 5 + version = "3.1.10"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.hepforge.org/archive/rivet/Rivet-${version}.tar.bz2"; 9 - hash = "sha256-9lMgRdph7rKtwgqavEFmtLLUGrLByltQDNYWuxuS57E="; 9 + hash = "sha256-RYuODfHec46ZctJLJg6qCH3xLJnU/p3uU3fUfqakmRk="; 10 10 }; 11 11 12 12 latex = texliveBasic.withPackages (ps: with ps; [
-89
pkgs/development/libraries/yajl/cmake-shared-static-fix.patch
··· 1 - From 768be8b9f98e30a8bd2d51576be9dfcf2cb838ea Mon Sep 17 00:00:00 2001 2 - From: Kiskae <Kiskae@users.noreply.github.com> 3 - Date: Tue, 26 Sep 2023 20:53:00 +0200 4 - Subject: [PATCH] simplify compilation of static/shared with cmake 5 - 6 - Signed-off-by: Kiskae <Kiskae@users.noreply.github.com> 7 - --- 8 - CMakeLists.txt | 2 ++ 9 - example/CMakeLists.txt | 2 +- 10 - perf/CMakeLists.txt | 2 +- 11 - src/CMakeLists.txt | 7 ++----- 12 - test/parsing/CMakeLists.txt | 2 +- 13 - 5 files changed, 7 insertions(+), 8 deletions(-) 14 - 15 - diff --git a/CMakeLists.txt b/CMakeLists.txt 16 - index 471eee13..9af25203 100644 17 - --- a/CMakeLists.txt 18 - +++ b/CMakeLists.txt 19 - @@ -16,6 +16,8 @@ CMAKE_MINIMUM_REQUIRED(VERSION 2.6) 20 - 21 - PROJECT(YetAnotherJSONParser C) 22 - 23 - +option(BUILD_SHARED_LIBS "Build using shared libraries" ON) 24 - + 25 - SET (YAJL_MAJOR 2) 26 - SET (YAJL_MINOR 1) 27 - SET (YAJL_MICRO 1) 28 - diff --git a/example/CMakeLists.txt b/example/CMakeLists.txt 29 - index 0a7f6220..62ddf14c 100644 30 - --- a/example/CMakeLists.txt 31 - +++ b/example/CMakeLists.txt 32 - @@ -20,4 +20,4 @@ LINK_DIRECTORIES(${CMAKE_CURRENT_BINARY_DIR}/../${YAJL_DIST_NAME}/lib) 33 - 34 - ADD_EXECUTABLE(parse_config ${SRCS}) 35 - 36 - -TARGET_LINK_LIBRARIES(parse_config yajl_s) 37 - +TARGET_LINK_LIBRARIES(parse_config yajl) 38 - diff --git a/perf/CMakeLists.txt b/perf/CMakeLists.txt 39 - index b438d7a1..924a2681 100644 40 - --- a/perf/CMakeLists.txt 41 - +++ b/perf/CMakeLists.txt 42 - @@ -20,4 +20,4 @@ LINK_DIRECTORIES(${CMAKE_CURRENT_BINARY_DIR}/../${YAJL_DIST_NAME}/lib) 43 - 44 - ADD_EXECUTABLE(perftest ${SRCS}) 45 - 46 - -TARGET_LINK_LIBRARIES(perftest yajl_s) 47 - +TARGET_LINK_LIBRARIES(perftest yajl) 48 - diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt 49 - index 789ddf99..78875032 100644 50 - --- a/src/CMakeLists.txt 51 - +++ b/src/CMakeLists.txt 52 - @@ -35,9 +35,7 @@ SET (pkgconfigDir ${CMAKE_CURRENT_BINARY_DIR}/../${YAJL_DIST_NAME}/lib/pkgconfig 53 - # set the output path for libraries 54 - SET(LIBRARY_OUTPUT_PATH ${libDir}) 55 - 56 - -ADD_LIBRARY(yajl_s STATIC ${SRCS} ${HDRS} ${PUB_HDRS}) 57 - - 58 - -ADD_LIBRARY(yajl SHARED ${SRCS} ${HDRS} ${PUB_HDRS}) 59 - +ADD_LIBRARY(yajl ${SRCS} ${HDRS} ${PUB_HDRS}) 60 - 61 - #### setup shared library version number 62 - SET_TARGET_PROPERTIES(yajl PROPERTIES 63 - @@ -69,7 +67,7 @@ FOREACH (header ${PUB_HDRS}) 64 - 65 - EXEC_PROGRAM(${CMAKE_COMMAND} ARGS -E copy_if_different ${header} ${incDir}) 66 - 67 - - ADD_CUSTOM_COMMAND(TARGET yajl_s POST_BUILD 68 - + ADD_CUSTOM_COMMAND(TARGET yajl POST_BUILD 69 - COMMAND ${CMAKE_COMMAND} -E copy_if_different ${header} ${incDir}) 70 - ENDFOREACH (header ${PUB_HDRS}) 71 - 72 - @@ -81,7 +79,6 @@ INSTALL(TARGETS yajl 73 - RUNTIME DESTINATION lib${LIB_SUFFIX} 74 - LIBRARY DESTINATION lib${LIB_SUFFIX} 75 - ARCHIVE DESTINATION lib${LIB_SUFFIX}) 76 - -INSTALL(TARGETS yajl_s ARCHIVE DESTINATION lib${LIB_SUFFIX}) 77 - INSTALL(FILES ${PUB_HDRS} DESTINATION include/yajl) 78 - INSTALL(FILES ${incDir}/yajl_version.h DESTINATION include/yajl) 79 - INSTALL(FILES ${pkgconfigDir}/yajl.pc DESTINATION lib${LIB_SUFFIX}/pkgconfig) 80 - diff --git a/test/parsing/CMakeLists.txt b/test/parsing/CMakeLists.txt 81 - index c22a3887..f445920d 100644 82 - --- a/test/parsing/CMakeLists.txt 83 - +++ b/test/parsing/CMakeLists.txt 84 - @@ -20,4 +20,4 @@ LINK_DIRECTORIES(${CMAKE_CURRENT_BINARY_DIR}/../../${YAJL_DIST_NAME}/lib) 85 - 86 - ADD_EXECUTABLE(yajl_test ${SRCS}) 87 - 88 - -TARGET_LINK_LIBRARIES(yajl_test yajl_s) 89 - +TARGET_LINK_LIBRARIES(yajl_test yajl)
+3 -8
pkgs/development/libraries/yajl/default.nix
··· 2 2 3 3 stdenv.mkDerivation (finalAttrs: { 4 4 pname = "yajl"; 5 - version = "unstable-2022-04-20"; 5 + version = "2.1.0-unstable-2024-02-01"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "containers"; 9 9 repo = "yajl"; 10 - rev = "49923ccb2143e36850bcdeb781e2bcdf5ce22f15"; 11 - hash = "sha256-9bMPA5FpyBp8fvG/kkT/MnhYtdqg3QzOnmDFXKwJVW0="; 10 + rev = "6bc5219389fd2752631682b0a8368e6d8218a8c5"; 11 + hash = "sha256-vY0tqCkz6PN00Qbip5ViO64L3C06fJ4JjFuIk0TWgCo="; 12 12 }; 13 - 14 - patches = [ 15 - # https://github.com/containers/yajl/pull/1 16 - ./cmake-shared-static-fix.patch 17 - ]; 18 13 19 14 nativeBuildInputs = [ cmake ]; 20 15
+2 -2
pkgs/development/python-modules/aioautomower/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "aioautomower"; 17 - version = "2024.2.7"; 17 + version = "2024.2.8"; 18 18 pyproject = true; 19 19 20 20 disabled = pythonOlder "3.11"; ··· 23 23 owner = "Thomas55555"; 24 24 repo = "aioautomower"; 25 25 rev = "refs/tags/${version}"; 26 - hash = "sha256-ij/Webe/YqpAyjCXFpKq0eyvTegiTDJYiMASuUJKc7Q="; 26 + hash = "sha256-YdC6459lEvHDnX4L26n28oGzDSsa7/8UGHjnONhn9Yo="; 27 27 }; 28 28 29 29 postPatch = ''
+2 -2
pkgs/development/python-modules/appthreat-vulnerability-db/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "appthreat-vulnerability-db"; 20 - version = "5.6.2"; 20 + version = "5.6.3"; 21 21 pyproject = true; 22 22 23 23 disabled = pythonOlder "3.8"; ··· 26 26 owner = "AppThreat"; 27 27 repo = "vulnerability-db"; 28 28 rev = "refs/tags/v${version}"; 29 - hash = "sha256-/Un5Jh/3UjhJApL0eQzj545F9q+55xwFsIa5M+U93w0="; 29 + hash = "sha256-aOHnuZdjXiIqd/SeQdVB1qB7v8DfnEFH0zHctA74MPw="; 30 30 }; 31 31 32 32 postPatch = ''
+2 -2
pkgs/development/python-modules/clarifai-grpc/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "clarifai-grpc"; 14 - version = "10.1.4"; 14 + version = "10.1.6"; 15 15 pyproject = true; 16 16 17 17 disabled = pythonOlder "3.8"; ··· 20 20 owner = "Clarifai"; 21 21 repo = "clarifai-python-grpc"; 22 22 rev = "refs/tags/${version}"; 23 - hash = "sha256-cYYAEen/RY5TG2jLxUS38Acehg/X8pni6T1zxhJAi1Y="; 23 + hash = "sha256-VRI4mAYWJUP9kxf+xOlcys07Jsa7Zy9bP8BDKDEYli4="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+21 -2
pkgs/development/python-modules/dask-awkward/default.nix
··· 2 2 , awkward 3 3 , buildPythonPackage 4 4 , dask 5 + , dask-histogram 6 + , distributed 5 7 , fetchFromGitHub 6 8 , hatch-vcs 7 9 , hatchling 10 + , hist 11 + , pandas 8 12 , pyarrow 9 13 , pytestCheckHook 10 14 , pythonOlder 11 15 , pythonRelaxDepsHook 16 + , typing-extensions 17 + , uproot 12 18 }: 13 19 14 20 buildPythonPackage rec { ··· 38 44 propagatedBuildInputs = [ 39 45 awkward 40 46 dask 47 + typing-extensions 41 48 ]; 42 49 50 + passthru.optional-dependencies = { 51 + io = [ 52 + pyarrow 53 + ]; 54 + }; 55 + 43 56 checkInputs = [ 57 + dask-histogram 58 + distributed 59 + hist 60 + pandas 44 61 pytestCheckHook 45 - pyarrow 46 - ]; 62 + uproot 63 + ] ++ lib.flatten (builtins.attrValues passthru.optional-dependencies); 47 64 48 65 pythonImportsCheck = [ 49 66 "dask_awkward" ··· 54 71 "test_remote_double" 55 72 "test_remote_single" 56 73 "test_from_text" 74 + # ValueError: not a ROOT file: first four bytes... 75 + "test_basic_root_works" 57 76 ]; 58 77 59 78 meta = with lib; {
+2 -2
pkgs/development/python-modules/http-message-signatures/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "http-message-signatures"; 14 - version = "0.4.4"; 14 + version = "0.5.0"; 15 15 format = "setuptools"; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "pyauth"; 21 21 repo = pname; 22 22 rev = "v${version}"; 23 - hash = "sha256-acTziJM5H5Td+eG/LNrlNwgpVvFDyl/tf6//YuE1XZk="; 23 + hash = "sha256-Jsivw4lNA/2oqsOGGx8D4gUPftzuys877A9RXyapnSQ="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+7 -11
pkgs/development/python-modules/nvchecker/default.nix
··· 1 1 { lib 2 - , aiohttp 3 2 , platformdirs 4 3 , buildPythonPackage 5 4 , docutils 6 5 , fetchFromGitHub 7 6 , flaky 8 7 , installShellFiles 9 - , packaging 10 8 , pycurl 11 9 , pytest-asyncio 12 10 , pytest-httpbin ··· 20 18 21 19 buildPythonPackage rec { 22 20 pname = "nvchecker"; 23 - version = "2.12"; 24 - format = "pyproject"; 21 + version = "2.13.1"; 22 + pyproject = true; 25 23 26 - disabled = pythonOlder "3.7"; 24 + disabled = pythonOlder "3.8"; 27 25 28 26 src = fetchFromGitHub { 29 27 owner = "lilydjwg"; 30 28 repo = pname; 31 29 rev = "v${version}"; 32 - hash = "sha256-6mhVDC2jpIIOZeoKz4AxxU7jj8dqPVBKRWupbuY/T7E="; 30 + hash = "sha256-q+az9oaxxIOv/vLFpkT3cF5GDJsa0Cid4oPWEKg5s7M="; 33 31 }; 34 32 35 33 nativeBuildInputs = [ 34 + setuptools 36 35 docutils 37 36 installShellFiles 38 37 ]; 39 38 40 39 propagatedBuildInputs = [ 41 - aiohttp 40 + structlog 42 41 platformdirs 43 - packaging 42 + tornado 44 43 pycurl 45 - setuptools 46 - structlog 47 - tornado 48 44 ] ++ lib.optionals (pythonOlder "3.11") [ 49 45 tomli 50 46 ];
+2 -2
pkgs/development/python-modules/odp-amsterdam/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "odp-amsterdam"; 15 - version = "6.0.0"; 15 + version = "6.0.1"; 16 16 pyproject = true; 17 17 18 18 disabled = pythonOlder "3.11"; ··· 21 21 owner = "klaasnicolaas"; 22 22 repo = "python-odp-amsterdam"; 23 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-dAyKypc8bMWkXhYa7BlGGAGqPaPJHFHwXd/UK80BGoE="; 24 + hash = "sha256-teLjiclkbjlG226gMUgqc2IUEWqKcSm6xIekw+AQPU4="; 25 25 }; 26 26 27 27 postPatch = ''
+78
pkgs/development/python-modules/orbax-checkpoint/default.nix
··· 1 + { lib 2 + , absl-py 3 + , buildPythonPackage 4 + , cached-property 5 + , etils 6 + , fetchPypi 7 + , flit-core 8 + , importlib-resources 9 + , jax 10 + , jaxlib 11 + , msgpack 12 + , nest-asyncio 13 + , numpy 14 + , protobuf 15 + , pytest-xdist 16 + , pytestCheckHook 17 + , pythonOlder 18 + , pyyaml 19 + , tensorstore 20 + , typing-extensions 21 + }: 22 + 23 + buildPythonPackage rec { 24 + pname = "orbax-checkpoint"; 25 + version = "0.5.3"; 26 + pyproject = true; 27 + 28 + disabled = pythonOlder "3.9"; 29 + 30 + src = fetchPypi { 31 + pname = "orbax_checkpoint"; 32 + inherit version; 33 + hash = "sha256-FXKQTLv+hROSfg2A+AtzDg7y9oAzLTwoENhENTKTi0U="; 34 + }; 35 + 36 + nativeBuildInputs = [ 37 + flit-core 38 + ]; 39 + 40 + propagatedBuildInputs = [ 41 + absl-py 42 + cached-property 43 + etils 44 + importlib-resources 45 + jax 46 + jaxlib 47 + msgpack 48 + nest-asyncio 49 + numpy 50 + protobuf 51 + pyyaml 52 + tensorstore 53 + typing-extensions 54 + ]; 55 + 56 + nativeCheckInputs = [ 57 + pytest-xdist 58 + pytestCheckHook 59 + ]; 60 + 61 + pythonImportsCheck = [ 62 + "orbax" 63 + ]; 64 + 65 + disabledTestPaths = [ 66 + # Circular dependency flax 67 + "orbax/checkpoint/transform_utils_test.py" 68 + "orbax/checkpoint/utils_test.py" 69 + ]; 70 + 71 + meta = with lib; { 72 + description = "Orbax provides common utility libraries for JAX users"; 73 + homepage = "https://github.com/google/orbax/tree/main/checkpoint"; 74 + changelog = "https://github.com/google/orbax/blob/${version}/CHANGELOG.md"; 75 + license = licenses.asl20; 76 + maintainers = with maintainers; [fab ]; 77 + }; 78 + }
+2 -2
pkgs/development/python-modules/oslo-context/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "oslo.context"; 5 - version = "5.3.0"; 5 + version = "5.4.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - hash = "sha256-xRBxQcYotq5W1P62MiucSnAJL9ahgekfq+relKCeTjg="; 9 + hash = "sha256-6WSRu91rUecqOoxUahKbhNI56OngtSEMi6fAoKVimRk="; 10 10 }; 11 11 12 12 postPatch = ''
+3
pkgs/development/python-modules/pillow-heif/default.nix
··· 55 55 x265 56 56 ]; 57 57 58 + # clang-16: error: argument unused during compilation: '-fno-strict-overflow' [-Werror,-Wunused-command-line-argument] 59 + env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.cc.isClang "-Wno-unused-command-line-argument"; 60 + 58 61 propagatedBuildInputs = [ 59 62 pillow 60 63 ];
+2 -2
pkgs/development/python-modules/puremagic/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "puremagic"; 10 - version = "1.20"; 10 + version = "1.21"; 11 11 format = "setuptools"; 12 12 13 13 disabled = pythonOlder "3.7"; ··· 16 16 owner = "cdgriffith"; 17 17 repo = pname; 18 18 rev = "refs/tags/${version}"; 19 - hash = "sha256-Iyf/Vf1uqdtHlaP9Petpp88aIGCGmHu//cH6bindL6c="; 19 + hash = "sha256-ObJp3+gk1tf1+9wBpvzs0wwP7ptDlfGwX9b4wlCb1RI="; 20 20 }; 21 21 22 22 nativeCheckInputs = [
+2 -2
pkgs/development/python-modules/pydrawise/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "pydrawise"; 20 - version = "2024.1.1"; 20 + version = "2024.2.0"; 21 21 format = "pyproject"; 22 22 23 23 disabled = pythonOlder "3.10"; ··· 26 26 owner = "dknowles2"; 27 27 repo = "pydrawise"; 28 28 rev = "refs/tags/${version}"; 29 - hash = "sha256-fMwWGE6WfgENti4H+WSfd8ZSHqxHyBVATUhng/o8qeY="; 29 + hash = "sha256-eFjfO2lpRPgyTtzIutHqGIKC0SLKPBA4Pq0vhl9iCvs="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+4 -4
pkgs/development/python-modules/pynuki/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "pynuki"; 12 - version = "1.6.2"; 13 - format = "pyproject"; 12 + version = "1.6.3"; 13 + pyproject = true; 14 14 15 15 disabled = pythonOlder "3.8"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pschmitt"; 19 - repo = pname; 19 + repo = "pynuki"; 20 20 rev = "refs/tags/${version}"; 21 - hash = "sha256-I0eAhgThSBEmJF6mYw+0Bh1kCUqEMFnCx+4n7l3Hf14="; 21 + hash = "sha256-PF5FmAuPcJXq8gQ8HyzdtL2HiiUjueT+LAS1lYRvrwM="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/pytedee-async/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "pytedee-async"; 11 - version = "0.2.13"; 11 + version = "0.2.14"; 12 12 pyproject = true; 13 13 14 14 disabled = pythonOlder "3.9"; ··· 17 17 owner = "zweckj"; 18 18 repo = "pytedee_async"; 19 19 rev = "refs/tags/v${version}"; 20 - hash = "sha256-3W+eqkniDMoDKeute5w1QyklOc/aren/Q8txBEI/4ys="; 20 + hash = "sha256-BtBHiDOYe8BkrqJEGG4eGKFMnCspCQK4fvcj2vvGmFM="; 21 21 }; 22 22 23 23 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/python-homewizard-energy/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "python-homewizard-energy"; 16 - version = "4.3.0"; 16 + version = "4.3.1"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.9"; ··· 22 22 owner = "DCSBL"; 23 23 repo = "python-homewizard-energy"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-5e2PzH+kDOopH4LYOq49SlHsfBbZZk60U1BSN8OnrKI="; 25 + hash = "sha256-LpxXTzUb+N15lGno3pAhRSEJCb4NmwBcGQ/PshI9gYA="; 26 26 }; 27 27 28 28 postPatch = ''
+2 -2
pkgs/development/python-modules/pyunifiprotect/default.nix
··· 32 32 33 33 buildPythonPackage rec { 34 34 pname = "pyunifiprotect"; 35 - version = "4.23.3"; 35 + version = "4.23.4"; 36 36 pyproject = true; 37 37 38 38 disabled = pythonOlder "3.9"; ··· 41 41 owner = "briis"; 42 42 repo = "pyunifiprotect"; 43 43 rev = "refs/tags/v${version}"; 44 - hash = "sha256-QWIiBuKDhSNYVyEm45QV4a2UxADDrBdiCBeJI+a6v7c="; 44 + hash = "sha256-sBdu4XJkEtHf6dlHgJKFQvONp1x89NiS2EgxMiJFX7A="; 45 45 }; 46 46 47 47 env.SETUPTOOLS_SCM_PRETEND_VERSION = version;
+2 -2
pkgs/development/python-modules/snakemake-interface-common/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "snakemake-interface-common"; 11 - version = "1.17.0"; 11 + version = "1.17.1"; 12 12 format = "pyproject"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "snakemake"; 16 16 repo = pname; 17 17 rev = "refs/tags/v${version}"; 18 - hash = "sha256-1dvanwYCQE5usgXPhYCZfUpj4MyaLImQ5RskQvS6nJs="; 18 + hash = "sha256-23PGKSBX7KMt0Q7sWiLIPfCkxr2HtBas7flYeNHABWM="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+4 -14
pkgs/development/python-modules/structlog/default.nix
··· 11 11 , pythonOlder 12 12 , simplejson 13 13 , twisted 14 - , typing-extensions 15 14 }: 16 15 17 16 buildPythonPackage rec { 18 17 pname = "structlog"; 19 - version = "23.2.0"; 20 - format = "pyproject"; 18 + version = "24.1.0"; 19 + pyproject = true; 21 20 22 21 disabled = pythonOlder "3.8"; 23 22 ··· 25 24 owner = "hynek"; 26 25 repo = "structlog"; 27 26 rev = "refs/tags/${version}"; 28 - hash = "sha256-KSHKgkv+kObKCdWZDg5o6QYe0AMND9VLdEuseY/GyDY="; 27 + hash = "sha256-0Yc28UEeozK2+IqILFTqHoTiM5L2SA4t6jld4qTBSzQ="; 29 28 }; 30 29 31 30 nativeBuildInputs = [ ··· 34 33 hatchling 35 34 ]; 36 35 37 - propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [ 38 - typing-extensions 39 - ]; 40 - 41 36 nativeCheckInputs = [ 42 37 freezegun 43 38 pretend ··· 47 42 twisted 48 43 ]; 49 44 50 - disabledTests = [ 51 - # _pickle.PicklingError: Only BytesLoggers to sys.stdout and sys.stderr can be pickled. 52 - "test_pickle" 53 - ]; 54 - 55 45 pythonImportsCheck = [ 56 46 "structlog" 57 47 ]; ··· 61 51 homepage = "https://github.com/hynek/structlog"; 62 52 changelog = "https://github.com/hynek/structlog/blob/${version}/CHANGELOG.md"; 63 53 license = licenses.asl20; 64 - maintainers = with maintainers; [ ]; 54 + maintainers = with maintainers; [ dotlambda ]; 65 55 }; 66 56 }
+47
pkgs/development/python-modules/systembridgeconnector/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , pythonOlder 4 + , fetchFromGitHub 5 + , setuptools 6 + , aiohttp 7 + , incremental 8 + , systembridgemodels 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "systembridgeconnector"; 13 + version = "4.0.1"; 14 + pyproject = true; 15 + 16 + disabled = pythonOlder "3.11"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "timmo001"; 20 + repo = "system-bridge-connector"; 21 + rev = "refs/tags/${version}"; 22 + hash = "sha256-dMOhw7e2sCmGItsgGcGxYVCIJM2FBm6IyxIQXPtY+Pg="; 23 + }; 24 + 25 + nativeBuildInputs = [ 26 + setuptools 27 + ]; 28 + 29 + propagatedBuildInputs = [ 30 + aiohttp 31 + incremental 32 + systembridgemodels 33 + ]; 34 + 35 + pythonImportsCheck = [ "systembridgeconnector" ]; 36 + 37 + # upstream has no tests 38 + doCheck = false; 39 + 40 + meta = { 41 + changelog = "https://github.com/timmo001/system-bridge-connector/releases/tag/${version}"; 42 + description = "This is the connector package for the System Bridge project"; 43 + homepage = "https://github.com/timmo001/system-bridge-connector"; 44 + license = lib.licenses.asl20; 45 + maintainers = with lib.maintainers; [ dotlambda ]; 46 + }; 47 + }
+51
pkgs/development/python-modules/systembridgemodels/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , pythonOlder 4 + , fetchFromGitHub 5 + , fetchpatch2 6 + , setuptools 7 + , incremental 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "systembridgemodels"; 12 + version = "4.0.0"; 13 + pyproject = true; 14 + 15 + disabled = pythonOlder "3.11"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "timmo001"; 19 + repo = "system-bridge-models"; 20 + rev = "refs/tags/${version}"; 21 + hash = "sha256-4nbTsVRqtoX4UhTrQS4HwoLtx0RO1VA8UewSAWOSsik="; 22 + }; 23 + 24 + patches = [ 25 + (fetchpatch2 { 26 + url = "https://github.com/timmo001/system-bridge-models/commit/7cd506760fd47c0f3717b6fcfe127b673e3198f8.patch"; 27 + hash = "sha256-i+GCcoyX07ii9Kj46dtAlT85jUKfF0KHEH9++UTjiik="; 28 + }) 29 + ]; 30 + 31 + nativeBuildInputs = [ 32 + setuptools 33 + ]; 34 + 35 + propagatedBuildInputs = [ 36 + incremental 37 + ]; 38 + 39 + pythonImportsCheck = [ "systembridgemodels" ]; 40 + 41 + # upstream has no tests 42 + doCheck = false; 43 + 44 + meta = { 45 + changelog = "https://github.com/timmo001/system-bridge-models/releases/tag/${version}"; 46 + description = "This is the models package used by the System Bridge project"; 47 + homepage = "https://github.com/timmo001/system-bridge-models"; 48 + license = lib.licenses.asl20; 49 + maintainers = with lib.maintainers; [ dotlambda ]; 50 + }; 51 + }
+2 -2
pkgs/development/python-modules/teslajsonpy/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "teslajsonpy"; 20 - version = "3.9.11"; 20 + version = "3.10.0"; 21 21 format = "pyproject"; 22 22 23 23 disabled = pythonOlder "3.7"; ··· 26 26 owner = "zabuldon"; 27 27 repo = pname; 28 28 rev = "refs/tags/v${version}"; 29 - hash = "sha256-oGYXhSMwG566xdGCDMz9ajJ4HJXXcYBAJQf035iJQvE="; 29 + hash = "sha256-7pT3LXBbE4/QRfmTWAJG6yarU787r2tjXRiv7ySvuSs="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/ytmusicapi/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "ytmusicapi"; 12 - version = "1.5.2"; 12 + version = "1.5.3"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.8"; ··· 18 18 owner = "sigma67"; 19 19 repo = "ytmusicapi"; 20 20 rev = "refs/tags/${version}"; 21 - hash = "sha256-3dJ9Mu1cblBJh3BVEyxdfO+RD8kSxpdvnvox7ljMWT4="; 21 + hash = "sha256-X4bfGYFttuEMwDyjqzDe3RJGkAvVUs91hEL0JfXrdIM="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/zamg/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "zamg"; 12 - version = "0.3.5"; 12 + version = "0.3.6"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.8"; ··· 18 18 owner = "killer0071234"; 19 19 repo = "python-zamg"; 20 20 rev = "refs/tags/v${version}"; 21 - hash = "sha256-lT345G0apo4ncM4FMs69+ql+QxvTlsEtG2KRX4oYvlo="; 21 + hash = "sha256-j864+3c0GDDftdLqLDD0hizT54c0IgTjT77jOneXlq0="; 22 22 }; 23 23 24 24 postPatch = ''
-8
pkgs/development/ruby-modules/gem-config/default.nix
··· 620 620 ovirt-engine-sdk = attrs: { 621 621 buildInputs = [ curl libxml2 ]; 622 622 dontBuild = false; 623 - patches = [ 624 - # fix ruby 3.1 https://github.com/oVirt/ovirt-engine-sdk-ruby/pull/3 625 - (fetchpatch { 626 - url = "https://github.com/oVirt/ovirt-engine-sdk-ruby/pull/3/commits/b596b919bc7857fdc0fc1c61a8cb7eab32cfc2db.patch"; 627 - hash = "sha256-AzGTQaD/e6X4LOMuXhy/WhbayhWKYCGHXPFlzLRWyPM="; 628 - stripLen = 1; 629 - }) 630 - ]; 631 623 }; 632 624 633 625 pango = attrs: {
+2 -2
pkgs/development/tools/analysis/flow/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "flow"; 5 - version = "0.229.1"; 5 + version = "0.229.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "facebook"; 9 9 repo = "flow"; 10 10 rev = "v${version}"; 11 - hash = "sha256-zovtSY37f7WKwE0Mjl9Vc+RcYjqMRhPHafN50XAj5cE="; 11 + hash = "sha256-PoEtXk8EqlFgy33akd6na50P/tT6uWtEq+kfbayDo5s="; 12 12 }; 13 13 14 14 postPatch = ''
+28 -21
pkgs/development/tools/aws-sam-cli/default.nix
··· 10 10 11 11 python3.pkgs.buildPythonApplication rec { 12 12 pname = "aws-sam-cli"; 13 - version = "1.103.0"; 14 - format = "pyproject"; 13 + version = "1.110.0"; 14 + pyproject = true; 15 15 16 16 disabled = python3.pythonOlder "3.8"; 17 17 ··· 19 19 owner = "aws"; 20 20 repo = "aws-sam-cli"; 21 21 rev = "refs/tags/v${version}"; 22 - hash = "sha256-oy0+dAA6x8Jl1nZ1wjsR9xvpR9biemTtqL9B1awz4BM="; 22 + hash = "sha256-FJHHEsdi2uGP9/GxrANsVEuxZiS4M4BPBGoARQBQpkA="; 23 23 }; 24 24 25 25 nativeBuildInputs = with python3.pkgs; [ ··· 28 28 ]; 29 29 30 30 pythonRelaxDeps = [ 31 + "aws-lambda-builders" 31 32 "aws-sam-translator" 32 33 "boto3-stubs" 33 - "tzlocal" 34 + "cfn-lint" 34 35 "cookiecutter" 35 36 "docker" 36 - "aws-lambda-builders" 37 + "jsonschema" 38 + "pyopenssl" 39 + "rich" 40 + "ruamel-yaml" 37 41 "tomlkit" 38 - "rich" 39 - "jsonschema" 42 + "tzlocal" 40 43 ]; 41 44 42 45 propagatedBuildInputs = with python3.pkgs; [ ··· 85 88 --prefix PATH : $out/bin:${lib.makeBinPath [ git ]} 86 89 ''; 87 90 88 - doCheck = true; 89 - 90 91 nativeCheckInputs = with python3.pkgs; [ 91 92 filelock 92 93 flaky 93 94 parameterized 94 95 psutil 96 + pytest-timeout 95 97 pytest-xdist 96 98 pytestCheckHook 97 99 ]; ··· 103 105 104 106 pytestFlagsArray = [ 105 107 "tests" 108 + # Disable warnings 109 + "-W" 110 + "ignore::DeprecationWarning" 111 + ]; 106 112 113 + disabledTestPaths = [ 107 114 # Disable tests that requires networking or complex setup 108 - "--ignore=tests/end_to_end" 109 - "--ignore=tests/integration" 110 - "--ignore=tests/regression" 111 - "--ignore=tests/smoke" 112 - "--ignore=tests/unit/lib/telemetry" 113 - 115 + "tests/end_to_end" 116 + "tests/integration" 117 + "tests/regression" 118 + "tests/smoke" 119 + "tests/unit/lib/telemetry" 114 120 # Disable flaky tests 115 - "--ignore=tests/unit/lib/samconfig/test_samconfig.py" 116 - "--deselect=tests/unit/lib/sync/flows/test_rest_api_sync_flow.py::TestRestApiSyncFlow::test_update_stage" 117 - "--deselect=tests/unit/lib/sync/flows/test_rest_api_sync_flow.py::TestRestApiSyncFlow::test_delete_deployment" 118 - "--deselect=tests/unit/local/lambda_service/test_local_lambda_invoke_service.py::TestValidateRequestHandling::test_request_with_no_data" 121 + "tests/unit/lib/samconfig/test_samconfig.py" 122 + ]; 119 123 120 - # Disable warnings 121 - "-W ignore::DeprecationWarning" 124 + disabledTests = [ 125 + # Disable flaky tests 126 + "test_update_stage" 127 + "test_delete_deployment" 128 + "test_request_with_no_data" 122 129 ]; 123 130 124 131 pythonImportsCheck = [
pkgs/development/tools/build-managers/gprbuild/boot.nix pkgs/development/ada-modules/gprbuild/boot.nix
+4 -1
pkgs/development/tools/build-managers/gprbuild/default.nix pkgs/development/ada-modules/gprbuild/default.nix
··· 54 54 # link gprconfig_kb db from gprbuild-boot into build dir, 55 55 # the install process copies its contents to $out 56 56 preInstall = '' 57 - ln -sf ${gprbuild-boot}/share/gprconfig share/gprconfig 57 + # Use PATH to discover spliced gprbuild-boot from buildPackages, 58 + # since path interpolation would give us gprbuild-boot from pkgsHostTarget 59 + gprbuild_boot="$(dirname "$(type -p gprbuild)")/.." 60 + ln -sf "$gprbuild_boot/share/gprconfig" share/gprconfig 58 61 ''; 59 62 60 63 # no need for the install script
pkgs/development/tools/build-managers/gprbuild/gpr-project-darwin-rpath-hook.sh pkgs/development/ada-modules/gprbuild/gpr-project-darwin-rpath-hook.sh
pkgs/development/tools/build-managers/gprbuild/gpr-project-path-hook.sh pkgs/development/ada-modules/gprbuild/gpr-project-path-hook.sh
pkgs/development/tools/build-managers/gprbuild/gprbuild-relocatable-build.patch pkgs/development/ada-modules/gprbuild/gprbuild-relocatable-build.patch
pkgs/development/tools/build-managers/gprbuild/nixpkgs-gnat.xml pkgs/development/ada-modules/gprbuild/nixpkgs-gnat.xml
+1 -1
pkgs/development/tools/continuous-integration/drone-runner-docker/default.nix
··· 14 14 vendorHash = "sha256-KcNp3VdJ201oxzF0bLXY4xWHqHNz54ZrVSI96cfhU+k="; 15 15 16 16 meta = with lib; { 17 - maintainers = with maintainers; [ endocrimes emilylange ]; 17 + maintainers = with maintainers; [ endocrimes ]; 18 18 license = licenses.unfreeRedistributable; 19 19 homepage = "https://github.com/drone-runners/drone-runner-docker"; 20 20 description = "Drone pipeline runner that executes builds inside Docker containers";
+7 -2
pkgs/development/tools/electron/binary/generic.nix
··· 12 12 , mesa 13 13 , libxkbcommon 14 14 , libxshmfence 15 - , libglvnd 15 + , libGL 16 16 , alsa-lib 17 17 , cairo 18 18 , cups ··· 102 102 ++ lib.optionals (lib.versionOlder version "10.0.0") [ libXScrnSaver ] 103 103 ++ lib.optionals (lib.versionAtLeast version "11.0.0") [ libxkbcommon ] 104 104 ++ lib.optionals (lib.versionAtLeast version "12.0.0") [ libxshmfence ] 105 - ++ lib.optionals (lib.versionAtLeast version "17.0.0") [ libglvnd ] 105 + ++ lib.optionals (lib.versionAtLeast version "17.0.0") [ libGL ] 106 106 ); 107 107 108 108 linux = { ··· 130 130 --set-rpath "${electronLibPath}:$out/libexec/electron" \ 131 131 $out/libexec/electron/.electron-wrapped \ 132 132 ${lib.optionalString (lib.versionAtLeast version "15.0.0") "$out/libexec/electron/.chrome_crashpad_handler-wrapped" } 133 + 134 + # patch libANGLE 135 + patchelf \ 136 + --set-rpath "${lib.makeLibraryPath [ libGL pciutils ]}" \ 137 + $out/libexec/electron/lib*GL* 133 138 ''; 134 139 }; 135 140
+2 -2
pkgs/development/tools/misc/kool/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "kool"; 10 - version = "3.0.0"; 10 + version = "3.1.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "kool-dev"; 14 14 repo = "kool"; 15 15 rev = version; 16 - hash = "sha256-+vdizU2/q2nrEanpRPy1scgfTYh/I7feW4jz8efelWY="; 16 + hash = "sha256-apecHILrtvzD1bAOuyhSokDqBB2UgCavQXOw4dQSPwc="; 17 17 }; 18 18 19 19 vendorHash = "sha256-PmS96KVhe9TDmtYBx2hROLCbGMQ0OY3MN405dUmxPzk=";
+3 -3
pkgs/development/tools/rojo/default.nix
··· 12 12 in 13 13 rustPlatform.buildRustPackage rec { 14 14 pname = "rojo"; 15 - version = "7.4.0"; 15 + version = "7.4.1"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "rojo-rbx"; 19 19 repo = "rojo"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-Eh1G0jX9KXVlMZLl8whxULywadblWml232qvcq4JLJ4="; 21 + hash = "sha256-7fnzNYAbsZW/48C4dwpMXXQy2ZgxbYFSs85wNKGcu/4="; 22 22 fetchSubmodules = true; 23 23 }; 24 24 25 - cargoSha256 = "sha256-aKfgylY9aspL1JpdYa6hOy/6lQoqO54OhZWqSlMPZ8o="; 25 + cargoHash = "sha256-9kmSNWsZY0OcqaYOCblMwkXTdGXhj7f/2pUDx/L/o2o="; 26 26 27 27 nativeBuildInputs = [ 28 28 pkg-config
+3 -3
pkgs/development/tools/rust/ravedude/default.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "ravedude"; 13 - version = "0.1.6"; 13 + version = "0.1.7"; 14 14 15 15 src = fetchCrate { 16 16 inherit pname version; 17 - hash = "sha256-LhPRz3DUMDoe50Hq3yO+2BHpyh5fQ4sMNGLttjkdSZw="; 17 + hash = "sha256-p5pbxnoUBhdDf7acpLStgBvoWZyFYNHxTwzDhGSApRM="; 18 18 }; 19 19 20 - cargoHash = "sha256-Uo8wlTAHBkn/WeGPhPP+BU80wjSyNHsWQj8QvA7mHrk="; 20 + cargoHash = "sha256-L7eXSji+irjwuOZ5uxqWK9SesRZrqEeoenJgMzqpszo="; 21 21 22 22 nativeBuildInputs = [ pkg-config ]; 23 23
+2 -2
pkgs/games/libremines/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "libremines"; 12 - version = "1.10.0"; 12 + version = "2.0.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "Bollos00"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - hash = "sha256-aqWzTvvRoke+Rakb6dNpDoD7haKHEKW3XARGLrH2WiY="; 18 + hash = "sha256-LejDXjli+AEVGp23y+ez/NyJY/8w7uHcOij6RsDwIH4="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ cmake wrapQtAppsHook ];
+2 -2
pkgs/games/papermc/default.nix
··· 7 7 }: 8 8 stdenvNoCC.mkDerivation (finalAttrs: { 9 9 pname = "papermc"; 10 - version = "1.20.2.234"; 10 + version = "1.20.4.435"; 11 11 12 12 src = 13 13 let ··· 16 16 in 17 17 fetchurl { 18 18 url = "https://papermc.io/api/v2/projects/paper/versions/${mcVersion}/builds/${buildNum}/downloads/paper-${mcVersion}-${buildNum}.jar"; 19 - hash = "sha256-fR7Dq09iFGVXodQjrS7Hg4NcrKPJbNg0hexU520JC6c="; 19 + hash = "sha256-NrIsYLoAAWORw/S26NDFjYBVwpNITJxuWGZow3696wM="; 20 20 }; 21 21 22 22 installPhase = ''
+3 -3
pkgs/misc/cups/drivers/foomatic-db/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "foomatic-db"; 16 - version = "unstable-2023-09-02"; 16 + version = "unstable-2024-02-09"; 17 17 18 18 src = fetchFromGitHub { 19 19 # there is also a daily snapshot at the `downloadPage`, 20 20 # but it gets deleted quickly and would provoke 404 errors 21 21 owner = "OpenPrinting"; 22 22 repo = "foomatic-db"; 23 - rev = "4e6ab90da63afddee33d80115acb44149d2d292b"; 24 - hash = "sha256-wtDGJUyViiCenCY4zvr0Ia4ecZpoDsDSWwlYYs3YMT8="; 23 + rev = "f8b43644771612f854fecda969440511de784bf0"; 24 + hash = "sha256-8Pui83Z7g5aHBJk46AYeKil/0++I6zcc5S/BWRuy1WM="; 25 25 }; 26 26 27 27 buildInputs = [ cups cups-filters ghostscript gnused perl ];
+29
pkgs/misc/drivers/epkowa/default.nix
··· 99 99 }; 100 100 meta = common_meta // { description = "Plugin to support " + passthru.hw + " scanner in sane"; }; 101 101 }; 102 + v550 = stdenv.mkDerivation rec { 103 + pname = "iscan-perfection-v550-bundle"; 104 + version = "2.30.4"; 105 + 106 + nativeBuildInputs = [ autoPatchelfHook rpm ]; 107 + src = fetchurl { 108 + urls = [ 109 + "https://download2.ebz.epson.net/iscan/plugin/perfection-v550/rpm/x64/iscan-perfection-v550-bundle-${version}.x64.rpm.tar.gz" 110 + "https://web.archive.org/web/https://download2.ebz.epson.net/iscan/plugin/perfection-v550/rpm/x64/iscan-perfection-v550-bundle-${version}.x64.rpm.tar.gz" 111 + ]; 112 + sha256 = "f8b3abf21354fc5b9bc87753cef950b6c0f07bf322a94aaff2c163bafcf50cd9"; 113 + }; 114 + installPhase = '' 115 + cd plugins 116 + ${rpm}/bin/rpm2cpio iscan-plugin-perfection-v550-*.x86_64.rpm | ${cpio}/bin/cpio -idmv 117 + mkdir $out 118 + cp -r usr/share $out 119 + cp -r usr/lib64 $out/lib 120 + mv $out/share/iscan $out/share/esci 121 + mv $out/lib/iscan $out/lib/esci 122 + ''; 123 + passthru = { 124 + registrationCommand = '' 125 + $registry --add interpreter usb 0x04b8 0x013b "$plugin/lib/esci/libiscan-plugin-perfection-v550 $plugin/share/esci/esfweb.bin" 126 + ''; 127 + hw = "Perfection V550 Photo"; 128 + }; 129 + meta = common_meta // { description = "Plugin to support " + passthru.hw + " scanner in sane"; }; 130 + }; 102 131 v600 = stdenv.mkDerivation rec { 103 132 pname = "iscan-gt-x820-bundle"; 104 133 version = "2.30.4";
+2 -2
pkgs/os-specific/linux/facetimehd/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "facetimehd-${version}-${kernel.version}"; 5 - version = "0.5.18"; 5 + version = "0.6.8"; 6 6 7 7 # Note: When updating this revision: 8 8 # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ ··· 18 18 owner = "patjak"; 19 19 repo = "facetimehd"; 20 20 rev = version; 21 - sha256 = "sha256-UO8t2zrfdJlu4uzhhyWOuHIjJNVezIq3nUPGZeW/KJU="; 21 + sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; 22 22 }; 23 23 24 24 preConfigure = ''
+5 -7
pkgs/os-specific/linux/nvidia-x11/default.nix
··· 117 117 118 118 # Last one supporting Kepler architecture 119 119 legacy_470 = generic { 120 - version = "470.223.02"; 121 - sha256_64bit = "sha256-s2hi1TNsw+br6Ow6tPiFsYPaJY8d+x4FrkBrP2xNRPg="; 122 - sha256_aarch64 = "sha256-CFkg2ARlGWqlFQKm8SlbwMH6eLidHKA/q5QGVOpPGuU="; 123 - settingsSha256 = "sha256-r6DuIH/rnsCm/y51iRgPNi5/kz+EFMVABREdTjBneZ0="; 124 - persistencedSha256 = "sha256-e71fpPBBv8S/aoeXxBXkzKy5bsMMbv8y024cSLc8DYc="; 125 - 126 - patches = [ rcu_patch ]; 120 + version = "470.239.06"; 121 + sha256_64bit = "sha256-fXTKrBQKBDLXnr6OQzDceW85un3UCz/NYd92AYG/nMw="; 122 + sha256_aarch64 = "sha256-NZj8OLQ0N7y3V7UBamLyJE8AbI3alZJD1weNjnssuNs="; 123 + settingsSha256 = "sha256-2YTk6DaoB8Qvob9/ohtHXuDhxGO9O/SUwlXXbLSgJP0="; 124 + persistencedSha256 = "sha256-wLrkfD8MQ8sMODE+yEnWg/1ETxYVWOqNsIj1dY+5yjc="; 127 125 }; 128 126 129 127 # Last one supporting x86
+2 -2
pkgs/os-specific/linux/virtio_vmmci/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "virtio_vmmci"; 5 - version = "0.5.0"; 5 + version = "0.6.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "voutilad"; 9 9 repo = "virtio_vmmci"; 10 10 rev = version; 11 - hash = "sha256-ZHslYYZFjM3wp0W5J3/WwCtQ2wDzT1jNc26Z/giTC8g="; 11 + hash = "sha256-dMh6bqlhsp/cWKqiJ9xjVI9yJj2w1ap7agKSnRjadXA="; 12 12 }; 13 13 14 14 hardeningDisable = [ "pic" "format" ];
+3 -1
pkgs/servers/home-assistant/component-packages.nix
··· 4887 4887 ifaddr 4888 4888 psutil-home-assistant 4889 4889 sqlalchemy 4890 + systembridgeconnector 4890 4891 zeroconf 4891 - ]; # missing inputs: systembridgeconnector 4892 + ]; 4892 4893 "system_health" = ps: with ps; [ 4893 4894 aiohttp-cors 4894 4895 aiohttp-fast-url-dispatcher ··· 6490 6491 "syncthing" 6491 6492 "syncthru" 6492 6493 "synology_dsm" 6494 + "system_bridge" 6493 6495 "system_health" 6494 6496 "system_log" 6495 6497 "systemmonitor"
+2 -2
pkgs/servers/home-assistant/custom-lovelace-modules/multiple-entity-row/default.nix
··· 6 6 7 7 mkYarnPackage rec { 8 8 pname = "multiple-entity-row"; 9 - version = "4.5.0"; 9 + version = "4.5.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "benct"; 13 13 repo = "lovelace-multiple-entity-row"; 14 14 rev = "v${version}"; 15 - hash = "sha256-3CkBzxB3bX4jwk71PaRMX1MkAb6UVOBqZCYpTN7VORY="; 15 + hash = "sha256-CXRgXyH1NUg7ssQhenqP0tXr1m2qOkHna3Rf30K3SjI="; 16 16 }; 17 17 18 18 packageJSON = ./package.json;
+1 -1
pkgs/servers/home-assistant/custom-lovelace-modules/multiple-entity-row/package.json
··· 1 1 { 2 2 "name": "multiple-entity-row", 3 - "version": "4.5.0", 3 + "version": "4.5.1", 4 4 "description": "Show multiple entity states, attributes and icons on entity rows in Home Assistant's Lovelace UI", 5 5 "keywords": [ 6 6 "home-assistant",
+25 -8
pkgs/servers/homepage-dashboard/default.nix
··· 9 9 , fetchpatch 10 10 , makeBinaryWrapper 11 11 , nixosTests 12 + , enableLocalIcons ? false 12 13 }: 14 + let 15 + dashboardIcons = fetchFromGitHub { 16 + owner = "walkxcode"; 17 + repo = "dashboard-icons"; 18 + rev = "a02a5999fe56948671721da8b0830cdd5b609ed7"; # Until 2024-02-25 19 + hash = "sha256-s0Doh4j6CH66fZoQKMt4yc7aLStNFGMVoDp5dvs7+pk="; 20 + }; 13 21 22 + installLocalIcons = '' 23 + mkdir -p $out/share/homepage/public/icons 24 + cp ${dashboardIcons}/png/* $out/share/homepage/public/icons 25 + cp ${dashboardIcons}/svg/* $out/share/homepage/public/icons 26 + cp ${dashboardIcons}/LICENSE $out/share/homepage/public/icons/ 27 + ''; 28 + in 14 29 buildNpmPackage rec { 15 30 pname = "homepage-dashboard"; 16 31 version = "0.8.8"; ··· 49 64 installPhase = '' 50 65 runHook preInstall 51 66 52 - mkdir -p $out 53 - cp -r .next/standalone $out/bin 54 - cp -r public $out/bin/public 67 + mkdir -p $out/{share,bin} 55 68 56 - mkdir -p $out/bin/.next 57 - cp -r .next/static $out/bin/.next/static 69 + cp -r .next/standalone $out/share/homepage/ 70 + cp -r public $out/share/homepage/public 58 71 59 - mv $out/bin/server.js $out/bin/homepage 60 - chmod +x $out/bin/homepage 72 + mkdir -p $out/share/homepage/.next 73 + cp -r .next/static $out/share/homepage/.next/static 74 + 75 + chmod +x $out/share/homepage/server.js 61 76 62 - wrapProgram $out/bin/homepage \ 77 + makeWrapper $out/share/homepage/server.js $out/bin/homepage \ 63 78 --set-default PORT 3000 \ 64 79 --set-default HOMEPAGE_CONFIG_DIR /var/lib/homepage-dashboard 80 + 81 + ${if enableLocalIcons then installLocalIcons else ""} 65 82 66 83 runHook postInstall 67 84 '';
+2 -2
pkgs/servers/mail/rspamd/default.nix
··· 27 27 28 28 stdenv.mkDerivation rec { 29 29 pname = "rspamd"; 30 - version = "3.8.2"; 30 + version = "3.8.3"; 31 31 32 32 src = fetchFromGitHub { 33 33 owner = "rspamd"; 34 34 repo = "rspamd"; 35 35 rev = version; 36 - hash = "sha256-02Ykj4qo821iJa4AqS3XfSBm1nqBxRKC2IgTgbdiRss="; 36 + hash = "sha256-LX37HE4xr3tJqAXBDbi2O8N9tt8DazslIfmqG9hNiKw="; 37 37 }; 38 38 39 39 hardeningEnable = [ "pie" ];
+12
pkgs/servers/monitoring/prometheus/statsd-exporter.nix
··· 14 14 hash = "sha256-C7+4v40T667KJHEQ3ebLDg2wJNrxD/nossfT6rMlER8="; 15 15 }; 16 16 17 + ldflags = 18 + let 19 + t = "github.com/prometheus/common/version"; 20 + in 21 + [ "-s" "-w" 22 + "-X ${t}.Version=${version}" 23 + "-X ${t}.Revision=unknown" 24 + "-X ${t}.Branch=unknown" 25 + "-X ${t}.BuildUser=nix@nixpkgs" 26 + "-X ${t}.BuildDate=unknown" 27 + ]; 28 + 17 29 vendorHash = "sha256-scBpRZeECgAtpu9lnkIk1I2c8UmAkEL8LYNPUeUNYto="; 18 30 19 31 meta = with lib; {
+2 -2
pkgs/servers/monitoring/zabbix/agent.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libiconv, openssl, pcre }: 2 2 3 - import ./versions.nix ({ version, sha256, ... }: 3 + import ./versions.nix ({ version, hash, ... }: 4 4 stdenv.mkDerivation { 5 5 pname = "zabbix-agent"; 6 6 inherit version; 7 7 8 8 src = fetchurl { 9 9 url = "https://cdn.zabbix.com/zabbix/sources/stable/${lib.versions.majorMinor version}/zabbix-${version}.tar.gz"; 10 - inherit sha256; 10 + inherit hash; 11 11 }; 12 12 13 13 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/servers/monitoring/zabbix/agent2.nix
··· 1 1 { lib, buildGoModule, fetchurl, autoreconfHook, pkg-config, libiconv, openssl, pcre, zlib }: 2 2 3 - import ./versions.nix ({ version, sha256, vendorHash ? throw "unsupported version ${version} for zabbix-agent2", ... }: 3 + import ./versions.nix ({ version, hash, vendorHash ? throw "unsupported version ${version} for zabbix-agent2", ... }: 4 4 buildGoModule { 5 5 pname = "zabbix-agent2"; 6 6 inherit version; 7 7 8 8 src = fetchurl { 9 9 url = "https://cdn.zabbix.com/zabbix/sources/stable/${lib.versions.majorMinor version}/zabbix-${version}.tar.gz"; 10 - inherit sha256; 10 + inherit hash; 11 11 }; 12 12 13 13 modRoot = "src/go";
+2 -2
pkgs/servers/monitoring/zabbix/proxy.nix
··· 15 15 let 16 16 inherit (lib) optional optionalString; 17 17 in 18 - import ./versions.nix ({ version, sha256, ... }: 18 + import ./versions.nix ({ version, hash, ... }: 19 19 stdenv.mkDerivation { 20 20 pname = "zabbix-proxy"; 21 21 inherit version; 22 22 23 23 src = fetchurl { 24 24 url = "https://cdn.zabbix.com/zabbix/sources/stable/${lib.versions.majorMinor version}/zabbix-${version}.tar.gz"; 25 - inherit sha256; 25 + inherit hash; 26 26 }; 27 27 28 28 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/servers/monitoring/zabbix/server.nix
··· 16 16 let 17 17 inherit (lib) optional optionalString; 18 18 in 19 - import ./versions.nix ({ version, sha256, ... }: 19 + import ./versions.nix ({ version, hash, ... }: 20 20 stdenv.mkDerivation { 21 21 pname = "zabbix-server"; 22 22 inherit version; 23 23 24 24 src = fetchurl { 25 25 url = "https://cdn.zabbix.com/zabbix/sources/stable/${lib.versions.majorMinor version}/zabbix-${version}.tar.gz"; 26 - inherit sha256; 26 + inherit hash; 27 27 }; 28 28 29 29 nativeBuildInputs = [ autoreconfHook pkg-config ];
+5 -5
pkgs/servers/monitoring/zabbix/versions.nix
··· 1 1 generic: { 2 2 v60 = generic { 3 - version = "6.0.21"; 4 - sha256 = "sha256-hdKPI5UEQvF/URH2eLWW32az3LMEse3UXIELOsfvwzk="; 3 + version = "6.0.26"; 4 + hash = "sha256-MIOKe5hqfDecB1oWZKzbFmJCsQLuAGtp21l2WxxVG+g="; 5 5 vendorHash = null; 6 6 }; 7 7 8 8 v50 = generic { 9 - version = "5.0.37"; 10 - sha256 = "sha256-+C5fI+eMJKsynVnVJIYj27x1iFQwaG9Fnho0BXgENQI="; 11 - vendorHash = "sha256-oSZBzIUL1yHXk7PnkSAlhI0i89aGMFrFHmbMN9rDAJ0="; 9 + version = "5.0.41"; 10 + hash = "sha256-pPvw0lPoK1IpsXc5c8Qu9zFhx2oHJz2bwiX80vrYa58="; 11 + vendorHash = "sha256-qLDoNnEFiSrWXbLtYlmQaqY8Rv6JaG8WbMYBlry5Evc="; 12 12 }; 13 13 }
+2 -2
pkgs/servers/monitoring/zabbix/web.nix
··· 1 1 { lib, stdenv, fetchurl, writeText }: 2 2 3 - import ./versions.nix ({ version, sha256, ... }: 3 + import ./versions.nix ({ version, hash, ... }: 4 4 stdenv.mkDerivation rec { 5 5 pname = "zabbix-web"; 6 6 inherit version; 7 7 8 8 src = fetchurl { 9 9 url = "https://cdn.zabbix.com/zabbix/sources/stable/${lib.versions.majorMinor version}/zabbix-${version}.tar.gz"; 10 - inherit sha256; 10 + inherit hash; 11 11 }; 12 12 13 13 phpConfig = writeText "zabbix.conf.php" ''
+4 -2
pkgs/servers/sql/postgresql/ext/pg_net.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pg_net"; 5 - version = "0.7.3"; 5 + version = "0.8.0"; 6 6 7 7 buildInputs = [ curl postgresql ]; 8 8 ··· 10 10 owner = "supabase"; 11 11 repo = pname; 12 12 rev = "refs/tags/v${version}"; 13 - hash = "sha256-j5qLgn/i4ljysuwgT46579N+9VpGr483vQEX/3lUYFA="; 13 + hash = "sha256-ZPsRPWV1G3lMM2mT+H139Wvgoy8QnmeUbzEnGeDJmZA="; 14 14 }; 15 + 16 + env.NIX_CFLAGS_COMPILE = "-Wno-error"; 15 17 16 18 installPhase = '' 17 19 mkdir -p $out/{lib,share/postgresql/extension}
+2 -2
pkgs/servers/tang/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "tang"; 21 - version = "14"; 21 + version = "15"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "latchset"; 25 25 repo = "tang"; 26 26 rev = "refs/tags/v${version}"; 27 - hash = "sha256-QKURKb2g71pZvuZlJk3Rc26H3oU0WSkjgQtJQLrYGbw="; 27 + hash = "sha256-nlC2hdNzQZrfirjS2gX4oFp2OD1OdxmLsN03hfxD3ug="; 28 28 }; 29 29 30 30 nativeBuildInputs = [
+5 -3
pkgs/servers/web-apps/changedetection-io/default.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "changedetection-io"; 8 - version = "0.45.9"; 8 + version = "0.45.14"; 9 9 format = "setuptools"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "dgtlmoon"; 13 13 repo = "changedetection.io"; 14 14 rev = version; 15 - hash = "sha256-xiKXp9DBaiSteqZwQLZ4zLwT5MeETJx01rKRrWGYioc="; 15 + hash = "sha256-O+kWivVc/FZmIDjOE/fsUccrOyHrQ8GakjulEnm4w88="; 16 16 }; 17 17 18 18 postPatch = '' 19 19 substituteInPlace requirements.txt \ 20 - --replace "apprise~=1.6.0" "apprise" \ 20 + --replace "apprise~=1.7.1" "apprise" \ 21 21 --replace "cryptography~=3.4" "cryptography" \ 22 22 --replace "dnspython~=2.4" "dnspython" \ 23 23 --replace "pytest ~=7.2" "" \ ··· 47 47 jinja2-time 48 48 jsonpath-ng 49 49 jq 50 + loguru 50 51 lxml 51 52 paho-mqtt 52 53 pillow ··· 76 77 changelog = "https://github.com/dgtlmoon/changedetection.io/releases/tag/${version}"; 77 78 license = licenses.asl20; 78 79 maintainers = with maintainers; [ mikaelfangel ]; 80 + mainProgram = "changedetection.io"; 79 81 }; 80 82 }
+5
pkgs/tools/audio/audiowaveform/default.nix
··· 11 11 sha256 = "sha256-FcQq0xWs3jH2MfhFQ5r5Vaz8B3akBHBSg8Z/k9An/Wg="; 12 12 }; 13 13 14 + cmakeFlags = [ 15 + # gtest no longer supports C++11. 16 + "-DCMAKE_CXX_STANDARD=14" 17 + ]; 18 + 14 19 nativeBuildInputs = [ cmake gtest ]; 15 20 16 21 buildInputs = [ boost gd libsndfile libmad libid3tag ];
+2 -2
pkgs/tools/audio/whisper-ctranslate2/default.nix
··· 5 5 }: 6 6 let 7 7 pname = "whisper-ctranslate2"; 8 - version = "0.3.9"; 8 + version = "0.4.1"; 9 9 in 10 10 python3.pkgs.buildPythonApplication { 11 11 inherit pname version; ··· 17 17 owner = "Softcatala"; 18 18 repo = "whisper-ctranslate2"; 19 19 rev = version; 20 - hash = "sha256-dm8LPcAVxEvhFDEkZcFXFZLfEZTtKzTqBqWKfXbXn5Q="; 20 + hash = "sha256-kFln/AqKjnEK5L9hOqGpyoRjNG+dagBIGrmq2C+OZOY="; 21 21 }; 22 22 23 23 propagatedBuildInputs = with python3.pkgs; [
+7 -3
pkgs/tools/backup/borgmatic/default.nix
··· 13 13 14 14 python3Packages.buildPythonApplication rec { 15 15 pname = "borgmatic"; 16 - version = "1.8.1"; 16 + version = "1.8.8"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "sha256-XbihTQJtoiRRfwjMCP+XEPmbt7//zFPx1fIWOvn92Nc="; 20 + sha256 = "sha256-dPWp8SH4//HJlCrF6YRaMb32idox1E0/Gd8qc/GmP4c="; 21 21 }; 22 22 23 - nativeCheckInputs = with python3Packages; [ flexmock pytestCheckHook pytest-cov ]; 23 + nativeCheckInputs = with python3Packages; [ flexmock pytestCheckHook pytest-cov ] ++ passthru.optional-dependencies.apprise; 24 24 25 25 # - test_borgmatic_version_matches_news_version 26 26 # The file NEWS not available on the pypi source, and this test is useless ··· 39 39 requests 40 40 setuptools 41 41 ]; 42 + 43 + passthru.optional-dependencies = { 44 + apprise = with python3Packages; [ apprise ]; 45 + }; 42 46 43 47 postInstall = '' 44 48 installShellCompletion --cmd borgmatic \
+2 -1
pkgs/tools/misc/esphome/default.nix
··· 59 59 colorama 60 60 cryptography 61 61 esphome-dashboard 62 + icmplib 62 63 kconfiglib 63 - icmplib 64 + packaging 64 65 paho-mqtt 65 66 pillow 66 67 platformio
+3 -3
pkgs/tools/misc/faketty/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "faketty"; 5 - version = "1.0.14"; 5 + version = "1.0.15"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - hash = "sha256-oma8Vmp1AMmEGyZG8i/ztiyYH0RrLZ/l/vXgPJs+5o0="; 9 + hash = "sha256-f32Y9Aj4Z9y6Da9rbRgwi9BGPl4FsI790BH52cIIoPA="; 10 10 }; 11 11 12 - cargoHash = "sha256-+gojthIR5WMSjN1gCUyN0cKHWYBKBezsckVZJD7JncM="; 12 + cargoHash = "sha256-+M1oq2CHUK6CIDFiUNLjO1UmHI19D5zdHVl8dvmQ1G8="; 13 13 14 14 postPatch = '' 15 15 patchShebangs tests/test.sh
+5 -5
pkgs/tools/misc/fend/default.nix
··· 16 16 17 17 rustPlatform.buildRustPackage rec { 18 18 pname = "fend"; 19 - version = "1.4.0"; 19 + version = "1.4.3"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "printfn"; 23 - repo = pname; 23 + repo = "fend"; 24 24 rev = "v${version}"; 25 - sha256 = "sha256-s6b15FhVfEwsHtVt4bhd6LDxl/WW1PXlUrH2XFOTT5E="; 25 + hash = "sha256-X96r5wN5eq1PZD/JGqnG/0kg6PYEdnj5h9zc+GXQjQM="; 26 26 }; 27 27 28 - cargoHash = "sha256-Ilsv0mo7/4eEdRH3jWZXdF4LSYYdWr6gCvnMMAZn5j0="; 28 + cargoHash = "sha256-UIZs45OQ1j57VEb6g4P0AwjmEsjMt0am5FUXXDODaWI="; 29 29 30 30 nativeBuildInputs = [ pandoc installShellFiles copyDesktopItems ]; 31 31 buildInputs = lib.optionals stdenv.isDarwin [ darwin.apple_sdk.frameworks.Security ]; ··· 46 46 ''; 47 47 48 48 postInstall = '' 49 - install -D -m 444 $src/icon/fend-icon-256.png $out/share/icons/hicolor/256x256/apps/fend.png 49 + install -D -m 444 $src/icon/icon.svg $out/share/icons/hicolor/scalable/apps/fend.svg 50 50 ''; 51 51 52 52 desktopItems = [
+3 -3
pkgs/tools/misc/tagref/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "tagref"; 5 - version = "1.9.0"; 5 + version = "1.9.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "stepchowfun"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-SPmpQR4RMimU6RnljmqV9z0WvDRZkc+Y+C32BnNmK/E="; 11 + sha256 = "sha256-4F9u1wzeBgYP3L6h08xMvgq62ix/SOaFaLl7uEf1j1c="; 12 12 }; 13 13 14 - cargoHash = "sha256-VufTLK1LDQlIiNNsV9q24sHTmcT1Y7bCnhIXPRvuRAU="; 14 + cargoHash = "sha256-AO6BGevCoLCH4vpyrXrgF3FrjUa3lHA7ynXfk4KKigM="; 15 15 16 16 meta = with lib; { 17 17 description = "Manage cross-references in your code";
+3 -3
pkgs/tools/misc/xq/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "xq"; 8 - version = "0.3.0"; 8 + version = "0.3.1"; 9 9 10 10 src = fetchCrate { 11 11 inherit pname version; 12 - sha256 = "sha256-mgvs3/gseLnFtAciW5txtYqo+8DyyQC7y/tN1kDqcb4="; 12 + sha256 = "sha256-KR5gjRJH392s7Ue0F26slj4sRosFAAAahf6up+yOQno="; 13 13 }; 14 14 15 - cargoHash = "sha256-lSyJqGWlk3ldgAkyebuyUDLp8mJdwnw8ee6ZHQXU2Y4="; 15 + cargoHash = "sha256-eL7VFLRfRVF2seWgHLWGudsTt5u+JcnNrJiD7K47EPA="; 16 16 17 17 meta = with lib; { 18 18 description = "Pure rust implementation of jq";
+3 -3
pkgs/tools/networking/ddns-go/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "ddns-go"; 8 - version = "6.0.3"; 8 + version = "6.1.2"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "jeessy2"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - hash = "sha256-hfL4heW2p1JdNEAQqsRMmvXSeBkw/zWfXk0YPXyqLXk="; 14 + hash = "sha256-OKQRcYG3t7sU/HSmnkViWWm1is0fhrb6nyh8ahl/l6U="; 15 15 }; 16 16 17 - vendorHash = "sha256-UsMeYI/YogTbwyaJjVZbGMbxa434BDRBF+5VoSk6G9k="; 17 + vendorHash = "sha256-VCp+seFaYXElQmktYlWm+nW4gNwNocOVm7T+M6+AdNg="; 18 18 19 19 ldflags = [ 20 20 "-X main.version=${version}"
+1 -1
pkgs/tools/security/metasploit/Gemfile
··· 1 1 # frozen_string_literal: true 2 2 source "https://rubygems.org" 3 3 4 - gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.3.56" 4 + gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.3.57"
+5 -5
pkgs/tools/security/metasploit/Gemfile.lock
··· 1 1 GIT 2 2 remote: https://github.com/rapid7/metasploit-framework 3 - revision: ff8298ede09a5e825d5d53775f36d60cd4110f17 4 - ref: refs/tags/6.3.56 3 + revision: e01334b3bd267539df650f14627231fb8e4bc21d 4 + ref: refs/tags/6.3.57 5 5 specs: 6 - metasploit-framework (6.3.56) 6 + metasploit-framework (6.3.57) 7 7 actionpack (~> 7.0.0) 8 8 activerecord (~> 7.0.0) 9 9 activesupport (~> 7.0.0) ··· 35 35 metasploit-concern 36 36 metasploit-credential 37 37 metasploit-model 38 - metasploit-payloads (= 2.0.165) 38 + metasploit-payloads (= 2.0.166) 39 39 metasploit_data_models 40 40 metasploit_payloads-mettle (= 1.0.26) 41 41 mqtt ··· 254 254 activemodel (~> 7.0) 255 255 activesupport (~> 7.0) 256 256 railties (~> 7.0) 257 - metasploit-payloads (2.0.165) 257 + metasploit-payloads (2.0.166) 258 258 metasploit_data_models (6.0.3) 259 259 activerecord (~> 7.0) 260 260 activesupport (~> 7.0)
+2 -2
pkgs/tools/security/metasploit/default.nix
··· 15 15 }; 16 16 in stdenv.mkDerivation rec { 17 17 pname = "metasploit-framework"; 18 - version = "6.3.56"; 18 + version = "6.3.57"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "rapid7"; 22 22 repo = "metasploit-framework"; 23 23 rev = "refs/tags/${version}"; 24 - hash = "sha256-BF/8+Quu8heS+VKn5ciHfZLTAmoliO25O4BccQBj4bE="; 24 + hash = "sha256-MToWengiF4dacD6E0byZENNMh408d3YJ18sn93nEksI="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+5 -5
pkgs/tools/security/metasploit/gemset.nix
··· 664 664 platforms = []; 665 665 source = { 666 666 fetchSubmodules = false; 667 - rev = "ff8298ede09a5e825d5d53775f36d60cd4110f17"; 668 - sha256 = "1cg1cc072p407fwyv215d81d74kxhz4fb9sjz691gwmf1gwzqpq4"; 667 + rev = "e01334b3bd267539df650f14627231fb8e4bc21d"; 668 + sha256 = "1hljqiwzf9ybsw4pcxrwin3lrlqhk6yd311yf1d8f5r2g1x1cfii"; 669 669 type = "git"; 670 670 url = "https://github.com/rapid7/metasploit-framework"; 671 671 }; 672 - version = "6.3.56"; 672 + version = "6.3.57"; 673 673 }; 674 674 metasploit-model = { 675 675 groups = ["default"]; ··· 686 686 platforms = []; 687 687 source = { 688 688 remotes = ["https://rubygems.org"]; 689 - sha256 = "0v9vr3iklxm53vfkyiqja8a942n8r0a49w9rmvk9ql4h3r5xcgpw"; 689 + sha256 = "0f8grdgqn9y8wc61k111zlap5vqjika56k4vabkwglljs5bv44nk"; 690 690 type = "gem"; 691 691 }; 692 - version = "2.0.165"; 692 + version = "2.0.166"; 693 693 }; 694 694 metasploit_data_models = { 695 695 groups = ["default"];
+2 -2
pkgs/tools/security/trufflehog/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "trufflehog"; 10 - version = "3.68.1"; 10 + version = "3.68.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "trufflesecurity"; 14 14 repo = "trufflehog"; 15 15 rev = "refs/tags/v${version}"; 16 - hash = "sha256-KHMQnAI0t532YGOh7jtuuLCfRrXkzPuWOBEWaJ45HCs="; 16 + hash = "sha256-6gQoyVlLE+cXYwh8lTkL2giDhd3ETgETjT3XuEOwOU8="; 17 17 }; 18 18 19 19 vendorHash = "sha256-D58WqqDwQo7fRubkGNRhD6g9ooKS9peb2qJJDRXgLtk=";
+3 -3
pkgs/tools/text/csview/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "csview"; 5 - version = "1.2.2"; 5 + version = "1.2.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "wfxr"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-pv0zCtVHTjzkXK5EZhu6jviMJF0p9dvAuYcA6khiIos="; 11 + sha256 = "sha256-O6IJGfJwGdtxLyUTFNHp9rGy05gVLlQTS8bTRsSYIuY="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-uMBwEbxI8hjoFMlH+oquHvKdyLUC9bnO5uMFHkyZjgY="; 14 + cargoHash = "sha256-jwkoyvelxl2lJoOHznZDmd39GJMye/+vi7PjrzjlLk4="; 15 15 16 16 meta = with lib; { 17 17 description = "A high performance csv viewer with cjk/emoji support";
+45
pkgs/top-level/ada-packages.nix
··· 1 + { lib 2 + , pkgs 3 + , makeScopeWithSplicing' 4 + , generateSplicesForMkScope 5 + , gnat 6 + }: 7 + let 8 + gnat_version = lib.versions.major gnat.version; 9 + in 10 + makeScopeWithSplicing' { 11 + otherSplices = generateSplicesForMkScope ("gnat" + gnat_version + "Packages"); 12 + f = (self: { 13 + inherit gnat; 14 + 15 + gprbuild-boot = self.callPackage ../development/ada-modules/gprbuild/boot.nix { }; 16 + gprbuild = self.callPackage ../development/ada-modules/gprbuild { }; 17 + 18 + xmlada = self.callPackage ../development/ada-modules/xmlada { }; 19 + 20 + gnatprove = self.callPackage ../development/ada-modules/gnatprove { 21 + ocamlPackages = pkgs.ocaml-ng.ocamlPackages_4_14; 22 + }; 23 + 24 + gnatcoll-core = self.callPackage ../development/ada-modules/gnatcoll/core.nix { }; 25 + 26 + # gnatcoll-bindings repository 27 + gnatcoll-gmp = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "gmp"; }; 28 + gnatcoll-iconv = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "iconv"; }; 29 + gnatcoll-lzma = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "lzma"; }; 30 + gnatcoll-omp = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "omp"; }; 31 + gnatcoll-python3 = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "python3"; python3 = pkgs.python39; }; 32 + gnatcoll-readline = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "readline"; }; 33 + gnatcoll-syslog = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "syslog"; }; 34 + gnatcoll-zlib = self.callPackage ../development/ada-modules/gnatcoll/bindings.nix { component = "zlib"; }; 35 + 36 + # gnatcoll-db repository 37 + gnatcoll-postgres = self.callPackage ../development/ada-modules/gnatcoll/db.nix { component = "postgres"; }; 38 + gnatcoll-sql = self.callPackage ../development/ada-modules/gnatcoll/db.nix { component = "sql"; }; 39 + gnatcoll-sqlite = self.callPackage ../development/ada-modules/gnatcoll/db.nix { component = "sqlite"; }; 40 + gnatcoll-xref = self.callPackage ../development/ada-modules/gnatcoll/db.nix { component = "xref"; }; 41 + gnatcoll-db2ada = self.callPackage ../development/ada-modules/gnatcoll/db.nix { component = "gnatcoll_db2ada"; }; 42 + gnatinspect = self.callPackage ../development/ada-modules/gnatcoll/db.nix { component = "gnatinspect"; }; 43 + }); 44 + } 45 +
+18 -1
pkgs/top-level/aliases.nix
··· 349 349 gnatboot11 = gnat-bootstrap11; 350 350 gnatboot12 = gnat-bootstrap12; 351 351 gnatboot = gnat-bootstrap; 352 + gnatcoll-core = gnatPackages.gnatcoll-core; # Added 2024-02-25 353 + gnatcoll-gmp = gnatPackages.gnatcoll-gmp; # Added 2024-02-25 354 + gnatcoll-iconv = gnatPackages.gnatcoll-iconv; # Added 2024-02-25 355 + gnatcoll-lzma = gnatPackages.gnatcoll-lzma; # Added 2024-02-25 356 + gnatcoll-omp = gnatPackages.gnatcoll-omp; # Added 2024-02-25 357 + gnatcoll-python3 = gnatPackages.gnatcoll-python3; # Added 2024-02-25 358 + gnatcoll-readline = gnatPackages.gnatcoll-readline; # Added 2024-02-25 359 + gnatcoll-syslog = gnatPackages.gnatcoll-syslog; # Added 2024-02-25 360 + gnatcoll-zlib = gnatPackages.gnatcoll-zlib; # Added 2024-02-25 361 + gnatcoll-postgres = gnatPackages.gnatcoll-postgres; # Added 2024-02-25 362 + gnatcoll-sql = gnatPackages.gnatcoll-sql; # Added 2024-02-25 363 + gnatcoll-sqlite = gnatPackages.gnatcoll-sqlite; # Added 2024-02-25 364 + gnatcoll-xref = gnatPackages.gnatcoll-xref; # Added 2024-02-25 365 + gnatcoll-db2ada = gnatPackages.gnatcoll-db2ada; # Added 2024-02-25 366 + gnatinspect = gnatPackages.gnatinspect; # Added 2024-02-25 352 367 gnome-firmware-updater = gnome-firmware; # added 2022-04-14 353 368 gnome-passwordsafe = gnome-secrets; # added 2022-01-30 354 369 gnome-mpv = throw "'gnome-mpv' has been renamed to/replaced by 'celluloid'"; # Converted to throw 2023-09-10 ··· 393 408 gocode = throw "'gocode' has been removed as the upstream project was archived. 'gopls' is suggested as replacement"; # Added 2023-12-26 394 409 govendor = throw "'govendor' has been removed as it is no longer maintained upstream, please use Go modules instead"; # Added 2023-12-26 395 410 gometer = throw "gometer has been removed from nixpkgs because goLance stopped offering Linux support"; # Added 2023-02-10 396 - 411 + gprbuild-boot = gnatPackages.gprbuild-boot; # Added 2024-02-25; 397 412 graalvm11-ce = throw "graalvm11-ce has been removed because upstream dropped support to different JDK versions for each GraalVM release. Please use graalvm-ce instead"; # Added 2023-09-26 398 413 graalvm17-ce = throw "graalvm17-ce has been removed because upstream dropped support to different JDK versions for each GraalVM release. Please use graalvm-ce instead"; # Added 2023-09-26 399 414 graalvm19-ce = throw "graalvm19-ce has been removed because upstream dropped support to different JDK versions for each GraalVM release. Please use graalvm-ce instead"; # Added 2023-09-26 ··· 1016 1031 spark2 = throw "'spark2' is no longer supported nixpkgs, please use 'spark'"; # Added 2023-05-08 1017 1032 spark_2_4 = throw "'spark_2_4' is no longer supported nixpkgs, please use 'spark'"; # Added 2023-05-08 1018 1033 spark_3_1 = throw "'spark_3_1' is no longer supported nixpkgs, please use 'spark'"; # Added 2023-05-08 1034 + spark2014 = gnatprove; # Added 2024-02-25 1019 1035 1020 1036 # Added 2020-02-10 1021 1037 sourceHanSansPackages = { ··· 1173 1189 xdg_utils = xdg-utils; # Added 2021-02-01 1174 1190 xineLib = xine-lib; # Added 2021-04-27 1175 1191 xineUI = xine-ui; # Added 2021-04-27 1192 + xmlada = gnatPackages.xmlada; # Added 2024-02-25 1176 1193 xonsh-unwrapped = throw "'xonsh-unwrapped' was incorporated into xonsh code; call xonsh directly instead."; # Added 2024-01-20 1177 1194 xtrt = throw "xtrt has been removed due to being abandoned"; # Added 2023-05-25 1178 1195 xulrunner = firefox-unwrapped; # Added 2023-11-03
+10 -41
pkgs/top-level/all-packages.nix
··· 2338 2338 }; 2339 2339 2340 2340 git-cliff = callPackage ../applications/version-management/git-cliff { 2341 - inherit (darwin.apple_sdk.frameworks) Security; 2341 + inherit (darwin.apple_sdk.frameworks) Security SystemConfiguration; 2342 2342 }; 2343 2343 2344 2344 git-codeowners = callPackage ../applications/version-management/git-codeowners { }; ··· 16005 16005 inherit (gnome2) libart_lgpl; 16006 16006 }); 16007 16007 16008 - gnat = gnat12; 16008 + gnat = gnat12; # When changing this, update also gnatPackages 16009 16009 16010 16010 gnat11 = wrapCC (gcc11.cc.override { 16011 16011 name = "gnat"; ··· 16076 16076 } // lib.optionalAttrs (stdenv.hostPlatform.isDarwin) { 16077 16077 bintools = bintoolsDualAs; 16078 16078 }); 16079 + 16080 + gnat12Packages = recurseIntoAttrs (callPackage ./ada-packages.nix { gnat = buildPackages.gnat12; }); 16081 + gnat13Packages = recurseIntoAttrs (callPackage ./ada-packages.nix { gnat = buildPackages.gnat13; }); 16082 + gnatPackages = gnat12Packages; 16083 + 16084 + inherit (gnatPackages) 16085 + gprbuild 16086 + gnatprove; 16079 16087 16080 16088 gnu-smalltalk = callPackage ../development/compilers/gnu-smalltalk { }; 16081 16089 ··· 17934 17942 17935 17943 sparkleshare = callPackage ../applications/version-management/sparkleshare { }; 17936 17944 17937 - spark2014 = callPackage ../development/libraries/ada/spark2014 { 17938 - ocamlPackages = ocaml-ng.ocamlPackages_4_14; 17939 - }; 17940 - 17941 17945 spidermonkey_78 = callPackage ../development/interpreters/spidermonkey/78.nix { 17942 17946 inherit (darwin) libobjc; 17943 17947 }; ··· 19121 19125 19122 19126 global = callPackage ../development/tools/misc/global { }; 19123 19127 19124 - gnatcoll-db2ada = callPackage ../development/libraries/ada/gnatcoll/db.nix { 19125 - component = "gnatcoll_db2ada"; 19126 - }; 19127 - 19128 - gnatinspect = callPackage ../development/libraries/ada/gnatcoll/db.nix { 19129 - component = "gnatinspect"; 19130 - }; 19131 - 19132 19128 gnome-doc-utils = callPackage ../development/tools/documentation/gnome-doc-utils { }; 19133 19129 19134 19130 gnome-desktop-testing = callPackage ../development/tools/gnome-desktop-testing { }; ··· 19173 19169 19174 19170 gotty = callPackage ../servers/gotty { }; 19175 19171 19176 - gprbuild-boot = callPackage ../development/tools/build-managers/gprbuild/boot.nix { }; 19177 - 19178 - gprbuild = callPackage ../development/tools/build-managers/gprbuild { }; 19179 - 19180 19172 gputils = callPackage ../development/embedded/gputils { }; 19181 19173 19182 19174 gpuvis = callPackage ../development/tools/misc/gpuvis { }; ··· 21581 21573 mpir = callPackage ../development/libraries/mpir { }; 21582 21574 21583 21575 gl3w = callPackage ../development/libraries/gl3w { }; 21584 - 21585 - gnatcoll-core = callPackage ../development/libraries/ada/gnatcoll/core.nix { }; 21586 - 21587 - # gnatcoll-bindings repository 21588 - gnatcoll-gmp = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "gmp"; }; 21589 - gnatcoll-iconv = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "iconv"; }; 21590 - gnatcoll-lzma = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "lzma"; }; 21591 - gnatcoll-omp = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "omp"; }; 21592 - gnatcoll-python3 = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { 21593 - component = "python3"; 21594 - python3 = python39; 21595 - }; 21596 - gnatcoll-readline = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "readline"; }; 21597 - gnatcoll-syslog = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "syslog"; }; 21598 - gnatcoll-zlib = callPackage ../development/libraries/ada/gnatcoll/bindings.nix { component = "zlib"; }; 21599 - 21600 - # gnatcoll-db repository 21601 - gnatcoll-postgres = callPackage ../development/libraries/ada/gnatcoll/db.nix { component = "postgres"; }; 21602 - gnatcoll-sql = callPackage ../development/libraries/ada/gnatcoll/db.nix { component = "sql"; }; 21603 - gnatcoll-sqlite = callPackage ../development/libraries/ada/gnatcoll/db.nix { component = "sqlite"; }; 21604 - gnatcoll-xref = callPackage ../development/libraries/ada/gnatcoll/db.nix { component = "xref"; }; 21605 21576 21606 21577 gns3Packages = dontRecurseIntoAttrs (callPackage ../applications/networking/gns3 { }); 21607 21578 gns3-gui = gns3Packages.guiStable; ··· 25497 25468 xgeometry-select = callPackage ../tools/X11/xgeometry-select { }; 25498 25469 25499 25470 xmake-core-sv = callPackage ../development/libraries/xmake-core-sv { }; 25500 - 25501 - xmlada = callPackage ../development/libraries/ada/xmlada { }; 25502 25471 25503 25472 xmlrpc_c = callPackage ../development/libraries/xmlrpc-c { }; 25504 25473
+6
pkgs/top-level/python-packages.nix
··· 8952 8952 8953 8953 oras = callPackage ../development/python-modules/oras { }; 8954 8954 8955 + orbax-checkpoint = callPackage ../development/python-modules/orbax-checkpoint { }; 8956 + 8955 8957 orderedmultidict = callPackage ../development/python-modules/orderedmultidict { }; 8956 8958 8957 8959 ordered-set = callPackage ../development/python-modules/ordered-set { }; ··· 14221 14223 syslog-rfc5424-formatter = callPackage ../development/python-modules/syslog-rfc5424-formatter { }; 14222 14224 14223 14225 systembridge = callPackage ../development/python-modules/systembridge { }; 14226 + 14227 + systembridgeconnector = callPackage ../development/python-modules/systembridgeconnector { }; 14228 + 14229 + systembridgemodels = callPackage ../development/python-modules/systembridgemodels { }; 14224 14230 14225 14231 systemd = callPackage ../development/python-modules/systemd { 14226 14232 inherit (pkgs) systemd;