Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
72bb5faa 425f395a

+1063 -270
+6
maintainers/maintainer-list.nix
··· 1417 githubId = 12958979; 1418 name = "Mika Naylor"; 1419 }; 1420 avaq = { 1421 email = "nixpkgs@account.avaq.it"; 1422 github = "Avaq";
··· 1417 githubId = 12958979; 1418 name = "Mika Naylor"; 1419 }; 1420 + avakhrenev = { 1421 + email = "avakhrenev@gmail.com"; 1422 + github = "avakhrenev"; 1423 + githubId = 1060224; 1424 + name = "Alexey Vakhrenev"; 1425 + }; 1426 avaq = { 1427 email = "nixpkgs@account.avaq.it"; 1428 github = "Avaq";
+1
nixos/modules/config/no-x-libs.nix
··· 67 stoken = super.stoken.override { withGTK3 = false; }; 68 # translateManpages -> perlPackages.po4a -> texlive-combined-basic -> texlive-core-big -> libX11 69 util-linux = super.util-linux.override { translateManpages = false; }; 70 zbar = super.zbar.override { enableVideo = false; withXorg = false; }; 71 })); 72 };
··· 67 stoken = super.stoken.override { withGTK3 = false; }; 68 # translateManpages -> perlPackages.po4a -> texlive-combined-basic -> texlive-core-big -> libX11 69 util-linux = super.util-linux.override { translateManpages = false; }; 70 + vim-full = super.vim-full.override { guiSupport = false; }; 71 zbar = super.zbar.override { enableVideo = false; withXorg = false; }; 72 })); 73 };
+51 -29
nixos/modules/system/boot/systemd/repart.nix
··· 1 { config, pkgs, lib, ... }: 2 3 let 4 - cfg = config.boot.initrd.systemd.repart; 5 6 writeDefinition = name: partitionConfig: pkgs.writeText 7 "${name}.conf" ··· 24 ''; 25 in 26 { 27 - options.boot.initrd.systemd.repart = { 28 - enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // { 29 description = lib.mdDoc '' 30 - Grow and add partitions to a partition table a boot time in the initrd. 31 systemd-repart only works with GPT partition tables. 32 ''; 33 }; 34 35 - partitions = lib.mkOption { 36 - type = with lib.types; attrsOf (attrsOf (oneOf [ str int bool ])); 37 - default = { }; 38 - example = { 39 - "10-root" = { 40 - Type = "root"; 41 - }; 42 - "20-home" = { 43 - Type = "home"; 44 - SizeMinBytes = "512M"; 45 - SizeMaxBytes = "2G"; 46 }; 47 }; 48 - description = lib.mdDoc '' 49 - Specify partitions as a set of the names of the definition files as the 50 - key and the partition configuration as its value. The partition 51 - configuration can use all upstream options. See <link 52 - xlink:href="https://www.freedesktop.org/software/systemd/man/repart.d.html"/> 53 - for all available options. 54 - ''; 55 }; 56 }; 57 58 - config = lib.mkIf cfg.enable { 59 - # Link the definitions into /etc so that they are included in the 60 - # /nix/store of the sysroot. This also allows the user to run the 61 - # systemd-repart binary after activation manually while automatically 62 - # picking up the definition files. 63 environment.etc."repart.d".source = definitionsDirectory; 64 65 - boot.initrd.systemd = { 66 additionalUpstreamUnits = [ 67 "systemd-repart.service" 68 ]; ··· 73 74 # Override defaults in upstream unit. 75 services.systemd-repart = { 76 - # Unset the coniditions as they cannot be met before activation because 77 # the definition files are not stored in the expected locations. 78 unitConfig.ConditionDirectoryNotEmpty = [ 79 " " # required to unset the previous value. ··· 97 after = [ "sysroot.mount" ]; 98 }; 99 }; 100 }; 101 }
··· 1 { config, pkgs, lib, ... }: 2 3 let 4 + cfg = config.systemd.repart; 5 + initrdCfg = config.boot.initrd.systemd.repart; 6 7 writeDefinition = name: partitionConfig: pkgs.writeText 8 "${name}.conf" ··· 25 ''; 26 in 27 { 28 + options = { 29 + boot.initrd.systemd.repart.enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // { 30 description = lib.mdDoc '' 31 + Grow and add partitions to a partition table at boot time in the initrd. 32 systemd-repart only works with GPT partition tables. 33 + 34 + To run systemd-repart after the initrd, see 35 + `options.systemd.repart.enable`. 36 ''; 37 }; 38 39 + systemd.repart = { 40 + enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // { 41 + description = lib.mdDoc '' 42 + Grow and add partitions to a partition table. 43 + systemd-repart only works with GPT partition tables. 44 + 45 + To run systemd-repart while in the initrd, see 46 + `options.boot.initrd.systemd.repart.enable`. 47 + ''; 48 + }; 49 + 50 + partitions = lib.mkOption { 51 + type = with lib.types; attrsOf (attrsOf (oneOf [ str int bool ])); 52 + default = { }; 53 + example = { 54 + "10-root" = { 55 + Type = "root"; 56 + }; 57 + "20-home" = { 58 + Type = "home"; 59 + SizeMinBytes = "512M"; 60 + SizeMaxBytes = "2G"; 61 + }; 62 }; 63 + description = lib.mdDoc '' 64 + Specify partitions as a set of the names of the definition files as the 65 + key and the partition configuration as its value. The partition 66 + configuration can use all upstream options. See <link 67 + xlink:href="https://www.freedesktop.org/software/systemd/man/repart.d.html"/> 68 + for all available options. 69 + ''; 70 }; 71 }; 72 }; 73 74 + config = lib.mkIf (cfg.enable || initrdCfg.enable) { 75 + # Always link the definitions into /etc so that they are also included in 76 + # the /nix/store of the sysroot during early userspace (i.e. while in the 77 + # initrd). 78 environment.etc."repart.d".source = definitionsDirectory; 79 80 + boot.initrd.systemd = lib.mkIf initrdCfg.enable { 81 additionalUpstreamUnits = [ 82 "systemd-repart.service" 83 ]; ··· 88 89 # Override defaults in upstream unit. 90 services.systemd-repart = { 91 + # Unset the conditions as they cannot be met before activation because 92 # the definition files are not stored in the expected locations. 93 unitConfig.ConditionDirectoryNotEmpty = [ 94 " " # required to unset the previous value. ··· 112 after = [ "sysroot.mount" ]; 113 }; 114 }; 115 + 116 + systemd = lib.mkIf cfg.enable { 117 + additionalUpstreamSystemUnits = [ 118 + "systemd-repart.service" 119 + ]; 120 + }; 121 }; 122 + 123 }
+9 -2
nixos/modules/virtualisation/podman/default.nix
··· 9 extraPackages = cfg.extraPackages 10 # setuid shadow 11 ++ [ "/run/wrappers" ] 12 - # include pkgs.zfs by default in the wrapped podman used by the module so it is cached 13 - ++ (if (builtins.elem "zfs" config.boot.supportedFilesystems) then [ config.boot.zfs.package ] else [ pkgs.zfs ]); 14 }); 15 16 # Provides a fake "docker" binary mapping to podman ··· 184 185 systemd.packages = [ cfg.package ]; 186 187 systemd.services.podman-prune = { 188 description = "Prune podman resources"; 189 ··· 203 204 systemd.sockets.podman.wantedBy = [ "sockets.target" ]; 205 systemd.sockets.podman.socketConfig.SocketGroup = "podman"; 206 207 systemd.user.sockets.podman.wantedBy = [ "sockets.target" ]; 208
··· 9 extraPackages = cfg.extraPackages 10 # setuid shadow 11 ++ [ "/run/wrappers" ] 12 + ++ lib.optional (builtins.elem "zfs" config.boot.supportedFilesystems) config.boot.zfs.package; 13 }); 14 15 # Provides a fake "docker" binary mapping to podman ··· 183 184 systemd.packages = [ cfg.package ]; 185 186 + systemd.services.podman.serviceConfig = { 187 + ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ]; 188 + }; 189 + 190 systemd.services.podman-prune = { 191 description = "Prune podman resources"; 192 ··· 206 207 systemd.sockets.podman.wantedBy = [ "sockets.target" ]; 208 systemd.sockets.podman.socketConfig.SocketGroup = "podman"; 209 + 210 + systemd.user.services.podman.serviceConfig = { 211 + ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ]; 212 + }; 213 214 systemd.user.sockets.podman.wantedBy = [ "sockets.target" ]; 215
+30 -4
nixos/tests/systemd-repart.nix
··· 52 }; 53 }; 54 55 - boot.initrd.systemd.enable = true; 56 - boot.initrd.systemd.repart.enable = true; 57 - 58 # systemd-repart operates on disks with a partition table. The qemu module, 59 # however, creates separate filesystem images without a partition table, so 60 # we have to create a disk image manually. ··· 88 nodes.machine = { config, pkgs, ... }: { 89 imports = [ common ]; 90 91 - boot.initrd.systemd.repart.partitions = { 92 "10-root" = { 93 Type = "linux-generic"; 94 }; ··· 102 machine.wait_for_unit("multi-user.target") 103 104 systemd_repart_logs = machine.succeed("journalctl --boot --unit systemd-repart.service") 105 assert "Growing existing partition 1." in systemd_repart_logs 106 ''; 107 };
··· 52 }; 53 }; 54 55 # systemd-repart operates on disks with a partition table. The qemu module, 56 # however, creates separate filesystem images without a partition table, so 57 # we have to create a disk image manually. ··· 85 nodes.machine = { config, pkgs, ... }: { 86 imports = [ common ]; 87 88 + boot.initrd.systemd.enable = true; 89 + 90 + boot.initrd.systemd.repart.enable = true; 91 + systemd.repart.partitions = { 92 "10-root" = { 93 Type = "linux-generic"; 94 }; ··· 102 machine.wait_for_unit("multi-user.target") 103 104 systemd_repart_logs = machine.succeed("journalctl --boot --unit systemd-repart.service") 105 + assert "Growing existing partition 1." in systemd_repart_logs 106 + ''; 107 + }; 108 + 109 + after-initrd = makeTest { 110 + name = "systemd-repart-after-initrd"; 111 + meta.maintainers = with maintainers; [ nikstur ]; 112 + 113 + nodes.machine = { config, pkgs, ... }: { 114 + imports = [ common ]; 115 + 116 + systemd.repart.enable = true; 117 + systemd.repart.partitions = { 118 + "10-root" = { 119 + Type = "linux-generic"; 120 + }; 121 + }; 122 + }; 123 + 124 + testScript = { nodes, ... }: '' 125 + ${useDiskImage nodes.machine} 126 + 127 + machine.start() 128 + machine.wait_for_unit("multi-user.target") 129 + 130 + systemd_repart_logs = machine.succeed("journalctl --unit systemd-repart.service") 131 assert "Growing existing partition 1." in systemd_repart_logs 132 ''; 133 };
+7 -6
pkgs/applications/audio/eartag/default.nix
··· 1 { stdenv 2 , lib 3 - , fetchFromGitHub 4 , meson 5 , ninja 6 , pkg-config ··· 18 19 python3Packages.buildPythonApplication rec { 20 pname = "eartag"; 21 - version = "0.3.1"; 22 format = "other"; 23 24 - src = fetchFromGitHub { 25 owner = "knuxify"; 26 repo = pname; 27 - rev = "refs/tags/${version}"; 28 - sha256 = "sha256-gN3V5ZHlhHp52Jg/i+hDLEDpSvP8yFngujyw5ZncQQg="; 29 }; 30 31 postPatch = '' ··· 67 ''; 68 69 meta = with lib; { 70 - homepage = "https://github.com/knuxify/eartag"; 71 description = "Simple music tag editor"; 72 # This seems to be using ICU license but we're flagging it to MIT license 73 # since ICU license is a modified version of MIT and to prevent it from
··· 1 { stdenv 2 , lib 3 + , fetchFromGitLab 4 , meson 5 , ninja 6 , pkg-config ··· 18 19 python3Packages.buildPythonApplication rec { 20 pname = "eartag"; 21 + version = "0.3.2"; 22 format = "other"; 23 24 + src = fetchFromGitLab { 25 + domain = "gitlab.gnome.org"; 26 owner = "knuxify"; 27 repo = pname; 28 + rev = version; 29 + sha256 = "sha256-XvbfQtE8LsztQ2VByG2jLYND3qVpH6owdAgh3b//lI4="; 30 }; 31 32 postPatch = '' ··· 68 ''; 69 70 meta = with lib; { 71 + homepage = "https://gitlab.gnome.org/knuxify/eartag"; 72 description = "Simple music tag editor"; 73 # This seems to be using ICU license but we're flagging it to MIT license 74 # since ICU license is a modified version of MIT and to prevent it from
+2 -2
pkgs/applications/audio/pianotrans/default.nix
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "pianotrans"; 9 - version = "1.0"; 10 format = "setuptools"; 11 12 src = fetchFromGitHub { 13 owner = "azuwis"; 14 repo = pname; 15 rev = "v${version}"; 16 - hash = "sha256-6Otup1Yat1dBZdSoR4lDfpytUQ2RbDXC6ieo835Nw+U="; 17 }; 18 19 propagatedBuildInputs = with python3.pkgs; [
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "pianotrans"; 9 + version = "1.0.1"; 10 format = "setuptools"; 11 12 src = fetchFromGitHub { 13 owner = "azuwis"; 14 repo = pname; 15 rev = "v${version}"; 16 + hash = "sha256-gRbyUQmPtGvx5QKAyrmeJl0stp7hwLBWwjSbJajihdE="; 17 }; 18 19 propagatedBuildInputs = with python3.pkgs; [
+2 -2
pkgs/applications/blockchains/ledger-live-desktop/default.nix
··· 2 3 let 4 pname = "ledger-live-desktop"; 5 - version = "2.51.0"; 6 7 src = fetchurl { 8 url = "https://download.live.ledger.com/${pname}-${version}-linux-x86_64.AppImage"; 9 - hash = "sha256-qpgzGJsj7hrrK2i+xP0T+hcw7WMlGBILbHVJBHD5duo="; 10 }; 11 12 appimageContents = appimageTools.extractType2 {
··· 2 3 let 4 pname = "ledger-live-desktop"; 5 + version = "2.53.2"; 6 7 src = fetchurl { 8 url = "https://download.live.ledger.com/${pname}-${version}-linux-x86_64.AppImage"; 9 + hash = "sha256-RGeJWUMZagXM/8SHHOpTpcnsz+BShnGp2yvt31qo5lI="; 10 }; 11 12 appimageContents = appimageTools.extractType2 {
+31 -9
pkgs/applications/emulators/flycast/default.nix
··· 5 , pkg-config 6 , makeWrapper 7 , alsa-lib 8 - , libX11 9 , libevdev 10 - , udev 11 , libpulseaudio 12 - , SDL2 13 , libzip 14 , miniupnpc 15 , vulkan-loader 16 }: 17 18 stdenv.mkDerivation rec { 19 pname = "flycast"; 20 - version = "2.0"; 21 22 src = fetchFromGitHub { 23 owner = "flyinghead"; 24 repo = "flycast"; 25 - rev = "v${version}"; 26 - sha256 = "sha256-vSyLg2lAJBV7crKVbGRbi1PUuCwHF9GB/8pjMTlaigA="; 27 fetchSubmodules = true; 28 }; 29 ··· 35 36 buildInputs = [ 37 alsa-lib 38 - libX11 39 libevdev 40 - udev 41 libpulseaudio 42 - SDL2 43 libzip 44 miniupnpc 45 ]; 46 47 postFixup = ''
··· 5 , pkg-config 6 , makeWrapper 7 , alsa-lib 8 + , curl 9 + , egl-wayland 10 + , libao 11 + , libdecor 12 , libevdev 13 + , libffi 14 + , libGL 15 , libpulseaudio 16 + , libX11 17 + , libXext 18 + , libxkbcommon 19 , libzip 20 + , mesa 21 , miniupnpc 22 + , udev 23 + , vulkan-headers 24 , vulkan-loader 25 + , wayland 26 + , zlib 27 }: 28 29 stdenv.mkDerivation rec { 30 pname = "flycast"; 31 + version = "2.1"; 32 33 src = fetchFromGitHub { 34 owner = "flyinghead"; 35 repo = "flycast"; 36 + rev = "V${version}"; 37 + sha256 = "sha256-PRInOqg9OpaUVLwSj1lOxDtjpVaYehkRsp0jLrVKPyY="; 38 fetchSubmodules = true; 39 }; 40 ··· 46 47 buildInputs = [ 48 alsa-lib 49 + curl 50 + egl-wayland 51 + libao 52 + libdecor 53 libevdev 54 + libffi 55 + libGL 56 libpulseaudio 57 + libX11 58 + libXext 59 + libxkbcommon 60 libzip 61 + mesa # for libgbm 62 miniupnpc 63 + udev 64 + vulkan-headers 65 + wayland 66 + zlib 67 ]; 68 69 postFixup = ''
+3 -3
pkgs/applications/misc/usql/default.nix
··· 10 11 buildGoModule rec { 12 pname = "usql"; 13 - version = "0.13.8"; 14 15 src = fetchFromGitHub { 16 owner = "xo"; 17 repo = "usql"; 18 rev = "v${version}"; 19 - hash = "sha256-oNsA9VM6MN2czeZSTFGvmCWX0T3iVaAhQk1mVRyKgWw="; 20 }; 21 22 buildInputs = [ unixODBC icu ]; 23 24 - vendorHash = "sha256-LG5gTHXB1ItDZFbTBHyZGHZLaSYb8wekIHkahTMXzkk="; 25 proxyVendor = true; 26 27 # Exclude broken impala & hive driver
··· 10 11 buildGoModule rec { 12 pname = "usql"; 13 + version = "0.13.9"; 14 15 src = fetchFromGitHub { 16 owner = "xo"; 17 repo = "usql"; 18 rev = "v${version}"; 19 + hash = "sha256-hcAwwu1bp7QJLt+mrUZYK6YeX/uRmfRa8JnUfrTzf3k="; 20 }; 21 22 buildInputs = [ unixODBC icu ]; 23 24 + vendorHash = "sha256-BehI6O+WpCcgMGabTFMCpYHN3CIo3Zb5rBQuGLsWRc0="; 25 proxyVendor = true; 26 27 # Exclude broken impala & hive driver
+4
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/tg_owt.nix
··· 56 fetchSubmodules = true; 57 }; 58 59 postPatch = lib.optionalString stdenv.isLinux '' 60 substituteInPlace src/modules/desktop_capture/linux/egl_dmabuf.cc \ 61 --replace '"libEGL.so.1"' '"${libGL}/lib/libEGL.so.1"' \
··· 56 fetchSubmodules = true; 57 }; 58 59 + patches = [ 60 + ./tg_owt.patch 61 + ]; 62 + 63 postPatch = lib.optionalString stdenv.isLinux '' 64 substituteInPlace src/modules/desktop_capture/linux/egl_dmabuf.cc \ 65 --replace '"libEGL.so.1"' '"${libGL}/lib/libEGL.so.1"' \
+23
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/tg_owt.patch
···
··· 1 + --- a/src/modules/include/module_common_types_public.h 2 + +++ b/src/modules/include/module_common_types_public.h 3 + @@ -11,6 +11,7 @@ 4 + #ifndef MODULES_INCLUDE_MODULE_COMMON_TYPES_PUBLIC_H_ 5 + #define MODULES_INCLUDE_MODULE_COMMON_TYPES_PUBLIC_H_ 6 + 7 + +#include <cstdint> 8 + #include <limits> 9 + 10 + #include "absl/types/optional.h" 11 + diff --git a/src/common_video/h265/h265_pps_parser.h b/src/common_video/h265/h265_pps_parser.h 12 + index 28c95ea9..790b0b73 100644 13 + --- a/src/common_video/h265/h265_pps_parser.h 14 + +++ b/src/common_video/h265/h265_pps_parser.h 15 + @@ -13,6 +13,8 @@ 16 + 17 + #include "absl/types/optional.h" 18 + 19 + +#include <stdint.h> 20 + + 21 + namespace rtc { 22 + class BitBuffer; 23 + }
+7 -2
pkgs/applications/networking/syncthing/default.nix
··· 1 - { buildGoModule, stdenv, lib, procps, fetchFromGitHub, nixosTests }: 2 3 let 4 common = { stname, target, postInstall ? "" }: ··· 22 23 buildPhase = '' 24 runHook preBuild 25 - go run build.go -no-upgrade -version v${version} build ${target} 26 runHook postBuild 27 ''; 28
··· 1 + { pkgsBuildBuild, go, buildGoModule, stdenv, lib, procps, fetchFromGitHub, nixosTests }: 2 3 let 4 common = { stname, target, postInstall ? "" }: ··· 22 23 buildPhase = '' 24 runHook preBuild 25 + ( 26 + export GOOS="${pkgsBuildBuild.go.GOOS}" GOARCH="${pkgsBuildBuild.go.GOARCH}" CC=$CC_FOR_BUILD 27 + go build build.go 28 + go generate github.com/syncthing/syncthing/lib/api/auto github.com/syncthing/syncthing/cmd/strelaypoolsrv/auto 29 + ) 30 + ./build -goos ${go.GOOS} -goarch ${go.GOARCH} -no-upgrade -version v${version} build ${target} 31 runHook postBuild 32 ''; 33
+2 -2
pkgs/applications/science/misc/cwltool/default.nix
··· 7 8 python3.pkgs.buildPythonApplication rec { 9 pname = "cwltool"; 10 - version = "3.1.20230209161050"; 11 format = "setuptools"; 12 13 src = fetchFromGitHub { 14 owner = "common-workflow-language"; 15 repo = pname; 16 rev = "refs/tags/${version}"; 17 - hash = "sha256-gc/KSJS3KcxXc3xDyJSXavaxtwhKBiihgdI7yc7d2I8="; 18 }; 19 20 postPatch = ''
··· 7 8 python3.pkgs.buildPythonApplication rec { 9 pname = "cwltool"; 10 + version = "3.1.20230213100550"; 11 format = "setuptools"; 12 13 src = fetchFromGitHub { 14 owner = "common-workflow-language"; 15 repo = pname; 16 rev = "refs/tags/${version}"; 17 + hash = "sha256-BtHkIVadcccnYYX8lRqiCzO+/qFeBaZfdUuu6qrjysk="; 18 }; 19 20 postPatch = ''
+16 -55
pkgs/applications/virtualization/podman/default.nix
··· 14 , go-md2man 15 , nixosTests 16 , python3 17 - , makeWrapper 18 - , symlinkJoin 19 - , extraPackages ? [ ] 20 - , runc 21 - , crun 22 - , conmon 23 - , slirp4netns 24 - , fuse-overlayfs 25 - , util-linux 26 - , iptables 27 - , iproute2 28 - , catatonit 29 - , gvproxy 30 - , aardvark-dns 31 - , netavark 32 , testers 33 , podman 34 }: 35 - let 36 - # do not add qemu to this wrapper, store paths get written to the podman vm config and break when GCed 37 38 - binPath = lib.makeBinPath ([ 39 - ] ++ lib.optionals stdenv.isLinux [ 40 - runc 41 - crun 42 - conmon 43 - slirp4netns 44 - fuse-overlayfs 45 - util-linux 46 - iptables 47 - iproute2 48 - ] ++ extraPackages); 49 - 50 - helpersBin = symlinkJoin { 51 - name = "podman-helper-binary-wrapper"; 52 - 53 - # this only works for some binaries, others may need to be be added to `binPath` or in the modules 54 - paths = [ 55 - gvproxy 56 - ] ++ lib.optionals stdenv.isLinux [ 57 - aardvark-dns 58 - catatonit # added here for the pause image and also set in `containersConf` for `init_path` 59 - netavark 60 - ]; 61 - }; 62 - in 63 buildGoModule rec { 64 pname = "podman"; 65 version = "4.4.1"; ··· 80 81 doCheck = false; 82 83 - outputs = [ "out" "man" ]; 84 85 - nativeBuildInputs = [ pkg-config go-md2man installShellFiles makeWrapper python3 ]; 86 87 buildInputs = lib.optionals stdenv.isLinux [ 88 btrfs-progs ··· 94 systemd 95 ]; 96 97 - HELPER_BINARIES_DIR = "${helpersBin}/bin"; 98 - PREFIX = "${placeholder "out"}"; 99 - 100 buildPhase = '' 101 runHook preBuild 102 patchShebangs . 103 ${if stdenv.isDarwin then '' 104 make podman-remote # podman-mac-helper uses FHS paths 105 '' else '' 106 - make bin/podman bin/rootlessport bin/quadlet 107 ''} 108 make docs 109 runHook postBuild ··· 111 112 installPhase = '' 113 runHook preInstall 114 ${if stdenv.isDarwin then '' 115 - install bin/darwin/podman -Dt $out/bin 116 '' else '' 117 - make install.bin install.systemd 118 ''} 119 - make install.completions install.man 120 - wrapProgram $out/bin/podman \ 121 - --prefix PATH : ${lib.escapeShellArg binPath} 122 runHook postInstall 123 ''; 124 125 postFixup = lib.optionalString stdenv.isLinux '' 126 - RPATH=$(patchelf --print-rpath $out/bin/.podman-wrapped) 127 - patchelf --set-rpath "${lib.makeLibraryPath [ systemd ]}":$RPATH $out/bin/.podman-wrapped 128 ''; 129 130 passthru.tests = {
··· 14 , go-md2man 15 , nixosTests 16 , python3 17 , testers 18 , podman 19 }: 20 21 buildGoModule rec { 22 pname = "podman"; 23 version = "4.4.1"; ··· 38 39 doCheck = false; 40 41 + outputs = [ "out" "man" ] ++ lib.optionals stdenv.isLinux [ "rootlessport" ]; 42 43 + nativeBuildInputs = [ pkg-config go-md2man installShellFiles python3 ]; 44 45 buildInputs = lib.optionals stdenv.isLinux [ 46 btrfs-progs ··· 52 systemd 53 ]; 54 55 buildPhase = '' 56 runHook preBuild 57 patchShebangs . 58 ${if stdenv.isDarwin then '' 59 make podman-remote # podman-mac-helper uses FHS paths 60 '' else '' 61 + make bin/podman bin/rootlessport 62 ''} 63 make docs 64 runHook postBuild ··· 66 67 installPhase = '' 68 runHook preInstall 69 + mkdir -p {$out/{bin,etc,lib,share},$man} # ensure paths exist for the wrapper 70 ${if stdenv.isDarwin then '' 71 + mv bin/{darwin/podman,podman} 72 '' else '' 73 + install -Dm644 contrib/tmpfile/podman.conf -t $out/lib/tmpfiles.d 74 + for s in contrib/systemd/**/*.in; do 75 + substituteInPlace "$s" --replace "@@PODMAN@@" "podman" # don't use unwrapped binary 76 + done 77 + PREFIX=$out make install.systemd 78 + install -Dm555 bin/rootlessport -t $rootlessport/bin 79 ''} 80 + install -Dm555 bin/podman -t $out/bin 81 + PREFIX=$out make install.completions 82 + MANDIR=$man/share/man make install.man 83 runHook postInstall 84 ''; 85 86 postFixup = lib.optionalString stdenv.isLinux '' 87 + RPATH=$(patchelf --print-rpath $out/bin/podman) 88 + patchelf --set-rpath "${lib.makeLibraryPath [ systemd ]}":$RPATH $out/bin/podman 89 ''; 90 91 passthru.tests = {
+78
pkgs/applications/virtualization/podman/wrapper.nix
···
··· 1 + { podman-unwrapped 2 + , runCommand 3 + , makeWrapper 4 + , symlinkJoin 5 + , lib 6 + , stdenv 7 + , extraPackages ? [] 8 + , runc # Default container runtime 9 + , crun # Container runtime (default with cgroups v2 for podman/buildah) 10 + , conmon # Container runtime monitor 11 + , slirp4netns # User-mode networking for unprivileged namespaces 12 + , fuse-overlayfs # CoW for images, much faster than default vfs 13 + , util-linux # nsenter 14 + , iptables 15 + , iproute2 16 + , catatonit 17 + , gvproxy 18 + , aardvark-dns 19 + , netavark 20 + }: 21 + 22 + # do not add qemu to this wrapper, store paths get written to the podman vm config and break when GCed 23 + 24 + let 25 + binPath = lib.makeBinPath ([ 26 + ] ++ lib.optionals stdenv.isLinux [ 27 + runc 28 + crun 29 + conmon 30 + slirp4netns 31 + fuse-overlayfs 32 + util-linux 33 + iptables 34 + iproute2 35 + ] ++ extraPackages); 36 + 37 + helpersBin = symlinkJoin { 38 + name = "${podman-unwrapped.pname}-helper-binary-wrapper-${podman-unwrapped.version}"; 39 + 40 + # this only works for some binaries, others may need to be be added to `binPath` or in the modules 41 + paths = [ 42 + gvproxy 43 + ] ++ lib.optionals stdenv.isLinux [ 44 + aardvark-dns 45 + catatonit # added here for the pause image and also set in `containersConf` for `init_path` 46 + netavark 47 + podman-unwrapped.rootlessport 48 + ]; 49 + }; 50 + 51 + in runCommand podman-unwrapped.name { 52 + name = "${podman-unwrapped.pname}-wrapper-${podman-unwrapped.version}"; 53 + inherit (podman-unwrapped) pname version passthru; 54 + 55 + preferLocalBuild = true; 56 + 57 + meta = builtins.removeAttrs podman-unwrapped.meta [ "outputsToInstall" ]; 58 + 59 + outputs = [ 60 + "out" 61 + "man" 62 + ]; 63 + 64 + nativeBuildInputs = [ 65 + makeWrapper 66 + ]; 67 + 68 + } '' 69 + ln -s ${podman-unwrapped.man} $man 70 + 71 + mkdir -p $out/bin 72 + ln -s ${podman-unwrapped}/etc $out/etc 73 + ln -s ${podman-unwrapped}/lib $out/lib 74 + ln -s ${podman-unwrapped}/share $out/share 75 + makeWrapper ${podman-unwrapped}/bin/podman $out/bin/podman \ 76 + --set CONTAINERS_HELPER_BINARY_DIR ${helpersBin}/bin \ 77 + --prefix PATH : ${lib.escapeShellArg binPath} 78 + ''
+42
pkgs/data/fonts/nasin-nanpa/default.nix
···
··· 1 + { lib, stdenvNoCC, fetchurl }: 2 + 3 + stdenvNoCC.mkDerivation rec { 4 + pname = "nasin-nanpa"; 5 + version = "2.5.1"; 6 + 7 + srcs = [ 8 + (fetchurl { 9 + name = "nasin-nanpa.otf"; 10 + url = "https://github.com/ETBCOR/nasin-nanpa/releases/download/n${version}/nasin-nanpa-${version}.otf"; 11 + hash = "sha256-++uOrqFzQ6CB/OPEmBivpjMfAtFk3PSsCNpFBjOtGEg="; 12 + }) 13 + (fetchurl { 14 + name = "nasin-nanpa-lasina-kin.otf"; 15 + url = "https://github.com/ETBCOR/nasin-nanpa/releases/download/n${version}/nasin-nanpa-${version}-lasina-kin.otf"; 16 + hash = "sha256-4WIX74y2O4NaKi/JQrgTbOxlKDQKJ/F9wkQuoOdWuTI="; 17 + }) 18 + ]; 19 + 20 + dontUnpack = true; 21 + 22 + installPhase = '' 23 + mkdir -p $out/share/fonts/opentype 24 + for src in $srcs; do 25 + file=$(stripHash $src) 26 + cp $src $out/share/fonts/opentype/$file 27 + done 28 + ''; 29 + 30 + meta = with lib; { 31 + homepage = "https://github.com/ETBCOR/nasin-nanpa"; 32 + description = "UCSUR OpenType monospaced font for the Toki Pona writing system, Sitelen Pona"; 33 + longDescription = '' 34 + ni li nasin pi sitelen pona. 35 + sitelen ale pi nasin ni li sama mute weka. 36 + sitelen pi nasin ni li lon nasin UCSUR kin. 37 + ''; 38 + license = licenses.mit; 39 + platforms = platforms.all; 40 + maintainers = with maintainers; [ somasis ]; 41 + }; 42 + }
+2 -2
pkgs/data/icons/numix-icon-theme-square/default.nix
··· 2 3 stdenvNoCC.mkDerivation rec { 4 pname = "numix-icon-theme-square"; 5 - version = "23.02.05"; 6 7 src = fetchFromGitHub { 8 owner = "numixproject"; 9 repo = pname; 10 rev = version; 11 - sha256 = "sha256-FZt/3RugPHjanlxKjITSpaIb5RoKzI9mJvmPn7CNqS4="; 12 }; 13 14 nativeBuildInputs = [ gtk3 ];
··· 2 3 stdenvNoCC.mkDerivation rec { 4 pname = "numix-icon-theme-square"; 5 + version = "23.02.16"; 6 7 src = fetchFromGitHub { 8 owner = "numixproject"; 9 repo = pname; 10 rev = version; 11 + sha256 = "sha256-z9LHSfhCTeHsf4XtPJeOqOqfKHHz0B7n2hciIpCQ9H4="; 12 }; 13 14 nativeBuildInputs = [ gtk3 ];
+2
pkgs/development/compilers/zig/0.10.nix
··· 47 cmakeFlags = [ 48 # file RPATH_CHANGE could not write new RPATH 49 "-DCMAKE_SKIP_BUILD_RPATH=ON" 50 "-DZIG_TARGET_MCPU=baseline" 51 ]; 52
··· 47 cmakeFlags = [ 48 # file RPATH_CHANGE could not write new RPATH 49 "-DCMAKE_SKIP_BUILD_RPATH=ON" 50 + 51 + # ensure determinism in the compiler build 52 "-DZIG_TARGET_MCPU=baseline" 53 ]; 54
+3
pkgs/development/compilers/zig/0.9.1.nix
··· 62 cmakeFlags = [ 63 # file RPATH_CHANGE could not write new RPATH 64 "-DCMAKE_SKIP_BUILD_RPATH=ON" 65 ]; 66 67 doCheck = true;
··· 62 cmakeFlags = [ 63 # file RPATH_CHANGE could not write new RPATH 64 "-DCMAKE_SKIP_BUILD_RPATH=ON" 65 + 66 + # ensure determinism in the compiler build 67 + "-DZIG_TARGET_MCPU=baseline" 68 ]; 69 70 doCheck = true;
+3 -3
pkgs/development/libraries/tl-expected/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tl-expected-unstable"; 5 - version = "2019-11-11"; # 5 commits ahead of version 1.0.0 6 7 src = fetchFromGitHub { 8 owner = "TartanLlama"; 9 repo = "expected"; 10 - rev = "1d9c5d8c0da84b8ddc54bd3d90d632eec95c1f13"; 11 fetchSubmodules = true; 12 - sha256 = "0rzfn9yyg70zwpxbmv22qy0015baymi2rdd65ixmcb31fgnap68i"; 13 }; 14 15 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tl-expected-unstable"; 5 + version = "2023-02-15"; # 37 commits ahead of version 1.0.0 6 7 src = fetchFromGitHub { 8 owner = "TartanLlama"; 9 repo = "expected"; 10 + rev = "9d812f5e3b5bc68023f6e31d29489cdcaacef606"; 11 fetchSubmodules = true; 12 + hash = "sha256-ZokcGQgHH37nmTMLmxFcun4S1RjXuXb9NfWHet8Fbc4="; 13 }; 14 15 nativeBuildInputs = [ cmake ];
+3 -2
pkgs/development/python-modules/canonicaljson/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "canonicaljson"; 13 - version = "1.6.4"; 14 format = "pyproject"; 15 16 disabled = pythonOlder "3.7"; 17 18 src = fetchPypi { 19 inherit pname version; 20 - hash = "sha256-bAmyEZUR8w6xEmz82XOhCCTiDxz9JQOc3j0SGN2cjY8="; 21 }; 22 23 nativeBuildInputs = [ ··· 49 meta = with lib; { 50 description = "Encodes objects and arrays as RFC 7159 JSON"; 51 homepage = "https://github.com/matrix-org/python-canonicaljson"; 52 license = licenses.asl20; 53 maintainers = with maintainers; [ fab ]; 54 };
··· 10 11 buildPythonPackage rec { 12 pname = "canonicaljson"; 13 + version = "1.6.5"; 14 format = "pyproject"; 15 16 disabled = pythonOlder "3.7"; 17 18 src = fetchPypi { 19 inherit pname version; 20 + hash = "sha256-aN/BV7AR4H2Uv3S11MzAGVhYTtlC2d/V/dcGYJ6BzUs="; 21 }; 22 23 nativeBuildInputs = [ ··· 49 meta = with lib; { 50 description = "Encodes objects and arrays as RFC 7159 JSON"; 51 homepage = "https://github.com/matrix-org/python-canonicaljson"; 52 + changelog = "https://github.com/matrix-org/python-canonicaljson/blob/v${version}/CHANGES.md"; 53 license = licenses.asl20; 54 maintainers = with maintainers; [ fab ]; 55 };
-46
pkgs/development/python-modules/gdtoolkit/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, pythonOlder, lark, docopt, pyyaml, setuptools }: 2 - 3 - let lark080 = lark.overrideAttrs (old: rec { 4 - # gdtoolkit needs exactly this lark version 5 - version = "0.8.0"; 6 - src = fetchFromGitHub { 7 - owner = "lark-parser"; 8 - repo = "lark"; 9 - rev = version; 10 - sha256 = "su7kToZ05OESwRCMPG6Z+XlFUvbEb3d8DgsTEcPJMg4="; 11 - }; 12 - }); 13 - 14 - in 15 - buildPythonPackage rec { 16 - pname = "gdtoolkit"; 17 - version = "3.3.1"; 18 - 19 - propagatedBuildInputs = [ 20 - lark080 21 - docopt 22 - pyyaml 23 - setuptools 24 - ]; 25 - 26 - # If we try to get using fetchPypi it requires GeoIP (but the package dont has that dep!?) 27 - src = fetchFromGitHub { 28 - owner = "Scony"; 29 - repo = "godot-gdscript-toolkit"; 30 - rev = version; 31 - sha256 = "13nnpwy550jf5qnm9ixpxl1bwfnhhbiys8vqfd25g3aim4bm3gnn"; 32 - }; 33 - 34 - disabled = pythonOlder "3.7"; 35 - 36 - # Tests cannot be run because they need network to install additional dependencies using pip and tox 37 - doCheck = false; 38 - pythonImportsCheck = [ "gdtoolkit" "gdtoolkit.formatter" "gdtoolkit.linter" "gdtoolkit.parser" ]; 39 - 40 - meta = with lib; { 41 - description = "Independent set of tools for working with Godot's GDScript - parser, linter and formatter"; 42 - homepage = "https://github.com/Scony/godot-gdscript-toolkit"; 43 - license = licenses.mit; 44 - maintainers = with maintainers; [ shiryel ]; 45 - }; 46 - }
···
+3 -3
pkgs/development/python-modules/leb128/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "leb128"; 5 - version = "1.0.4"; 6 7 # fetchPypi doesn't include files required for tests 8 src = fetchFromGitHub { 9 owner = "mohanson"; 10 repo = "leb128"; 11 - rev = "v${version}"; 12 - sha256 = "040l6fxyzqal841kirf783kk1840gcy1gjd374jfr46v96qc8scm"; 13 }; 14 15 nativeCheckInputs = [ pytestCheckHook ];
··· 2 3 buildPythonPackage rec { 4 pname = "leb128"; 5 + version = "1.0.5"; 6 7 # fetchPypi doesn't include files required for tests 8 src = fetchFromGitHub { 9 owner = "mohanson"; 10 repo = "leb128"; 11 + rev = "refs/tags/v${version}"; 12 + sha256 = "sha256-zK14LPziBkvXAMzuPbcg/47caO/5GEYA9txAzCGfpS8="; 13 }; 14 15 nativeCheckInputs = [ pytestCheckHook ];
+1
pkgs/development/python-modules/playwright/default.nix
··· 223 homepage = "https://github.com/microsoft/playwright-python"; 224 license = licenses.asl20; 225 maintainers = with maintainers; [ techknowlogick yrd SuperSandro2000 ]; 226 }; 227 }
··· 223 homepage = "https://github.com/microsoft/playwright-python"; 224 license = licenses.asl20; 225 maintainers = with maintainers; [ techknowlogick yrd SuperSandro2000 ]; 226 + platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" ]; 227 }; 228 }
+3 -2
pkgs/development/python-modules/pynobo/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "pynobo"; 9 - version = "1.6.0"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; ··· 15 owner = "echoromeo"; 16 repo = pname; 17 rev = "refs/tags/v${version}"; 18 - hash = "sha256-YbQfdOLO1gs7+oiwe4rDmmD1o7MG+vma5xPlrtNZ00M="; 19 }; 20 21 # Project has no tests ··· 28 meta = with lib; { 29 description = "Python TCP/IP interface for Nobo Hub/Nobo Energy Control devices"; 30 homepage = "https://github.com/echoromeo/pynobo"; 31 license = with licenses; [ gpl3Plus ]; 32 maintainers = with maintainers; [ fab ]; 33 };
··· 6 7 buildPythonPackage rec { 8 pname = "pynobo"; 9 + version = "1.6.1"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; ··· 15 owner = "echoromeo"; 16 repo = pname; 17 rev = "refs/tags/v${version}"; 18 + hash = "sha256-T86d3HGu6hsc54+ocCbINsInH/qHL9+HhOXDQ0I8QGA="; 19 }; 20 21 # Project has no tests ··· 28 meta = with lib; { 29 description = "Python TCP/IP interface for Nobo Hub/Nobo Energy Control devices"; 30 homepage = "https://github.com/echoromeo/pynobo"; 31 + changelog = "https://github.com/echoromeo/pynobo/releases/tag/v${version}"; 32 license = with licenses; [ gpl3Plus ]; 33 maintainers = with maintainers; [ fab ]; 34 };
+2 -2
pkgs/development/python-modules/requests-pkcs12/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "requests-pkcs12"; 11 - version = "1.14"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "m-click"; 18 repo = "requests_pkcs12"; 19 rev = version; 20 - hash = "sha256-LZgKjSas0KdJAf4leSVz8sEnRrlJ20Sm9Ka+S5zDOTM="; 21 }; 22 23 propagatedBuildInputs = [
··· 8 9 buildPythonPackage rec { 10 pname = "requests-pkcs12"; 11 + version = "1.15"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "m-click"; 18 repo = "requests_pkcs12"; 19 rev = version; 20 + hash = "sha256-xk8+oERonZWzxKEmZutfvovzVOz9ZP5O83cMDTz9i3Y="; 21 }; 22 23 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/types-python-dateutil/default.nix
··· 5 6 buildPythonPackage rec { 7 pname = "types-python-dateutil"; 8 - version = "2.8.19.6"; 9 format = "setuptools"; 10 11 src = fetchPypi { 12 inherit pname version; 13 - hash = "sha256-Sm9MwZzkuhoIZwhx4pe/OAL1XU8SnmqiRD9UC2z4A9I="; 14 }; 15 16 # Modules doesn't have tests
··· 5 6 buildPythonPackage rec { 7 pname = "types-python-dateutil"; 8 + version = "2.8.19.7"; 9 format = "setuptools"; 10 11 src = fetchPypi { 12 inherit pname version; 13 + hash = "sha256-evWl0bgKsd+guk2Hn6yzgug2piwtQIwqUJvkaA/Yscg="; 14 }; 15 16 # Modules doesn't have tests
+2 -2
pkgs/development/python-modules/types-requests/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "types-requests"; 9 - version = "2.28.11.12"; 10 format = "setuptools"; 11 12 src = fetchPypi { 13 inherit pname version; 14 - sha256 = "sha256-/VMKqz/E8F7jZAavFo8INubwDx7lGguWtzEfgstnUjA="; 15 }; 16 17 propagatedBuildInputs = [
··· 6 7 buildPythonPackage rec { 8 pname = "types-requests"; 9 + version = "2.28.11.13"; 10 format = "setuptools"; 11 12 src = fetchPypi { 13 inherit pname version; 14 + sha256 = "sha256-P9MyhC6HWepffrd4nfiqdyuhVSFszxDvSqOw5bQuG0Y="; 15 }; 16 17 propagatedBuildInputs = [
+2 -2
pkgs/development/tools/faas-cli/default.nix
··· 18 in 19 buildGoModule rec { 20 pname = "faas-cli"; 21 - version = "0.15.4"; 22 23 src = fetchFromGitHub { 24 owner = "openfaas"; 25 repo = "faas-cli"; 26 rev = version; 27 - sha256 = "sha256-Dj4Wli1z4X8FgnthjPszC/h4EIeFiMO/YB5Rlkis5f8="; 28 }; 29 30 vendorSha256 = null;
··· 18 in 19 buildGoModule rec { 20 pname = "faas-cli"; 21 + version = "0.15.9"; 22 23 src = fetchFromGitHub { 24 owner = "openfaas"; 25 repo = "faas-cli"; 26 rev = version; 27 + sha256 = "sha256-DudZOIwpsa7VaOQMJ2P/mfWHWYwESNhDfIUbtMV5Es0="; 28 }; 29 30 vendorSha256 = null;
+84
pkgs/development/tools/gdtoolkit/default.nix
···
··· 1 + { lib 2 + , python3Packages 3 + , fetchFromGitHub 4 + , godot-server 5 + }: 6 + 7 + let lark080 = python3Packages.lark.overrideAttrs (old: rec { 8 + # gdtoolkit needs exactly this lark version 9 + version = "0.8.0"; 10 + src = fetchFromGitHub { 11 + owner = "lark-parser"; 12 + repo = "lark"; 13 + rev = version; 14 + hash = "sha256-KN9buVlH8hJ8t0ZP5yefeYM5vH5Gg7a7TEDGKJYpozs="; 15 + fetchSubmodules = true; 16 + }; 17 + }); 18 + 19 + in 20 + python3Packages.buildPythonApplication rec { 21 + pname = "gdtoolkit"; 22 + version = "3.3.1"; 23 + 24 + # If we try to get using fetchPypi it requires GeoIP (but the package dont has that dep!?) 25 + src = fetchFromGitHub { 26 + owner = "Scony"; 27 + repo = "godot-gdscript-toolkit"; 28 + rev = version; 29 + sha256 = "13nnpwy550jf5qnm9ixpxl1bwfnhhbiys8vqfd25g3aim4bm3gnn"; 30 + }; 31 + 32 + disabled = python3Packages.pythonOlder "3.7"; 33 + 34 + propagatedBuildInputs = [ lark080 35 + ] ++ (with python3Packages; [ 36 + docopt 37 + pyyaml 38 + setuptools 39 + ]); 40 + 41 + doCheck = true; 42 + 43 + nativeCheckInputs = with python3Packages; [ 44 + pytestCheckHook 45 + hypothesis 46 + godot-server 47 + ]; 48 + 49 + preCheck = 50 + let 51 + godotServerMajorVersion = lib.versions.major godot-server.version; 52 + gdtoolkitMajorVersion = lib.versions.major version; 53 + msg = '' 54 + gdtoolkit major version ${gdtoolkitMajorVersion} does not match godot-server major version ${godotServerMajorVersion}! 55 + gdtoolkit needs a matching godot-server for its tests. 56 + If you see this error, you can either: 57 + - disable doCheck for gdtoolkit, or 58 + - provide a compatible godot-server version to gdtoolkit" 59 + ''; 60 + in lib.throwIf (godotServerMajorVersion != gdtoolkitMajorVersion) msg '' 61 + # The tests want to run the installed executables 62 + export PATH=$out/bin:$PATH 63 + 64 + # gdtoolkit tries to write cache variables to $HOME/.cache 65 + export HOME=$TMP 66 + 67 + # Work around https://github.com/godotengine/godot/issues/20503 68 + # Without this, Godot will complain about a missing project file 69 + touch project.godot 70 + 71 + # Remove broken test case 72 + # (hard to skip via disabledTests since the test name contains an absolute path) 73 + rm tests/potential-godot-bugs/multiline-subscription-expression.gd 74 + ''; 75 + 76 + pythonImportsCheck = [ "gdtoolkit" "gdtoolkit.formatter" "gdtoolkit.linter" "gdtoolkit.parser" ]; 77 + 78 + meta = with lib; { 79 + description = "Independent set of tools for working with Godot's GDScript - parser, linter and formatter"; 80 + homepage = "https://github.com/Scony/godot-gdscript-toolkit"; 81 + license = licenses.mit; 82 + maintainers = with maintainers; [ shiryel tmarkus ]; 83 + }; 84 + }
+9 -4
pkgs/development/tools/skopeo/default.nix
··· 12 , fuse-overlayfs 13 , dockerTools 14 , runCommand 15 }: 16 17 buildGoModule rec { 18 pname = "skopeo"; 19 - version = "1.11.0"; 20 21 src = fetchFromGitHub { 22 rev = "v${version}"; 23 owner = "containers"; 24 repo = "skopeo"; 25 - hash = "sha256-P556Is03BeC0Tf+kNv+Luy0KASgTXsyZ/MrPaPFUHE8="; 26 }; 27 28 outputs = [ "out" "man" ]; ··· 45 46 installPhase = '' 47 runHook preInstall 48 - PREFIX=$out make install-binary install-completions 49 - PREFIX=$man make install-docs 50 install ${passthru.policy}/default-policy.json -Dt $out/etc/containers 51 '' + lib.optionalString stdenv.isLinux '' 52 wrapProgram $out/bin/skopeo \ ··· 60 install ${src}/default-policy.json -Dt $out 61 ''; 62 tests = { 63 inherit (dockerTools.examples) testNixFromDockerHub; 64 }; 65 }; 66 67 meta = with lib; { 68 description = "A command line utility for various operations on container images and image repositories"; 69 homepage = "https://github.com/containers/skopeo"; 70 maintainers = with maintainers; [ lewo ] ++ teams.podman.members;
··· 12 , fuse-overlayfs 13 , dockerTools 14 , runCommand 15 + , testers 16 + , skopeo 17 }: 18 19 buildGoModule rec { 20 pname = "skopeo"; 21 + version = "1.11.1"; 22 23 src = fetchFromGitHub { 24 rev = "v${version}"; 25 owner = "containers"; 26 repo = "skopeo"; 27 + hash = "sha256-wTOcluPSguF6ZnKHlLelM5R2dIF9nd66qu7u/48uNyU="; 28 }; 29 30 outputs = [ "out" "man" ]; ··· 47 48 installPhase = '' 49 runHook preInstall 50 + PREFIX=${placeholder "out"} make install-binary install-completions install-docs 51 install ${passthru.policy}/default-policy.json -Dt $out/etc/containers 52 '' + lib.optionalString stdenv.isLinux '' 53 wrapProgram $out/bin/skopeo \ ··· 61 install ${src}/default-policy.json -Dt $out 62 ''; 63 tests = { 64 + version = testers.testVersion { 65 + package = skopeo; 66 + }; 67 inherit (dockerTools.examples) testNixFromDockerHub; 68 }; 69 }; 70 71 meta = with lib; { 72 + changelog = "https://github.com/containers/skopeo/releases/tag/${src.rev}"; 73 description = "A command line utility for various operations on container images and image repositories"; 74 homepage = "https://github.com/containers/skopeo"; 75 maintainers = with maintainers; [ lewo ] ++ teams.podman.members;
+5 -5
pkgs/servers/prowlarr/default.nix
··· 16 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 17 18 hash = { 19 - x64-linux_hash = "sha256-hKvme3saa3/GT0l6OlFjYI0RPClo5rWtVYFN/YuJSaw="; 20 - arm64-linux_hash = "sha256-f7YIJRk1AhlfepmsQqlDFMA97QnbAAzrUtPFfbuV+QY="; 21 - x64-osx_hash = "sha256-7nU12Y7f+fwjziUm6O+xO78IZf8EOfgmz+JibAP/xk8="; 22 }."${arch}-${os}_hash"; 23 24 in stdenv.mkDerivation rec { 25 pname = "prowlarr"; 26 - version = "1.1.3.2521"; 27 28 src = fetchurl { 29 - url = "https://github.com/Prowlarr/Prowlarr/releases/download/v${version}/Prowlarr.master.${version}.${os}-core-${arch}.tar.gz"; 30 sha256 = hash; 31 }; 32
··· 16 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 17 18 hash = { 19 + x64-linux_hash = "sha256-Xx2z5aiIKRNbBxBMXCTfm1VacQOLyruC6sXB/+C7knk="; 20 + arm64-linux_hash = "sha256-r6WuQhydSRZmsH1hp51gGcQ/7ZruxbEMrbrFps2nmcw="; 21 + x64-osx_hash = "sha256-F8bE4lXcqyBVZhgYcQKPrza9cphCuC5j7968jL6qgxM="; 22 }."${arch}-${os}_hash"; 23 24 in stdenv.mkDerivation rec { 25 pname = "prowlarr"; 26 + version = "1.2.0.2583"; 27 28 src = fetchurl { 29 + url = "https://github.com/Prowlarr/Prowlarr/releases/download/v${version}/Prowlarr.develop.${version}.${os}-core-${arch}.tar.gz"; 30 sha256 = hash; 31 }; 32
+1 -1
pkgs/servers/prowlarr/update.sh
··· 13 14 hashKey="${arch}-${os}_hash" 15 16 - url="https://github.com/Prowlarr/Prowlarr/releases/download/v$version/Prowlarr.master.$version.$os-core-$arch.tar.gz" 17 hash=$(nix-prefetch-url --type sha256 $url) 18 sriHash="$(nix hash to-sri --type sha256 $hash)" 19
··· 13 14 hashKey="${arch}-${os}_hash" 15 16 + url="https://github.com/Prowlarr/Prowlarr/releases/download/v$version/Prowlarr.develop.$version.$os-core-$arch.tar.gz" 17 hash=$(nix-prefetch-url --type sha256 $url) 18 sriHash="$(nix hash to-sri --type sha256 $hash)" 19
+26
pkgs/servers/redpanda/base64.nix
···
··· 1 + { clangStdenv 2 + , cmake 3 + , fetchFromGitHub 4 + , lib 5 + }: 6 + let 7 + pname = "base64"; 8 + version = "0.5.0"; 9 + in 10 + clangStdenv.mkDerivation { 11 + inherit pname version; 12 + src = fetchFromGitHub { 13 + owner = "aklomp"; 14 + repo = "base64"; 15 + rev = "v${version}"; 16 + sha256 = "sha256-2HNI9ycT9f+NLwLElEuR61qmTguOsI+kNxv01ipxSqQ="; 17 + }; 18 + nativeBuildInputs = [ cmake ]; 19 + meta = with lib; { 20 + description = "Fast Base64 stream encoder/decoder in C99, with SIMD acceleration"; 21 + license = licenses.bsd2; 22 + homepage = "https://github.com/aklomp/base64"; 23 + maintainers = with maintainers; [ avakhrenev ]; 24 + platforms = platforms.unix; 25 + }; 26 + }
+39 -35
pkgs/servers/redpanda/default.nix
··· 1 - { lib, stdenv, fetchzip }: 2 - 3 let 4 - version = "22.3.11"; 5 - platform = if stdenv.isLinux then "linux" else "darwin"; 6 - arch = if stdenv.isAarch64 then "arm" else "amd"; 7 - sha256s = { 8 - darwin.amd = "sha256-kwAKxFg7BSNInvsQvFqgtpq8EEwSnmDeDyaF5b8L8SQ="; 9 - darwin.arm = "sha256-kH5Ii672SeAIiRcWuAO3oVJVSBWp+r78RmTiR3BaDbg="; 10 - linux.amd = "sha256-EKgkRKBrM4+X2YGoP2LpWRHL+fdHu44LYwCZ+O+c5ZY="; 11 - linux.arm = "sha256-9b4oerRXjUVUYoswJWtnMBJSQDoCKClf673VjDQFUAw="; 12 }; 13 - in stdenv.mkDerivation rec { 14 - pname = "redpanda"; 15 - inherit version; 16 - 17 - src = fetchzip { 18 - url = "https://github.com/redpanda-data/redpanda/releases/download/v${version}/rpk-${platform}-${arch}64.zip"; 19 - sha256 = sha256s.${platform}.${arch}; 20 - }; 21 - 22 - installPhase = '' 23 - runHook preInstall 24 25 - mkdir -p $out/bin 26 - cp rpk $out/bin 27 28 - ${lib.optionalString stdenv.isLinux '' 29 - patchelf \ 30 - --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ 31 - $out/bin/rpk 32 - ''} 33 34 - runHook postInstall 35 ''; 36 37 - # stripping somehow completely breaks it 38 - dontStrip = true; 39 40 meta = with lib; { 41 - description = "Redpanda is a streaming data platform for developers. Kafka API compatible. 10x faster. No ZooKeeper. No JVM! "; 42 - sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 43 license = licenses.bsl11; 44 - homepage = "https://redpanda.com/"; 45 - maintainers = with maintainers; [ happysalada ]; 46 platforms = platforms.all; 47 }; 48 }
··· 1 + { buildGoModule 2 + , callPackage 3 + , doCheck ? !stdenv.isDarwin # Can't start localhost test server in MacOS sandbox. 4 + , fetchFromGitHub 5 + , installShellFiles 6 + , lib 7 + , stdenv 8 + }: 9 let 10 + version = "22.3.13"; 11 + src = fetchFromGitHub { 12 + owner = "redpanda-data"; 13 + repo = "redpanda"; 14 + rev = "v${version}"; 15 + sha256 = "sha256-cUQFDXWnQYSLcfKFYg6BLrxF77iX+Yx3hcul4tMxdoc="; 16 }; 17 + server = callPackage ./server.nix { inherit src version; }; 18 + in 19 + buildGoModule rec { 20 + pname = "redpanda-rpk"; 21 + inherit doCheck src version; 22 + modRoot = "./src/go/rpk"; 23 + runVend = false; 24 + vendorSha256 = "sha256-JVZuHRh3gavIGArxDkqUQsL5oBjz35EKGsC75Sy+cMo="; 25 26 + ldflags = [ 27 + ''-X "github.com/redpanda-data/redpanda/src/go/rpk/pkg/cli/cmd/version.version=${version}"'' 28 + ''-X "github.com/redpanda-data/redpanda/src/go/rpk/pkg/cli/cmd/version.rev=v${version}"'' 29 + ''-X "github.com/redpanda-data/redpanda/src/go/rpk/pkg/cli/cmd/container/common.tag=v${version}"'' 30 + ]; 31 32 + nativeBuildInputs = [ installShellFiles ]; 33 34 + postInstall = '' 35 + for shell in bash fish zsh; do 36 + $out/bin/rpk generate shell-completion $shell > rpk.$shell 37 + installShellCompletion rpk.$shell 38 + done 39 ''; 40 41 + passthru = { 42 + inherit server; 43 + }; 44 45 meta = with lib; { 46 + description = "Redpanda client"; 47 + homepage = "https://redpanda.com/"; 48 license = licenses.bsl11; 49 + maintainers = with maintainers; [ avakhrenev happysalada ]; 50 platforms = platforms.all; 51 }; 52 }
+28
pkgs/servers/redpanda/hdr-histogram.nix
···
··· 1 + { clangStdenv 2 + , cmake 3 + , fetchFromGitHub 4 + , lib 5 + , zlib 6 + }: 7 + let 8 + pname = "HdrHistogram_c"; 9 + version = "0.11.5"; 10 + in 11 + clangStdenv.mkDerivation { 12 + inherit pname version; 13 + src = fetchFromGitHub { 14 + owner = "HdrHistogram"; 15 + repo = "HdrHistogram_c"; 16 + rev = version; 17 + sha256 = "sha256-29if+0H8wdpQBN48lt0ylGgtUCv/tJYZnG5LzcIqXDs="; 18 + }; 19 + nativeBuildInputs = [ cmake ]; 20 + buildInputs = [ zlib ]; 21 + meta = with lib; { 22 + description = "C port of the HdrHistogram"; 23 + license = licenses.bsd2; 24 + homepage = "https://github.com/HdrHistogram/HdrHistogram_c"; 25 + maintainers = with maintainers; [ avakhrenev ]; 26 + platforms = platforms.unix; 27 + }; 28 + }
+32
pkgs/servers/redpanda/rapidjson.nix
···
··· 1 + # rapidjson used in nixpkgs is too old. Although it is technically a latest release, it was made in 2016. 2 + # Redpanda uses its own version 3 + { clangStdenv 4 + , cmake 5 + , fetchFromGitHub 6 + , lib 7 + , pkg-config 8 + }: 9 + 10 + clangStdenv.mkDerivation rec { 11 + pname = "rapidjson"; 12 + version = "1.1.1"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "redpanda-data"; 16 + repo = "rapidjson"; 17 + rev = "27c3a8dc0e2c9218fe94986d249a12b5ed838f1d"; 18 + sha256 = "sha256-wggyCL5uEsnJDxkYAUsXOjoO1MNQBGB05E6aSpsNcl0="; 19 + }; 20 + 21 + nativeBuildInputs = [ pkg-config cmake ]; 22 + 23 + doCheck = false; 24 + 25 + meta = with lib; { 26 + description = "Fast JSON parser/generator for C++ with both SAX/DOM style API"; 27 + homepage = "http://rapidjson.org/"; 28 + maintainers = with maintainers; [ avakhrenev ]; 29 + license = licenses.mit; 30 + platforms = platforms.unix; 31 + }; 32 + }
+73
pkgs/servers/redpanda/redpanda.patch
···
··· 1 + diff --git a/cmake/main.cmake b/cmake/main.cmake 2 + index 8c60c4214..194f33a21 100644 3 + --- a/cmake/main.cmake 4 + +++ b/cmake/main.cmake 5 + @@ -15,15 +15,6 @@ set(CMAKE_CXX_STANDARD_REQUIRED ON) 6 + set(CMAKE_UNITY_BUILD_BATCH_SIZE 10) 7 + set(CMAKE_CXX_EXTENSIONS OFF) 8 + set(CMAKE_POSITION_INDEPENDENT_CODE ON) 9 + -list(APPEND BASE_LD_FLAGS_LIST 10 + - -L${REDPANDA_DEPS_INSTALL_DIR}/lib 11 + - -L${REDPANDA_DEPS_INSTALL_DIR}/lib64 12 + - -fuse-ld=lld) 13 + -set(PKG_CONFIG_PATH_LIST 14 + - ${REDPANDA_DEPS_INSTALL_DIR}/lib64/pkgconfig 15 + - ${REDPANDA_DEPS_INSTALL_DIR}/share/pkgconfig 16 + - ${REDPANDA_DEPS_INSTALL_DIR}/lib/pkgconfig 17 + - ) 18 + 19 + list(APPEND BASE_CXX_FLAGS_LIST -fPIC) 20 + list(APPEND BASE_C_FLAGS_LIST -fPIC) 21 + diff --git a/cmake/testing.cmake b/cmake/testing.cmake 22 + index 7f149dc82..7c57aa3dd 100644 23 + --- a/cmake/testing.cmake 24 + +++ b/cmake/testing.cmake 25 + @@ -24,6 +24,7 @@ message(STATUS "RP_ENABLE_BENCHMARK_TESTS=${RP_ENABLE_BENCHMARK_TESTS}") 26 + message(STATUS "RP_ENABLE_HONEY_BADGER_TESTS=${RP_ENABLE_HONEY_BADGER_TESTS}") 27 + 28 + function (rp_test) 29 + + return() 30 + set(options 31 + INTEGRATION_TEST UNIT_TEST BENCHMARK_TEST HBADGER_TEST) 32 + set(oneValueArgs BINARY_NAME TIMEOUT PREPARE_COMMAND POST_COMMAND) 33 + diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt 34 + index eecd145ed..b9efa89b5 100644 35 + --- a/src/CMakeLists.txt 36 + +++ b/src/CMakeLists.txt 37 + @@ -5,4 +5,5 @@ find_package(Boost REQUIRED 38 + unit_test_framework) 39 + find_package(absl REQUIRED) 40 + add_subdirectory(v) 41 + -add_subdirectory(go/kreq-gen) 42 + +# Don't build kafka-request-generator, it is needed only for tests 43 + +# add_subdirectory(go/kreq-gen) 44 + diff --git a/src/v/CMakeLists.txt b/src/v/CMakeLists.txt 45 + index 075da485e..af7ede2bc 100644 46 + --- a/src/v/CMakeLists.txt 47 + +++ b/src/v/CMakeLists.txt 48 + @@ -58,7 +58,9 @@ else() 49 + if(${ENABLE_GIT_HASH}) 50 + message(FATAL_ERROR "ENABLE_GIT_HASH cannot be 'on' when ENABLE_GIT_VERSION is 'off'") 51 + endif() 52 + - set(GIT_VER "no_version") 53 + + if(NOT GIT_VER) 54 + + set(GIT_VER "no_version") 55 + + endif() 56 + endif() 57 + 58 + if(${ENABLE_GIT_HASH}) 59 + @@ -71,8 +73,12 @@ if(${ENABLE_GIT_HASH}) 60 + set(GIT_CLEAN_DIRTY "") 61 + endif() 62 + else() 63 + - set(GIT_SHA1 "000") 64 + - set(GIT_CLEAN_DIRTY "-dev") 65 + + if(NOT GIT_SHA1) 66 + + set(GIT_SHA1 "000") 67 + + endif() 68 + + if(NOT GIT_CLEAN_DIRTY) 69 + + set(GIT_CLEAN_DIRTY "-dev") 70 + + endif() 71 + endif() 72 + 73 + configure_file(version.h.in version.h @ONLY)
+13
pkgs/servers/redpanda/seastar-fixes.patch
···
··· 1 + diff --git a/include/seastar/core/std-coroutine.hh b/include/seastar/core/std-coroutine.hh 2 + index ea364bee..57474529 100644 3 + --- a/include/seastar/core/std-coroutine.hh 4 + +++ b/include/seastar/core/std-coroutine.hh 5 + @@ -87,7 +87,7 @@ class coroutine_handle<void> { 6 + 7 + explicit operator bool() const noexcept { return _pointer; } 8 + 9 + - static coroutine_handle from_address(void* ptr) noexcept { 10 + + static constexpr coroutine_handle from_address(void* ptr) noexcept { 11 + coroutine_handle hndl; 12 + hndl._pointer = ptr; 13 + return hndl;
+84
pkgs/servers/redpanda/seastar.nix
···
··· 1 + { boost175 2 + , c-ares 3 + , cmake 4 + , cryptopp 5 + , fetchFromGitHub 6 + , fmt_8 7 + , gnutls 8 + , hwloc 9 + , lib 10 + , libsystemtap 11 + , libtasn1 12 + , liburing 13 + , libxfs 14 + , lksctp-tools 15 + , llvmPackages_14 16 + , lz4 17 + , ninja 18 + , numactl 19 + , openssl 20 + , pkg-config 21 + , python3 22 + , ragel 23 + , valgrind 24 + , yaml-cpp 25 + }: 26 + let 27 + pname = "seastar"; 28 + version = "22.11.0"; 29 + in 30 + llvmPackages_14.stdenv.mkDerivation { 31 + inherit pname version; 32 + strictDeps = true; 33 + src = fetchFromGitHub { 34 + owner = "redpanda-data"; 35 + repo = "seastar"; 36 + rev = "30d3a28bde08d2228b4e560c173b89fdd94c3f05"; 37 + sha256 = "sha256-Xzu7AJMkvE++BGEqluod3fwMEIpDnbCczmlEad0/4v4="; 38 + }; 39 + nativeBuildInputs = [ 40 + cmake 41 + ninja 42 + openssl 43 + pkg-config 44 + python3 45 + ragel 46 + ]; 47 + buildInputs = [ 48 + libsystemtap 49 + libxfs 50 + ]; 51 + propagatedBuildInputs = [ 52 + boost175 53 + c-ares 54 + gnutls 55 + cryptopp 56 + fmt_8 57 + hwloc 58 + libtasn1 59 + liburing 60 + lksctp-tools 61 + lz4 62 + numactl 63 + valgrind 64 + yaml-cpp 65 + ]; 66 + patches = [ 67 + ./seastar-fixes.patch 68 + ]; 69 + postPatch = '' 70 + patchShebangs ./scripts/seastar-json2code.py 71 + ''; 72 + cmakeFlags = [ 73 + "-DSeastar_EXCLUDE_DEMOS_FROM_ALL=ON" 74 + "-DSeastar_EXCLUDE_TESTS_FROM_ALL=ON" 75 + ]; 76 + doCheck = false; 77 + meta = with lib; { 78 + description = "High performance server-side application framework."; 79 + license = licenses.asl20; 80 + homepage = "https://seastar.io/"; 81 + maintainers = with maintainers; [ avakhrenev ]; 82 + platforms = platforms.unix; 83 + }; 84 + }
+123
pkgs/servers/redpanda/server.nix
···
··· 1 + { abseil-cpp 2 + , avro-cpp 3 + , callPackage 4 + , ccache 5 + , cmake 6 + , crc32c 7 + , croaring 8 + , ctre 9 + , curl 10 + , dpdk 11 + , git 12 + , lib 13 + , llvmPackages_14 14 + , llvm_14 15 + , ninja 16 + , p11-kit 17 + , pkg-config 18 + , procps 19 + , protobuf3_21 20 + , python3 21 + , snappy 22 + , src 23 + , unzip 24 + , version 25 + , writeShellScriptBin 26 + , xxHash 27 + , zip 28 + , zstd 29 + }: 30 + let 31 + pname = "redpanda"; 32 + pythonPackages = p: with p; [ jinja2 ]; 33 + seastar = callPackage ./seastar.nix { }; 34 + base64 = callPackage ./base64.nix { }; 35 + hdr-histogram = callPackage ./hdr-histogram.nix { }; 36 + kafka-codegen-venv = python3.withPackages (ps: [ 37 + ps.jinja2 38 + ps.jsonschema 39 + ]); 40 + rapidjson = callPackage ./rapidjson.nix { }; 41 + in 42 + llvmPackages_14.stdenv.mkDerivation rec { 43 + inherit pname version src; 44 + 45 + preConfigure = '' 46 + # setup sccache 47 + export CCACHE_DIR=$TMPDIR/sccache-redpanda 48 + mkdir -p $CCACHE_DIR 49 + ''; 50 + patches = [ 51 + ./redpanda.patch 52 + ]; 53 + postPatch = '' 54 + # Fix 'error: use of undeclared identifier 'roaring'; did you mean 'Roaring 55 + # qualified reference to 'Roaring' is a constructor name rather than a type in this context' 56 + substituteInPlace \ 57 + ./src/v/storage/compacted_offset_list.h \ 58 + ./src/v/storage/compaction_reducers.cc \ 59 + ./src/v/storage/compaction_reducers.h \ 60 + ./src/v/storage/segment_utils.h \ 61 + ./src/v/storage/segment_utils.cc \ 62 + --replace 'roaring::Roaring' 'Roaring' 63 + 64 + patchShebangs ./src/v/rpc/rpc_compiler.py 65 + ''; 66 + 67 + doCheck = false; 68 + 69 + nativeBuildInputs = [ 70 + (python3.withPackages pythonPackages) 71 + (writeShellScriptBin "kafka-codegen-venv" "exec -a $0 ${kafka-codegen-venv}/bin/python3 $@") 72 + ccache 73 + cmake 74 + curl 75 + git 76 + llvm_14 77 + ninja 78 + pkg-config 79 + procps 80 + seastar 81 + unzip 82 + zip 83 + ]; 84 + 85 + cmakeFlags = [ 86 + "-DREDPANDA_DEPS_SKIP_BUILD=ON" 87 + "-DRP_ENABLE_TESTS=OFF" 88 + "-Wno-dev" 89 + "-DGIT_VER=${version}" 90 + "-DGIT_CLEAN_DIRTY=\"\"" 91 + ]; 92 + 93 + buildInputs = [ 94 + abseil-cpp 95 + avro-cpp 96 + base64 97 + crc32c 98 + croaring 99 + ctre 100 + dpdk 101 + hdr-histogram 102 + p11-kit 103 + protobuf3_21 104 + rapidjson 105 + seastar 106 + snappy 107 + xxHash 108 + zstd 109 + ]; 110 + 111 + meta = with lib; { 112 + description = "Kafka-compatible streaming platform."; 113 + license = licenses.bsl11; 114 + longDescription = '' 115 + Redpanda is a Kafka-compatible streaming data platform that is 116 + proven to be 10x faster and 6x lower in total costs. It is also JVM-free, 117 + ZooKeeper-free, Jepsen-tested and source available. 118 + ''; 119 + homepage = "https://redpanda.com/"; 120 + maintainers = with maintainers; [ avakhrenev happysalada ]; 121 + platforms = platforms.linux; 122 + }; 123 + }
+45 -14
pkgs/servers/teleport/default.nix
··· 2 , buildGoModule 3 , rustPlatform 4 , fetchFromGitHub 5 , makeWrapper 6 , symlinkJoin 7 , CoreFoundation 8 , AppKit 9 , libfido2 10 , openssl 11 , pkg-config 12 , protobuf 13 , Security 14 , stdenv 15 , xdg-utils 16 , nixosTests 17 18 , withRdpClient ? true ··· 23 owner = "gravitational"; 24 repo = "teleport"; 25 rev = "v${version}"; 26 - hash = "sha256-dr+tmWVO7yXRLTvJZoFZzayRWETa8wC/aZ7S/vh8qyk="; 27 }; 28 - version = "11.2.3"; 29 30 rdpClient = rustPlatform.buildRustPackage rec { 31 pname = "teleport-rdpclient"; 32 - cargoHash = "sha256-8NTzX9HeGg9U3bmiZHXHTcKnbJk55YfY2bkjilEyg0g="; 33 inherit version src; 34 35 buildAndTestSubdir = "lib/srv/desktop/rdp/rdpclient"; ··· 50 ''; 51 }; 52 53 - webassets = fetchFromGitHub { 54 - owner = "gravitational"; 55 - repo = "webassets"; 56 - # Submodule rev from https://github.com/gravitational/teleport/tree/v11.2.3 57 - rev = "cbddcfda9d5ccba11f02ee61bd305c1f600ee6b0"; 58 - hash = "sha256-XPcQaMyf6kEj5RDRKjNO5b+n1zj/TpBHcDnGhYVUbts="; 59 }; 60 in 61 buildGoModule rec { 62 pname = "teleport"; 63 64 inherit src version; 65 - vendorHash = "sha256-rWdRVOaPPK2oXK6fXka4FtuxEkaQf4igm7xlg0wauMs="; 66 67 subPackages = [ "tool/tbot" "tool/tctl" "tool/teleport" "tool/tsh" ]; 68 tags = [ "libfido2" "webassets_embed" ] ··· 85 outputs = [ "out" "client" ]; 86 87 preBuild = '' 88 - mkdir -p build 89 - echo "making webassets" 90 - cp -r ${webassets}/* webassets/ 91 - make -j$NIX_BUILD_CORES lib/web/build/webassets 92 '' + lib.optionalString withRdpClient '' 93 ln -s ${rdpClient}/lib/* lib/ 94 ln -s ${rdpClient}/include/* lib/srv/desktop/rdp/rdpclient/
··· 2 , buildGoModule 3 , rustPlatform 4 , fetchFromGitHub 5 + , fetchYarnDeps 6 , makeWrapper 7 , symlinkJoin 8 , CoreFoundation 9 , AppKit 10 , libfido2 11 + , nodejs 12 , openssl 13 , pkg-config 14 , protobuf 15 , Security 16 , stdenv 17 , xdg-utils 18 + , yarn 19 + , yarn2nix-moretea 20 , nixosTests 21 22 , withRdpClient ? true ··· 27 owner = "gravitational"; 28 repo = "teleport"; 29 rev = "v${version}"; 30 + hash = "sha256-jJfOgcwKkNFO/5XHxMoapZxM8Tb0kEgKVA7SrMU7uW4="; 31 }; 32 + version = "11.3.4"; 33 34 rdpClient = rustPlatform.buildRustPackage rec { 35 pname = "teleport-rdpclient"; 36 + cargoHash = "sha256-TSIwLCY01ygCWT73LR/Ch7NwPQA3a3r0PyL3hUzBNr4="; 37 inherit version src; 38 39 buildAndTestSubdir = "lib/srv/desktop/rdp/rdpclient"; ··· 54 ''; 55 }; 56 57 + yarnOfflineCache = fetchYarnDeps { 58 + yarnLock = "${src}/yarn.lock"; 59 + hash = "sha256-MAGeWzA366yzpjdCY0+X6RV5MKcsHa/xD5CJu6ce1FU="; 60 + }; 61 + 62 + webassets = stdenv.mkDerivation { 63 + pname = "teleport-webassets"; 64 + inherit src version; 65 + 66 + nativeBuildInputs = [ 67 + nodejs 68 + yarn 69 + yarn2nix-moretea.fixup_yarn_lock 70 + ]; 71 + 72 + configurePhase = '' 73 + export HOME=$(mktemp -d) 74 + ''; 75 + 76 + buildPhase = '' 77 + yarn config --offline set yarn-offline-mirror ${yarnOfflineCache} 78 + fixup_yarn_lock yarn.lock 79 + 80 + yarn install --offline \ 81 + --frozen-lockfile \ 82 + --ignore-engines --ignore-scripts 83 + patchShebangs . 84 + 85 + yarn build-ui-oss 86 + ''; 87 + 88 + installPhase = '' 89 + mkdir -p $out 90 + cp -R webassets/. $out 91 + ''; 92 }; 93 in 94 buildGoModule rec { 95 pname = "teleport"; 96 97 inherit src version; 98 + vendorHash = "sha256-NkiFLEHBNjxUOSuAlVugAV14yCCo3z6yhX7LZQFKhvA="; 99 + proxyVendor = true; 100 101 subPackages = [ "tool/tbot" "tool/tctl" "tool/teleport" "tool/tsh" ]; 102 tags = [ "libfido2" "webassets_embed" ] ··· 119 outputs = [ "out" "client" ]; 120 121 preBuild = '' 122 + cp -r ${webassets} webassets 123 '' + lib.optionalString withRdpClient '' 124 ln -s ${rdpClient}/lib/* lib/ 125 ln -s ${rdpClient}/include/* lib/srv/desktop/rdp/rdpclient/
+3 -3
pkgs/shells/nix-your-shell/default.nix
··· 5 }: 6 rustPlatform.buildRustPackage rec { 7 pname = "nix-your-shell"; 8 - version = "1.0.2"; 9 10 src = fetchFromGitHub { 11 owner = "MercuryTechnologies"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-W3MeApvqO3hBaHWu6vyrR6pniEMMKiXTAQ0bhUPbpx8="; 15 }; 16 17 - cargoSha256 = "sha256-M6yj4jTTWnembVX51/Xz+JtKhWJsmQ7SpipH8pHzids="; 18 19 meta = with lib; { 20 description = "A `nix` and `nix-shell` wrapper for shells other than `bash`";
··· 5 }: 6 rustPlatform.buildRustPackage rec { 7 pname = "nix-your-shell"; 8 + version = "1.1.0"; 9 10 src = fetchFromGitHub { 11 owner = "MercuryTechnologies"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-MXshCRgGL2V51Pd1ms6D0Sn0mtRcxd0pWUz+zghBTdI="; 15 }; 16 17 + cargoSha256 = "sha256-f1igCSdv6iMUDeCDGSxDIecjVcJQN2jbdALGMpDVepQ="; 18 19 meta = with lib; { 20 description = "A `nix` and `nix-shell` wrapper for shells other than `bash`";
+21
pkgs/tools/misc/mpy-utils/default.nix
···
··· 1 + { stdenv, lib, python3, buildPythonApplication, fetchPypi, fusepy, pyserial }: 2 + 3 + buildPythonApplication rec { 4 + pname = "mpy-utils"; 5 + version = "0.1.13"; 6 + 7 + src = fetchPypi { 8 + inherit pname version; 9 + hash = "sha256-die8hseaidhs9X7mfFvV8C8zn0uyw08gcHNqmjl+2Z4="; 10 + }; 11 + 12 + propagatedBuildInputs = [ fusepy pyserial ]; 13 + 14 + meta = with lib; { 15 + description = "MicroPython development utility programs"; 16 + homepage = "https://github.com/nickzoic/mpy-utils"; 17 + license = licenses.mit; 18 + maintainers = with maintainers; [ aciceri ]; 19 + broken = stdenv.isDarwin; 20 + }; 21 + }
+3 -3
pkgs/tools/misc/mutagen-compose/default.nix
··· 2 3 buildGoModule rec { 4 pname = "mutagen-compose"; 5 - version = "0.16.4"; 6 7 src = fetchFromGitHub { 8 owner = "mutagen-io"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-V+9TSzCwBITpG7j3mOyPMQN1VwYSPRFgOBPiF3LZVmk="; 12 }; 13 14 - vendorHash = "sha256-m6XCXwns2if7Odhc2nFbXbGhif4vElrVjcBX0DULkCE="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "mutagen-compose"; 5 + version = "0.16.5"; 6 7 src = fetchFromGitHub { 8 owner = "mutagen-io"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-Rn3aXwez/WUGpuRvA6lkuECchpYek8KDMh6xzZOV9v0="; 12 }; 13 14 + vendorHash = "sha256-EkLeB2zUJkKCWsJxMiYHSDgr0/8X24MT0Jp0nuYebds="; 15 16 doCheck = false; 17
+3 -3
pkgs/tools/misc/ntfy-sh/default.nix
··· 10 in 11 buildGoModule rec { 12 pname = "ntfy-sh"; 13 - version = "1.30.1"; 14 15 src = fetchFromGitHub { 16 owner = "binwiederhier"; 17 repo = "ntfy"; 18 rev = "v${version}"; 19 - sha256 = "sha256-MgjCfYYv4tBZHsoj9oXGKYOQb0Anp0zVD/vc+UpAiAc="; 20 }; 21 22 - vendorSha256 = "sha256-8TQVpJ02EPve1OUP6RHbvwBug8larSO3BgBiCfL2614="; 23 24 doCheck = false; 25
··· 10 in 11 buildGoModule rec { 12 pname = "ntfy-sh"; 13 + version = "1.31.0"; 14 15 src = fetchFromGitHub { 16 owner = "binwiederhier"; 17 repo = "ntfy"; 18 rev = "v${version}"; 19 + sha256 = "sha256-SQOiVHhdwOmzWVPtr1hw9oz8G/xjz5HghYcNN/u3ITo="; 20 }; 21 22 + vendorSha256 = "sha256-Ffmz7c/FMtXjmanZYp8vquxUu+eSTqtR5nesNdN/F0c="; 23 24 doCheck = false; 25
+2 -2
pkgs/tools/security/clamav/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "clamav"; 9 - version = "1.0.0"; 10 11 src = fetchurl { 12 url = "https://www.clamav.net/downloads/production/${pname}-${version}.tar.gz"; 13 - hash = "sha256-vaObuFaQLm3WB36jE6Pri+zNSH4AgqlZF4d/Kymc2G4="; 14 }; 15 16 patches = [
··· 6 7 stdenv.mkDerivation rec { 8 pname = "clamav"; 9 + version = "1.0.1"; 10 11 src = fetchurl { 12 url = "https://www.clamav.net/downloads/production/${pname}-${version}.tar.gz"; 13 + hash = "sha256-CHLcG4L/TNfo5DI/r17kGh9mroCGXQVCkIW5RjVdhu4="; 14 }; 15 16 patches = [
+47
pkgs/tools/security/posteid-seed-extractor/default.nix
···
··· 1 + { lib 2 + , python3Packages 3 + , fetchFromGitHub 4 + }: 5 + 6 + python3Packages.buildPythonApplication { 7 + pname = "posteid-seed-extractor"; 8 + version = "unstable-2022-02-23"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "simone36050"; 12 + repo = "PosteID-seed-extractor"; 13 + rev = "667e2997a98aa3273a6bf6b4b34ca77715120e7f"; 14 + hash = "sha256-smNwp67HYbZuMrl0uf2X2yox2JqeEV6WzIBp4dALwgw="; 15 + }; 16 + 17 + format = "other"; 18 + 19 + pythonPath = with python3Packages; [ 20 + certifi 21 + cffi 22 + charset-normalizer 23 + cryptography 24 + idna 25 + jwcrypto 26 + pycparser 27 + pycryptodome 28 + pyotp 29 + qrcode 30 + requests 31 + urllib3 32 + wrapt 33 + ]; 34 + 35 + installPhase = '' 36 + runHook preInstall 37 + install -Dm755 extractor.py $out/bin/posteid-seed-extractor 38 + runHook postInstall 39 + ''; 40 + 41 + meta = with lib; { 42 + homepage = "https://github.com/simone36050/PosteID-seed-extractor"; 43 + description = "Extract OTP seed instead of using PosteID app"; 44 + license = licenses.mit; 45 + maintainers = with maintainers; [ aciceri ]; 46 + }; 47 + }
+9 -2
pkgs/tools/security/vaultwarden/update.nix
··· 1 { writeShellScript 2 , lib 3 , nix-update 4 , curl 5 , git ··· 9 }: 10 11 writeShellScript "update-vaultwarden" '' 12 - PATH=${lib.makeBinPath [ curl git gnugrep gnused jq nix-update ]} 13 14 set -euxo pipefail 15 ··· 17 nix-update "vaultwarden" --version "$VAULTWARDEN_VERSION" 18 19 URL="https://raw.githubusercontent.com/dani-garcia/vaultwarden/''${VAULTWARDEN_VERSION}/docker/Dockerfile.j2" 20 - WEBVAULT_VERSION=$(curl --silent "$URL" | grep "set vault_version" | sed -E "s/.*\"([^\"]+)\".*/\\1/") 21 nix-update "vaultwarden.webvault" --version "$WEBVAULT_VERSION" 22 ''
··· 1 { writeShellScript 2 , lib 3 + , nix 4 + , nix-prefetch-git 5 , nix-update 6 , curl 7 , git ··· 11 }: 12 13 writeShellScript "update-vaultwarden" '' 14 + PATH=${lib.makeBinPath [ curl git gnugrep gnused jq nix nix-prefetch-git nix-update ]} 15 16 set -euxo pipefail 17 ··· 19 nix-update "vaultwarden" --version "$VAULTWARDEN_VERSION" 20 21 URL="https://raw.githubusercontent.com/dani-garcia/vaultwarden/''${VAULTWARDEN_VERSION}/docker/Dockerfile.j2" 22 + WEBVAULT_VERSION=$(curl --silent "$URL" | grep "set vault_version" | sed -E "s/.*\"v([^\"]+)\".*/\\1/") 23 + old_hash_bw=$(nix --extra-experimental-features nix-command eval -f default.nix --raw vaultwarden.webvault.src.outputHash) 24 + old_hash_vw=$(nix --extra-experimental-features nix-command eval -f default.nix --raw vaultwarden.webvault.bw_web_builds.outputHash) 25 + new_hash_bw=$(nix --extra-experimental-features nix-command hash to-sri --type sha256 $(nix-prefetch-git https://github.com/bitwarden/clients.git --rev "web-v$WEBVAULT_VERSION" | jq --raw-output ".sha256")) 26 + new_hash_vw=$(nix --extra-experimental-features nix-command hash to-sri --type sha256 $(nix-prefetch-git https://github.com/dani-garcia/bw_web_builds.git --rev "v$WEBVAULT_VERSION" | jq --raw-output ".sha256")) 27 + sed -e "s#$old_hash_bw#$new_hash_bw#" -e "s#$old_hash_vw#$new_hash_vw#" -i pkgs/tools/security/vaultwarden/webvault.nix 28 nix-update "vaultwarden.webvault" --version "$WEBVAULT_VERSION" 29 ''
+58 -13
pkgs/tools/security/vaultwarden/webvault.nix
··· 1 - { lib, stdenv, fetchurl, nixosTests }: 2 3 - stdenv.mkDerivation rec { 4 - pname = "vaultwarden-webvault"; 5 version = "2022.12.0"; 6 7 - src = fetchurl { 8 - url = "https://github.com/dani-garcia/bw_web_builds/releases/download/v${version}/bw_web_v${version}.tar.gz"; 9 - hash = "sha256-QC3/aqIF2NdJPHmwUbvJR62wsUGBrgsHJCyqBJ/0gMc="; 10 }; 11 12 - buildCommand = '' 13 - mkdir -p $out/share/vaultwarden/ 14 - cd $out/share/vaultwarden/ 15 - tar xf $src 16 - mv web-vault vault 17 ''; 18 19 - passthru.tests = nixosTests.vaultwarden; 20 21 meta = with lib; { 22 description = "Integrates the web vault into vaultwarden"; 23 homepage = "https://github.com/dani-garcia/bw_web_builds"; 24 platforms = platforms.all; 25 license = licenses.gpl3Plus; 26 - maintainers = with maintainers; [ msteen mic92 ]; 27 }; 28 }
··· 1 + { lib 2 + , buildNpmPackage 3 + , fetchFromGitHub 4 + , git 5 + , nixosTests 6 + , nodejs-16_x 7 + , python3 8 + }: 9 10 + let 11 + buildNpmPackage' = buildNpmPackage.override { nodejs = nodejs-16_x; }; 12 + 13 version = "2022.12.0"; 14 15 + bw_web_builds = fetchFromGitHub { 16 + owner = "dani-garcia"; 17 + repo = "bw_web_builds"; 18 + rev = "v${version}"; 19 + hash = "sha256-4yUE0ySUCKmmbca+T8qjqSO0AHZEUAHZ4nheRjpDnZo="; 20 + }; 21 + in buildNpmPackage' { 22 + pname = "vaultwarden-webvault"; 23 + inherit version; 24 + 25 + src = fetchFromGitHub { 26 + owner = "bitwarden"; 27 + repo = "clients"; 28 + rev = "web-v${version}"; 29 + hash = "sha256-CsbnnP12P7JuGDOm5Ia73SzET/jCx3qRbz9vdUf7lCA="; 30 }; 31 32 + npmDepsHash = "sha256-wWOtVGNOzY2s82nfQDuWgA4ukpJxJr8Z7Y+rFPq2QdU="; 33 + 34 + postPatch = '' 35 + ln -s ${bw_web_builds}/{patches,resources} .. 36 + PATH="${git}/bin:$PATH" VAULT_VERSION=${bw_web_builds.rev} \ 37 + bash ${bw_web_builds}/scripts/apply_patches.sh 38 + ''; 39 + 40 + nativeBuildInputs = [ 41 + python3 42 + ]; 43 + 44 + makeCacheWritable = true; 45 + 46 + ELECTRON_SKIP_BINARY_DOWNLOAD = "1"; 47 + 48 + npmBuildScript = "dist:oss:selfhost"; 49 + 50 + npmBuildFlags = [ 51 + "--workspace" "apps/web" 52 + ]; 53 + 54 + installPhase = '' 55 + runHook preInstall 56 + mkdir -p $out/share/vaultwarden 57 + mv apps/web/build $out/share/vaultwarden/vault 58 + runHook postInstall 59 ''; 60 61 + passthru = { 62 + inherit bw_web_builds; 63 + tests = nixosTests.vaultwarden; 64 + }; 65 66 meta = with lib; { 67 description = "Integrates the web vault into vaultwarden"; 68 homepage = "https://github.com/dani-garcia/bw_web_builds"; 69 platforms = platforms.all; 70 license = licenses.gpl3Plus; 71 + maintainers = with maintainers; [ dotlambda msteen mic92 ]; 72 }; 73 }
+12 -1
pkgs/top-level/all-packages.nix
··· 1530 1531 mprocs = callPackage ../tools/misc/mprocs { }; 1532 1533 nominatim = callPackage ../servers/nominatim { }; 1534 1535 ocs-url = libsForQt5.callPackage ../tools/misc/ocs-url { }; ··· 7586 7587 gdmap = callPackage ../tools/system/gdmap { }; 7588 7589 gef = callPackage ../development/tools/misc/gef { }; 7590 7591 gelasio = callPackage ../data/fonts/gelasio { }; ··· 11008 11009 pocketbase = callPackage ../servers/pocketbase { }; 11010 11011 - podman = callPackage ../applications/virtualization/podman { }; 11012 11013 podman-compose = python3Packages.callPackage ../applications/virtualization/podman-compose {}; 11014 ··· 11045 pantum-driver = callPackage ../misc/drivers/pantum-driver { 11046 libjpeg8 = libjpeg.override { enableJpeg8 = true; }; 11047 }; 11048 11049 postscript-lexmark = callPackage ../misc/drivers/postscript-lexmark { }; 11050 ··· 11396 redmine = callPackage ../applications/version-management/redmine { }; 11397 11398 redpanda = callPackage ../servers/redpanda { }; 11399 11400 redsocks = callPackage ../tools/networking/redsocks { }; 11401 ··· 27530 nanum = callPackage ../data/fonts/nanum { }; 27531 27532 nanum-gothic-coding = callPackage ../data/fonts/nanum-gothic-coding { }; 27533 27534 national-park-typeface = callPackage ../data/fonts/national-park { }; 27535
··· 1530 1531 mprocs = callPackage ../tools/misc/mprocs { }; 1532 1533 + mpy-utils = python3Packages.callPackage ../tools/misc/mpy-utils { }; 1534 + 1535 nominatim = callPackage ../servers/nominatim { }; 1536 1537 ocs-url = libsForQt5.callPackage ../tools/misc/ocs-url { }; ··· 7588 7589 gdmap = callPackage ../tools/system/gdmap { }; 7590 7591 + gdtoolkit = callPackage ../development/tools/gdtoolkit { }; 7592 + 7593 gef = callPackage ../development/tools/misc/gef { }; 7594 7595 gelasio = callPackage ../data/fonts/gelasio { }; ··· 11012 11013 pocketbase = callPackage ../servers/pocketbase { }; 11014 11015 + podman = callPackage ../applications/virtualization/podman/wrapper.nix { }; 11016 + podman-unwrapped = callPackage ../applications/virtualization/podman { }; 11017 11018 podman-compose = python3Packages.callPackage ../applications/virtualization/podman-compose {}; 11019 ··· 11050 pantum-driver = callPackage ../misc/drivers/pantum-driver { 11051 libjpeg8 = libjpeg.override { enableJpeg8 = true; }; 11052 }; 11053 + 11054 + posteid-seed-extractor = callPackage ../tools/security/posteid-seed-extractor {}; 11055 11056 postscript-lexmark = callPackage ../misc/drivers/postscript-lexmark { }; 11057 ··· 11403 redmine = callPackage ../applications/version-management/redmine { }; 11404 11405 redpanda = callPackage ../servers/redpanda { }; 11406 + 11407 + redpanda-server = redpanda.server; 11408 11409 redsocks = callPackage ../tools/networking/redsocks { }; 11410 ··· 27539 nanum = callPackage ../data/fonts/nanum { }; 27540 27541 nanum-gothic-coding = callPackage ../data/fonts/nanum-gothic-coding { }; 27542 + 27543 + nasin-nanpa = callPackage ../data/fonts/nasin-nanpa {}; 27544 27545 national-park-typeface = callPackage ../data/fonts/national-park { }; 27546
+1
pkgs/top-level/python-aliases.nix
··· 91 functorch = throw "functorch is now part of the torch package and has therefore been removed. See https://github.com/pytorch/functorch/releases/tag/v1.13.0 for more info."; # added 2022-12-01 92 garages-amsterdam = throw "garages-amsterdam has been renamed odp-amsterdam."; # added 2023-01-04 93 garminconnect-ha = garminconnect; # added 2022-02-05 94 gigalixir = throw "gigalixir has been promoted to a top-level attribute"; # Added 2022-10-02 95 gitdb2 = throw "gitdb2 has been deprecated, use gitdb instead."; # added 2020-03-14 96 GitPython = gitpython; # added 2022-10-28
··· 91 functorch = throw "functorch is now part of the torch package and has therefore been removed. See https://github.com/pytorch/functorch/releases/tag/v1.13.0 for more info."; # added 2022-12-01 92 garages-amsterdam = throw "garages-amsterdam has been renamed odp-amsterdam."; # added 2023-01-04 93 garminconnect-ha = garminconnect; # added 2022-02-05 94 + gdtoolkit = throw "gdtoolkit has been promoted to a top-level attribute"; # added 2023-02-15 95 gigalixir = throw "gigalixir has been promoted to a top-level attribute"; # Added 2022-10-02 96 gitdb2 = throw "gitdb2 has been deprecated, use gitdb instead."; # added 2020-03-14 97 GitPython = gitpython; # added 2022-10-28
-2
pkgs/top-level/python-packages.nix
··· 3726 3727 gdown = callPackage ../development/python-modules/gdown { }; 3728 3729 - gdtoolkit = callPackage ../development/python-modules/gdtoolkit { }; 3730 - 3731 ge25519 = callPackage ../development/python-modules/ge25519 { }; 3732 3733 geant4 = toPythonModule (pkgs.geant4.override {
··· 3726 3727 gdown = callPackage ../development/python-modules/gdown { }; 3728 3729 ge25519 = callPackage ../development/python-modules/ge25519 { }; 3730 3731 geant4 = toPythonModule (pkgs.geant4.override {