lol

Merge staging-next into staging

authored by

nixpkgs-ci[bot] and committed by
GitHub
775423fe 3e0f5100

+106 -66
+60 -20
nixos/modules/installer/cd-dvd/iso-image.nix
··· 4 4 { 5 5 config, 6 6 lib, 7 + utils, 7 8 pkgs, 8 9 ... 9 10 }: ··· 785 786 # specified on the kernel command line, created in the stage 1 786 787 # init script. 787 788 "/iso" = lib.mkImageMediaOverride { 788 - device = "/dev/root"; 789 + device = 790 + if config.boot.initrd.systemd.enable then 791 + "/dev/disk/by-label/${config.isoImage.volumeID}" 792 + else 793 + "/dev/root"; 789 794 neededForBoot = true; 790 795 noCheck = true; 791 796 }; ··· 794 799 # image) to make this a live CD. 795 800 "/nix/.ro-store" = lib.mkImageMediaOverride { 796 801 fsType = "squashfs"; 797 - device = "/iso/nix-store.squashfs"; 802 + device = "${lib.optionalString config.boot.initrd.systemd.enable "/sysroot"}/iso/nix-store.squashfs"; 798 803 options = [ 799 804 "loop" 800 805 ] ··· 809 814 }; 810 815 811 816 "/nix/store" = lib.mkImageMediaOverride { 812 - fsType = "overlay"; 813 - device = "overlay"; 814 - options = [ 815 - "lowerdir=/nix/.ro-store" 816 - "upperdir=/nix/.rw-store/store" 817 - "workdir=/nix/.rw-store/work" 818 - ]; 819 - depends = [ 820 - "/nix/.ro-store" 821 - "/nix/.rw-store/store" 822 - "/nix/.rw-store/work" 823 - ]; 817 + overlay = { 818 + lowerdir = [ "/nix/.ro-store" ]; 819 + upperdir = "/nix/.rw-store/store"; 820 + workdir = "/nix/.rw-store/work"; 821 + }; 824 822 }; 825 823 }; 826 824 ··· 882 880 # UUID of the USB stick. It would be nicer to write 883 881 # `root=/dev/disk/by-label/...' here, but UNetbootin doesn't 884 882 # recognise that. 885 - boot.kernelParams = [ 886 - "root=LABEL=${config.isoImage.volumeID}" 883 + boot.kernelParams = lib.optionals (!config.boot.initrd.systemd.enable) [ 887 884 "boot.shell_on_fail" 885 + "root=LABEL=${config.isoImage.volumeID}" 888 886 ]; 889 887 890 888 fileSystems = config.lib.isoFileSystems; ··· 901 899 "overlay" 902 900 ]; 903 901 902 + boot.initrd.systemd = lib.mkIf config.boot.initrd.systemd.enable { 903 + emergencyAccess = true; 904 + 905 + # Most of util-linux is not included by default. 906 + initrdBin = [ config.boot.initrd.systemd.package.util-linux ]; 907 + services.copytoram = { 908 + description = "Copy ISO contents to RAM"; 909 + requiredBy = [ "initrd.target" ]; 910 + before = [ 911 + "${utils.escapeSystemdPath "/sysroot/nix/.ro-store"}.mount" 912 + "initrd-switch-root.target" 913 + ]; 914 + unitConfig = { 915 + RequiresMountsFor = "/sysroot/iso"; 916 + ConditionKernelCommandLine = "copytoram"; 917 + }; 918 + serviceConfig = { 919 + Type = "oneshot"; 920 + RemainAfterExit = true; 921 + }; 922 + path = [ 923 + pkgs.coreutils 924 + config.boot.initrd.systemd.package.util-linux 925 + ]; 926 + script = '' 927 + device=$(findmnt -n -o SOURCE --target /sysroot/iso) 928 + fsSize=$(blockdev --getsize64 "$device" || stat -Lc '%s' "$device") 929 + mkdir -p /tmp-iso 930 + mount --bind --make-private /sysroot/iso /tmp-iso 931 + umount /sysroot/iso 932 + mount -t tmpfs -o size="$fsSize" tmpfs /sysroot/iso 933 + cp -r /tmp-iso/* /sysroot/iso/ 934 + umount /tmp-iso 935 + rm -r /tmp-iso 936 + ''; 937 + }; 938 + }; 939 + 904 940 # Closures to be copied to the Nix store on the CD, namely the init 905 941 # script and the top-level system configuration directory. 906 942 isoImage.storeContents = [ ··· 959 995 target = "/EFI"; 960 996 } 961 997 { 962 - source = (pkgs.writeTextDir "grub/loopback.cfg" "source /EFI/BOOT/grub.cfg") + "/grub"; 963 - target = "/boot/grub"; 964 - } 965 - { 966 998 source = config.isoImage.efiSplashImage; 967 999 target = "/EFI/BOOT/efi-background.png"; 1000 + } 1001 + ] 1002 + ++ lib.optionals (config.isoImage.makeEfiBootable && !config.boot.initrd.systemd.enable) [ 1003 + # http://www.supergrubdisk.org/wiki/Loopback.cfg 1004 + # This feature will be removed, and thus is not supported by systemd initrd 1005 + { 1006 + source = (pkgs.writeTextDir "grub/loopback.cfg" "source /EFI/BOOT/grub.cfg") + "/grub"; 1007 + target = "/boot/grub"; 968 1008 } 969 1009 ] 970 1010 ++ lib.optionals (config.boot.loader.grub.memtest86.enable && config.isoImage.makeBiosBootable) [
+3 -3
pkgs/by-name/_7/_7zz/package.nix
··· 28 28 in 29 29 stdenv.mkDerivation (finalAttrs: { 30 30 pname = "7zz"; 31 - version = "25.00"; 31 + version = "25.01"; 32 32 33 33 src = fetchzip { 34 34 url = "https://7-zip.org/a/7z${lib.replaceStrings [ "." ] [ "" ] finalAttrs.version}-src.tar.xz"; 35 35 hash = 36 36 { 37 - free = "sha256-YY2Nw1aeQjXay9IEd4SwuhgqzeK95nH4nlZGwAlud6o="; 38 - unfree = "sha256-gwC/5OkIAHp0OHJWhwD7JpJVSx06oCFs1Ndf+iG5qB8="; 37 + free = "sha256-A1BBdSGepobpguzokL1zpjce5EOl0zqABYciv9zCOac="; 38 + unfree = "sha256-Jkj6T4tMols33uyJSOCcVmxh5iBYYCO/rq9dF4NDMko="; 39 39 } 40 40 .${if enableUnfree then "unfree" else "free"}; 41 41 stripRoot = false;
+2 -2
pkgs/by-name/ai/aider-chat/package.nix
··· 19 19 d.stopwords 20 20 ]); 21 21 22 - version = "0.85.2"; 22 + version = "0.86.0"; 23 23 aider-chat = python3Packages.buildPythonApplication { 24 24 pname = "aider-chat"; 25 25 inherit version; ··· 29 29 owner = "Aider-AI"; 30 30 repo = "aider"; 31 31 tag = "v${version}"; 32 - hash = "sha256-J2xCx1edbu8mEGzNq2PKMxPCMlMZkArEwz6338Sm1tw="; 32 + hash = "sha256-pqwsYObgio50rbuGGOmi7PlEMxdX75B1ONKs+VAJrd8="; 33 33 }; 34 34 35 35 pythonRelaxDeps = true;
+3 -3
pkgs/by-name/bo/boring/package.nix
··· 10 10 11 11 buildGoModule (finalAttrs: { 12 12 pname = "boring"; 13 - version = "0.11.6"; 13 + version = "0.11.7"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "alebeck"; 17 17 repo = "boring"; 18 18 tag = finalAttrs.version; 19 - hash = "sha256-mIR12OkdZll3MqlKF3OMqrc3C73SPmqypj0as9Y5LRQ="; 19 + hash = "sha256-RXLFIOGJEvE6kV14+rnN4zPV8bloikxjksdlSHQFwUU="; 20 20 }; 21 21 22 22 nativeBuildInputs = [ 23 23 installShellFiles 24 24 ]; 25 25 26 - vendorHash = "sha256-1FVSKjsPDe4faaIioJG89556ibREcJt6xi28mp68Ea0="; 26 + vendorHash = "sha256-/MAkVesn8ub2MrguWTueMI9+/lgCRdaXUEioHE/bg8w="; 27 27 28 28 ldflags = [ 29 29 "-s"
+2 -2
pkgs/by-name/fr/frida-tools/package.nix
··· 6 6 7 7 python3Packages.buildPythonApplication rec { 8 8 pname = "frida-tools"; 9 - version = "14.4.2"; 9 + version = "14.4.5"; 10 10 format = "pyproject"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - hash = "sha256-M+iKHoJpxIUUoEVYntL8PPR7B3TbBDiW/Oc8ZE15wo8="; 14 + hash = "sha256-sId91KB2qLasJHsfrS6Nfqctn0kCPS6ieNwtfheai8M="; 15 15 }; 16 16 17 17 build-system = with python3Packages; [
+2 -2
pkgs/by-name/op/opentofu/package.nix
··· 15 15 let 16 16 package = buildGoModule rec { 17 17 pname = "opentofu"; 18 - version = "1.10.4"; 18 + version = "1.10.5"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "opentofu"; 22 22 repo = "opentofu"; 23 23 tag = "v${version}"; 24 - hash = "sha256-COAX185U35htUL/ZdUy5Rq2/OUVcdGe3zAg8NnjoqnQ="; 24 + hash = "sha256-w7uzTG0zqa+izncQoqCSbIJCCIz+jOVbPg9/HiCm7Ik="; 25 25 }; 26 26 27 27 vendorHash = "sha256-+cwFkqhFuLJCb02tvYjccpkNzy7tz979mjgCeqi2DC4=";
+2 -2
pkgs/by-name/ri/rime-wanxiang/package.nix
··· 9 9 10 10 stdenvNoCC.mkDerivation (finalAttrs: { 11 11 pname = "rime-wanxiang"; 12 - version = "9.1.3"; 12 + version = "10.0.10"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "amzxyz"; 16 16 repo = "rime_wanxiang"; 17 17 tag = "v" + finalAttrs.version; 18 - hash = "sha256-jcYvDktk1zj32i92LQKYu35Br2uPRcoNtoyPKo3hP/Y="; 18 + hash = "sha256-lDjvaVkHEHhfL7iI7psaaVlUO4SNe2e49N5Nz+Lex68="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+3 -9
pkgs/by-name/va/vala-lint/package.nix
··· 16 16 17 17 stdenv.mkDerivation { 18 18 pname = "vala-lint"; 19 - version = "0-unstable-2024-08-28"; 19 + version = "0-unstable-2025-08-03"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "vala-lang"; 23 23 repo = "vala-lint"; 24 - rev = "4ed1443c35a8a84445fb59292d539358365d8263"; 25 - sha256 = "sha256-NPadBrL2g5w95slwDpp7kNXBgLJ9na8Yd/J7zm28SSo="; 24 + rev = "a1d1a7bc0f740920e592fd788a836c402fd9825c"; 25 + sha256 = "sha256-63T+wLdnGtVBxKkkkj7gJx0ebApam922Z+cmk2R7Ys0="; 26 26 }; 27 27 28 28 nativeBuildInputs = [ ··· 38 38 glib 39 39 json-glib 40 40 ]; 41 - 42 - postPatch = '' 43 - # https://github.com/vala-lang/vala-lint/issues/181 44 - substituteInPlace test/meson.build \ 45 - --replace "test('auto-fix', auto_fix_test, env: test_envars)" "" 46 - ''; 47 41 48 42 doCheck = true; 49 43
+2 -2
pkgs/by-name/xa/xapp/package.nix
··· 24 24 25 25 stdenv.mkDerivation rec { 26 26 pname = "xapp"; 27 - version = "2.8.11"; 27 + version = "2.8.12"; 28 28 29 29 outputs = [ 30 30 "out" ··· 35 35 owner = "linuxmint"; 36 36 repo = "xapp"; 37 37 rev = version; 38 - hash = "sha256-dmMjGWjq0s4MkobeqssbG5G3+gHRqA6lmu95uJX3RJY="; 38 + hash = "sha256-LGONOsllf9POLLcRG2JN6VNvvMZorcG+aXVNLUz31Tc="; 39 39 }; 40 40 41 41 # Recommended by upstream, which enables the build of xapp-debug.
+23 -7
pkgs/desktops/mate/mate-panel/default.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchurl, 4 + fetchFromGitHub, 5 + autoconf-archive, 6 + autoreconfHook, 5 7 pkg-config, 6 8 gettext, 9 + gtk-doc, 7 10 itstool, 8 11 glib, 9 12 gtk-layer-shell, ··· 14 17 libxml2, 15 18 dconf, 16 19 dconf-editor, 20 + mate-common, 17 21 mate-desktop, 18 22 mate-menus, 19 23 hicolor-icon-theme, 20 24 wayland, 21 25 gobject-introspection, 22 26 wrapGAppsHook3, 27 + yelp-tools, 23 28 marco, 24 - mateUpdateScript, 29 + gitUpdater, 25 30 }: 26 31 27 32 stdenv.mkDerivation rec { 28 33 pname = "mate-panel"; 29 - version = "1.28.4"; 34 + version = "1.28.5"; 30 35 31 - src = fetchurl { 32 - url = "https://pub.mate-desktop.org/releases/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 33 - hash = "sha256-AvCesDFMKsGXtvCJlQpXHNujm/0D1sOguP13JSqWiHQ="; 36 + src = fetchFromGitHub { 37 + owner = "mate-desktop"; 38 + repo = "mate-panel"; 39 + tag = "v${version}"; 40 + fetchSubmodules = true; 41 + hash = "sha256-P1zrOH1xTbKXIoP13azAFDv2Q05dubR1AfmuLbgh250="; 34 42 }; 35 43 36 44 nativeBuildInputs = [ 45 + autoconf-archive 46 + autoreconfHook 37 47 gobject-introspection 38 48 gettext 49 + gtk-doc 39 50 itstool 40 51 libxml2 # xmllint 52 + mate-common # mate-common.m4 macros 41 53 pkg-config 42 54 wrapGAppsHook3 55 + yelp-tools 43 56 ]; 44 57 45 58 buildInputs = [ ··· 81 94 82 95 enableParallelBuilding = true; 83 96 84 - passthru.updateScript = mateUpdateScript { inherit pname; }; 97 + passthru.updateScript = gitUpdater { 98 + rev-prefix = "v"; 99 + odd-unstable = true; 100 + }; 85 101 86 102 meta = with lib; { 87 103 description = "MATE panel";
+2 -12
pkgs/desktops/pantheon/apps/elementary-code/default.nix
··· 2 2 lib, 3 3 stdenv, 4 4 fetchFromGitHub, 5 - fetchpatch, 6 5 nix-update-script, 7 6 meson, 8 7 ninja, ··· 26 25 27 26 stdenv.mkDerivation rec { 28 27 pname = "elementary-code"; 29 - version = "8.0.0"; 28 + version = "8.1.0"; 30 29 31 30 src = fetchFromGitHub { 32 31 owner = "elementary"; 33 32 repo = "code"; 34 33 rev = version; 35 - hash = "sha256-muW7K9cFITZaoNi3id+iplmokN5sSE8x1CVQ62+myUU="; 34 + hash = "sha256-pL/xyD9jwuPixbVdjPa3vdZWHxI+T2ARI4BvcTV61jc="; 36 35 }; 37 - 38 - patches = [ 39 - # Fix build with GCC 14 40 - # https://github.com/elementary/code/pull/1606 41 - (fetchpatch { 42 - url = "https://github.com/elementary/code/commit/9b8347adcbb94f3186815413d927eecc51be2ccf.patch"; 43 - hash = "sha256-VhpvWgOGniOEjxBOjvX30DZIRGalxfPlb9j1VaOAJTA="; 44 - }) 45 - ]; 46 36 47 37 strictDeps = true; 48 38
+2 -2
pkgs/desktops/xfce/applications/orage/default.nix
··· 13 13 mkXfceDerivation { 14 14 category = "apps"; 15 15 pname = "orage"; 16 - version = "4.20.1"; 16 + version = "4.20.2"; 17 17 18 - sha256 = "sha256-WdvqsgHfhJ2sk4vQ75m1zmWjefJBJdDKH8E0GA4fCNg="; 18 + sha256 = "sha256-iV4eVYmOXfEpq5cnHeCXRvx0Ms0Dis3EIwbcSakGLXs="; 19 19 20 20 buildInputs = [ 21 21 glib