Merge staging-next into staging

authored by nixpkgs-ci[bot] and committed by GitHub 7a955016 e923af99

+2272 -1150
+1
.github/workflows/pr.yml
··· 3 3 on: 4 4 pull_request: 5 5 paths: 6 + - .github/actions/get-merge-commit/action.yml 6 7 - .github/workflows/build.yml 7 8 - .github/workflows/check.yml 8 9 - .github/workflows/eval.yml
+1 -1
doc/packages/linux.section.md
··· 25 25 ignoreConfigErrors = true; 26 26 autoModules = false; 27 27 kernelPreferBuiltin = true; 28 - extraStructuredConfig = with lib.kernel; { 28 + structuredExtraConfig = with lib.kernel; { 29 29 DEBUG_KERNEL = yes; 30 30 FRAME_POINTER = yes; 31 31 KGDB = yes;
+10
lib/attrsets.nix
··· 633 633 634 634 : Predicate taking an attribute name and an attribute value, which returns `true` to include the attribute, or `false` to exclude the attribute. 635 635 636 + <!-- TIP --> 637 + If possible, decide on `name` first and on `value` only if necessary. 638 + This avoids evaluating the value if the name is already enough, making it possible, potentially, to have the argument reference the return value. 639 + (Depending on context, that could still be considered a self reference by users; a common pattern in Nix.) 640 + 641 + <!-- TIP --> 642 + `filterAttrs` is occasionally the cause of infinite recursion in configuration systems that allow self-references. 643 + To support the widest range of user-provided logic, perform the `filterAttrs` call as late as possible. 644 + Typically that's right before using it in a derivation, as opposed to an implicit conversion whose result is accessible to the user's expressions. 645 + 636 646 `set` 637 647 638 648 : The attribute set to filter
-5
maintainers/maintainer-list.nix
··· 26093 26093 githubId = 57819359; 26094 26094 name = "Binh Nguyen"; 26095 26095 }; 26096 - tuynia = { 26097 - github = "mivorasu"; 26098 - githubId = 221005165; 26099 - name = "Qylia Vorlaque"; 26100 - }; 26101 26096 tv = { 26102 26097 email = "tv@krebsco.de"; 26103 26098 github = "4z3";
+35 -8
nixos/modules/config/debug-info.nix
··· 1 - { config, lib, ... }: 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 2 7 { 3 8 4 9 options = { ··· 23 28 ''; 24 29 }; 25 30 31 + environment.debuginfodServers = lib.mkOption { 32 + type = lib.types.listOf lib.types.str; 33 + default = [ ]; 34 + description = '' 35 + List of urls of debuginfod servers for tools like {command}`gdb` and {command}`valgrind` to use. 36 + 37 + Unrelated to {option}`environment.enableDebugInfo`. 38 + ''; 39 + }; 40 + 26 41 }; 27 42 28 - config = lib.mkIf config.environment.enableDebugInfo { 43 + config = lib.mkMerge [ 44 + (lib.mkIf config.environment.enableDebugInfo { 45 + 46 + # FIXME: currently disabled because /lib is already in 47 + # environment.pathsToLink, and we can't have both. 48 + #environment.pathsToLink = [ "/lib/debug/.build-id" ]; 29 49 30 - # FIXME: currently disabled because /lib is already in 31 - # environment.pathsToLink, and we can't have both. 32 - #environment.pathsToLink = [ "/lib/debug/.build-id" ]; 50 + environment.extraOutputsToInstall = [ "debug" ]; 51 + 52 + environment.variables.NIX_DEBUG_INFO_DIRS = [ "/run/current-system/sw/lib/debug" ]; 33 53 34 - environment.extraOutputsToInstall = [ "debug" ]; 54 + }) 55 + (lib.mkIf (config.environment.debuginfodServers != [ ]) { 56 + environment.variables.DEBUGINFOD_URLS = lib.strings.concatStringsSep " " config.environment.debuginfodServers; 35 57 36 - environment.variables.NIX_DEBUG_INFO_DIRS = [ "/run/current-system/sw/lib/debug" ]; 58 + environment.systemPackages = [ 59 + # valgrind support requires debuginfod-find on PATH 60 + (lib.getBin pkgs.elfutils) 61 + ]; 37 62 38 - }; 63 + environment.etc."gdb/gdbinit.d/nixseparatedebuginfod2.gdb".text = "set debuginfod enabled on"; 64 + }) 65 + ]; 39 66 40 67 }
+65 -36
nixos/modules/config/system-path.nix
··· 8 8 }: 9 9 let 10 10 11 - requiredPackages = 12 - map (pkg: lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg) 13 - [ 14 - pkgs.acl 15 - pkgs.attr 16 - pkgs.bashInteractive # bash with ncurses support 17 - pkgs.bzip2 18 - pkgs.coreutils-full 19 - pkgs.cpio 20 - pkgs.curl 21 - pkgs.diffutils 22 - pkgs.findutils 23 - pkgs.gawk 24 - pkgs.stdenv.cc.libc 25 - pkgs.getent 26 - pkgs.getconf 27 - pkgs.gnugrep 28 - pkgs.gnupatch 29 - pkgs.gnused 30 - pkgs.gnutar 31 - pkgs.gzip 32 - pkgs.xz 33 - pkgs.less 34 - pkgs.libcap 35 - pkgs.ncurses 36 - pkgs.netcat 37 - config.programs.ssh.package 38 - pkgs.mkpasswd 39 - pkgs.procps 40 - pkgs.su 41 - pkgs.time 42 - pkgs.util-linux 43 - pkgs.which 44 - pkgs.zstd 45 - ]; 11 + corePackageNames = [ 12 + "acl" 13 + "attr" 14 + "bashInteractive" # bash with ncurses support 15 + "bzip2" 16 + "coreutils-full" 17 + "cpio" 18 + "curl" 19 + "diffutils" 20 + "findutils" 21 + "gawk" 22 + "getent" 23 + "getconf" 24 + "gnugrep" 25 + "gnupatch" 26 + "gnused" 27 + "gnutar" 28 + "gzip" 29 + "xz" 30 + "less" 31 + "libcap" 32 + "ncurses" 33 + "netcat" 34 + "mkpasswd" 35 + "procps" 36 + "su" 37 + "time" 38 + "util-linux" 39 + "which" 40 + "zstd" 41 + ]; 42 + corePackages = 43 + (map ( 44 + n: 45 + let 46 + pkg = pkgs.${n}; 47 + in 48 + lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg 49 + ) corePackageNames) 50 + ++ [ pkgs.stdenv.cc.libc ]; 51 + corePackagesText = "[ ${lib.concatMapStringsSep " " (n: "pkgs.${n}") corePackageNames} ]"; 46 52 47 53 defaultPackageNames = [ 48 54 "perl" ··· 77 83 configuration. (The latter is the main difference with 78 84 installing them in the default profile, 79 85 {file}`/nix/var/nix/profiles/default`. 86 + ''; 87 + }; 88 + 89 + corePackages = lib.mkOption { 90 + type = lib.types.listOf lib.types.package; 91 + default = corePackages; 92 + defaultText = lib.literalMD '' 93 + these packages, with their `meta.priority` numerically increased 94 + (thus lowering their installation priority): 95 + 96 + ${corePackagesText} 97 + ''; 98 + example = [ ]; 99 + description = '' 100 + Set of core packages for a normal interactive system. 101 + 102 + Only change this if you know what you're doing! 103 + 104 + Like with systemPackages, packages are installed to 105 + {file}`/run/current-system/sw`. They are 106 + automatically available to all users, and are 107 + automatically updated every time you rebuild the system 108 + configuration. 80 109 ''; 81 110 }; 82 111 ··· 151 180 152 181 config = { 153 182 154 - environment.systemPackages = requiredPackages ++ config.environment.defaultPackages; 183 + environment.systemPackages = config.environment.corePackages ++ config.environment.defaultPackages; 155 184 156 185 environment.pathsToLink = [ 157 186 "/bin"
+1
nixos/modules/module-list.nix
··· 591 591 ./services/development/jupyterhub/default.nix 592 592 ./services/development/livebook.nix 593 593 ./services/development/lorri.nix 594 + ./services/development/nixseparatedebuginfod2.nix 594 595 ./services/development/nixseparatedebuginfod.nix 595 596 ./services/development/rstudio-server/default.nix 596 597 ./services/development/vsmartcard-vpcd.nix
+97 -103
nixos/modules/programs/bash/bash.nix
··· 23 23 in 24 24 25 25 { 26 - imports = [ 27 - (lib.mkRemovedOptionModule [ "programs" "bash" "enable" ] "") 28 - ]; 29 26 30 27 options = { 31 28 32 29 programs.bash = { 33 30 34 - /* 35 - enable = lib.mkOption { 36 - default = true; 37 - description = '' 38 - Whenever to configure Bash as an interactive shell. 39 - Note that this tries to make Bash the default 40 - {option}`users.defaultUserShell`, 41 - which in turn means that you might need to explicitly 42 - set this variable if you have another shell configured 43 - with NixOS. 44 - ''; 45 - type = lib.types.bool; 46 - }; 47 - */ 31 + enable = lib.mkOption { 32 + default = true; 33 + description = '' 34 + Whenever to configure Bash as an interactive shell. 35 + Note that this tries to make Bash the default 36 + {option}`users.defaultUserShell`, 37 + which in turn means that you might need to explicitly 38 + set this variable if you have another shell configured 39 + with NixOS. 40 + ''; 41 + type = lib.types.bool; 42 + }; 48 43 49 44 shellAliases = lib.mkOption { 50 45 default = { }; ··· 129 124 130 125 }; 131 126 132 - config = # lib.mkIf cfg.enable 133 - { 127 + config = lib.mkIf cfg.enable { 134 128 135 - programs.bash = { 129 + programs.bash = { 136 130 137 - shellAliases = builtins.mapAttrs (name: lib.mkDefault) cfge.shellAliases; 131 + shellAliases = builtins.mapAttrs (name: lib.mkDefault) cfge.shellAliases; 138 132 139 - shellInit = '' 140 - if [ -z "$__NIXOS_SET_ENVIRONMENT_DONE" ]; then 141 - . ${config.system.build.setEnvironment} 142 - fi 133 + shellInit = '' 134 + if [ -z "$__NIXOS_SET_ENVIRONMENT_DONE" ]; then 135 + . ${config.system.build.setEnvironment} 136 + fi 143 137 144 - ${cfge.shellInit} 145 - ''; 138 + ${cfge.shellInit} 139 + ''; 146 140 147 - loginShellInit = cfge.loginShellInit; 141 + loginShellInit = cfge.loginShellInit; 148 142 149 - interactiveShellInit = '' 150 - # Check the window size after every command. 151 - shopt -s checkwinsize 143 + interactiveShellInit = '' 144 + # Check the window size after every command. 145 + shopt -s checkwinsize 152 146 153 - # Disable hashing (i.e. caching) of command lookups. 154 - set +h 147 + # Disable hashing (i.e. caching) of command lookups. 148 + set +h 155 149 156 - ${cfg.promptInit} 157 - ${cfg.promptPluginInit} 158 - ${bashAliases} 150 + ${cfg.promptInit} 151 + ${cfg.promptPluginInit} 152 + ${bashAliases} 159 153 160 - ${cfge.interactiveShellInit} 161 - ''; 154 + ${cfge.interactiveShellInit} 155 + ''; 162 156 163 - }; 157 + }; 164 158 165 - environment.etc.profile.text = '' 166 - # /etc/profile: DO NOT EDIT -- this file has been generated automatically. 167 - # This file is read for login shells. 159 + environment.etc.profile.text = '' 160 + # /etc/profile: DO NOT EDIT -- this file has been generated automatically. 161 + # This file is read for login shells. 168 162 169 - # Only execute this file once per shell. 170 - if [ -n "$__ETC_PROFILE_SOURCED" ]; then return; fi 171 - __ETC_PROFILE_SOURCED=1 163 + # Only execute this file once per shell. 164 + if [ -n "$__ETC_PROFILE_SOURCED" ]; then return; fi 165 + __ETC_PROFILE_SOURCED=1 172 166 173 - # Prevent this file from being sourced by interactive non-login child shells. 174 - export __ETC_PROFILE_DONE=1 167 + # Prevent this file from being sourced by interactive non-login child shells. 168 + export __ETC_PROFILE_DONE=1 175 169 176 - ${cfg.shellInit} 177 - ${cfg.loginShellInit} 170 + ${cfg.shellInit} 171 + ${cfg.loginShellInit} 178 172 179 - # Read system-wide modifications. 180 - if test -f /etc/profile.local; then 181 - . /etc/profile.local 182 - fi 173 + # Read system-wide modifications. 174 + if test -f /etc/profile.local; then 175 + . /etc/profile.local 176 + fi 183 177 184 - if [ -n "''${BASH_VERSION:-}" ]; then 185 - . /etc/bashrc 186 - fi 187 - ''; 178 + if [ -n "''${BASH_VERSION:-}" ]; then 179 + . /etc/bashrc 180 + fi 181 + ''; 188 182 189 - environment.etc.bashrc.text = '' 190 - # /etc/bashrc: DO NOT EDIT -- this file has been generated automatically. 183 + environment.etc.bashrc.text = '' 184 + # /etc/bashrc: DO NOT EDIT -- this file has been generated automatically. 191 185 192 - # Only execute this file once per shell. 193 - if [ -n "$__ETC_BASHRC_SOURCED" ] || [ -n "$NOSYSBASHRC" ]; then return; fi 194 - __ETC_BASHRC_SOURCED=1 186 + # Only execute this file once per shell. 187 + if [ -n "$__ETC_BASHRC_SOURCED" ] || [ -n "$NOSYSBASHRC" ]; then return; fi 188 + __ETC_BASHRC_SOURCED=1 195 189 196 - # If the profile was not loaded in a parent process, source 197 - # it. But otherwise don't do it because we don't want to 198 - # clobber overridden values of $PATH, etc. 199 - if [ -z "$__ETC_PROFILE_DONE" ]; then 200 - . /etc/profile 201 - fi 190 + # If the profile was not loaded in a parent process, source 191 + # it. But otherwise don't do it because we don't want to 192 + # clobber overridden values of $PATH, etc. 193 + if [ -z "$__ETC_PROFILE_DONE" ]; then 194 + . /etc/profile 195 + fi 202 196 203 - # We are not always an interactive shell. 204 - if [ -n "$PS1" ]; then 205 - ${cfg.interactiveShellInit} 206 - fi 197 + # We are not always an interactive shell. 198 + if [ -n "$PS1" ]; then 199 + ${cfg.interactiveShellInit} 200 + fi 207 201 208 - # Read system-wide modifications. 209 - if test -f /etc/bashrc.local; then 210 - . /etc/bashrc.local 211 - fi 212 - ''; 202 + # Read system-wide modifications. 203 + if test -f /etc/bashrc.local; then 204 + . /etc/bashrc.local 205 + fi 206 + ''; 213 207 214 - environment.etc.bash_logout.text = '' 215 - # /etc/bash_logout: DO NOT EDIT -- this file has been generated automatically. 208 + environment.etc.bash_logout.text = '' 209 + # /etc/bash_logout: DO NOT EDIT -- this file has been generated automatically. 216 210 217 - # Only execute this file once per shell. 218 - if [ -n "$__ETC_BASHLOGOUT_SOURCED" ] || [ -n "$NOSYSBASHLOGOUT" ]; then return; fi 219 - __ETC_BASHLOGOUT_SOURCED=1 211 + # Only execute this file once per shell. 212 + if [ -n "$__ETC_BASHLOGOUT_SOURCED" ] || [ -n "$NOSYSBASHLOGOUT" ]; then return; fi 213 + __ETC_BASHLOGOUT_SOURCED=1 220 214 221 - ${cfg.logout} 215 + ${cfg.logout} 222 216 223 - # Read system-wide modifications. 224 - if test -f /etc/bash_logout.local; then 225 - . /etc/bash_logout.local 226 - fi 227 - ''; 217 + # Read system-wide modifications. 218 + if test -f /etc/bash_logout.local; then 219 + . /etc/bash_logout.local 220 + fi 221 + ''; 228 222 229 - # Configuration for readline in bash. We use "option default" 230 - # priority to allow user override using both .text and .source. 231 - environment.etc.inputrc.source = lib.mkOptionDefault ./inputrc; 223 + # Configuration for readline in bash. We use "option default" 224 + # priority to allow user override using both .text and .source. 225 + environment.etc.inputrc.source = lib.mkOptionDefault ./inputrc; 232 226 233 - users.defaultUserShell = lib.mkDefault pkgs.bashInteractive; 227 + users.defaultUserShell = lib.mkDefault pkgs.bashInteractive; 234 228 235 - environment.pathsToLink = lib.optionals cfg.completion.enable [ 236 - "/etc/bash_completion.d" 237 - "/share/bash-completion" 238 - ]; 229 + environment.pathsToLink = lib.optionals cfg.completion.enable [ 230 + "/etc/bash_completion.d" 231 + "/share/bash-completion" 232 + ]; 239 233 240 - environment.shells = [ 241 - "/run/current-system/sw/bin/bash" 242 - "/run/current-system/sw/bin/sh" 243 - "${pkgs.bashInteractive}/bin/bash" 244 - "${pkgs.bashInteractive}/bin/sh" 245 - ]; 234 + environment.shells = [ 235 + "/run/current-system/sw/bin/bash" 236 + "/run/current-system/sw/bin/sh" 237 + "${pkgs.bashInteractive}/bin/bash" 238 + "${pkgs.bashInteractive}/bin/sh" 239 + ]; 246 240 247 - }; 241 + }; 248 242 249 243 }
+31 -2
nixos/modules/programs/fuse.nix
··· 1 - { config, lib, ... }: 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 2 7 3 8 let 4 9 cfg = config.programs.fuse; ··· 7 12 meta.maintainers = with lib.maintainers; [ ]; 8 13 9 14 options.programs.fuse = { 15 + enable = lib.mkEnableOption "fuse" // { 16 + default = true; 17 + }; 18 + 10 19 mountMax = lib.mkOption { 11 20 # In the C code it's an "int" (i.e. signed and at least 16 bit), but 12 21 # negative numbers obviously make no sense: ··· 27 36 }; 28 37 }; 29 38 30 - config = { 39 + config = lib.mkIf cfg.enable { 40 + environment.systemPackages = [ 41 + pkgs.fuse 42 + pkgs.fuse3 43 + ]; 44 + 45 + security.wrappers = 46 + let 47 + mkSetuidRoot = source: { 48 + setuid = true; 49 + owner = "root"; 50 + group = "root"; 51 + inherit source; 52 + }; 53 + in 54 + { 55 + fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount"; 56 + fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3"; 57 + }; 58 + 31 59 environment.etc."fuse.conf".text = '' 32 60 ${lib.optionalString (!cfg.userAllowOther) "#"}user_allow_other 33 61 mount_max = ${builtins.toString cfg.mountMax} 34 62 ''; 63 + 35 64 }; 36 65 }
+2
nixos/modules/programs/ssh.nix
··· 335 335 } 336 336 ); 337 337 338 + environment.corePackages = [ cfg.package ]; 339 + 338 340 # SSH configuration. Slight duplication of the sshd_config 339 341 # generation in the sshd service. 340 342 environment.etc."ssh/ssh_config".text = ''
-2
nixos/modules/security/wrappers/default.nix
··· 266 266 in 267 267 { 268 268 # These are mount related wrappers that require the +s permission. 269 - fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount"; 270 - fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3"; 271 269 mount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/mount"; 272 270 umount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/umount"; 273 271 };
+1 -9
nixos/modules/services/development/nixseparatedebuginfod.nix
··· 101 101 extra-allowed-users = [ "nixseparatedebuginfod" ]; 102 102 }; 103 103 104 - environment.variables.DEBUGINFOD_URLS = "http://${url}"; 105 - 106 - environment.systemPackages = [ 107 - # valgrind support requires debuginfod-find on PATH 108 - (lib.getBin pkgs.elfutils) 109 - ]; 110 - 111 - environment.etc."gdb/gdbinit.d/nixseparatedebuginfod.gdb".text = "set debuginfod enabled on"; 112 - 104 + environment.debuginfodServers = [ "http://${url}" ]; 113 105 }; 114 106 }
+97
nixos/modules/services/development/nixseparatedebuginfod2.nix
··· 1 + { 2 + pkgs, 3 + lib, 4 + config, 5 + utils, 6 + ... 7 + }: 8 + let 9 + cfg = config.services.nixseparatedebuginfod2; 10 + url = "127.0.0.1:${toString cfg.port}"; 11 + in 12 + { 13 + options = { 14 + services.nixseparatedebuginfod2 = { 15 + enable = lib.mkEnableOption "nixseparatedebuginfod2, a debuginfod server providing source and debuginfo for nix packages"; 16 + port = lib.mkOption { 17 + description = "port to listen"; 18 + default = 1950; 19 + type = lib.types.port; 20 + }; 21 + package = lib.mkPackageOption pkgs "nixseparatedebuginfod2" { }; 22 + substituter = lib.mkOption { 23 + description = "nix substituter to fetch debuginfo from. Either http/https substituters, or `local:` to use debuginfo present in the local store."; 24 + default = "https://cache.nixos.org"; 25 + example = "local:"; 26 + type = lib.types.str; 27 + }; 28 + cacheExpirationDelay = lib.mkOption { 29 + description = "keep unused cache entries for this long. A number followed by a unit"; 30 + default = "1d"; 31 + type = lib.types.str; 32 + }; 33 + }; 34 + }; 35 + config = lib.mkIf cfg.enable { 36 + systemd.services.nixseparatedebuginfod2 = { 37 + wantedBy = [ "multi-user.target" ]; 38 + path = [ config.nix.package ]; 39 + serviceConfig = { 40 + ExecStart = [ 41 + (utils.escapeSystemdExecArgs [ 42 + (lib.getExe cfg.package) 43 + "--listen-address" 44 + url 45 + "--substituter" 46 + cfg.substituter 47 + "--expiration" 48 + cfg.cacheExpirationDelay 49 + ]) 50 + ]; 51 + Restart = "on-failure"; 52 + CacheDirectory = "nixseparatedebuginfod2"; 53 + DynamicUser = true; 54 + 55 + # hardening 56 + # Filesystem stuff 57 + ProtectSystem = "strict"; # Prevent writing to most of / 58 + ProtectHome = true; # Prevent accessing /home and /root 59 + PrivateTmp = true; # Give an own directory under /tmp 60 + PrivateDevices = true; # Deny access to most of /dev 61 + ProtectKernelTunables = true; # Protect some parts of /sys 62 + ProtectControlGroups = true; # Remount cgroups read-only 63 + RestrictSUIDSGID = true; # Prevent creating SETUID/SETGID files 64 + PrivateMounts = true; # Give an own mount namespace 65 + RemoveIPC = true; 66 + UMask = "0077"; 67 + 68 + # Capabilities 69 + CapabilityBoundingSet = ""; # Allow no capabilities at all 70 + NoNewPrivileges = true; # Disallow getting more capabilities. This is also implied by other options. 71 + 72 + # Kernel stuff 73 + ProtectKernelModules = true; # Prevent loading of kernel modules 74 + SystemCallArchitectures = "native"; # Usually no need to disable this 75 + SystemCallFilter = "@system-service"; 76 + ProtectKernelLogs = true; # Prevent access to kernel logs 77 + ProtectClock = true; # Prevent setting the RTC 78 + ProtectProc = "noaccess"; 79 + ProcSubset = "pid"; 80 + 81 + # Networking 82 + RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6"; 83 + 84 + # Misc 85 + LockPersonality = true; # Prevent change of the personality 86 + ProtectHostname = true; # Give an own UTS namespace 87 + RestrictRealtime = true; # Prevent switching to RT scheduling 88 + MemoryDenyWriteExecute = true; # Maybe disable this for interpreters like python 89 + RestrictNamespaces = true; 90 + 91 + }; 92 + }; 93 + 94 + environment.debuginfodServers = [ "http://${url}" ]; 95 + 96 + }; 97 + }
+1 -1
nixos/modules/services/networking/netbird.nix
··· 310 310 mkdir -p "$out/share/applications" 311 311 substitute ${cfg.ui.package}/share/applications/netbird.desktop \ 312 312 "$out/share/applications/${mkBin "netbird"}.desktop" \ 313 - --replace-fail 'Name=NetBird' "Name=NetBird @ ${client.service.name}" \ 313 + --replace-fail 'Name=Netbird' "Name=NetBird @ ${client.service.name}" \ 314 314 --replace-fail '${lib.getExe cfg.ui.package}' "$out/bin/${mkBin "netbird-ui"}" 315 315 '') 316 316 ];
+8 -12
nixos/modules/services/networking/prosody.nix
··· 567 567 568 568 ${lib.concatMapStrings (muc: '' 569 569 Component ${toLua muc.domain} "muc" 570 - modules_enabled = {${optionalString cfg.modules.mam ''" muc_mam",''}${optionalString muc.allowners_muc ''" muc_allowners",''} } 570 + modules_enabled = {${optionalString cfg.modules.mam ''"muc_mam",''}${optionalString muc.allowners_muc ''"muc_allowners",''} } 571 571 name = ${toLua muc.name} 572 572 restrict_room_creation = ${toLua muc.restrictRoomCreation} 573 573 max_history_messages = ${toLua muc.maxHistoryMessages} ··· 585 585 ${muc.extraConfig} 586 586 '') cfg.muc} 587 587 588 - ${ 589 - lib.optionalString (cfg.httpFileShare != null) '' 590 - Component ${toLua cfg.httpFileShare.domain} "http_file_share" 591 - modules_disabled = { "s2s" } 592 - '' 593 - + lib.optionalString (cfg.httpFileShare.http_host != null) '' 588 + ${lib.optionalString (cfg.httpFileShare != null) '' 589 + Component ${toLua cfg.httpFileShare.domain} "http_file_share" 590 + modules_disabled = { "s2s" } 591 + ${lib.optionalString (cfg.httpFileShare.http_host != null) '' 594 592 http_host = "${cfg.httpFileShare.http_host}" 595 - '' 596 - + '' 597 - ${settingsToLua " http_file_share_" (cfg.httpFileShare // { domain = null; })} 598 - '' 599 - } 593 + ''} 594 + ${settingsToLua " http_file_share_" (cfg.httpFileShare // { domain = null; })} 595 + ''} 600 596 601 597 ${lib.concatStringsSep "\n" ( 602 598 lib.mapAttrsToList (n: v: ''
+25 -1
nixos/modules/services/networking/tayga.nix
··· 23 23 data-dir ${cfg.dataDir} 24 24 25 25 ${concatStringsSep "\n" (mapAttrsToList (ipv4: ipv6: "map " + ipv4 + " " + ipv6) cfg.mappings)} 26 + 27 + ${optionalString ((builtins.length cfg.log) > 0) '' 28 + log ${concatStringsSep " " cfg.log} 29 + ''} 30 + 31 + wkpf-strict ${if cfg.wkpfStrict then "yes" else "no"} 26 32 ''; 27 33 28 34 addrOpts = ··· 132 138 } 133 139 ''; 134 140 }; 141 + 142 + log = mkOption { 143 + type = types.listOf types.str; 144 + default = [ ]; 145 + description = "Packet errors to log (drop, reject, icmp, self)"; 146 + example = literalExpression '' 147 + [ "drop" "reject" "icmp" "self" ] 148 + ''; 149 + }; 150 + 151 + wkpfStrict = mkOption { 152 + type = types.bool; 153 + default = true; 154 + description = "Enable restrictions on the use of the well-known prefix (64:ff9b::/96) - prevents translation of non-global IPv4 ranges when using the well-known prefix. Must be enabled for RFC 6052 compatibility."; 155 + }; 135 156 }; 136 157 }; 137 158 ··· 171 192 }; 172 193 }; 173 194 195 + environment.etc."tayga.conf".source = configFile; 196 + 174 197 systemd.services.tayga = { 175 198 description = "Stateless NAT64 implementation"; 176 199 wantedBy = [ "multi-user.target" ]; 177 200 after = [ "network.target" ]; 178 201 202 + reloadTriggers = [ configFile ]; 179 203 serviceConfig = { 180 - ExecStart = "${cfg.package}/bin/tayga -d --nodetach --config ${configFile}"; 204 + ExecStart = "${cfg.package}/bin/tayga -d --nodetach --config /etc/tayga.conf"; 181 205 ExecReload = "${pkgs.coreutils}/bin/kill -SIGHUP $MAINPID"; 182 206 Restart = "always"; 183 207
+39 -1
nixos/modules/services/video/frigate.nix
··· 13 13 elem 14 14 filterAttrsRecursive 15 15 hasPrefix 16 + literalExpression 16 17 makeLibraryPath 17 18 mkDefault 18 19 mkEnableOption ··· 29 30 format = pkgs.formats.yaml { }; 30 31 31 32 filteredConfig = converge (filterAttrsRecursive (_: v: !elem v [ null ])) cfg.settings; 33 + 34 + configFileUnchecked = format.generate "frigate.yaml" filteredConfig; 35 + configFileChecked = 36 + pkgs.runCommand "frigate-config" 37 + { 38 + preferLocalBuilds = true; 39 + } 40 + '' 41 + function error() { 42 + cat << 'HEREDOC' 43 + 44 + Note that not all configurations can be reliably checked in the 45 + build sandbox. 46 + 47 + This check can be disabled using `services.frigate.checkConfig`. 48 + HEREDOC 49 + 50 + exit 1 51 + } 52 + 53 + cp ${configFileUnchecked} $out 54 + export CONFIG_FILE=$out 55 + export PYTHONPATH=${cfg.package.pythonPath} 56 + ${cfg.package.python.interpreter} -m frigate --validate-config || error 57 + ''; 58 + configFile = if cfg.checkConfig then configFileChecked else configFileUnchecked; 32 59 33 60 cameraFormat = 34 61 with types; ··· 163 190 164 191 - https://docs.frigate.video/configuration/hardware_acceleration 165 192 - https://docs.frigate.video/configuration/ffmpeg_presets#hwaccel-presets 193 + ''; 194 + }; 195 + 196 + checkConfig = mkOption { 197 + type = bool; 198 + default = pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform; 199 + defaultText = literalExpression '' 200 + pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform 201 + ''; 202 + description = '' 203 + Whether to check the configuration at build time. 166 204 ''; 167 205 }; 168 206 ··· 636 674 rm --recursive --force /var/cache/frigate/!(model_cache) 637 675 '') 638 676 (pkgs.writeShellScript "frigate-create-writable-config" '' 639 - cp --no-preserve=mode "${format.generate "frigate.yml" filteredConfig}" /run/frigate/frigate.yml 677 + cp --no-preserve=mode ${configFile} /run/frigate/frigate.yml 640 678 '') 641 679 ]; 642 680 ExecStart = "${cfg.package.python.interpreter} -m frigate";
+1 -1
nixos/modules/services/web-apps/jitsi-meet.nix
··· 235 235 236 236 # required for muc_breakout_rooms 237 237 package = lib.mkDefault ( 238 - config.services.prosody.package.override { 238 + pkgs.prosody.override { 239 239 withExtraLuaPackages = p: with p; [ cjson ]; 240 240 } 241 241 );
+2 -2
nixos/modules/services/web-apps/mediawiki.nix
··· 711 711 tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c 64 > ${stateDir}/secret.key 712 712 fi 713 713 714 - echo "exit( wfGetDB( DB_PRIMARY )->tableExists( 'user' ) ? 1 : 0 );" | \ 715 - ${php}/bin/php ${pkg}/share/mediawiki/maintenance/eval.php --conf ${mediawikiConfig} && \ 714 + echo "exit( \$this->getPrimaryDB()->tableExists( 'user' ) ? 1 : 0 );" | \ 715 + ${php}/bin/php ${pkg}/share/mediawiki/maintenance/run.php eval --conf ${mediawikiConfig} && \ 716 716 ${php}/bin/php ${pkg}/share/mediawiki/maintenance/install.php \ 717 717 --confpath /tmp \ 718 718 --scriptpath / \
+1 -1
nixos/modules/system/activation/activation-script.nix
··· 317 317 source ${config.system.build.earlyMountScript} 318 318 ''; 319 319 320 - systemd.user = { 320 + systemd.user = lib.mkIf config.system.activatable { 321 321 services.nixos-activation = { 322 322 description = "Run user-specific NixOS activation"; 323 323 script = config.system.userActivationScripts.script;
+6 -4
nixos/modules/system/boot/kernel.nix
··· 102 102 { 103 103 name = "foo"; 104 104 patch = ./foo.patch; 105 - extraStructuredConfig.FOO = lib.kernel.yes; 105 + structuredExtraConfig.FOO = lib.kernel.yes; 106 106 features.foo = true; 107 107 } 108 108 { ··· 127 127 # (required, but can be null if only config changes 128 128 # are needed) 129 129 130 - extraStructuredConfig = { # attrset of extra configuration parameters without the CONFIG_ prefix 130 + structuredExtraConfig = { # attrset of extra configuration parameters without the CONFIG_ prefix 131 131 FOO = lib.kernel.yes; # (optional) 132 132 }; # values should generally be lib.kernel.yes, 133 133 # lib.kernel.no or lib.kernel.module ··· 138 138 139 139 extraConfig = "FOO y"; # extra configuration options in string form without the CONFIG_ prefix 140 140 # (optional, multiple lines allowed to specify multiple options) 141 - # (deprecated, use extraStructuredConfig instead) 141 + # (deprecated, use structuredExtraConfig instead) 142 142 } 143 143 ``` 144 144 ··· 414 414 415 415 ln -s ${initrdPath} $out/initrd 416 416 417 - ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out 417 + ${optionalString (config.boot.initrd.secrets != { }) '' 418 + ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out 419 + ''} 418 420 419 421 ln -s ${config.hardware.firmware}/lib/firmware $out/firmware 420 422 '';
+17 -2
nixos/modules/system/boot/kexec.nix
··· 1 - { pkgs, lib, ... }: 1 + { 2 + config, 3 + pkgs, 4 + lib, 5 + ... 6 + }: 2 7 8 + let 9 + cfg = config.boot.kexec; 10 + in 3 11 { 4 - config = lib.mkIf (lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools) { 12 + options.boot.kexec = { 13 + enable = lib.mkEnableOption "kexec" // { 14 + default = lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools; 15 + defaultText = lib.literalExpression ''lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools''; 16 + }; 17 + }; 18 + 19 + config = lib.mkIf cfg.enable { 5 20 environment.systemPackages = [ pkgs.kexec-tools ]; 6 21 7 22 systemd.services.prepare-kexec = {
+1 -7
nixos/modules/tasks/filesystems.nix
··· 461 461 # Add the mount helpers to the system path so that `mount' can find them. 462 462 system.fsPackages = [ pkgs.dosfstools ]; 463 463 464 - environment.systemPackages = 465 - with pkgs; 466 - [ 467 - fuse3 468 - fuse 469 - ] 470 - ++ config.system.fsPackages; 464 + environment.systemPackages = config.system.fsPackages; 471 465 472 466 environment.etc.fstab.text = 473 467 let
+13 -11
nixos/modules/tasks/network-interfaces.nix
··· 1767 1767 text = cfg.hostName + "\n"; 1768 1768 }; 1769 1769 1770 - environment.systemPackages = [ 1771 - pkgs.host 1772 - pkgs.hostname-debian 1773 - pkgs.iproute2 1774 - pkgs.iputils 1775 - ] 1776 - ++ optionals config.networking.wireless.enable [ 1777 - pkgs.wirelesstools # FIXME: obsolete? 1778 - pkgs.iw 1779 - ] 1780 - ++ bridgeStp; 1770 + environment.corePackages = lib.mkOptionDefault ( 1771 + [ 1772 + pkgs.host 1773 + pkgs.hostname-debian 1774 + pkgs.iproute2 1775 + pkgs.iputils 1776 + ] 1777 + ++ optionals config.networking.wireless.enable [ 1778 + pkgs.wirelesstools # FIXME: obsolete? 1779 + pkgs.iw 1780 + ] 1781 + ++ bridgeStp 1782 + ); 1781 1783 1782 1784 # Wake-on-LAN configuration is shared by the scripted and networkd backends. 1783 1785 systemd.network.links = pipe interfaces [
+1
nixos/tests/all-tests.nix
··· 1059 1059 }; 1060 1060 nixpkgs = pkgs.callPackage ../modules/misc/nixpkgs/test.nix { inherit evalMinimalConfig; }; 1061 1061 nixseparatedebuginfod = runTest ./nixseparatedebuginfod.nix; 1062 + nixseparatedebuginfod2 = runTest ./nixseparatedebuginfod2.nix; 1062 1063 node-red = runTest ./node-red.nix; 1063 1064 nomad = runTest ./nomad.nix; 1064 1065 nominatim = runTest ./nominatim.nix;
+13 -12
nixos/tests/nixseparatedebuginfod.nix
··· 5 5 in 6 6 { 7 7 name = "nixseparatedebuginfod"; 8 - # A binary cache with debug info and source for nix 8 + # A binary cache with debug info and source for gnumake 9 9 nodes.cache = 10 10 { pkgs, ... }: 11 11 { ··· 15 15 openFirewall = true; 16 16 }; 17 17 system.extraDependencies = [ 18 - pkgs.nix.debug 19 - pkgs.nix.src 18 + pkgs.gnumake.debug 19 + pkgs.gnumake.src 20 20 pkgs.sl 21 21 ]; 22 22 }; ··· 33 33 environment.systemPackages = [ 34 34 pkgs.valgrind 35 35 pkgs.gdb 36 + pkgs.gnumake 36 37 (pkgs.writeShellScriptBin "wait_for_indexation" '' 37 38 set -x 38 - while debuginfod-find debuginfo /run/current-system/sw/bin/nix |& grep 'File too large'; do 39 + while debuginfod-find debuginfo /run/current-system/sw/bin/make |& grep 'File too large'; do 39 40 sleep 1; 40 41 done 41 42 '') ··· 56 57 57 58 # nixseparatedebuginfod needs .drv to associate executable -> source 58 59 # on regular systems this would be provided by nixos-rebuild 59 - machine.succeed("nix-instantiate '<nixpkgs>' -A nix") 60 + machine.succeed("nix-instantiate '<nixpkgs>' -A gnumake") 60 61 61 62 machine.succeed("timeout 600 wait_for_indexation") 62 63 63 64 # test debuginfod-find 64 - machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/nix") 65 + machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/make") 65 66 66 67 # test that gdb can fetch source 67 - out = machine.succeed("gdb /run/current-system/sw/bin/nix --batch -x ${builtins.toFile "commands" '' 68 + out = machine.succeed("gdb /run/current-system/sw/bin/make --batch -x ${builtins.toFile "commands" '' 68 69 start 69 70 l 70 71 ''}") 71 72 print(out) 72 - assert 'int main(' in out 73 + assert 'main (int argc, char **argv, char **envp)' in out 73 74 74 75 # test that valgrind can display location information 75 - # this relies on the fact that valgrind complains about nix 76 - # libgc helps in this regard, and we also ask valgrind to show leak kinds 76 + # this relies on the fact that valgrind complains about gnumake 77 + # because we also ask valgrind to show leak kinds 77 78 # which are usually false positives. 78 - out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all nix-env --version 2>&1") 79 + out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all make --version 2>&1") 79 80 print(out) 80 - assert 'main.cc' in out 81 + assert 'main.c' in out 81 82 ''; 82 83 }
+72
nixos/tests/nixseparatedebuginfod2.nix
··· 1 + { pkgs, lib, ... }: 2 + { 3 + name = "nixseparatedebuginfod2"; 4 + # A binary cache with debug info and source for gnumake 5 + nodes.cache = 6 + { pkgs, ... }: 7 + { 8 + services.nginx = { 9 + enable = true; 10 + virtualHosts.default = { 11 + default = true; 12 + addSSL = false; 13 + root = "/var/lib/thebinarycache"; 14 + }; 15 + }; 16 + networking.firewall.allowedTCPPorts = [ 80 ]; 17 + systemd.services.buildthebinarycache = { 18 + before = [ "nginx.service" ]; 19 + wantedBy = [ "nginx.service" ]; 20 + script = '' 21 + ${pkgs.nix}/bin/nix --extra-experimental-features nix-command copy --to file:///var/lib/thebinarycache?index-debug-info=true ${pkgs.gnumake.debug} ${pkgs.gnumake} ${pkgs.gnumake.src} ${pkgs.sl} 22 + ''; 23 + serviceConfig = { 24 + User = "nginx"; 25 + Group = "nginx"; 26 + StateDirectory = "thebinarycache"; 27 + Type = "oneshot"; 28 + }; 29 + }; 30 + }; 31 + # the machine where we need the debuginfo 32 + nodes.machine = { 33 + services.nixseparatedebuginfod2 = { 34 + enable = true; 35 + substituter = "http://cache"; 36 + }; 37 + environment.systemPackages = [ 38 + pkgs.valgrind 39 + pkgs.gdb 40 + pkgs.gnumake 41 + ]; 42 + }; 43 + testScript = '' 44 + start_all() 45 + cache.wait_for_unit("nginx.service") 46 + cache.wait_for_open_port(80) 47 + machine.wait_for_unit("nixseparatedebuginfod2.service") 48 + machine.wait_for_open_port(1950) 49 + 50 + with subtest("check that the binary cache works"): 51 + machine.succeed("nix-store --extra-substituters http://cache --option require-sigs false -r ${pkgs.sl}") 52 + 53 + # test debuginfod-find 54 + machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/make") 55 + 56 + # test that gdb can fetch source 57 + out = machine.succeed("gdb /run/current-system/sw/bin/make --batch -x ${builtins.toFile "commands" '' 58 + start 59 + l 60 + ''}") 61 + print(out) 62 + assert 'main (int argc, char **argv, char **envp)' in out 63 + 64 + # test that valgrind can display location information 65 + # this relies on the fact that valgrind complains about gnumake 66 + # because we also ask valgrind to show leak kinds 67 + # which are usually false positives. 68 + out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all make --version 2>&1") 69 + print(out) 70 + assert 'main.c' in out 71 + ''; 72 + }
+24 -5
nixos/tests/tayga.nix
··· 31 31 }; 32 32 33 33 nodes = { 34 - # The server is configured with static IPv4 addresses. RFC 6052 Section 3.1 35 - # disallows the mapping of non-global IPv4 addresses like RFC 1918 into the 36 - # Well-Known Prefix 64:ff9b::/96. TAYGA also does not allow the mapping of 37 - # documentation space (RFC 5737). To circumvent this, 100.64.0.2/24 from 38 - # RFC 6589 (Carrier Grade NAT) is used here. 34 + # The server is configured with static IPv4 addresses. We have to disable the 35 + # well-known prefix restrictions (as required by RFC 6052 Section 3.1) because 36 + # we're using private space (TAYGA also considers documentation space non-global, 37 + # unfortunately). 39 38 # To reach the IPv4 address pool of the NAT64 gateway, there is a static 40 39 # route configured. In normal cases, where the router would also source NAT 41 40 # the pool addresses to one IPv4 addresses, this would not be needed. ··· 63 62 }; 64 63 }; 65 64 programs.mtr.enable = true; 65 + environment.systemPackages = [ pkgs.tcpdump ]; 66 66 }; 67 67 68 68 # The router is configured with static IPv4 addresses towards the server ··· 87 87 ]; 88 88 89 89 networking = { 90 + hostName = "router-systemd"; 90 91 useDHCP = false; 91 92 useNetworkd = true; 92 93 firewall.enable = false; ··· 137 138 mappings = { 138 139 "192.0.2.42" = "2001:db8::2"; 139 140 }; 141 + log = [ 142 + "drop" 143 + "reject" 144 + "icmp" 145 + "self" 146 + ]; 147 + wkpfStrict = false; 140 148 }; 149 + environment.systemPackages = [ pkgs.tcpdump ]; 141 150 }; 142 151 143 152 router_nixos = { ··· 152 161 ]; 153 162 154 163 networking = { 164 + hostName = "router-nixos"; 155 165 useDHCP = false; 156 166 firewall.enable = false; 157 167 interfaces.eth1 = lib.mkForce { ··· 201 211 mappings = { 202 212 "192.0.2.42" = "2001:db8::2"; 203 213 }; 214 + log = [ 215 + "drop" 216 + "reject" 217 + "icmp" 218 + "self" 219 + ]; 220 + wkpfStrict = false; 204 221 }; 222 + environment.systemPackages = [ pkgs.tcpdump ]; 205 223 }; 206 224 207 225 # The client is configured with static IPv6 addresses. It has also a static ··· 233 251 }; 234 252 }; 235 253 programs.mtr.enable = true; 254 + environment.systemPackages = [ pkgs.tcpdump ]; 236 255 }; 237 256 }; 238 257
+2 -2
nixos/tests/velocity.nix
··· 37 37 (mkVelocityService "velocity-with-native" (pkgs.velocity.override { withVelocityNative = true; })) 38 38 ]; 39 39 40 - environment.systemPackages = [ pkgs.mcstatus ]; 40 + environment.systemPackages = [ (pkgs.python3.withPackages (p: [ p.mcstatus ])) ]; 41 41 }; 42 42 43 43 testScript = '' ··· 50 50 server.wait_until_succeeds(f"journalctl -b -u {name} | grep -q -E '{connections_startup_query}'") 51 51 server.wait_until_succeeds(f"journalctl -b -u {name} | grep -q 'Done ([0-9]*.[0-9]*s)!'"); 52 52 53 - _, status_result = server.execute("mcstatus localhost:25565 status") 53 + _, status_result = server.execute("python -m mcstatus localhost:25565 status") 54 54 assert "A Velocity Server" in status_result 55 55 56 56 server.execute(f"echo stop > /run/{name}.stdin")
+13
pkgs/applications/editors/vim/plugins/generated.nix
··· 21974 21974 meta.hydraPlatforms = [ ]; 21975 21975 }; 21976 21976 21977 + workspaces-nvim = buildVimPlugin { 21978 + pname = "workspaces.nvim"; 21979 + version = "2024-10-08"; 21980 + src = fetchFromGitHub { 21981 + owner = "natecraddock"; 21982 + repo = "workspaces.nvim"; 21983 + rev = "55a1eb6f5b72e07ee8333898254e113e927180ca"; 21984 + sha256 = "143xzg60yiw1aam7sc5rva9bzzmshfzpm2sacimwr8188qsz8xvb"; 21985 + }; 21986 + meta.homepage = "https://github.com/natecraddock/workspaces.nvim/"; 21987 + meta.hydraPlatforms = [ ]; 21988 + }; 21989 + 21977 21990 wrapping-nvim = buildVimPlugin { 21978 21991 pname = "wrapping.nvim"; 21979 21992 version = "2025-01-16";
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 1687 1687 https://github.com/wannesm/wmgraphviz.vim/,, 1688 1688 https://github.com/vim-scripts/wombat256.vim/,, 1689 1689 https://github.com/lukaszkorecki/workflowish/,, 1690 + https://github.com/natecraddock/workspaces.nvim/,HEAD, 1690 1691 https://github.com/andrewferrier/wrapping.nvim/,HEAD, 1691 1692 https://github.com/tweekmonster/wstrip.vim/,, 1692 1693 https://github.com/piersolenski/wtf.nvim/,HEAD,
+2 -2
pkgs/applications/editors/vscode/extensions/WakaTime.vscode-wakatime/default.nix
··· 7 7 mktplcRef = { 8 8 name = "vscode-wakatime"; 9 9 publisher = "WakaTime"; 10 - version = "25.2.2"; 11 - hash = "sha256-9Ldb45tCgLaTdntmQlcIPe13ZTeIVGKrHYXLRgLlB0w="; 10 + version = "25.3.0"; 11 + hash = "sha256-cw3wcMr8QKG75VofIsAmlD2RqN/0fGdqhugen/vmJlo="; 12 12 }; 13 13 14 14 meta = {
+2 -2
pkgs/applications/editors/vscode/extensions/dbaeumer.vscode-eslint/default.nix
··· 7 7 mktplcRef = { 8 8 name = "vscode-eslint"; 9 9 publisher = "dbaeumer"; 10 - version = "3.0.15"; 11 - hash = "sha256-oeudNCBrHO3yvw3FrFA4EZk1yODcRRfF/y3U5tdEz4I="; 10 + version = "3.0.16"; 11 + hash = "sha256-UxD07bouMK8nuysh5TAV7ZVhkLiOV6R1qfvVZcXB2Hc="; 12 12 }; 13 13 14 14 meta = {
+12 -12
pkgs/applications/editors/vscode/extensions/default.nix
··· 477 477 mktplcRef = { 478 478 publisher = "ban"; 479 479 name = "spellright"; 480 - version = "3.0.144"; 481 - hash = "sha256-+JNvChnAi2p04X3VVWgBZQAsF5UpAQpG7fROYtjaHRo="; 480 + version = "3.0.146"; 481 + hash = "sha256-gvj5vWA8VAy5Ohtkn9vsx7MswgVAcxYOLm+ifKhjLz0="; 482 482 }; 483 483 meta = { 484 484 description = "Visual Studio Code extension for Spellchecker"; ··· 493 493 mktplcRef = { 494 494 publisher = "banacorn"; 495 495 name = "agda-mode"; 496 - version = "0.6.2"; 497 - hash = "sha256-OQHNbzlTnpv2V5ICNTfAC1QM3bDnRgtJvgJKONxvU5M="; 496 + version = "0.6.3"; 497 + hash = "sha256-ZyFY3pzNUUpdAB3lqys/z0NOUrQA/qmPquRPNFw/JAI="; 498 498 }; 499 499 meta = { 500 500 changelog = "https://marketplace.visualstudio.com/items/banacorn.agda-mode/changelog"; ··· 788 788 mktplcRef = { 789 789 name = "vscode-tailwindcss"; 790 790 publisher = "bradlc"; 791 - version = "0.14.25"; 792 - hash = "sha256-NXA7UDSo6G0Did6tzwgIYnjR+ymoY7V5aUtaFzqlVik="; 791 + version = "0.14.26"; 792 + hash = "sha256-agntfMsLAYASviH7Wuw/W8JwfHRi6qAfuMkqmFWT0bg="; 793 793 }; 794 794 meta = { 795 795 changelog = "https://marketplace.visualstudio.com/items/bradlc.vscode-tailwindcss/changelog"; ··· 1212 1212 mktplcRef = { 1213 1213 publisher = "DanielSanMedium"; 1214 1214 name = "dscodegpt"; 1215 - version = "3.13.40"; 1216 - hash = "sha256-2O96Bey2VKj2FdK1nJSYSKE9fltciNbqD/UI7rKlFgY="; 1215 + version = "3.14.3"; 1216 + hash = "sha256-B0FYMM7usSkQgq7jZfo3uEvERRQ6PrinO36KJGke/Yo="; 1217 1217 }; 1218 1218 meta = { 1219 1219 changelog = "https://marketplace.visualstudio.com/items/DanielSanMedium.dscodegpt/changelog"; ··· 3169 3169 mktplcRef = { 3170 3170 name = "compare-folders"; 3171 3171 publisher = "moshfeu"; 3172 - version = "0.25.1"; 3173 - hash = "sha256-axNTdnSkMkFs7LSZCc7VinjbrDncsRHlRtDG9+eh2qQ="; 3172 + version = "0.25.3"; 3173 + hash = "sha256-QrSh8/AycC5nKbZ1+E3V/lJu/7Skket8b05yPnZg68s="; 3174 3174 }; 3175 3175 3176 3176 meta = { ··· 5255 5255 mktplcRef = { 5256 5256 name = "volar"; 5257 5257 publisher = "Vue"; 5258 - version = "3.0.4"; 5259 - hash = "sha256-Eqg4+jX1dARryfb9Ueb2qng5xwhyaU6cDG089nlLNgc="; 5258 + version = "3.0.5"; 5259 + hash = "sha256-Ja0zWCHHxd1XE2f2ZQvchqzCKv0pbcAU3uEh2f6+X3c="; 5260 5260 }; 5261 5261 meta = { 5262 5262 changelog = "https://github.com/vuejs/language-tools/blob/master/CHANGELOG.md";
+2 -2
pkgs/applications/editors/vscode/extensions/fstarlang.fstar-vscode-assistant/default.nix
··· 4 4 mktplcRef = { 5 5 name = "fstar-vscode-assistant"; 6 6 publisher = "FStarLang"; 7 - version = "0.18.1"; 8 - hash = "sha256-uiw3EJbYoDG5r93NIxloiF7Co3gxcZT9+hlLZFnxkBE="; 7 + version = "0.19.1"; 8 + hash = "sha256-bC9Kzhp4H9wykuitEKQUthYVhmVI/m8H0PloBqoFbvU="; 9 9 }; 10 10 meta = { 11 11 description = "Interactive editing mode VS Code extension for F*";
-1
pkgs/applications/editors/vscode/extensions/ndonfris.fish-lsp/default.nix
··· 16 16 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ndonfris.fish-lsp"; 17 17 homepage = "https://github.com/ndonfris/fish-lsp"; 18 18 license = lib.licenses.mit; 19 - maintainers = with lib.maintainers; [ tuynia ]; 20 19 }; 21 20 }
-1
pkgs/applications/editors/vscode/extensions/oliver-ni.scheme-fmt/default.nix
··· 24 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=oliver-ni.scheme-fmt"; 25 25 homepage = "https://github.com/oliver-ni/scheme-fmt"; 26 26 license = lib.licenses.cc0; 27 - maintainers = with lib.maintainers; [ tuynia ]; 28 27 }; 29 28 }
-1
pkgs/applications/editors/vscode/extensions/release-candidate.vscode-scheme-repl/default.nix
··· 24 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=release-candidate.vscode-scheme-repl"; 25 25 homepage = "https://github.com/Release-Candidate/vscode-scheme-repl"; 26 26 license = lib.licenses.mit; 27 - maintainers = with lib.maintainers; [ tuynia ]; 28 27 }; 29 28 }
+2 -2
pkgs/applications/editors/vscode/extensions/rooveterinaryinc.roo-cline/default.nix
··· 8 8 mktplcRef = { 9 9 publisher = "RooVeterinaryInc"; 10 10 name = "roo-cline"; 11 - version = "3.25.4"; 12 - hash = "sha256-uyI/VdBpkCxzlm1Ei2v/UjsenhyanDuVXLXk3Pkiw1s="; 11 + version = "3.25.10"; 12 + hash = "sha256-j9ydB6hR+Qx4HvBDMrYGev2K/vsG6ASeOQHhhYheEuw="; 13 13 }; 14 14 15 15 passthru.updateScript = vscode-extension-update-script { };
-1
pkgs/applications/editors/vscode/extensions/tsyesika.guile-scheme-enhanced/default.nix
··· 24 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=tsyesika.guile-scheme-enhanced"; 25 25 homepage = "https://codeberg.org/tsyesika/vscode-guile-scheme-enhanced"; 26 26 license = lib.licenses.asl20; 27 - maintainers = with lib.maintainers; [ tuynia ]; 28 27 }; 29 28 }
-1
pkgs/applications/editors/vscode/extensions/ufo5260987423.magic-scheme/default.nix
··· 26 26 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ufo5260987423.magic-scheme"; 27 27 homepage = "https://github.com/ufo5260987423/magic-scheme"; 28 28 license = lib.licenses.mit; 29 - maintainers = with lib.maintainers; [ tuynia ]; 30 29 }; 31 30 }
+3 -3
pkgs/applications/emulators/libretro/cores/dolphin.nix
··· 17 17 }: 18 18 mkLibretroCore { 19 19 core = "dolphin"; 20 - version = "0-unstable-2025-05-17"; 20 + version = "0-unstable-2025-08-05"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "libretro"; 24 24 repo = "dolphin"; 25 - rev = "a09f78f735f0d2184f64ba5b134abe98ee99c65f"; 26 - hash = "sha256-NUnWNj47FmH8perfRwFFnaXeU58shUXqKFOzHf4ce5c="; 25 + rev = "83438f9b1a2c832319876a1fda130a5e33d4ef87"; 26 + hash = "sha256-q4y+3uJ1tQ2OvlEvi/JNyIO/RfuWNIEKfVZ6xEWKFCg="; 27 27 }; 28 28 29 29 extraNativeBuildInputs = [
+3 -3
pkgs/applications/emulators/libretro/cores/nestopia.nix
··· 5 5 }: 6 6 mkLibretroCore { 7 7 core = "nestopia"; 8 - version = "0-unstable-2025-07-20"; 8 + version = "0-unstable-2025-08-09"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "libretro"; 12 12 repo = "nestopia"; 13 - rev = "0e82a1642d4acafab4da9ce937954b85d846952b"; 14 - hash = "sha256-/r1EUb3Z6RaEycGnkU4RtYr0JjohgQmru99DG45OWKo="; 13 + rev = "d33852f5efe89c87a06f8ce7d12b8b5451e9ae71"; 14 + hash = "sha256-v/jXoXgVEIXpxBgHZ/6oL+YGPDv9jefwdetiqLFBN9I="; 15 15 }; 16 16 17 17 makefile = "Makefile";
+1 -7
pkgs/applications/networking/browsers/chromium/default.nix
··· 79 79 pulseSupport 80 80 ungoogled 81 81 ; 82 - gnChromium = buildPackages.gn.overrideAttrs (oldAttrs: { 83 - version = if (upstream-info.deps.gn ? "version") then upstream-info.deps.gn.version else "0"; 84 - src = fetchgit { 85 - url = "https://gn.googlesource.com/gn"; 86 - inherit (upstream-info.deps.gn) rev hash; 87 - }; 88 - }); 82 + gnChromium = buildPackages.gn.override upstream-info.deps.gn; 89 83 }); 90 84 91 85 browser = callPackage ./browser.nix {
+4 -2
pkgs/applications/networking/browsers/chromium/info.json
··· 12 12 "hash": "sha256-UouvzNFStYScnyfIJcz1Om7cDhC7EyShZQ/Icu73BPo=" 13 13 }, 14 14 "gn": { 15 + "version": "0-unstable-2025-06-19", 15 16 "rev": "97b68a0bb62b7528bc3491c7949d6804223c2b82", 16 - "hash": "sha256-m+z10s40Q/iYcoMw3o/+tmhIdqHMsYJjdGabHrK/aqo=" 17 + "hash": "sha256-gwptzuirIdPAV9XCaAT09aM/fY7d6xgBU7oSu9C4tmE=" 17 18 }, 18 19 "npmHash": "sha256-R2gOpfPOUAmnsnUTIvzDPHuHNzL/b2fwlyyfTrywEcI=" 19 20 }, ··· 809 810 "hash": "sha256-UouvzNFStYScnyfIJcz1Om7cDhC7EyShZQ/Icu73BPo=" 810 811 }, 811 812 "gn": { 813 + "version": "0-unstable-2025-06-19", 812 814 "rev": "97b68a0bb62b7528bc3491c7949d6804223c2b82", 813 - "hash": "sha256-m+z10s40Q/iYcoMw3o/+tmhIdqHMsYJjdGabHrK/aqo=" 815 + "hash": "sha256-gwptzuirIdPAV9XCaAT09aM/fY7d6xgBU7oSu9C4tmE=" 814 816 }, 815 817 "ungoogled-patches": { 816 818 "rev": "139.0.7258.66-1",
+28 -11
pkgs/applications/networking/browsers/chromium/update.mjs
··· 62 62 chromedriver: !ungoogled ? await fetch_chromedriver_binaries(await get_latest_chromium_release('mac')) : undefined, 63 63 deps: { 64 64 depot_tools: {}, 65 - gn: {}, 65 + gn: await fetch_gn(chromium_rev, lockfile_initial[attr_path].deps.gn), 66 66 'ungoogled-patches': !ungoogled ? undefined : { 67 67 rev: ungoogled_patches.rev, 68 68 hash: ungoogled_patches.hash, ··· 76 76 lockfile[attr_path].deps.depot_tools = { 77 77 rev: depot_tools.rev, 78 78 hash: depot_tools.hash, 79 - } 80 - 81 - const gn = await fetch_gn(chromium_rev, lockfile_initial[attr_path].deps.gn) 82 - lockfile[attr_path].deps.gn = { 83 - rev: gn.rev, 84 - hash: gn.hash, 85 79 } 86 80 87 81 // DEPS update loop ··· 133 127 134 128 async function fetch_gn(chromium_rev, gn_previous) { 135 129 const DEPS_file = await get_gitiles_file('https://chromium.googlesource.com/chromium/src', chromium_rev, 'DEPS') 136 - const gn_rev = /^\s+'gn_version': 'git_revision:(?<rev>.+)',$/m.exec(DEPS_file).groups.rev 137 - const hash = gn_rev === gn_previous.rev ? gn_previous.hash : '' 130 + const { rev } = /^\s+'gn_version': 'git_revision:(?<rev>.+)',$/m.exec(DEPS_file).groups 131 + 132 + const cache_hit = rev === gn_previous.rev; 133 + if (cache_hit) { 134 + return gn_previous 135 + } 136 + 137 + const commit_date = await get_gitiles_commit_date('https://gn.googlesource.com/gn', rev) 138 + const version = `0-unstable-${commit_date}` 139 + 140 + const expr = [`(import ./. {}).gn.override { version = "${version}"; rev = "${rev}"; hash = ""; }`] 141 + const derivation = await $nixpkgs`nix-instantiate --expr ${expr}` 138 142 139 - return await prefetch_gitiles('https://gn.googlesource.com/gn', gn_rev, hash) 143 + return { 144 + version, 145 + rev, 146 + hash: await prefetch_FOD(derivation), 147 + } 148 + } 149 + 150 + 151 + async function get_gitiles_commit_date(base_url, rev) { 152 + const url = `${base_url}/+/${rev}?format=json` 153 + const response = await (await fetch(url)).text() 154 + const json = JSON.parse(response.replace(`)]}'\n`, '')) 155 + 156 + const date = new Date(json.commiter.time) 157 + return date.toISOString().split("T")[0] 140 158 } 141 159 142 160 ··· 259 277 260 278 return hash 261 279 } 262 -
+3 -3
pkgs/applications/networking/cluster/helmfile/default.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "helmfile"; 12 - version = "1.1.3"; 12 + version = "1.1.4"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "helmfile"; 16 16 repo = "helmfile"; 17 17 rev = "v${version}"; 18 - hash = "sha256-Nsfqd54QNRkeqUxUA05+0gtcoopz090/wW+zdFsEii8="; 18 + hash = "sha256-q0PIvTsl5wbzSNyrJbN6y8nB7yJB3NO2RAvWKr8hmNU="; 19 19 }; 20 20 21 - vendorHash = "sha256-fiwxmF91UCTNi3jgrJnWgPswWXQFLg70d+h3frnu7kU="; 21 + vendorHash = "sha256-frwwqVmkiWtA6eg4rcd/KbG5CiEoF+rRO66/6WMxawI="; 22 22 23 23 proxyVendor = true; # darwin/linux hash mismatch 24 24
+11 -11
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 335 335 "vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA=" 336 336 }, 337 337 "datadog": { 338 - "hash": "sha256-2BoazJ97yPtp627a5HpAVg9iD2OMIeXSmv5kkdxuTes=", 338 + "hash": "sha256-Fi1Ip/Uy89s8XeX5yT55LKjMw/Bk/B/Vwvc0qXTaYbw=", 339 339 "homepage": "https://registry.terraform.io/providers/DataDog/datadog", 340 340 "owner": "DataDog", 341 341 "repo": "terraform-provider-datadog", 342 - "rev": "v3.69.0", 342 + "rev": "v3.70.0", 343 343 "spdx": "MPL-2.0", 344 - "vendorHash": "sha256-AQ+/+NCBBj4ptBGHJmibH6QZo4560dRRbs55SqY9buE=" 344 + "vendorHash": "sha256-IW7v9w3/X+v+AF8eRE4n1KI7MnLWlxkXzTvAJtsQ4Ik=" 345 345 }, 346 346 "deno": { 347 347 "hash": "sha256-7IvJrhXMeAmf8e21QBdYNSJyVMEzLpat4Tm4zHWglW8=", ··· 633 633 "vendorHash": "sha256-SsEWNIBkgcdTlSrB4hIvRmhMv2eJ2qQaPUmiN09A+NM=" 634 634 }, 635 635 "huaweicloud": { 636 - "hash": "sha256-BzWYtn6KVVMq+wjqj3CMPKSzo9DzePIIdnRjJ53nJBI=", 636 + "hash": "sha256-LLQFgUy3Hv3HlcL4gnZPdIEcR95fqroKIH4cLyb21Sk=", 637 637 "homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud", 638 638 "owner": "huaweicloud", 639 639 "repo": "terraform-provider-huaweicloud", 640 - "rev": "v1.77.1", 640 + "rev": "v1.77.3", 641 641 "spdx": "MPL-2.0", 642 642 "vendorHash": null 643 643 }, ··· 831 831 "vendorHash": "sha256-QxbZv6YMa5/I4bTeQBNdmG3EKtLEmstnH7HMiZzFJrI=" 832 832 }, 833 833 "migadu": { 834 - "hash": "sha256-3q9vhHt4VDqcIYHEZjJY0whvGPQWMDHkGsAQEES8EkE=", 834 + "hash": "sha256-k7W/oaZeBY5/Wi1vRCD641DKc0KQbBa834WDmtBp5wY=", 835 835 "homepage": "https://registry.terraform.io/providers/metio/migadu", 836 836 "owner": "metio", 837 837 "repo": "terraform-provider-migadu", 838 - "rev": "2025.7.17", 838 + "rev": "2025.8.7", 839 839 "spdx": "0BSD", 840 - "vendorHash": "sha256-oipY2hwgRrntCxxHPyH06e8p+0fKfAQwhh2iBI4RGHQ=" 840 + "vendorHash": "sha256-CokSZ4CgWBCb/MnGK410Lt9rwBq3luceoFAPLLrwT5U=" 841 841 }, 842 842 "minio": { 843 843 "hash": "sha256-TLWbbWYTjnvxT1LaV3FsL31xHHov8LpDYhA/nchMyMo=", ··· 1210 1210 "vendorHash": "sha256-MIO0VHofPtKPtynbvjvEukMNr5NXHgk7BqwIhbc9+u0=" 1211 1211 }, 1212 1212 "signalfx": { 1213 - "hash": "sha256-EoehHn7j3nnXzpHEjX4FQSO1na9xSmVpnTiPnTqUrpE=", 1213 + "hash": "sha256-hNMZbrihV+xlfamXRaGszQRqO8Tn2829rd4+pH83lrU=", 1214 1214 "homepage": "https://registry.terraform.io/providers/splunk-terraform/signalfx", 1215 1215 "owner": "splunk-terraform", 1216 1216 "repo": "terraform-provider-signalfx", 1217 - "rev": "v9.17.0", 1217 + "rev": "v9.19.1", 1218 1218 "spdx": "MPL-2.0", 1219 - "vendorHash": "sha256-404/DlCtz0yAaM8zJ3ngJ2/DwoUJImjIqKYwdigHl4U=" 1219 + "vendorHash": "sha256-wpm7J8kfkm4vDZhZ0koQsgpW5JwWY7DngSYXfaWh3FQ=" 1220 1220 }, 1221 1221 "skytap": { 1222 1222 "hash": "sha256-JII4czazo6Di2sad1uFHMKDO2gWgZlQE8l/+IRYHQHU=",
-1
pkgs/applications/science/math/mathematica/default.nix
··· 76 76 license = licenses.unfree; 77 77 sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 78 78 maintainers = with maintainers; [ 79 - herberteuler 80 79 rafaelrc 81 80 ]; 82 81 platforms = [ "x86_64-linux" ];
+3 -3
pkgs/applications/video/mpv/scripts/skipsilence.nix
··· 7 7 8 8 buildLua { 9 9 pname = "mpv-skipsilence"; 10 - version = "0-unstable-2024-05-06"; 10 + version = "0-unstable-2025-08-03"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "ferreum"; 14 14 repo = "mpv-skipsilence"; 15 - rev = "5ae7c3b6f927e728c22fc13007265682d1ecf98c"; 16 - hash = "sha256-fg8vfeb68nr0bTBIvr0FnRnoB48/kV957pn22tWcz1g="; 15 + rev = "42e511c52c68c1aa9678e18caea41e43eee9149b"; 16 + hash = "sha256-+sOMWFFumJUk5gFE1iCTvWub3PWzYOkulXJLCGS4fYA="; 17 17 }; 18 18 19 19 passthru.updateScript = unstableGitUpdater { };
+3 -3
pkgs/by-name/al/all-the-package-names/package.nix
··· 7 7 8 8 buildNpmPackage rec { 9 9 pname = "all-the-package-names"; 10 - version = "2.0.2159"; 10 + version = "2.0.2168"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "nice-registry"; 14 14 repo = "all-the-package-names"; 15 15 tag = "v${version}"; 16 - hash = "sha256-7c4cxGSBc60WTLjRptb8VbTf279BxDgVOiVaP4C7pKk="; 16 + hash = "sha256-iHwmvrDIiBMoH1LBrAbYvI/qPebTJIlvaOl6KxXJ+O8="; 17 17 }; 18 18 19 - npmDepsHash = "sha256-fDQnEjPefRBbpCX21vZrJ3Y8y7d3PgM54IfPJbb44ao="; 19 + npmDepsHash = "sha256-WxgcuQx/raixX4Y2diyDM5cAhsfFCUrNt+z02VC3Ng4="; 20 20 21 21 passthru.updateScript = nix-update-script { }; 22 22
+69 -25
pkgs/by-name/am/amp-cli/package-lock.json
··· 5 5 "packages": { 6 6 "": { 7 7 "dependencies": { 8 - "@sourcegraph/amp": "^0.0.1754036264-ga0aa13" 8 + "@sourcegraph/amp": "^0.0.1754827277-g1b1a5d" 9 9 } 10 10 }, 11 11 "node_modules/@colors/colors": { ··· 28 28 "kuler": "^2.0.0" 29 29 } 30 30 }, 31 - "node_modules/@luxass/strip-json-comments": { 32 - "version": "1.4.0", 33 - "resolved": "https://registry.npmjs.org/@luxass/strip-json-comments/-/strip-json-comments-1.4.0.tgz", 34 - "integrity": "sha512-Zl343to4u/t8jz1q7R/1UY6hLX+344cwPLEXsIYthVwdU5zyjuVBGcpf2E24+QZkwFfRfmnHTcscreQzWn3hiA==", 35 - "license": "MIT", 36 - "engines": { 37 - "node": ">=18" 38 - } 39 - }, 40 31 "node_modules/@sourcegraph/amp": { 41 - "version": "0.0.1754036264-ga0aa13", 42 - "resolved": "https://registry.npmjs.org/@sourcegraph/amp/-/amp-0.0.1754036264-ga0aa13.tgz", 43 - "integrity": "sha512-76U1LuEOPUuJcVyMvRkblfvQChJutVZcgCJ4DB/rwke2yxXp2rhdqAOd1bHc2qWrH/nlWX+2BBZY1wTZgAVxRg==", 32 + "version": "0.0.1754827277-g1b1a5d", 33 + "resolved": "https://registry.npmjs.org/@sourcegraph/amp/-/amp-0.0.1754827277-g1b1a5d.tgz", 34 + "integrity": "sha512-P7PAvlEuRFz0dfpgErRe9brm00+1/I0xK2ym8QWt+hY6ITXtAFMbxJKELcsVpJwgSTJeFs3LUyj9glrJHdNMmw==", 44 35 "dependencies": { 45 36 "ansi-regex": "^6.1.0", 46 37 "commander": "^11.1.0", 47 38 "fuse.js": "^7.0.0", 48 - "jsonc-parse": "^1.5.5", 39 + "jsonc-parser": "^3.3.1", 49 40 "open": "^10.1.2", 50 41 "open-simplex-noise": "^2.5.0", 51 42 "runes": "^0.4.3", 52 43 "string-width": "^6.1.0", 53 44 "winston": "^3.17.0", 45 + "wrap-ansi": "^9.0.0", 54 46 "xdg-basedir": "^5.1.0" 55 47 }, 56 48 "bin": { ··· 78 70 "url": "https://github.com/chalk/ansi-regex?sponsor=1" 79 71 } 80 72 }, 73 + "node_modules/ansi-styles": { 74 + "version": "6.2.1", 75 + "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-6.2.1.tgz", 76 + "integrity": "sha512-bN798gFfQX+viw3R7yrGWRqnrN2oRkEkUjjl4JNn4E8GxxbjtG3FbrEIIY3l8/hrwUwIeCZvi4QuOTP4MErVug==", 77 + "license": "MIT", 78 + "engines": { 79 + "node": ">=12" 80 + }, 81 + "funding": { 82 + "url": "https://github.com/chalk/ansi-styles?sponsor=1" 83 + } 84 + }, 81 85 "node_modules/async": { 82 86 "version": "3.2.6", 83 87 "resolved": "https://registry.npmjs.org/async/-/async-3.2.6.tgz", ··· 232 236 "node": ">=10" 233 237 } 234 238 }, 239 + "node_modules/get-east-asian-width": { 240 + "version": "1.3.0", 241 + "resolved": "https://registry.npmjs.org/get-east-asian-width/-/get-east-asian-width-1.3.0.tgz", 242 + "integrity": "sha512-vpeMIQKxczTD/0s2CdEWHcb0eeJe6TFjxb+J5xgX7hScxqrGuyjmv4c1D4A/gelKfyox0gJJwIHF+fLjeaM8kQ==", 243 + "license": "MIT", 244 + "engines": { 245 + "node": ">=18" 246 + }, 247 + "funding": { 248 + "url": "https://github.com/sponsors/sindresorhus" 249 + } 250 + }, 235 251 "node_modules/inherits": { 236 252 "version": "2.0.4", 237 253 "resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz", ··· 304 320 "url": "https://github.com/sponsors/sindresorhus" 305 321 } 306 322 }, 307 - "node_modules/jsonc-parse": { 308 - "version": "1.5.5", 309 - "resolved": "https://registry.npmjs.org/jsonc-parse/-/jsonc-parse-1.5.5.tgz", 310 - "integrity": "sha512-6xSVqUb+VBwXSJoyDPzgK1toG+JoOcfjWrmZNBL5ZmKnokV9dLshqyLU8NkcLavKbT5tKEr+3T0d4/7d+wVdVw==", 311 - "license": "MIT", 312 - "dependencies": { 313 - "@luxass/strip-json-comments": "^1.3.2" 314 - }, 315 - "engines": { 316 - "node": ">=18" 317 - } 323 + "node_modules/jsonc-parser": { 324 + "version": "3.3.1", 325 + "resolved": "https://registry.npmjs.org/jsonc-parser/-/jsonc-parser-3.3.1.tgz", 326 + "integrity": "sha512-HUgH65KyejrUFPvHFPbqOY0rsFip3Bo5wb4ngvdi1EpCYWUQDC5V+Y7mZws+DLkr4M//zQJoanu1SP+87Dv1oQ==", 327 + "license": "MIT" 318 328 }, 319 329 "node_modules/kuler": { 320 330 "version": "2.0.0", ··· 556 566 }, 557 567 "engines": { 558 568 "node": ">= 12.0.0" 569 + } 570 + }, 571 + "node_modules/wrap-ansi": { 572 + "version": "9.0.0", 573 + "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-9.0.0.tgz", 574 + "integrity": "sha512-G8ura3S+3Z2G+mkgNRq8dqaFZAuxfsxpBB8OCTGRTCtp+l/v9nbFNmCUP1BZMts3G1142MsZfn6eeUKrr4PD1Q==", 575 + "license": "MIT", 576 + "dependencies": { 577 + "ansi-styles": "^6.2.1", 578 + "string-width": "^7.0.0", 579 + "strip-ansi": "^7.1.0" 580 + }, 581 + "engines": { 582 + "node": ">=18" 583 + }, 584 + "funding": { 585 + "url": "https://github.com/chalk/wrap-ansi?sponsor=1" 586 + } 587 + }, 588 + "node_modules/wrap-ansi/node_modules/string-width": { 589 + "version": "7.2.0", 590 + "resolved": "https://registry.npmjs.org/string-width/-/string-width-7.2.0.tgz", 591 + "integrity": "sha512-tsaTIkKW9b4N+AEj+SVA+WhJzV7/zMhcSu78mLKWSk7cXMOSHsBKFWUs0fWwq8QyK3MgJBQRX6Gbi4kYbdvGkQ==", 592 + "license": "MIT", 593 + "dependencies": { 594 + "emoji-regex": "^10.3.0", 595 + "get-east-asian-width": "^1.0.0", 596 + "strip-ansi": "^7.1.0" 597 + }, 598 + "engines": { 599 + "node": ">=18" 600 + }, 601 + "funding": { 602 + "url": "https://github.com/sponsors/sindresorhus" 559 603 } 560 604 }, 561 605 "node_modules/xdg-basedir": {
+3 -3
pkgs/by-name/am/amp-cli/package.nix
··· 9 9 10 10 buildNpmPackage (finalAttrs: { 11 11 pname = "amp-cli"; 12 - version = "0.0.1754036264-ga0aa13"; 12 + version = "0.0.1754827277-g1b1a5d"; 13 13 14 14 src = fetchzip { 15 15 url = "https://registry.npmjs.org/@sourcegraph/amp/-/amp-${finalAttrs.version}.tgz"; 16 - hash = "sha256-+pvxRLoluRk6/XfPr5luW2oIAjWTCYMJo53wHzQh598="; 16 + hash = "sha256-7LOp4/jpdxkeKi++vZGogobNiQpMqd5zMeCQywgc/wg="; 17 17 }; 18 18 19 19 postPatch = '' ··· 45 45 chmod +x bin/amp-wrapper.js 46 46 ''; 47 47 48 - npmDepsHash = "sha256-Xm/uZAf9bDasHGIhcS2G8JUo3GyTdnErjzU7clkFQW0="; 48 + npmDepsHash = "sha256-6n+1fzet/JwLzaL9Z0ALIFY7Z0yaCwRCrv+73DxNkiY="; 49 49 50 50 propagatedBuildInputs = [ 51 51 ripgrep
+3 -3
pkgs/by-name/au/automatic-timezoned/package.nix
··· 6 6 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "automatic-timezoned"; 9 - version = "2.0.84"; 9 + version = "2.0.85"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "maxbrunet"; 13 13 repo = "automatic-timezoned"; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-Ul9bzMC8MfbfE4PDi3O8mhsImbspOcBDqTZOoVVeP/0="; 15 + sha256 = "sha256-1Fsc33ZIZsXCPe0WuhFEO6HjSqrvzYoR6QD/MMPxVjA="; 16 16 }; 17 17 18 - cargoHash = "sha256-GroKztTpPWTw/tyrPWfld1ix0BnkjphwHM3J/17byqM="; 18 + cargoHash = "sha256-Gbb5+4RXZGebqGDcwVSXAipaQ3fA0Tu7jhQXnSyW9O0="; 19 19 20 20 meta = { 21 21 description = "Automatically update system timezone based on location";
+3 -3
pkgs/by-name/ba/balena-cli/package.nix
··· 22 22 in 23 23 buildNpmPackage' rec { 24 24 pname = "balena-cli"; 25 - version = "22.1.5"; 25 + version = "22.2.4"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "balena-io"; 29 29 repo = "balena-cli"; 30 30 rev = "v${version}"; 31 - hash = "sha256-5ltVQHye4miXA7W201n4XakP1eVyfFWzzaP+I7iKwOg="; 31 + hash = "sha256-d0buLOiCHBpGhzduOCfJk+hraqS/njz1PTOD8QZSt8k="; 32 32 }; 33 33 34 - npmDepsHash = "sha256-oYwysy/gBJZ3akTjkdZEaX3KfdBmoaXEPbdXZNs8Ds8="; 34 + npmDepsHash = "sha256-7qecvPiJeV1rOLnI76WNwRGmx6PVCPHH5M/+OH+8l3I="; 35 35 36 36 postPatch = '' 37 37 ln -s npm-shrinkwrap.json package-lock.json
+3 -3
pkgs/by-name/ba/bazel-watcher/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "bazel-watcher"; 12 - version = "0.26.8"; 12 + version = "0.26.10"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "bazelbuild"; 16 16 repo = "bazel-watcher"; 17 17 rev = "v${version}"; 18 - hash = "sha256-lAIIu6DWFQOwY6KFDaNVZg/H1pn2/eFmoqjtSGqBhMk="; 18 + hash = "sha256-OrOJ24XdYASOgO8170M0huVGYubH8MJ0tbp0hvqmN/w="; 19 19 }; 20 20 21 - vendorHash = "sha256-wbQY493O2d/fa46/qvCzBpv9OY1YPQjTEqHtT0A9EV0="; 21 + vendorHash = "sha256-JkEJyrBY70+XO9qjw/t2qCayhVQzRkTEp/NXFTr+pXY="; 22 22 23 23 # The dependency github.com/fsnotify/fsevents requires CGO 24 24 env.CGO_ENABLED = if stdenv.hostPlatform.isDarwin then "1" else "0";
+3 -3
pkgs/by-name/br/brutespray/package.nix
··· 8 8 9 9 buildGoModule (finalAttrs: { 10 10 pname = "brutespray"; 11 - version = "2.3.1"; 11 + version = "2.4.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "x90skysn3k"; 15 15 repo = "brutespray"; 16 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-oH7Gun/nKScv2buLwM6faiz9/3sl9l4JzkKbdTnGz0Q="; 17 + hash = "sha256-tws3BvVQSlGcBgiJ8Ho7V/KJjzoq3TEOiChqTzrMbiU="; 18 18 }; 19 19 20 - vendorHash = "sha256-TBLjCXb1W5FHBrzxBI0/3NMuM9eCizLiz489jyZsEso="; 20 + vendorHash = "sha256-Fe3W5rlKygw4z5bF+6xy5mv86wKcBuCf3nhtdtFWJPM="; 21 21 22 22 nativeBuildInputs = [ makeBinaryWrapper ]; 23 23
+3 -3
pkgs/by-name/ch/cht-sh/package.nix
··· 12 12 13 13 stdenv.mkDerivation { 14 14 pname = "cht.sh"; 15 - version = "0-unstable-2025-07-29"; 15 + version = "0-unstable-2025-08-08"; 16 16 17 17 nativeBuildInputs = [ makeWrapper ]; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "chubin"; 21 21 repo = "cheat.sh"; 22 - rev = "bae856b96329e205967c74b3803023cb2b655df9"; 23 - sha256 = "7k/9DLSO1D+1BvTlRZBHOvz++LMw1DcpOL5LIb7VUXw="; 22 + rev = "b714a5f0d56427924a7871f083fd05e7ede6b0e4"; 23 + sha256 = "JkqHxHgs7gUk511CSJ/sLEBWCAYig1lqfslhABDNMGI="; 24 24 }; 25 25 26 26 # Fix ".cht.sh-wrapped" in the help message
+3 -3
pkgs/by-name/cl/clickhouse-backup/package.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "clickhouse-backup"; 11 - version = "2.6.30"; 11 + version = "2.6.33"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "Altinity"; 15 15 repo = "clickhouse-backup"; 16 16 rev = "v${version}"; 17 - hash = "sha256-9CxmMCtrQlHO9Q7gGMN0mIKVERjdef9IB6YUXXuJxeg="; 17 + hash = "sha256-H8LwinH9/J2QawzVggt9vA7/oqaTXy02xqqlGPNtZvc="; 18 18 }; 19 19 20 - vendorHash = "sha256-tv5UaHoZTEAjo0jgbHRZHN6xiCNaexED+NG7cBDtiWA="; 20 + vendorHash = "sha256-LTljOVQI1fRXvo0cfsiT6SU4Q9t5dyaCuHBq/BiVe/w="; 21 21 22 22 ldflags = [ 23 23 "-X main.version=${version}"
+2 -2
pkgs/by-name/co/codex/package.nix
··· 14 14 }: 15 15 rustPlatform.buildRustPackage (finalAttrs: { 16 16 pname = "codex"; 17 - version = "0.19.0"; 17 + version = "0.20.0"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "openai"; 21 21 repo = "codex"; 22 22 tag = "rust-v${finalAttrs.version}"; 23 - hash = "sha256-s7gN1fsk/PRiVVzlrtmAUd2Vu8hhKtlCesLOVrzJ/58="; 23 + hash = "sha256-v5PEj3T/eirAMpHHMR6LE9X8qDNhvCJP40Nleal3oOw="; 24 24 }; 25 25 26 26 sourceRoot = "${finalAttrs.src.name}/codex-rs";
+2 -2
pkgs/by-name/co/copybara/package.nix
··· 13 13 }: 14 14 stdenv.mkDerivation (finalAttrs: { 15 15 pname = "copybara"; 16 - version = "20250728"; 16 + version = "20250804"; 17 17 18 18 src = fetchurl { 19 19 url = "https://github.com/google/copybara/releases/download/v${finalAttrs.version}/copybara_deploy.jar"; 20 - hash = "sha256-/ulX5Q+P6ViiDcdwRpd9zhJAQiFULzU2fSXvfOk36xo="; 20 + hash = "sha256-lus3WEwpd9TIGy7IO11d8eZ3S6J/jHzWRFQ76gRiVXg="; 21 21 }; 22 22 23 23 nativeBuildInputs = [
+3 -3
pkgs/by-name/cu/cubeb/package.nix
··· 24 24 25 25 stdenv.mkDerivation (finalAttrs: { 26 26 pname = "cubeb"; 27 - version = "0-unstable-2025-07-10"; 27 + version = "0-unstable-2025-08-05"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "mozilla"; 31 31 repo = "cubeb"; 32 - rev = "fa021607121360af7c171d881dc5bc8af7bb56eb"; 33 - hash = "sha256-6PUHUPybe3g5nexunAHsHLThFdvpnv+avks+C0oYih0="; 32 + rev = "d78a19ba4a892abfdfd7eeeb19fa7ffe3d80938c"; 33 + hash = "sha256-sjv5XKZu9uX2y2HN+BFttOsb6bECEpl0oRneYxNOZgU="; 34 34 }; 35 35 36 36 outputs = [
+2 -2
pkgs/by-name/da/databricks-cli/package.nix
··· 10 10 11 11 buildGoModule (finalAttrs: { 12 12 pname = "databricks-cli"; 13 - version = "0.262.0"; 13 + version = "0.263.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "databricks"; 17 17 repo = "cli"; 18 18 rev = "v${finalAttrs.version}"; 19 - hash = "sha256-grA7HI9gJFgeqNxmd6SboAn9z2QKLok7BayGj2RMYog="; 19 + hash = "sha256-bRHZGoO7+k7HoXcyJMusqDnn3XoAesgZ280j8jNgQYY="; 20 20 }; 21 21 22 22 # Otherwise these tests fail asserting that the version is 0.0.0-dev
+2 -2
pkgs/by-name/eg/eggnog-mapper/package.nix
··· 9 9 10 10 python3Packages.buildPythonApplication rec { 11 11 pname = "eggnog-mapper"; 12 - version = "2.1.12"; 12 + version = "2.1.13"; 13 13 format = "setuptools"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "eggnogdb"; 17 17 repo = "eggnog-mapper"; 18 18 tag = version; 19 - hash = "sha256-+luxXQmtGufYrA/9Ak3yKzbotOj2HM3vhIoOxE+Ty1U="; 19 + hash = "sha256-Gu4D8DBvgCPlO+2MjeNZy6+lNqsIlksegWmmYvEZmUU="; 20 20 }; 21 21 22 22 postPatch = ''
+2 -2
pkgs/by-name/er/ergo/package.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "ergo"; 12 - version = "6.0.0"; 12 + version = "6.0.1"; 13 13 14 14 src = fetchurl { 15 15 url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar"; 16 - sha256 = "sha256-gHDXMirYSXMpBISMDW+Wh3o7BZuWnBG8CXV/thMh/Ww="; 16 + sha256 = "sha256-ByvHXgXFdoHbc+lWEK82I/I50Q1aoe3SSI2JeaTjEC4="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ makeWrapper ];
+4 -4
pkgs/by-name/ev/evcc/package.nix
··· 17 17 }: 18 18 19 19 let 20 - version = "0.207.0"; 20 + version = "0.207.2"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "evcc-io"; 24 24 repo = "evcc"; 25 25 tag = version; 26 - hash = "sha256-gaTY+9MB3nPRD2bOnWYS+vALRR9eHkFNCrEEMspE5ck="; 26 + hash = "sha256-bBW2HU2TijUC6pn3gH23JTTGy5BWSm+V6BBsiYqi6U0="; 27 27 }; 28 28 29 - vendorHash = "sha256-cn7zqhBJblDPl7H8BJtWZ2+ckTKVlqBIwwuXNGwrXdk="; 29 + vendorHash = "sha256-VITdJ23xrO346EOlNe5uoOKcsQ76x+Yb7Vhl0/H+WTI="; 30 30 31 31 commonMeta = with lib; { 32 32 license = licenses.mit; ··· 52 52 53 53 npmDeps = fetchNpmDeps { 54 54 inherit src; 55 - hash = "sha256-yQ+MnXjixNQfWSVnRzmxRtQAvLecdLMDQSXyuIdzGnU="; 55 + hash = "sha256-GB57pXfWo1lduVDPPw7TBM8qgCmTxPDxKQyD4ZZJnjE="; 56 56 }; 57 57 58 58 nativeBuildInputs = [
+2 -2
pkgs/by-name/fc/fcitx5-pinyin-moegirl/package.nix
··· 6 6 }: 7 7 stdenvNoCC.mkDerivation (finalAttrs: { 8 8 pname = "fcitx5-pinyin-moegirl"; 9 - version = "20250711"; 9 + version = "20250810"; 10 10 11 11 src = fetchurl { 12 12 url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict"; 13 - hash = "sha256-kjdgsq5n+7rjPBrXOjrb13+JLPLeXNQFv9uhl4NSszM="; 13 + hash = "sha256-PuuW43+uu9Vasy33KW1IKb2uK2mh8M/V9fVCVp1QZl0="; 14 14 }; 15 15 16 16 dontUnpack = true;
+2 -2
pkgs/by-name/fc/fcitx5-pinyin-zhwiki/package.nix
··· 6 6 stdenvNoCC.mkDerivation (finalAttrs: { 7 7 pname = "fcitx5-pinyin-zhwiki"; 8 8 version = "0.2.5"; 9 - date = "20250415"; 9 + date = "20250731"; 10 10 11 11 src = fetchurl { 12 12 url = "https://github.com/felixonmars/fcitx5-pinyin-zhwiki/releases/download/${finalAttrs.version}/zhwiki-${finalAttrs.date}.dict"; 13 - hash = "sha256-8dFBoP3UcYCl6EYojn14Bp7aYe/Z9cf4drSmeheHbLw="; 13 + hash = "sha256-pS2fVLfihJGgKA1XsW1x0VanfhjHgDGtsqedpmvdUnE="; 14 14 }; 15 15 16 16 dontUnpack = true;
+122 -72
pkgs/by-name/fi/fire/package.nix
··· 1 1 { 2 2 stdenv, 3 3 lib, 4 + fetchurl, 4 5 fetchFromGitHub, 6 + runCommand, 5 7 unstableGitUpdater, 6 8 catch2_3, 7 9 cmake, 10 + fontconfig, 8 11 pkg-config, 9 12 libX11, 10 13 libXrandr, ··· 13 16 libXcursor, 14 17 freetype, 15 18 alsa-lib, 19 + 20 + # Only able to test this myself in Linux 21 + withStandalone ? stdenv.hostPlatform.isLinux, 16 22 }: 17 23 24 + let 25 + # Required version, base URL and expected location specified in cmake/CPM.cmake 26 + cpmDownloadVersion = "0.40.2"; 27 + cpmSrc = fetchurl { 28 + url = "https://github.com/cpm-cmake/CPM.cmake/releases/download/v${cpmDownloadVersion}/CPM.cmake"; 29 + hash = "sha256-yM3DLAOBZTjOInge1ylk3IZLKjSjENO3EEgSpcotg10="; 30 + }; 31 + cpmSourceCache = runCommand "cpm-source-cache" { } '' 32 + mkdir -p $out/cpm 33 + ln -s ${cpmSrc} $out/cpm/CPM_${cpmDownloadVersion}.cmake 34 + ''; 35 + 36 + pathMappings = [ 37 + { 38 + from = "LV2"; 39 + to = "${placeholder "out"}/${ 40 + if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/LV2" else "lib/lv2" 41 + }"; 42 + } 43 + { 44 + from = "VST3"; 45 + to = "${placeholder "out"}/${ 46 + if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/VST3" else "lib/vst3" 47 + }"; 48 + } 49 + # this one's a guess, don't know where ppl have agreed to put them yet 50 + { 51 + from = "CLAP"; 52 + to = "${placeholder "out"}/${ 53 + if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/CLAP" else "lib/clap" 54 + }"; 55 + } 56 + ] 57 + ++ lib.optionals withStandalone [ 58 + { 59 + from = "Standalone"; 60 + to = "${placeholder "out"}/bin"; 61 + } 62 + ] 63 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ 64 + # Audio Unit is a macOS-specific thing 65 + { 66 + from = "AU"; 67 + to = "${placeholder "out"}/Library/Audio/Plug-Ins/Components"; 68 + } 69 + ]; 70 + 71 + x11Libs = [ 72 + libX11 73 + libXrandr 74 + libXinerama 75 + libXext 76 + libXcursor 77 + ]; 78 + in 18 79 stdenv.mkDerivation (finalAttrs: { 19 80 pname = "fire"; 20 - version = "1.0.1-unstable-2025-03-12"; 81 + version = "1.0.2-unstable-2025-07-05"; 21 82 22 83 src = fetchFromGitHub { 23 84 owner = "jerryuhoo"; 24 85 repo = "Fire"; 25 - rev = "b7ded116ce7ab78a57bb9b6b61796cb2cf3a6e8b"; 86 + rev = "a0553c6fcced4919871771da3add390e931e29de"; 26 87 fetchSubmodules = true; 27 - hash = "sha256-d8w+b4OpU2/kQdcAimR4ihDEgVTM1V7J0hj7saDrQpY="; 88 + hash = "sha256-bHqWP3EZQg42OBi44Z1RvkIB2Ou0dDxgBLcidgxaMU8="; 28 89 }; 29 90 30 - postPatch = '' 31 - # Disable automatic copying of built plugins during buildPhase, it defaults 32 - # into user home and we want to have building & installing separated. 33 - substituteInPlace CMakeLists.txt \ 34 - --replace-fail 'COPY_PLUGIN_AFTER_BUILD TRUE' 'COPY_PLUGIN_AFTER_BUILD FALSE' 35 - '' 36 - + lib.optionalString stdenv.hostPlatform.isLinux '' 37 - # Remove hardcoded LTO flags: needs extra setup on Linux 38 - substituteInPlace CMakeLists.txt \ 39 - --replace-fail 'juce::juce_recommended_lto_flags' '# Not forcing LTO' 40 - '' 41 - + lib.optionalString (!finalAttrs.finalPackage.doCheck) '' 42 - substituteInPlace CMakeLists.txt \ 43 - --replace-fail 'include(Tests)' '# Not building tests' \ 44 - --replace-fail 'include(Benchmarks)' '# Not building benchmark test' 45 - ''; 91 + postPatch = 92 + let 93 + formatsListing = lib.strings.concatMapStringsSep " " (entry: entry.from) pathMappings; 94 + in 95 + '' 96 + # Allow all the formats we can handle 97 + # Set LV2URI again for LV2 build 98 + # Disable automatic copying of built plugins during buildPhase, it defaults 99 + # into user home and we want to have building & installing separated. 100 + substituteInPlace CMakeLists.txt \ 101 + --replace-fail 'set(FORMATS' 'set(FORMATS ${formatsListing}) #' \ 102 + --replace-fail 'BUNDLE_ID "''${BUNDLE_ID}"' 'BUNDLE_ID "''${BUNDLE_ID}" LV2URI "https://www.bluewingsmusic.com/Fire/"' \ 103 + --replace-fail 'COPY_PLUGIN_AFTER_BUILD TRUE' 'COPY_PLUGIN_AFTER_BUILD FALSE' 104 + '' 105 + + lib.optionalString stdenv.hostPlatform.isLinux '' 106 + # Remove hardcoded LTO flags: needs extra setup on Linux 107 + substituteInPlace CMakeLists.txt \ 108 + --replace-fail 'juce::juce_recommended_lto_flags' '# Not forcing LTO' 109 + '' 110 + + lib.optionalString (!finalAttrs.finalPackage.doCheck) '' 111 + substituteInPlace CMakeLists.txt \ 112 + --replace-fail 'include(Tests)' '# Not building tests' \ 113 + --replace-fail 'include(Benchmarks)' '# Not building benchmark test' 114 + ''; 46 115 47 116 strictDeps = true; 48 117 ··· 51 120 pkg-config 52 121 ]; 53 122 54 - buildInputs = lib.optionals stdenv.hostPlatform.isLinux [ 55 - libX11 56 - libXrandr 57 - libXinerama 58 - libXext 59 - libXcursor 60 - freetype 61 - alsa-lib 62 - ]; 123 + buildInputs = [ 124 + catch2_3 125 + fontconfig 126 + ] 127 + ++ lib.optionals stdenv.hostPlatform.isLinux ( 128 + x11Libs 129 + ++ [ 130 + freetype 131 + alsa-lib 132 + ] 133 + ); 63 134 64 135 cmakeFlags = [ 65 - (lib.cmakeBool "FETCHCONTENT_FULLY_DISCONNECTED" true) 66 - (lib.cmakeFeature "FETCHCONTENT_SOURCE_DIR_CATCH2" "${catch2_3.src}") 136 + (lib.cmakeFeature "CPM_SOURCE_CACHE" "${cpmSourceCache}") 137 + (lib.cmakeBool "CPM_LOCAL_PACKAGES_ONLY" true) 138 + (lib.cmakeFeature "Catch2_SOURCE_DIR" "${catch2_3.src}") 67 139 ]; 68 140 69 - installPhase = 70 - let 71 - pathMappings = [ 72 - { 73 - from = "LV2"; 74 - to = "${placeholder "out"}/${ 75 - if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/LV2" else "lib/lv2" 76 - }"; 77 - } 78 - { 79 - from = "VST3"; 80 - to = "${placeholder "out"}/${ 81 - if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/VST3" else "lib/vst3" 82 - }"; 83 - } 84 - # this one's a guess, don't know where ppl have agreed to put them yet 85 - { 86 - from = "CLAP"; 87 - to = "${placeholder "out"}/${ 88 - if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/CLAP" else "lib/clap" 89 - }"; 90 - } 91 - ] 92 - ++ lib.optionals stdenv.hostPlatform.isDarwin [ 93 - { 94 - from = "AU"; 95 - to = "${placeholder "out"}/Library/Audio/Plug-Ins/Components"; 96 - } 97 - ]; 98 - in 99 - '' 100 - runHook preInstall 141 + installPhase = '' 142 + runHook preInstall 101 143 102 - '' 103 - + lib.strings.concatMapStringsSep "\n" (entry: '' 104 - mkdir -p ${entry.to} 105 - # Exact path of the build artefact depends on used CMAKE_BUILD_TYPE 106 - cp -r Fire_artefacts/*/${entry.from}/* ${entry.to}/ 107 - '') pathMappings 108 - + '' 144 + '' 145 + + lib.strings.concatMapStringsSep "\n" (entry: '' 146 + mkdir -p ${entry.to} 147 + # Exact path of the build artefact depends on used CMAKE_BUILD_TYPE 148 + cp -r -t ${entry.to} Fire_artefacts/${finalAttrs.cmakeBuildType or "Release"}/${entry.from}/* 149 + '') pathMappings 150 + + '' 109 151 110 - runHook postInstall 111 - ''; 152 + runHook postInstall 153 + ''; 112 154 113 155 doCheck = stdenv.buildPlatform.canExecute stdenv.hostPlatform; 114 156 157 + # Standalone dlopen's X11 libraries 158 + postFixup = lib.strings.optionalString (withStandalone && stdenv.hostPlatform.isLinux) '' 159 + patchelf --add-rpath ${lib.makeLibraryPath x11Libs} $out/bin/Fire 160 + ''; 161 + 115 162 passthru.updateScript = unstableGitUpdater { tagPrefix = "v"; }; 116 163 117 164 meta = { 118 165 description = "Multi-band distortion plugin by Wings"; 119 - homepage = "https://github.com/jerryuhoo/Fire"; 166 + homepage = "https://www.bluewingsmusic.com/Fire"; 120 167 license = lib.licenses.agpl3Only; # Not clarified if Only or Plus 121 168 platforms = lib.platforms.unix; 122 169 maintainers = with lib.maintainers; [ OPNA2608 ]; 170 + } 171 + // lib.optionalAttrs withStandalone { 172 + mainProgram = "Fire"; 123 173 }; 124 174 })
+2 -2
pkgs/by-name/fo/foxglove-cli/package.nix
··· 11 11 }: 12 12 buildGoModule (finalAttrs: { 13 13 pname = "foxglove-cli"; 14 - version = "1.0.24"; 14 + version = "1.0.25"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "foxglove"; 18 18 repo = "foxglove-cli"; 19 19 tag = "v${finalAttrs.version}"; 20 - hash = "sha256-JYaBVXSKn4zgWHq+s/tMgHCpQ2z5ZYh/+e+ex4MaUmo="; 20 + hash = "sha256-zmX3eCh5NYCbYlbx6bIxwF6Qktj+kwV4KpVsTI9ofZ8="; 21 21 }; 22 22 23 23 vendorHash = "sha256-fL/eOGx81pdIPWHt14cf4VoIqmfUmbkKa8/y0QQKYko=";
+3 -3
pkgs/by-name/fx/fx/package.nix
··· 7 7 8 8 buildGoModule (finalAttrs: { 9 9 pname = "fx"; 10 - version = "38.0.0"; 10 + version = "39.0.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "antonmedv"; 14 14 repo = "fx"; 15 15 tag = finalAttrs.version; 16 - hash = "sha256-9g9xtnmM3ANsvfxqE8pMTxiiUj+uQadhBooRQYKQpTg="; 16 + hash = "sha256-KVnPESE0Fp1liOZtpDgNpAggROnGHYdefAAECkbgZDE="; 17 17 }; 18 18 19 - vendorHash = "sha256-yVAoswClpf5+1nwLyrLKLYFt9Noh2HRemif1e1nWm7M="; 19 + vendorHash = "sha256-7x0nbgMzEJznDH6Wf5iaTYXLh/2IGUSeSVvb0UKKTOQ="; 20 20 21 21 ldflags = [ "-s" ]; 22 22
+2 -2
pkgs/by-name/gi/git-repo/package.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "git-repo"; 16 - version = "2.57.2"; 16 + version = "2.57.3"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "android"; 20 20 repo = "tools_repo"; 21 21 rev = "v${version}"; 22 - hash = "sha256-B8Z5qkjUrydjWTeAanDHMn7C2qVIIqb90zJ6WrI6fgI="; 22 + hash = "sha256-QJr1srOHcCnIQZNz56+zBlKs5ZA0/yDfhILek7pBx1Q="; 23 23 }; 24 24 25 25 # Fix 'NameError: name 'ssl' is not defined'
+15 -3
pkgs/by-name/gi/git-statuses/package.nix
··· 2 2 lib, 3 3 fetchFromGitHub, 4 4 rustPlatform, 5 + installShellFiles, 5 6 pkg-config, 6 7 openssl, 8 + git, 7 9 versionCheckHook, 10 + stdenv, 8 11 nix-update-script, 9 12 }: 10 13 11 14 rustPlatform.buildRustPackage (finalAttrs: { 12 15 pname = "git-statuses"; 13 - version = "0.4.0"; 16 + version = "0.5.1"; 14 17 15 18 src = fetchFromGitHub { 16 19 owner = "bircni"; 17 20 repo = "git-statuses"; 18 21 tag = finalAttrs.version; 19 - hash = "sha256-e4g4tiewhN5acrkGN9Y5+WO+ihogiJXmT4PlhLtyWcs="; 22 + hash = "sha256-nuWtW1NEECBqQ5uZKRqnvbjMUeYBg04j51zrHi/SDm0="; 20 23 }; 21 24 22 - cargoHash = "sha256-IqlVwh80yTzVHWi5L+EQzt5SksK7SlBowZy46HnA+FI="; 25 + cargoHash = "sha256-WAr5AkT4C14HupJHHZi209jtE8a9IUwOCw76cYu8Yjc="; 23 26 24 27 # Needed to get openssl-sys to use pkg-config. 25 28 env.OPENSSL_NO_VENDOR = 1; 26 29 27 30 nativeBuildInputs = [ 31 + installShellFiles 28 32 pkg-config 29 33 ]; 30 34 buildInputs = [ 31 35 openssl 32 36 ]; 33 37 nativeInstallCheckInputs = [ 38 + git 34 39 versionCheckHook 35 40 ]; 36 41 doInstallCheck = true; 42 + 43 + postInstall = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 44 + installShellCompletion --cmd git-statuses \ 45 + --bash <($out/bin/git-statuses --completions bash) \ 46 + --fish <($out/bin/git-statuses --completions fish) \ 47 + --zsh <($out/bin/git-statuses --completions zsh) 48 + ''; 37 49 38 50 passthru.updateScript = nix-update-script { }; 39 51
+2 -2
pkgs/by-name/gi/github-backup/package.nix
··· 8 8 9 9 python3Packages.buildPythonApplication rec { 10 10 pname = "github-backup"; 11 - version = "0.50.2"; 11 + version = "0.50.3"; 12 12 pyproject = true; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "josegonzalez"; 16 16 repo = "python-github-backup"; 17 17 tag = version; 18 - hash = "sha256-MUPQa1L3HmAMn1pZSzQk8VKpcz2nDGuWZB8pVi7CyYs="; 18 + hash = "sha256-MBKBY86qIM/rgvGMvE7K9x9n+zDVtoimkVGLBxCWRmI="; 19 19 }; 20 20 21 21 build-system = with python3Packages; [
-79
pkgs/by-name/gn/gn/generic.nix
··· 1 - { 2 - stdenv, 3 - lib, 4 - fetchgit, 5 - fetchpatch, 6 - cctools, 7 - writeText, 8 - ninja, 9 - python3, 10 - ... 11 - }: 12 - 13 - { 14 - rev, 15 - revNum, 16 - version, 17 - sha256, 18 - }: 19 - 20 - let 21 - revShort = builtins.substring 0 7 rev; 22 - lastCommitPosition = writeText "last_commit_position.h" '' 23 - #ifndef OUT_LAST_COMMIT_POSITION_H_ 24 - #define OUT_LAST_COMMIT_POSITION_H_ 25 - 26 - #define LAST_COMMIT_POSITION_NUM ${revNum} 27 - #define LAST_COMMIT_POSITION "${revNum} (${revShort})" 28 - 29 - #endif // OUT_LAST_COMMIT_POSITION_H_ 30 - ''; 31 - 32 - in 33 - stdenv.mkDerivation { 34 - pname = "gn-unstable"; 35 - inherit version; 36 - 37 - src = fetchgit { 38 - # Note: The TAR-Archives (+archive/${rev}.tar.gz) are not deterministic! 39 - url = "https://gn.googlesource.com/gn"; 40 - inherit rev sha256; 41 - }; 42 - 43 - nativeBuildInputs = [ 44 - ninja 45 - python3 46 - ]; 47 - buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 48 - cctools 49 - ]; 50 - 51 - env.NIX_CFLAGS_COMPILE = "-Wno-error"; 52 - # Relax hardening as otherwise gn unstable 2024-06-06 and later fail with: 53 - # cc1plus: error: '-Wformat-security' ignored without '-Wformat' [-Werror=format-security] 54 - hardeningDisable = [ "format" ]; 55 - 56 - buildPhase = '' 57 - python build/gen.py --no-last-commit-position 58 - ln -s ${lastCommitPosition} out/last_commit_position.h 59 - ninja -j $NIX_BUILD_CORES -C out gn 60 - ''; 61 - 62 - installPhase = '' 63 - install -vD out/gn "$out/bin/gn" 64 - ''; 65 - 66 - setupHook = ./setup-hook.sh; 67 - 68 - meta = with lib; { 69 - description = "Meta-build system that generates build files for Ninja"; 70 - mainProgram = "gn"; 71 - homepage = "https://gn.googlesource.com/gn"; 72 - license = licenses.bsd3; 73 - platforms = platforms.unix; 74 - maintainers = with maintainers; [ 75 - stesie 76 - matthewbauer 77 - ]; 78 - }; 79 - }
+98 -6
pkgs/by-name/gn/gn/package.nix
··· 1 - { callPackage, ... }@args: 1 + { 2 + stdenv, 3 + lib, 4 + fetchgit, 5 + cctools, 6 + ninja, 7 + python3, 2 8 3 - callPackage ./generic.nix args { 4 9 # Note: Please use the recommended version for Chromium stable, i.e. from 5 10 # <nixpkgs>/pkgs/applications/networking/browsers/chromium/info.json 6 - rev = "85cc21e94af590a267c1c7a47020d9b420f8a033"; 7 - revNum = "2233"; # git describe $rev --match initial-commit | cut -d- -f3 8 - version = "2025-04-28"; 9 - sha256 = "sha256-+nKP2hBUKIqdNfDz1vGggXSdCuttOt0GwyGUQ3Z1ZHI="; 11 + version ? 12 + # This is a workaround for update-source-version to be able to update this 13 + let 14 + _version = "0-unstable-2025-06-19"; 15 + in 16 + _version, 17 + rev ? "97b68a0bb62b7528bc3491c7949d6804223c2b82", 18 + hash ? "sha256-gwptzuirIdPAV9XCaAT09aM/fY7d6xgBU7oSu9C4tmE=", 19 + }: 20 + 21 + stdenv.mkDerivation { 22 + pname = "gn"; 23 + inherit version; 24 + 25 + src = fetchgit { 26 + url = "https://gn.googlesource.com/gn"; 27 + inherit rev hash; 28 + leaveDotGit = true; 29 + deepClone = true; 30 + postFetch = '' 31 + cd "$out" 32 + mkdir .nix-files 33 + git rev-parse --short=12 HEAD > .nix-files/REV_SHORT 34 + git describe --match initial-commit | cut -d- -f3 > .nix-files/REV_NUM 35 + find "$out" -name .git -print0 | xargs -0 rm -rf 36 + ''; 37 + }; 38 + 39 + nativeBuildInputs = [ 40 + ninja 41 + python3 42 + ]; 43 + buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 44 + cctools 45 + ]; 46 + 47 + env.NIX_CFLAGS_COMPILE = "-Wno-error"; 48 + # Relax hardening as otherwise gn unstable 2024-06-06 and later fail with: 49 + # cc1plus: error: '-Wformat-security' ignored without '-Wformat' [-Werror=format-security] 50 + hardeningDisable = [ "format" ]; 51 + 52 + configurePhase = '' 53 + runHook preConfigure 54 + 55 + python build/gen.py --no-last-commit-position 56 + cat > out/last_commit_position.h << EOF 57 + #ifndef OUT_LAST_COMMIT_POSITION_H_ 58 + #define OUT_LAST_COMMIT_POSITION_H_ 59 + 60 + #define LAST_COMMIT_POSITION_NUM $(<.nix-files/REV_NUM) 61 + #define LAST_COMMIT_POSITION "$(<.nix-files/REV_NUM) ($(<.nix-files/REV_SHORT))" 62 + 63 + #endif // OUT_LAST_COMMIT_POSITION_H_ 64 + EOF 65 + 66 + runHook postConfigure 67 + ''; 68 + 69 + buildPhase = '' 70 + runHook preBuild 71 + 72 + ninja -v -j $NIX_BUILD_CORES -C out gn 73 + 74 + runHook postBuild 75 + ''; 76 + 77 + installPhase = '' 78 + runHook preInstall 79 + 80 + install -vD out/gn "$out/bin/gn" 81 + 82 + runHook postInstall 83 + ''; 84 + 85 + setupHook = ./setup-hook.sh; 86 + 87 + passthru.updateScript = ./update.sh; 88 + 89 + meta = { 90 + description = "Meta-build system that generates build files for Ninja"; 91 + mainProgram = "gn"; 92 + homepage = "https://gn.googlesource.com/gn"; 93 + license = lib.licenses.bsd3; 94 + platforms = lib.platforms.unix; 95 + maintainers = with lib.maintainers; [ 96 + stesie 97 + matthewbauer 98 + marcin-serwin 99 + emilylange 100 + ]; 101 + }; 10 102 }
+21
pkgs/by-name/gn/gn/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p jq curl common-updater-scripts 3 + 4 + set -ex 5 + 6 + rev=$( 7 + curl --location "https://raw.githubusercontent.com/NixOS/nixpkgs/refs/heads/master/pkgs/applications/networking/browsers/chromium/info.json" \ 8 + | jq -r ".chromium.deps.gn.rev" 9 + ) 10 + 11 + commit_time=$( 12 + curl "https://gn.googlesource.com/gn/+/$rev?format=json" \ 13 + | sed "s/)]}'//" \ 14 + | jq -r ".committer.time" \ 15 + | awk '{print $2, $3, $5, $4 $6}' 16 + ) 17 + 18 + commit_date=$(TZ= date --date "$commit_time" --iso-8601) 19 + version="0-unstable-$commit_date" 20 + 21 + update-source-version --rev="$rev" --version-key="_version" "gn" "$version"
+5 -5
pkgs/by-name/go/google-chrome/package.nix
··· 170 170 171 171 linux = stdenvNoCC.mkDerivation (finalAttrs: { 172 172 inherit pname meta passthru; 173 - version = "138.0.7204.183"; 173 + version = "139.0.7258.66"; 174 174 175 175 src = fetchurl { 176 176 url = "https://dl.google.com/linux/chrome/deb/pool/main/g/google-chrome-stable/google-chrome-stable_${finalAttrs.version}-1_amd64.deb"; 177 - hash = "sha256-GxdfHU6pskOL0i/rmN7kwGsuLYTotL1mEw6RV7qfl50="; 177 + hash = "sha256-DY1hFlYKVSWRYuK1DGaqxr4x+kEmXnr/GsKBC39rCxk="; 178 178 }; 179 179 180 180 # With strictDeps on, some shebangs were not being patched correctly ··· 275 275 276 276 darwin = stdenvNoCC.mkDerivation (finalAttrs: { 277 277 inherit pname meta passthru; 278 - version = "138.0.7204.184"; 278 + version = "139.0.7258.67"; 279 279 280 280 src = fetchurl { 281 - url = "http://dl.google.com/release2/chrome/acvbvqaeyyrjo6kygs27pc5y27ea_138.0.7204.184/GoogleChrome-138.0.7204.184.dmg"; 282 - hash = "sha256-KM9fK5zaXNCdVfCRN9b0RxIvH7VxCln4Eo9YgOEd8PY="; 281 + url = "http://dl.google.com/release2/chrome/l4kjdkw5j5zarcsucmoo3n4idi_139.0.7258.67/GoogleChrome-139.0.7258.67.dmg"; 282 + hash = "sha256-IfJlHRpMZy1DFmOC6yZ5dphchdOSvUYf7s3+ngQ7pL4="; 283 283 }; 284 284 285 285 dontPatch = true;
+3 -3
pkgs/by-name/go/gose/package.nix
··· 7 7 lib, 8 8 }: 9 9 let 10 - version = "0.11.1"; 10 + version = "0.11.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 repo = "gose"; 14 14 owner = "stv0g"; 15 15 tag = "v${version}"; 16 - hash = "sha256-Wz3gcx9/wrSfiHkOGnjAoUFfN0tiA1C+31GlnHqL3M0="; 16 + hash = "sha256-AeGrnRnKThv29wFopx91BSep22WFkkKkUsTa7qFQOzs="; 17 17 }; 18 18 19 19 frontend = buildNpmPackage { ··· 37 37 inherit version; 38 38 inherit src; 39 39 40 - vendorHash = "sha256-HsYF4v7RUzGDJvZEoq0qTo9iPGJoqK4YqTsXSv8SwKQ="; 40 + vendorHash = "sha256-9qQXk8XyvVsussu5YfoSrjEul0E1301W019vTVSgnkk="; 41 41 42 42 env.CGO_ENABLED = 0; 43 43
+2 -2
pkgs/by-name/ha/halo/package.nix
··· 8 8 }: 9 9 stdenv.mkDerivation rec { 10 10 pname = "halo"; 11 - version = "2.21.4"; 11 + version = "2.21.6"; 12 12 src = fetchurl { 13 13 url = "https://github.com/halo-dev/halo/releases/download/v${version}/halo-${version}.jar"; 14 - hash = "sha256-RoisTthVRq6UGTE5jRdo6tL/3UVaOu1/3XPpwyLQV4g="; 14 + hash = "sha256-kMz97dsWUbP4taRjxS84I+NWPyefVlP/WaY6pk7K6Q0="; 15 15 }; 16 16 17 17 nativeBuildInputs = [
+3 -3
pkgs/by-name/ho/holo-cli/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage (finalAttrs: { 13 13 pname = "holo-cli"; 14 - version = "0.5.0-unstable-2025-07-01"; 14 + version = "0.5.0-unstable-2025-08-07"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "holo-routing"; 18 18 repo = "holo-cli"; 19 - rev = "f04c1d0dcd6d800e079f33b8431b17fa00afeeb1"; 20 - hash = "sha256-ZJeXGT5oajynk44550W4qz+OZEx7y52Wwy+DYzrHZig="; 19 + rev = "e786bb16e5e6b78989dc3b4e3299b283432dfa26"; 20 + hash = "sha256-uqRgitI4D2H9igVdnwuNnc3frRiEZ85/DILp6FzGQ+0="; 21 21 }; 22 22 23 23 cargoHash = "sha256-bsoxWjOMzRRtFGEaaqK0/adhGpDcejCIY0Pzw1HjQ5U=";
+3 -3
pkgs/by-name/ho/home-manager/package.nix
··· 19 19 20 20 stdenvNoCC.mkDerivation (finalAttrs: { 21 21 pname = "home-manager"; 22 - version = "0-unstable-2025-07-28"; 22 + version = "0-unstable-2025-08-06"; 23 23 24 24 src = fetchFromGitHub { 25 25 name = "home-manager-source"; 26 26 owner = "nix-community"; 27 27 repo = "home-manager"; 28 - rev = "f49e872f55e36e67ebcb906ff65f86c7a1538f7c"; 29 - hash = "sha256-vojVM0SgFP8crFh1LDDXkzaI9/er/1cuRfbNPhfBHyc="; 28 + rev = "13461dec40bf03d9196ff79d1abe48408268cc35"; 29 + hash = "sha256-V0iiDcYvNeMOP2FyfgC4H8Esx+JodXEl80lD4hFD4SI="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+2 -22
pkgs/by-name/ii/iio-sensor-proxy/package.nix
··· 17 17 18 18 stdenv.mkDerivation rec { 19 19 pname = "iio-sensor-proxy"; 20 - version = "3.7"; 20 + version = "3.8"; 21 21 22 22 src = fetchFromGitLab { 23 23 domain = "gitlab.freedesktop.org"; 24 24 owner = "hadess"; 25 25 repo = "iio-sensor-proxy"; 26 26 rev = version; 27 - hash = "sha256-MAfh6bgh39J5J3rlyPjyCkk5KcfWHMZLytZcBRPHaJE="; 27 + hash = "sha256-ZVaV4Aj4alr5eP3uz6SunpeRsMOo8YcZMqCcB0DUYGY="; 28 28 }; 29 - 30 - # Fix devices with cros-ec-accel, like Chromebooks and Framework Laptop 12 31 - # https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/merge_requests/400 32 - patches = [ 33 - (fetchpatch2 { 34 - name = "mr400_1.patch"; 35 - url = "https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/commit/f35d293e65841a3b9c0de778300c7fa58b181fd0.patch"; 36 - hash = "sha256-Gk8Wpy+KFhHAsR3XklcsL3Eo4fHjQuFT6PCN5hz9KHk="; 37 - }) 38 - (fetchpatch2 { 39 - name = "mr400_2.patch"; 40 - url = "https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/commit/7416edf4da98d8e3b75f9eddb7e5c488ac4a4c54.patch"; 41 - hash = "sha256-5UnYam6P+paBHAI0qKXDAvrFM8JYhRVTUFePRTHCp+U="; 42 - }) 43 - (fetchpatch2 { 44 - name = "mr400_3.patch"; 45 - url = "https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/commit/d00109194422a4fe3e9a7bc1235ffc492459c61a.patch"; 46 - hash = "sha256-58KrXbdpR1eWbPmsr8b0ke67hX5J0o0gtqzrz3dc+ck="; 47 - }) 48 - ]; 49 29 50 30 postPatch = '' 51 31 # upstream meson.build currently doesn't have an option to change the default polkit dir
+2 -2
pkgs/by-name/jd/jd-diff-patch/package.nix
··· 6 6 7 7 buildGoModule (finalAttrs: { 8 8 pname = "jd-diff-patch"; 9 - version = "2.2.3"; 9 + version = "2.2.5"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "josephburnett"; 13 13 repo = "jd"; 14 14 rev = "v${finalAttrs.version}"; 15 - hash = "sha256-ucSJfzkcOpLfI2IcsnKvjpR/hwHNne+liE1b/L/H96g="; 15 + hash = "sha256-E11Hd2uvF5LrgrWpR8OzXqEjoUrBkBHDDuuCujznfbE="; 16 16 }; 17 17 18 18 sourceRoot = "${finalAttrs.src.name}/v2";
+3 -3
pkgs/by-name/je/jellyfin-tui/package.nix
··· 13 13 14 14 rustPlatform.buildRustPackage rec { 15 15 pname = "jellyfin-tui"; 16 - version = "1.2.3"; 16 + version = "1.2.4"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "dhonus"; 20 20 repo = "jellyfin-tui"; 21 21 tag = "v${version}"; 22 - hash = "sha256-gT6Zs32BhSfwH+JjwJcY9wK7WrqGuaWP+q/2rF8gp4M="; 22 + hash = "sha256-fRlnfCHjUZWvp+pYxLUXFxW/nR7Glhhfm4YQKLR2XaY="; 23 23 }; 24 24 25 - cargoHash = "sha256-U298pYDYzaRdU5w3FWHMkgaCT15aUTZITroVcEJ1Q0w="; 25 + cargoHash = "sha256-VUg96qyTF7XkZsl4wl70u5S9NqgRCGJ4od8Cj4dSoI8="; 26 26 27 27 nativeBuildInputs = [ pkg-config ]; 28 28 buildInputs = [
+2 -2
pkgs/by-name/kn/knowsmore/package.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication rec { 8 8 pname = "knowsmore"; 9 - version = "0.1.45"; 9 + version = "0.1.46"; 10 10 pyproject = true; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "helviojunior"; 14 14 repo = "knowsmore"; 15 15 tag = "v${version}"; 16 - hash = "sha256-Z0N98P1vh9nhqOzlkL/BgqQrybeig5TrHsg1K4jqGxw="; 16 + hash = "sha256-yY3BLouIUvSBeNlq4XcEHKLi00BWeGUXNOP2p5NIFXc="; 17 17 }; 18 18 19 19 pythonRelaxDeps = [
+2 -2
pkgs/by-name/lo/local-content-share/package.nix
··· 6 6 7 7 buildGoModule (finalAttrs: { 8 8 pname = "local-content-share"; 9 - version = "31"; 9 + version = "32"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Tanq16"; 13 13 repo = "local-content-share"; 14 14 tag = "v${finalAttrs.version}"; 15 - hash = "sha256-BVO804Ndjbg4uEE1bufZcGZxEVdraV29LJ6yBWXTakA="; 15 + hash = "sha256-2TgamuHDASwSKshPkNLAnwnnCU23SvdXWv6sU++yBII="; 16 16 }; 17 17 18 18 vendorHash = null;
+3 -3
pkgs/by-name/ma/matrix-alertmanager-receiver/package.nix
··· 8 8 9 9 buildGoModule (finalAttrs: { 10 10 pname = "matrix-alertmanager-receiver"; 11 - version = "2025.7.30"; 11 + version = "2025.8.6"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "metio"; 15 15 repo = "matrix-alertmanager-receiver"; 16 16 tag = finalAttrs.version; 17 - hash = "sha256-2zTkRXXXMMphNyw/OeiIAmc4KP0LqN6M0vtpX/7fhoI="; 17 + hash = "sha256-rnGKpJppR7NoOAx/jGt7vxr1EVok3tMzkr9ry/k57L8="; 18 18 }; 19 19 20 - vendorHash = "sha256-zOaAvPCAEQkJMogJ6ly0jkHfj+SAlFqk5m+eQdsaxK4="; 20 + vendorHash = "sha256-JMjfrSdaN2zXgACkPddQ9h7SLV6jhpUvFTk56UfPWJg="; 21 21 22 22 env.CGO_ENABLED = "0"; 23 23
+3 -3
pkgs/by-name/me/melange/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "melange"; 10 - version = "0.30.1"; 10 + version = "0.30.5"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "chainguard-dev"; 14 14 repo = "melange"; 15 15 rev = "v${version}"; 16 - hash = "sha256-BHeWrT0naxHLgd91xLTDHdDCt7piItPJMyjrRWQb2cA="; 16 + hash = "sha256-df8CHUVHvSK1nFpJIuVHmwbHsigwZLL5UwA0/V6NkxE="; 17 17 # populate values that require us to use git. By doing this in postFetch we 18 18 # can delete .git afterwards and maintain better reproducibility of the src. 19 19 leaveDotGit = true; ··· 26 26 ''; 27 27 }; 28 28 29 - vendorHash = "sha256-K2i9cQIcRkLbGIcGtEMo/PHO6pV2UXo/JgKdndWI7KM="; 29 + vendorHash = "sha256-hyE/5P2EabICjueTln2zBmdIK73OqteWwmT5mSf7vXE="; 30 30 31 31 subPackages = [ "." ]; 32 32
+52
pkgs/by-name/ni/nixseparatedebuginfod2/package.nix
··· 1 + { 2 + lib, 3 + fetchFromGitHub, 4 + rustPlatform, 5 + libarchive, 6 + openssl, 7 + pkg-config, 8 + bubblewrap, 9 + elfutils, 10 + nix, 11 + nixosTests, 12 + }: 13 + 14 + rustPlatform.buildRustPackage rec { 15 + pname = "nixseparatedebuginfod2"; 16 + version = "0.1.0"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "symphorien"; 20 + repo = "nixseparatedebuginfod2"; 21 + tag = "v${version}"; 22 + hash = "sha256-bk+l/oWAPuWV6mnh9Pr/mru3BZjos08IfzEGUEFSW1E="; 23 + }; 24 + 25 + cargoHash = "sha256-HmtFso6uF2GsjIA0FPVL4S3S+lwQUrg7N576UaekXpU="; 26 + 27 + buildInputs = [ 28 + libarchive 29 + openssl 30 + ]; 31 + 32 + nativeBuildInputs = [ pkg-config ]; 33 + 34 + nativeCheckInputs = [ 35 + bubblewrap 36 + elfutils 37 + nix 38 + ]; 39 + 40 + env.OPENSSL_NO_VENDOR = "1"; 41 + 42 + passthru.tests = { inherit (nixosTests) nixseparatedebuginfod2; }; 43 + 44 + meta = { 45 + description = "Downloads and provides debug symbols and source code for nix derivations to gdb and other debuginfod-capable debuggers as needed"; 46 + homepage = "https://github.com/symphorien/nixseparatedebuginfod2"; 47 + license = lib.licenses.gpl3Only; 48 + maintainers = [ lib.maintainers.symphorien ]; 49 + platforms = lib.platforms.linux; 50 + mainProgram = "nixseparatedebuginfod2"; 51 + }; 52 + }
+3 -3
pkgs/by-name/oh/oh-my-zsh/package.nix
··· 19 19 }: 20 20 21 21 stdenv.mkDerivation rec { 22 - version = "2025-07-28"; 22 + version = "2025-08-08"; 23 23 pname = "oh-my-zsh"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "ohmyzsh"; 27 27 repo = "ohmyzsh"; 28 - rev = "5c804257ceb5b3062b876afae290adf72c474aad"; 29 - sha256 = "sha256-LSyabJIVuLdocx2fy5mVGFVX45gDxzm4hGDyF8yihZ4="; 28 + rev = "9d8d4cf41482a95127ca41faecc0a7ee0781ca2e"; 29 + sha256 = "sha256-u98vvBhGYfvfYmo/J8hBc6bDui5HVlgM3hY32LwJGio="; 30 30 }; 31 31 32 32 strictDeps = true;
+1 -1
pkgs/by-name/ol/olivetin/package.nix
··· 49 49 ''; 50 50 51 51 outputHashMode = "recursive"; 52 - outputHash = "sha256-4mmpiI2GhjMBp662/+DiM7SjEd1cPhF/A4YpyU04/Fs="; 52 + outputHash = "sha256-o+Zt3rmTK7NmBQ9hDlbxZySUlCx6Ks7yQTtdm9+pJac="; 53 53 }; 54 54 55 55 webui = buildNpmPackage {
+4 -2
pkgs/by-name/ol/ollama/package.nix
··· 18 18 cudaPackages, 19 19 cudaArches ? cudaPackages.flags.realArches or [ ], 20 20 autoAddDriverRunpath, 21 + apple-sdk_15, 21 22 22 23 # passthru 23 24 nixosTests, ··· 152 153 ]; 153 154 154 155 buildInputs = 155 - lib.optionals enableRocm (rocmLibs ++ [ libdrm ]) ++ lib.optionals enableCuda cudaLibs; 156 + lib.optionals enableRocm (rocmLibs ++ [ libdrm ]) 157 + ++ lib.optionals enableCuda cudaLibs 158 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ apple-sdk_15 ]; 156 159 157 160 # replace inaccurate version number with actual release version 158 161 postPatch = '' ··· 251 254 changelog = "https://github.com/ollama/ollama/releases/tag/v${finalAttrs.version}"; 252 255 license = licenses.mit; 253 256 platforms = if (rocmRequested || cudaRequested) then platforms.linux else platforms.unix; 254 - broken = stdenv.hostPlatform.isDarwin; # TODO: Remove after upstream issue is fixed, see issue #431464 and comments. 255 257 mainProgram = "ollama"; 256 258 maintainers = with maintainers; [ 257 259 abysssol
+145 -145
pkgs/by-name/om/omnisharp-roslyn/deps.json
··· 31 31 }, 32 32 { 33 33 "pname": "ICSharpCode.Decompiler", 34 - "version": "8.2.0.7535", 35 - "hash": "sha256-4BWs04Va9pc/SLeMA/vKoBydhw+Bu6s9MDtoo/Ucft8=" 34 + "version": "9.1.0.7988", 35 + "hash": "sha256-zPLgLNO4cCrtN9BR9x6X+W0MNkQ71nADIopOC1VBhAQ=" 36 36 }, 37 37 { 38 38 "pname": "McMaster.Extensions.CommandLineUtils", ··· 58 58 "pname": "Microsoft.Bcl.AsyncInterfaces", 59 59 "version": "8.0.0", 60 60 "hash": "sha256-9aWmiwMJKrKr9ohD1KSuol37y+jdDxPGJct3m2/Bknw=" 61 + }, 62 + { 63 + "pname": "Microsoft.Bcl.AsyncInterfaces", 64 + "version": "9.0.0", 65 + "hash": "sha256-BsXNOWEgfFq3Yz7VTtK6m/ov4/erRqyBzieWSIpmc1U=" 61 66 }, 62 67 { 63 68 "pname": "Microsoft.Build", ··· 96 101 }, 97 102 { 98 103 "pname": "Microsoft.CodeAnalysis.Common", 99 - "version": "4.13.0-3.24620.4", 100 - "hash": "sha256-VSPRpTzEXnTNQAxXDOOi6YVS2C6/S2zTKgQR4aNkxME=", 101 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.common/4.13.0-3.24620.4/microsoft.codeanalysis.common.4.13.0-3.24620.4.nupkg" 104 + "version": "4.14.0-3.25168.13", 105 + "hash": "sha256-iQUNxmc2oGFqADDfNXj8A1O1nea6nxobBcYwBgqq8oY=", 106 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.common/4.14.0-3.25168.13/microsoft.codeanalysis.common.4.14.0-3.25168.13.nupkg" 102 107 }, 103 108 { 104 109 "pname": "Microsoft.CodeAnalysis.CSharp", 105 - "version": "4.13.0-3.24620.4", 106 - "hash": "sha256-YGxCN8J3BjSZ9hXYQF0nCL3Welv3UVASeSTkwwFPchc=", 107 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.4.13.0-3.24620.4.nupkg" 110 + "version": "4.14.0-3.25168.13", 111 + "hash": "sha256-XicPFcDtJis8WS3nkMsxbmE+A20K9x6qE3EWeJEBjh8=", 112 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.4.14.0-3.25168.13.nupkg" 108 113 }, 109 114 { 110 115 "pname": "Microsoft.CodeAnalysis.CSharp.Features", 111 - "version": "4.13.0-3.24620.4", 112 - "hash": "sha256-qpNsw5OtTAQFnN6g6tIh6+nsr+zc+/Na+oETR/GWxeM=", 113 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.features/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.features.4.13.0-3.24620.4.nupkg" 116 + "version": "4.14.0-3.25168.13", 117 + "hash": "sha256-vI0G7XR92aVD6r5rYIEF+pZ+bpyznnfHVhQvWF3Eu4Q=", 118 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.features/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.features.4.14.0-3.25168.13.nupkg" 114 119 }, 115 120 { 116 121 "pname": "Microsoft.CodeAnalysis.CSharp.Scripting", 117 - "version": "4.13.0-3.24620.4", 118 - "hash": "sha256-1D+TjiljZQQJEYIzhdLAbLq8DIvW30vgSDYnDlPoGoU=", 119 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.scripting/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.scripting.4.13.0-3.24620.4.nupkg" 122 + "version": "4.14.0-3.25168.13", 123 + "hash": "sha256-zy8otm38p285W08GGy0M//1ZTOxiCxrC3tBcWKIg4Ps=", 124 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.scripting/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.scripting.4.14.0-3.25168.13.nupkg" 120 125 }, 121 126 { 122 127 "pname": "Microsoft.CodeAnalysis.CSharp.Workspaces", 123 - "version": "4.13.0-3.24620.4", 124 - "hash": "sha256-NT7yDEq4fW8c71xHC3YPsP5vl8AZ9PdKASzxROwhccs=", 125 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.workspaces/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.workspaces.4.13.0-3.24620.4.nupkg" 128 + "version": "4.14.0-3.25168.13", 129 + "hash": "sha256-wuttOafOufLuc1DFlp2r8zdfkOrD5eFRRN2/pt/MWtE=", 130 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.workspaces/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.workspaces.4.14.0-3.25168.13.nupkg" 126 131 }, 127 132 { 128 133 "pname": "Microsoft.CodeAnalysis.Elfie", ··· 131 136 }, 132 137 { 133 138 "pname": "Microsoft.CodeAnalysis.ExternalAccess.AspNetCore", 134 - "version": "4.13.0-3.24620.4", 135 - "hash": "sha256-91ZFqiu4MlteCir6p7YrOtbUMuRNIpNr6jX5qLdmZgM=", 136 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.aspnetcore/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.aspnetcore.4.13.0-3.24620.4.nupkg" 139 + "version": "4.14.0-3.25168.13", 140 + "hash": "sha256-zhvnYOrXZvm0+YoVu1mG/X6IK9eIv+Fik9Y4cSBStdc=", 141 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.aspnetcore/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.aspnetcore.4.14.0-3.25168.13.nupkg" 137 142 }, 138 143 { 139 144 "pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp", 140 - "version": "4.13.0-3.24620.4", 141 - "hash": "sha256-o2+DeY/p5AxMkMnYIiNMyMtrAnazzgfC6cVY8lImz4E=", 142 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.omnisharp.4.13.0-3.24620.4.nupkg" 145 + "version": "4.14.0-3.25168.13", 146 + "hash": "sha256-MbPehGBs4q3zJ0gZf6Ab85IUBSyjRPO3nXfXxHus4v4=", 147 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.omnisharp.4.14.0-3.25168.13.nupkg" 143 148 }, 144 149 { 145 150 "pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp.CSharp", 146 - "version": "4.13.0-3.24620.4", 147 - "hash": "sha256-LfIgqc7lDoyxbOsGmF4Ji488iXaT1f2ecjZz1662WlM=", 148 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp.csharp/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.omnisharp.csharp.4.13.0-3.24620.4.nupkg" 151 + "version": "4.14.0-3.25168.13", 152 + "hash": "sha256-Hpomx3SEqAFilwaA7yJV60iLXGpWSJAC+7XANxjIpng=", 153 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp.csharp/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.omnisharp.csharp.4.14.0-3.25168.13.nupkg" 149 154 }, 150 155 { 151 156 "pname": "Microsoft.CodeAnalysis.Features", 152 - "version": "4.13.0-3.24620.4", 153 - "hash": "sha256-ITkMz+1b9Q9I5UZk4N5+qKD7FPTBMohLDOqx3e2hShI=", 154 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.features/4.13.0-3.24620.4/microsoft.codeanalysis.features.4.13.0-3.24620.4.nupkg" 157 + "version": "4.14.0-3.25168.13", 158 + "hash": "sha256-GDrT8bMIzWy6O1MSTXcBIooKNnKDrR4Q5RJnyikRGRI=", 159 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.features/4.14.0-3.25168.13/microsoft.codeanalysis.features.4.14.0-3.25168.13.nupkg" 155 160 }, 156 161 { 157 162 "pname": "Microsoft.CodeAnalysis.Scripting.Common", 158 - "version": "4.13.0-3.24620.4", 159 - "hash": "sha256-9Pch1BIrhsEwoI3ahgQM4BQBhw1wH9d8X9WB6deM3Sk=", 160 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.scripting.common/4.13.0-3.24620.4/microsoft.codeanalysis.scripting.common.4.13.0-3.24620.4.nupkg" 163 + "version": "4.14.0-3.25168.13", 164 + "hash": "sha256-k2M3MfdbTG30PtcNHLHzVimaU8nKsv80XYt0DE6jZAI=", 165 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.scripting.common/4.14.0-3.25168.13/microsoft.codeanalysis.scripting.common.4.14.0-3.25168.13.nupkg" 161 166 }, 162 167 { 163 168 "pname": "Microsoft.CodeAnalysis.Workspaces.Common", 164 - "version": "4.13.0-3.24620.4", 165 - "hash": "sha256-Ex39ayopBTApxMCjevqn1qVFgjEvbst9sf7twW6+osI=", 166 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.workspaces.common/4.13.0-3.24620.4/microsoft.codeanalysis.workspaces.common.4.13.0-3.24620.4.nupkg" 169 + "version": "4.14.0-3.25168.13", 170 + "hash": "sha256-eKk8/Ezlnm+d2XFyfgY8HkyVxASvGisJoppswwqtew8=", 171 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.workspaces.common/4.14.0-3.25168.13/microsoft.codeanalysis.workspaces.common.4.14.0-3.25168.13.nupkg" 167 172 }, 168 173 { 169 174 "pname": "Microsoft.CSharp", ··· 182 187 }, 183 188 { 184 189 "pname": "Microsoft.Extensions.Caching.Abstractions", 185 - "version": "8.0.0", 186 - "hash": "sha256-xGpKrywQvU1Wm/WolYIxgHYEFfgkNGeJ+GGc5DT3phI=" 190 + "version": "9.0.0", 191 + "hash": "sha256-hDau5OMVGIg4sc5+ofe14ROqwt63T0NSbzm/Cv0pDrY=" 187 192 }, 188 193 { 189 194 "pname": "Microsoft.Extensions.Caching.Memory", 190 - "version": "8.0.1", 191 - "hash": "sha256-5Q0vzHo3ZvGs4nPBc/XlBF4wAwYO8pxq6EGdYjjXZps=" 195 + "version": "9.0.0", 196 + "hash": "sha256-OZVOVGZOyv9uk5XGJrz6irBkPNjxnBxjfSyW30MnU0s=" 192 197 }, 193 198 { 194 199 "pname": "Microsoft.Extensions.Configuration", 195 - "version": "8.0.0", 196 - "hash": "sha256-9BPsASlxrV8ilmMCjdb3TiUcm5vFZxkBnAI/fNBSEyA=" 200 + "version": "9.0.0", 201 + "hash": "sha256-uBLeb4z60y8z7NelHs9uT3cLD6wODkdwyfJm6/YZLDM=" 197 202 }, 198 203 { 199 204 "pname": "Microsoft.Extensions.Configuration.Abstractions", 200 - "version": "8.0.0", 201 - "hash": "sha256-4eBpDkf7MJozTZnOwQvwcfgRKQGcNXe0K/kF+h5Rl8o=" 205 + "version": "9.0.0", 206 + "hash": "sha256-xtG2USC9Qm0f2Nn6jkcklpyEDT3hcEZOxOwTc0ep7uc=" 202 207 }, 203 208 { 204 209 "pname": "Microsoft.Extensions.Configuration.Binder", 205 - "version": "8.0.0", 206 - "hash": "sha256-GanfInGzzoN2bKeNwON8/Hnamr6l7RTpYLA49CNXD9Q=" 210 + "version": "9.0.0", 211 + "hash": "sha256-6ajYWcNOQX2WqftgnoUmVtyvC1kkPOtTCif4AiKEffU=" 207 212 }, 208 213 { 209 214 "pname": "Microsoft.Extensions.Configuration.CommandLine", 210 - "version": "8.0.0", 211 - "hash": "sha256-fmPC/o8S+weTtQJWykpnGHm6AKVU21xYE/CaHYU7zgg=" 215 + "version": "9.0.0", 216 + "hash": "sha256-RE6DotU1FM1sy5p3hukT+WOFsDYJRsKX6jx5vhlPceM=" 212 217 }, 213 218 { 214 219 "pname": "Microsoft.Extensions.Configuration.EnvironmentVariables", 215 - "version": "8.0.0", 216 - "hash": "sha256-+bjFZvqCsMf2FRM2olqx/fub+QwfM1kBhjGVOT5HC48=" 220 + "version": "9.0.0", 221 + "hash": "sha256-tDJx2prYZpr0RKSwmJfsK9FlUGwaDmyuSz2kqQxsWoI=" 217 222 }, 218 223 { 219 224 "pname": "Microsoft.Extensions.Configuration.FileExtensions", 220 - "version": "8.0.0", 221 - "hash": "sha256-BCxcjVP+kvrDDB0nzsFCJfU74UK4VBvct2JA4r+jNcs=" 225 + "version": "9.0.0", 226 + "hash": "sha256-PsLo6mrLGYfbi96rfCG8YS1APXkUXBG4hLstpT60I4s=" 222 227 }, 223 228 { 224 229 "pname": "Microsoft.Extensions.Configuration.Json", 225 - "version": "8.0.0", 226 - "hash": "sha256-Fi/ijcG5l0BOu7i96xHu96aN5/g7zO6SWQbTsI3Qetg=" 230 + "version": "9.0.0", 231 + "hash": "sha256-qQn7Ol0CvPYuyecYWYBkPpTMdocO7I6n+jXQI2udzLI=" 227 232 }, 228 233 { 229 234 "pname": "Microsoft.Extensions.DependencyInjection", 230 - "version": "8.0.0", 231 - "hash": "sha256-+qIDR8hRzreCHNEDtUcPfVHQdurzWPo/mqviCH78+EQ=" 235 + "version": "9.0.0", 236 + "hash": "sha256-dAH52PPlTLn7X+1aI/7npdrDzMEFPMXRv4isV1a+14k=" 232 237 }, 233 238 { 234 239 "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", ··· 237 242 }, 238 243 { 239 244 "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", 240 - "version": "8.0.2", 241 - "hash": "sha256-UfLfEQAkXxDaVPC7foE/J3FVEXd31Pu6uQIhTic3JgY=" 245 + "version": "9.0.0", 246 + "hash": "sha256-CncVwkKZ5CsIG2O0+OM9qXuYXh3p6UGyueTHSLDVL+c=" 242 247 }, 243 248 { 244 249 "pname": "Microsoft.Extensions.DependencyModel", 245 - "version": "8.0.0", 246 - "hash": "sha256-qkCdwemqdZY/yIW5Xmh7Exv74XuE39T8aHGHCofoVgo=" 250 + "version": "9.0.0", 251 + "hash": "sha256-xirwlMWM0hBqgTneQOGkZ8l45mHT08XuSSRIbprgq94=" 247 252 }, 248 253 { 249 254 "pname": "Microsoft.Extensions.FileProviders.Abstractions", 250 - "version": "8.0.0", 251 - "hash": "sha256-uQSXmt47X2HGoVniavjLICbPtD2ReQOYQMgy3l0xuMU=" 255 + "version": "9.0.0", 256 + "hash": "sha256-mVfLjZ8VrnOQR/uQjv74P2uEG+rgW72jfiGdSZhIfDc=" 252 257 }, 253 258 { 254 259 "pname": "Microsoft.Extensions.FileProviders.Physical", 255 - "version": "8.0.0", 256 - "hash": "sha256-29y5ZRQ1ZgzVOxHktYxyiH40kVgm5un2yTGdvuSWnRc=" 260 + "version": "9.0.0", 261 + "hash": "sha256-IzFpjKHmF1L3eVbFLUZa2N5aH3oJkJ7KE1duGIS7DP8=" 257 262 }, 258 263 { 259 264 "pname": "Microsoft.Extensions.FileSystemGlobbing", 260 - "version": "8.0.0", 261 - "hash": "sha256-+Oz41JR5jdcJlCJOSpQIL5OMBNi+1Hl2d0JUHfES7sU=" 265 + "version": "9.0.0", 266 + "hash": "sha256-eBLa8pW/y/hRj+JbEr340zbHRABIeFlcdqE0jf5/Uhc=" 262 267 }, 263 268 { 264 269 "pname": "Microsoft.Extensions.Logging", 265 - "version": "8.0.0", 266 - "hash": "sha256-Meh0Z0X7KyOEG4l0RWBcuHHihcABcvCyfUXgasmQ91o=" 270 + "version": "9.0.0", 271 + "hash": "sha256-kR16c+N8nQrWeYLajqnXPg7RiXjZMSFLnKLEs4VfjcM=" 267 272 }, 268 273 { 269 274 "pname": "Microsoft.Extensions.Logging.Abstractions", ··· 272 277 }, 273 278 { 274 279 "pname": "Microsoft.Extensions.Logging.Abstractions", 275 - "version": "8.0.2", 276 - "hash": "sha256-cHpe8X2BgYa5DzulZfq24rg8O2K5Lmq2OiLhoyAVgJc=" 280 + "version": "9.0.0", 281 + "hash": "sha256-iBTs9twjWXFeERt4CErkIIcoJZU1jrd1RWCI8V5j7KU=" 277 282 }, 278 283 { 279 284 "pname": "Microsoft.Extensions.Logging.Configuration", 280 - "version": "8.0.0", 281 - "hash": "sha256-mzmstNsVjKT0EtQcdAukGRifD30T82BMGYlSu8k4K7U=" 285 + "version": "9.0.0", 286 + "hash": "sha256-ysPjBq64p6JM4EmeVndryXnhLWHYYszzlVpPxRWkUkw=" 282 287 }, 283 288 { 284 289 "pname": "Microsoft.Extensions.Logging.Console", 285 - "version": "8.0.0", 286 - "hash": "sha256-bdb9YWWVn//AeySp7se87/tCN2E7e8Gx2GPMw28cd9c=" 290 + "version": "9.0.0", 291 + "hash": "sha256-N2t9EUdlS6ippD4Z04qUUyBuQ4tKSR/8TpmKScb5zRw=" 287 292 }, 288 293 { 289 294 "pname": "Microsoft.Extensions.Options", 290 - "version": "8.0.2", 291 - "hash": "sha256-AjcldddddtN/9aH9pg7ClEZycWtFHLi9IPe1GGhNQys=" 295 + "version": "9.0.0", 296 + "hash": "sha256-DT5euAQY/ItB5LPI8WIp6Dnd0lSvBRP35vFkOXC68ck=" 292 297 }, 293 298 { 294 299 "pname": "Microsoft.Extensions.Options.ConfigurationExtensions", 295 - "version": "8.0.0", 296 - "hash": "sha256-A5Bbzw1kiNkgirk5x8kyxwg9lLTcSngojeD+ocpG1RI=" 300 + "version": "9.0.0", 301 + "hash": "sha256-r1Z3sEVSIjeH2UKj+KMj86har68g/zybSqoSjESBcoA=" 297 302 }, 298 303 { 299 304 "pname": "Microsoft.Extensions.Primitives", 300 - "version": "8.0.0", 301 - "hash": "sha256-FU8qj3DR8bDdc1c+WeGZx/PCZeqqndweZM9epcpXjSo=" 305 + "version": "9.0.0", 306 + "hash": "sha256-ZNLusK1CRuq5BZYZMDqaz04PIKScE2Z7sS2tehU7EJs=" 302 307 }, 303 308 { 304 309 "pname": "Microsoft.IO.Redist", ··· 392 397 }, 393 398 { 394 399 "pname": "NuGet.Common", 395 - "version": "6.13.0-rc.95", 396 - "hash": "sha256-SeN5m2Wuwux9kO+S5qX6bvvYUA22BOZDz6rg2Gk0vQc=", 397 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.common/6.13.0-rc.95/nuget.common.6.13.0-rc.95.nupkg" 400 + "version": "6.14.0-rc.116", 401 + "hash": "sha256-9iueLk2eBzA1Qph0zz2eM9hSfKtwdlApcEXkcImYHow=", 402 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.common/6.14.0-rc.116/nuget.common.6.14.0-rc.116.nupkg" 398 403 }, 399 404 { 400 405 "pname": "NuGet.Configuration", 401 - "version": "6.13.0-rc.95", 402 - "hash": "sha256-vrqUvp0Nse6zITKySrVgnPpkl2+ic8f0d/veYrUeRzM=", 403 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.configuration/6.13.0-rc.95/nuget.configuration.6.13.0-rc.95.nupkg" 406 + "version": "6.14.0-rc.116", 407 + "hash": "sha256-aZcINPKC6x773h/JW007YDPkj/jXZIBs/Y2gVp2jHKI=", 408 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.configuration/6.14.0-rc.116/nuget.configuration.6.14.0-rc.116.nupkg" 404 409 }, 405 410 { 406 411 "pname": "NuGet.DependencyResolver.Core", 407 - "version": "6.13.0-rc.95", 408 - "hash": "sha256-ttllWdeTVn3JJECrqfCy9lVZKX7DQbgxjKMIBZH3GoI=", 409 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.dependencyresolver.core/6.13.0-rc.95/nuget.dependencyresolver.core.6.13.0-rc.95.nupkg" 412 + "version": "6.14.0-rc.116", 413 + "hash": "sha256-xn3ftpNI3xMblSwqQcgYzhZ1fDj/urbnnCLZrTLuNNk=", 414 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.dependencyresolver.core/6.14.0-rc.116/nuget.dependencyresolver.core.6.14.0-rc.116.nupkg" 410 415 }, 411 416 { 412 417 "pname": "NuGet.Frameworks", 413 - "version": "6.13.0-rc.95", 414 - "hash": "sha256-Dq1YxucNDbrO8L2l8uV1SEOKuL4oVhUjlDeRLrg82Wo=", 415 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.frameworks/6.13.0-rc.95/nuget.frameworks.6.13.0-rc.95.nupkg" 418 + "version": "6.14.0-rc.116", 419 + "hash": "sha256-d9pZxwUrPcl/pizjC6j+Tns30muXUk2OVOAvkQ40TWk=", 420 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.frameworks/6.14.0-rc.116/nuget.frameworks.6.14.0-rc.116.nupkg" 416 421 }, 417 422 { 418 423 "pname": "NuGet.LibraryModel", 419 - "version": "6.13.0-rc.95", 420 - "hash": "sha256-zuiuiT6NprcW/UEhndi6vO4J3ONeIGkmRMjkDqdf4QQ=", 421 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.librarymodel/6.13.0-rc.95/nuget.librarymodel.6.13.0-rc.95.nupkg" 424 + "version": "6.14.0-rc.116", 425 + "hash": "sha256-8MzoYPA6p9pd0NkVW3oImhy1t3szqjk/dqHbRb2UM9I=", 426 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.librarymodel/6.14.0-rc.116/nuget.librarymodel.6.14.0-rc.116.nupkg" 422 427 }, 423 428 { 424 429 "pname": "NuGet.Packaging", 425 - "version": "6.13.0-rc.95", 426 - "hash": "sha256-gK0UtXawa2HtdYyug/vTihrj4ZLqCJ8w516kj9Gmq40=", 427 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.packaging/6.13.0-rc.95/nuget.packaging.6.13.0-rc.95.nupkg" 430 + "version": "6.14.0-rc.116", 431 + "hash": "sha256-0ck3KroeV+MSYBESHrqtZ7I4h10Wx5qfEYgikVk9lLE=", 432 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.packaging/6.14.0-rc.116/nuget.packaging.6.14.0-rc.116.nupkg" 428 433 }, 429 434 { 430 435 "pname": "NuGet.ProjectModel", 431 - "version": "6.13.0-rc.95", 432 - "hash": "sha256-Y+3CNqRfoCTzVYgVpJ8Q2kIQcZIbdfit6uVOuqFaMy0=", 433 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.projectmodel/6.13.0-rc.95/nuget.projectmodel.6.13.0-rc.95.nupkg" 436 + "version": "6.14.0-rc.116", 437 + "hash": "sha256-w8xv1eWnCgTEMd7UoZkoxcQ2fiOhPTf6AgkcY6XFiXs=", 438 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.projectmodel/6.14.0-rc.116/nuget.projectmodel.6.14.0-rc.116.nupkg" 434 439 }, 435 440 { 436 441 "pname": "NuGet.Protocol", 437 - "version": "6.13.0-rc.95", 438 - "hash": "sha256-HyzaY1PmpPGG6J8g+BYdS1ETYZMwahEu7OiyWyjXzu4=", 439 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.protocol/6.13.0-rc.95/nuget.protocol.6.13.0-rc.95.nupkg" 442 + "version": "6.14.0-rc.116", 443 + "hash": "sha256-vJH2Lp7eBq44+w6iDkgUItcy81qYG52E7NE5q10TJqc=", 444 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.protocol/6.14.0-rc.116/nuget.protocol.6.14.0-rc.116.nupkg" 440 445 }, 441 446 { 442 447 "pname": "NuGet.Versioning", 443 - "version": "6.13.0-rc.95", 444 - "hash": "sha256-2em8SYwrFR7wDjBpoSDs3Gfdz7w90IUs8vnGCnxcgF8=", 445 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.versioning/6.13.0-rc.95/nuget.versioning.6.13.0-rc.95.nupkg" 448 + "version": "6.14.0-rc.116", 449 + "hash": "sha256-qSpNg8NdQDTxS+xXkz5j/LJNqhF8jUn/bAQyJWFP9vA=", 450 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.versioning/6.14.0-rc.116/nuget.versioning.6.14.0-rc.116.nupkg" 446 451 }, 447 452 { 448 453 "pname": "OmniSharp.Extensions.JsonRpc", ··· 506 511 }, 507 512 { 508 513 "pname": "System.Collections.Immutable", 509 - "version": "8.0.0", 510 - "hash": "sha256-F7OVjKNwpqbUh8lTidbqJWYi476nsq9n+6k0+QVRo3w=" 514 + "version": "9.0.0", 515 + "hash": "sha256-+6q5VMeoc5bm4WFsoV6nBXA9dV5pa/O4yW+gOdi8yac=" 511 516 }, 512 517 { 513 518 "pname": "System.ComponentModel.Annotations", ··· 516 521 }, 517 522 { 518 523 "pname": "System.ComponentModel.Composition", 519 - "version": "8.0.0", 520 - "hash": "sha256-MnKdjE/qIvAmEeRc3gOn5uJhT0TI3UnUJPjj3TLHFQo=" 524 + "version": "9.0.0", 525 + "hash": "sha256-CsWwo/NLEAt36kE52cT4wud8uUjJ31vpHlAY6RkUbog=" 521 526 }, 522 527 { 523 528 "pname": "System.Composition", 524 - "version": "8.0.0", 525 - "hash": "sha256-rA118MFj6soKN++BvD3y9gXAJf0lZJAtGARuznG5+Xg=" 529 + "version": "9.0.0", 530 + "hash": "sha256-FehOkQ2u1p8mQ0/wn3cZ+24HjhTLdck8VZYWA1CcgbM=" 526 531 }, 527 532 { 528 533 "pname": "System.Composition.AttributedModel", 529 - "version": "8.0.0", 530 - "hash": "sha256-n3aXiBAFIlQicSRLiNtLh++URSUxRBLggsjJ8OMNRpo=" 534 + "version": "9.0.0", 535 + "hash": "sha256-a7y7H6zj+kmYkllNHA402DoVfY9IaqC3Ooys8Vzl24M=" 531 536 }, 532 537 { 533 538 "pname": "System.Composition.Convention", 534 - "version": "8.0.0", 535 - "hash": "sha256-Z9HOAnH1lt1qc38P3Y0qCf5gwBwiLXQD994okcy53IE=" 539 + "version": "9.0.0", 540 + "hash": "sha256-tw4vE5JRQ60ubTZBbxoMPhtjOQCC3XoDFUH7NHO7o8U=" 536 541 }, 537 542 { 538 543 "pname": "System.Composition.Hosting", 539 - "version": "8.0.0", 540 - "hash": "sha256-axKJC71oKiNWKy66TVF/c3yoC81k03XHAWab3mGNbr0=" 544 + "version": "9.0.0", 545 + "hash": "sha256-oOxU+DPEEfMCuNLgW6wSkZp0JY5gYt44FJNnWt+967s=" 541 546 }, 542 547 { 543 548 "pname": "System.Composition.Runtime", 544 - "version": "8.0.0", 545 - "hash": "sha256-AxwZ29+GY0E35Pa255q8AcMnJU52Txr5pBy86t6V1Go=" 549 + "version": "9.0.0", 550 + "hash": "sha256-AyIe+di1TqwUBbSJ/sJ8Q8tzsnTN+VBdJw4K8xZz43s=" 546 551 }, 547 552 { 548 553 "pname": "System.Composition.TypedParts", 549 - "version": "8.0.0", 550 - "hash": "sha256-+ZJawThmiYEUNJ+cB9uJK+u/sCAVZarGd5ShZoSifGo=" 554 + "version": "9.0.0", 555 + "hash": "sha256-F5fpTUs3Rr7yP/NyIzr+Xn5NdTXXp8rrjBnF9UBBUog=" 551 556 }, 552 557 { 553 558 "pname": "System.Configuration.ConfigurationManager", 554 - "version": "8.0.0", 555 - "hash": "sha256-xhljqSkNQk8DMkEOBSYnn9lzCSEDDq4yO910itptqiE=" 559 + "version": "9.0.0", 560 + "hash": "sha256-+pLnTC0YDP6Kjw5DVBiFrV/Q3x5is/+6N6vAtjvhVWk=" 556 561 }, 557 562 { 558 563 "pname": "System.Data.DataSetExtensions", ··· 561 566 }, 562 567 { 563 568 "pname": "System.Diagnostics.DiagnosticSource", 564 - "version": "8.0.0", 565 - "hash": "sha256-+aODaDEQMqla5RYZeq0Lh66j+xkPYxykrVvSCmJQ+Vs=" 566 - }, 567 - { 568 - "pname": "System.Diagnostics.DiagnosticSource", 569 - "version": "8.0.1", 570 - "hash": "sha256-zmwHjcJgKcbkkwepH038QhcnsWMJcHys+PEbFGC0Jgo=" 569 + "version": "9.0.0", 570 + "hash": "sha256-1VzO9i8Uq2KlTw1wnCCrEdABPZuB2JBD5gBsMTFTSvE=" 571 571 }, 572 572 { 573 573 "pname": "System.Diagnostics.EventLog", 574 - "version": "8.0.0", 575 - "hash": "sha256-rt8xc3kddpQY4HEdghlBeOK4gdw5yIj4mcZhAVtk2/Y=" 574 + "version": "9.0.0", 575 + "hash": "sha256-tPvt6yoAp56sK/fe+/ei8M65eavY2UUhRnbrREj/Ems=" 576 576 }, 577 577 { 578 578 "pname": "System.Drawing.Common", ··· 596 596 }, 597 597 { 598 598 "pname": "System.IO.Pipelines", 599 - "version": "8.0.0", 600 - "hash": "sha256-LdpB1s4vQzsOODaxiKstLks57X9DTD5D6cPx8DE1wwE=" 599 + "version": "9.0.0", 600 + "hash": "sha256-vb0NrPjfEao3kfZ0tavp2J/29XnsQTJgXv3/qaAwwz0=" 601 601 }, 602 602 { 603 603 "pname": "System.Memory", ··· 621 621 }, 622 622 { 623 623 "pname": "System.Reflection.Metadata", 624 - "version": "8.0.0", 625 - "hash": "sha256-dQGC30JauIDWNWXMrSNOJncVa1umR1sijazYwUDdSIE=" 624 + "version": "9.0.0", 625 + "hash": "sha256-avEWbcCh7XgpsSesnR3/SgxWi/6C5OxjR89Jf/SfRjQ=" 626 626 }, 627 627 { 628 628 "pname": "System.Reflection.MetadataLoadContext", ··· 681 681 }, 682 682 { 683 683 "pname": "System.Security.Cryptography.ProtectedData", 684 - "version": "8.0.0", 685 - "hash": "sha256-fb0pa9sQxN+mr0vnXg1Igbx49CaOqS+GDkTfWNboUvs=" 684 + "version": "9.0.0", 685 + "hash": "sha256-gPgPU7k/InTqmXoRzQfUMEKL3QuTnOKowFqmXTnWaBQ=" 686 686 }, 687 687 { 688 688 "pname": "System.Security.Cryptography.Xml", ··· 711 711 }, 712 712 { 713 713 "pname": "System.Text.Encodings.Web", 714 - "version": "8.0.0", 715 - "hash": "sha256-IUQkQkV9po1LC0QsqrilqwNzPvnc+4eVvq+hCvq8fvE=" 714 + "version": "9.0.0", 715 + "hash": "sha256-WGaUklQEJywoGR2jtCEs5bxdvYu5SHaQchd6s4RE5x0=" 716 716 }, 717 717 { 718 718 "pname": "System.Text.Json", 719 - "version": "8.0.5", 720 - "hash": "sha256-yKxo54w5odWT6nPruUVsaX53oPRe+gKzGvLnnxtwP68=" 719 + "version": "9.0.0", 720 + "hash": "sha256-aM5Dh4okLnDv940zmoFAzRmqZre83uQBtGOImJpoIqk=" 721 721 }, 722 722 { 723 723 "pname": "System.Threading.Channels", ··· 731 731 }, 732 732 { 733 733 "pname": "System.Threading.Tasks.Dataflow", 734 - "version": "8.0.0", 735 - "hash": "sha256-Q6fPtMPNW4+SDKCabJzNS+dw4B04Oxd9sHH505bFtQo=" 734 + "version": "9.0.0", 735 + "hash": "sha256-nRzcFvLBpcOfyIJdCCZq5vDKZN0xHVuB8yCXoMrwZJA=" 736 736 }, 737 737 { 738 738 "pname": "System.Threading.Tasks.Extensions",
+2 -2
pkgs/by-name/om/omnisharp-roslyn/package.nix
··· 13 13 let 14 14 finalPackage = buildDotnetModule rec { 15 15 pname = "omnisharp-roslyn"; 16 - version = "1.39.13"; 16 + version = "1.39.14"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "OmniSharp"; 20 20 repo = "omnisharp-roslyn"; 21 21 tag = "v${version}"; 22 - hash = "sha256-/U7zpx0jAnvZl7tshGV7wORD/wQUKYgX1kADpyCXHM4="; 22 + hash = "sha256-yWrb+Ov1syKjeer7CxmGzkf9qUJxQ0IoIRfyIiO8eI8="; 23 23 }; 24 24 25 25 projectFile = "src/OmniSharp.Stdio.Driver/OmniSharp.Stdio.Driver.csproj";
+3 -3
pkgs/by-name/op/openhue-cli/package.nix
··· 8 8 9 9 buildGoModule (finalAttrs: { 10 10 pname = "openhue-cli"; 11 - version = "0.18"; 11 + version = "0.20"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "openhue"; 15 15 repo = "openhue-cli"; 16 16 tag = finalAttrs.version; 17 - hash = "sha256-LSaHE3gdjpNea6o+D/JGvHtwvG13LbHv2pDcZhlIoEE="; 17 + hash = "sha256-vUmJjuBcOjIhhtWrzq+y0fDlh+wQhgBwxnfuod27CBA="; 18 18 leaveDotGit = true; 19 19 postFetch = '' 20 20 cd "$out" ··· 23 23 ''; 24 24 }; 25 25 26 - vendorHash = "sha256-lqIzmtFtkfrJSrpic79Is0yGpnLUysPQLn2lp/Mh+u4="; 26 + vendorHash = "sha256-DhTe0fSWoAwzoGr8rZMsbSE92jJFr4T7aVx/ULMfVFo="; 27 27 28 28 env.CGO_ENABLED = 0; 29 29
+2 -2
pkgs/by-name/op/openxr-loader/package.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "openxr-loader"; 19 - version = "1.1.49"; 19 + version = "1.1.50"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "KhronosGroup"; 23 23 repo = "OpenXR-SDK-Source"; 24 24 tag = "release-${version}"; 25 - hash = "sha256-fQmS8oJZ7Oy/miKCtOQGSvZFDIEMFOcUyz2D6P8hNZY="; 25 + hash = "sha256-/5zw9tj7F0cxhzyIRf8njoYB9moJFYLEjDeqe0OBr34="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+3 -3
pkgs/by-name/pa/particle-cli/package.nix
··· 8 8 9 9 buildNpmPackage (finalAttrs: { 10 10 pname = "particle-cli"; 11 - version = "3.40.0"; 11 + version = "3.40.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "particle-iot"; 15 15 repo = "particle-cli"; 16 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-qfwj0hs+4p00pALrIMAjHCM7Cdoj6+sxV/nMyI2rYNg="; 17 + hash = "sha256-rbCk54bTDwvbpRMUR9bUNLTuIHw3HnKoJE7euXMujxg="; 18 18 }; 19 19 20 - npmDepsHash = "sha256-o8G6+xYOg80vgjJ6Skm7ydysuH71uN9erj7Nd4QOB2I="; 20 + npmDepsHash = "sha256-gvnjrFTx1N/dIYSWHjj+PGxiVyiP3pdcDjPIix48cAI="; 21 21 22 22 buildInputs = [ 23 23 udev
+2 -2
pkgs/by-name/pa/payme/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "payme"; 9 - version = "1.2.3"; 9 + version = "1.2.4"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "jovandeginste"; 13 13 repo = "payme"; 14 14 rev = "v${version}"; 15 - hash = "sha256-jkJGR6i68kNzA60T5ZOu2u+fPvZht4ssEtr8aYocGUk="; 15 + hash = "sha256-GXJjjCruDjL5+ag3aUJAHPLOvbwux9FBnyqXJ52WifE="; 16 16 leaveDotGit = true; 17 17 postFetch = '' 18 18 cd "$out"
+2 -2
pkgs/by-name/pe/petsc/package.nix
··· 111 111 in 112 112 stdenv.mkDerivation (finalAttrs: { 113 113 pname = "petsc"; 114 - version = "3.23.4"; 114 + version = "3.23.5"; 115 115 116 116 src = fetchzip { 117 117 url = "https://web.cels.anl.gov/projects/petsc/download/release-snapshots/petsc-${finalAttrs.version}.tar.gz"; 118 - hash = "sha256-7UugWo3SzRap3Ed6NySRZOJgD+Wkb9J+QEGRUfLbOPI="; 118 + hash = "sha256-pfGb/9GlKsZJpdEU6lOr61a8AE5NR9MlZ0mHJ/j+eDs="; 119 119 }; 120 120 121 121 strictDeps = true;
+3 -3
pkgs/by-name/pi/pistol/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "pistol"; 12 - version = "0.5.2"; 12 + version = "0.5.3"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "doronbehar"; 16 16 repo = "pistol"; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-/w2BenBIzhD0KHtELlFy7YGv0lykHrjrROZeW75gHis="; 18 + sha256 = "sha256-cL9hHehajqMIpdD10KYIbNkBt2fiRQkx81m9H3Yd1UY="; 19 19 }; 20 20 21 - vendorHash = "sha256-+Q72DUKLqahgbLCaXOTAYZaMvNfv3XF+SpyqHyB065g="; 21 + vendorHash = "sha256-+moQ3qZnWmmGpOXUxyBS3hIETK/ZtRwmvD2tXFf0A3o="; 22 22 23 23 doCheck = false; 24 24
+3 -3
pkgs/by-name/po/pocketbase/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "pocketbase"; 10 - version = "0.29.0"; 10 + version = "0.29.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "pocketbase"; 14 14 repo = "pocketbase"; 15 15 rev = "v${version}"; 16 - hash = "sha256-yNz/bwjOPcj4N4yXi1pckz/rGNSJeCs8xeZHj+W/+2E="; 16 + hash = "sha256-TWizSLWsQEK2BGaYVkqc/rrjiv/MZF0kKZAYGQAItJ4="; 17 17 }; 18 18 19 - vendorHash = "sha256-XfHU2E2VEcQEQtcGmZqEPjdy7wxvOEdcysSYYD5oLNM="; 19 + vendorHash = "sha256-MWCx8v1/A0xjm8M9zgPXkMYsQlpAqDaASoqFTr7FG18="; 20 20 21 21 # This is the released subpackage from upstream repo 22 22 subPackages = [ "examples/base" ];
+3 -3
pkgs/by-name/po/powerstation/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "powerstation"; 13 - version = "0.6.1"; 13 + version = "0.7.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "ShadowBlip"; 17 17 repo = "PowerStation"; 18 18 tag = "v${version}"; 19 - hash = "sha256-UB0NmP2UaQEYGrFR0f0nBLuGTjjTIhvz0bwx3eC2JE4="; 19 + hash = "sha256-wm/O36AdBxfLVCM3NtzSVVHBM+GfH4ARZ/2ekJX5qsE="; 20 20 }; 21 21 22 - cargoHash = "sha256-32tz1cJ2G3GXB9j0lFyjsAOn/iQGxzrdfcqkA/Yh4UY="; 22 + cargoHash = "sha256-P4NTzKKY/yB8ODPlsGWfihXTQD8MiOnp+tKCWFKtKxI="; 23 23 24 24 nativeBuildInputs = [ 25 25 cmake
+55
pkgs/by-name/qw/qwen-code/package.nix
··· 1 + { 2 + lib, 3 + buildNpmPackage, 4 + fetchFromGitHub, 5 + fetchNpmDeps, 6 + nix-update-script, 7 + }: 8 + 9 + buildNpmPackage (finalAttrs: { 10 + pname = "qwen-code"; 11 + version = "0.0.5"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "QwenLM"; 15 + repo = "qwen-code"; 16 + tag = "v${finalAttrs.version}"; 17 + hash = "sha256-/PuykGiXpjk2Fp1Sif59hvOIepZ7KcJRvL/9RMatQJA="; 18 + }; 19 + 20 + npmDeps = fetchNpmDeps { 21 + inherit (finalAttrs) src; 22 + hash = "sha256-HzrN549MfI+TN7BKssisIsga7udGKvextruzuoLq8M4="; 23 + }; 24 + 25 + buildPhase = '' 26 + runHook preBuild 27 + 28 + npm run generate 29 + npm run bundle 30 + 31 + runHook postBuild 32 + ''; 33 + 34 + installPhase = '' 35 + runHook preInstall 36 + 37 + mkdir -p $out/bin 38 + cp -r bundle/* $out/ 39 + patchShebangs $out 40 + ln -s $out/gemini.js $out/bin/qwen 41 + 42 + runHook postInstall 43 + ''; 44 + 45 + passthru.updateScript = nix-update-script { }; 46 + 47 + meta = { 48 + description = "Coding agent that lives in digital world"; 49 + homepage = "https://github.com/QwenLM/qwen-code"; 50 + mainProgram = "qwen"; 51 + license = lib.licenses.asl20; 52 + platforms = lib.platforms.all; 53 + maintainers = with lib.maintainers; [ lonerOrz ]; 54 + }; 55 + })
+2 -2
pkgs/by-name/ri/rime-moegirl/package.nix
··· 5 5 }: 6 6 stdenvNoCC.mkDerivation (finalAttrs: { 7 7 pname = "rime-moegirl"; 8 - version = "20250711"; 8 + version = "20250810"; 9 9 src = fetchurl { 10 10 url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict.yaml"; 11 - hash = "sha256-gs/JhdSeLFkBKvBdVRxk3RhqlkOhly18w4Pz63GG814="; 11 + hash = "sha256-/Yv/2kigtpNvnWlHYTJBMUlMV5i5toteaLiDJ0kDoZg="; 12 12 }; 13 13 14 14 dontUnpack = true;
+3 -3
pkgs/by-name/ru/rustical/package.nix
··· 8 8 9 9 rustPlatform.buildRustPackage (finalAttrs: { 10 10 pname = "rustical"; 11 - version = "0.8.1"; 11 + version = "0.8.4"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "lennart-k"; 15 15 repo = "rustical"; 16 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-TkgkgPQEj0SA9MjfWtOUu6rHKYCIs5jVieYL1N+XLk8="; 17 + hash = "sha256-y4t63lb14WdUjzhjv/mx90ThaTfE7KFyRkg+CG+66TE="; 18 18 }; 19 19 20 - cargoHash = "sha256-X+8G2H3wszKJmn7p8n0b6z3xZ/ylGzwc99oUnIGKpTA="; 20 + cargoHash = "sha256-DK3es0GjKurCwGmr/6gAk+ccJc1dUP64kK+UzvS+Mi0="; 21 21 22 22 nativeBuildInputs = [ pkg-config ]; 23 23 buildInputs = [ openssl ];
+3 -3
pkgs/by-name/sd/sdl_gamecontrollerdb/package.nix
··· 7 7 8 8 stdenvNoCC.mkDerivation (finalAttrs: { 9 9 pname = "sdl_gamecontrollerdb"; 10 - version = "0-unstable-2025-07-28"; 10 + version = "0-unstable-2025-08-05"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "mdqinc"; 14 14 repo = "SDL_GameControllerDB"; 15 - rev = "34765aa1de21323a873ab107a2a25e269e86b2e8"; 16 - hash = "sha256-K3XeSs6psR8RnDiYAKrVbx3KWQuJcD3RyZpOl+dn5Qw="; 15 + rev = "7543fc8af09232396f7d57e19c2342965c53e94f"; 16 + hash = "sha256-y5QyrgT/ipal36jTJurvXMac6uRMt3XOg3Sm6SLe0sk="; 17 17 }; 18 18 19 19 dontBuild = true;
+3 -3
pkgs/by-name/sh/shadowenv/package.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "shadowenv"; 10 - version = "3.3.1"; 10 + version = "3.4.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "Shopify"; 14 14 repo = "shadowenv"; 15 15 rev = version; 16 - hash = "sha256-s70tNeF0FnWYZ0xLGIL1lTM0LwJdhPPIHrNgrY1YNBs="; 16 + hash = "sha256-WsUeqkuT4NhoaCJG1hqz+uWyvWQBfxtDheEkWkYmSWU="; 17 17 }; 18 18 19 - cargoHash = "sha256-Cg01yM3FbrYpZrv2dhGJnezugNhcuwDcXIU47/AWrC4="; 19 + cargoHash = "sha256-vAMap35rpmEKSHJ9yW/PzPbEWtLw30DawDmI+QfcOsw="; 20 20 21 21 nativeBuildInputs = [ installShellFiles ]; 22 22
+2 -2
pkgs/by-name/sn/snyk/package.nix
··· 8 8 }: 9 9 10 10 let 11 - version = "1.1298.1"; 11 + version = "1.1298.2"; 12 12 in 13 13 buildNpmPackage { 14 14 pname = "snyk"; ··· 18 18 owner = "snyk"; 19 19 repo = "cli"; 20 20 tag = "v${version}"; 21 - hash = "sha256-oLkzEm7OMBNqT+EDrwujqQek4LWwKgYFUoMRWhpqY4o="; 21 + hash = "sha256-8VnbXxvz5mWWMq6sjffshMbHBf2H6s/xmPbQZsZC/4A="; 22 22 }; 23 23 24 24 npmDepsHash = "sha256-7fHehEKjNNRdRk9+kARzn75G0r1pse7ULn/Oz6mQRKM=";
+2 -2
pkgs/by-name/st/st/package.nix
··· 20 20 21 21 stdenv.mkDerivation (finalAttrs: { 22 22 pname = "st"; 23 - version = "0.9.2"; 23 + version = "0.9.3"; 24 24 25 25 src = fetchzip { 26 26 url = "https://dl.suckless.org/st/st-${finalAttrs.version}.tar.gz"; 27 - hash = "sha256-pFyK4XvV5Z4gBja8J996zF6wkdgQCNVccqUJ5+ejB/w="; 27 + hash = "sha256-Xr1JtaOMVgn+zsD39LFjP/0dkYkvaAXbEcYb3ptgYLA="; 28 28 }; 29 29 30 30 outputs = [
+3 -3
pkgs/by-name/st/stackit-cli/package.nix
··· 12 12 13 13 buildGoModule rec { 14 14 pname = "stackit-cli"; 15 - version = "0.37.3"; 15 + version = "0.38.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "stackitcloud"; 19 19 repo = "stackit-cli"; 20 20 rev = "v${version}"; 21 - hash = "sha256-nyNASYpZvao194rlKSyxNa74Ezo5CwiESNj54uBgUL4="; 21 + hash = "sha256-i6UOgD3C0nq6Z3Gdki8YOZotU1CbC14Jx8d9B1LV7Hk="; 22 22 }; 23 23 24 - vendorHash = "sha256-iWGRFjCvXm03GRnmQlscP5Y5di9W4lW3jotyhDcE/x4="; 24 + vendorHash = "sha256-qzNd1wn3N+EPjXO1gFYKtVNdGwd2D/jf6oJFvloR7HY="; 25 25 26 26 subPackages = [ "." ]; 27 27
+3 -3
pkgs/by-name/st/step-kms-plugin/package.nix
··· 12 12 13 13 buildGoModule rec { 14 14 pname = "step-kms-plugin"; 15 - version = "0.14.0"; 15 + version = "0.14.2"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "smallstep"; 19 19 repo = "step-kms-plugin"; 20 20 rev = "v${version}"; 21 - hash = "sha256-GP4ztKTkHIxBCK9Wx9oT8jehIFYCj3lnAt+RGgTMpHo="; 21 + hash = "sha256-0RIAwZbk6DNlJHTmxUd/td94OlrjwcQ86ao7wt7PSdg="; 22 22 }; 23 23 24 - vendorHash = "sha256-beRLkYLAe3wx0CmCXcn5flWeg+qOK1JPYjAD/bhPkTc="; 24 + vendorHash = "sha256-YvK3icanE8FoTeACfReVXmV143lcRTyXv8L6+hoFIaM="; 25 25 26 26 proxyVendor = true; 27 27
+3 -3
pkgs/by-name/sy/syft/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "syft"; 10 - version = "1.29.1"; 10 + version = "1.30.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "anchore"; 14 14 repo = "syft"; 15 15 tag = "v${version}"; 16 - hash = "sha256-X+7X71M7nJKEAvAm0L9hh/zamJTGb+OyYNFWfiYlyew="; 16 + hash = "sha256-7YnjkevF4Nmu8YDhpd/WqXzLM8cdVPDt5ss9bg8udow="; 17 17 # populate values that require us to use git. By doing this in postFetch we 18 18 # can delete .git afterwards and maintain better reproducibility of the src. 19 19 leaveDotGit = true; ··· 28 28 # hash mismatch with darwin 29 29 proxyVendor = true; 30 30 31 - vendorHash = "sha256-xgjnPTeSB+AWFLfXYLW3bveJowVje81lVvO30ZiCLxI="; 31 + vendorHash = "sha256-ydXEquE12om67jouEHN5/MPI9+i69OALIQcPHRBD/YA="; 32 32 33 33 nativeBuildInputs = [ installShellFiles ]; 34 34
+2 -2
pkgs/by-name/ta/tauno-monitor/package.nix
··· 13 13 }: 14 14 python3Packages.buildPythonApplication rec { 15 15 pname = "tauno-monitor"; 16 - version = "0.2.11"; 16 + version = "0.2.14"; 17 17 pyproject = false; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "taunoe"; 21 21 repo = "tauno-monitor"; 22 22 tag = "v${version}"; 23 - hash = "sha256-FoNn+A0zqFf/Nl0MrK9/X5mwaq8mJBRH0uGnemDC0is="; 23 + hash = "sha256-1jXQZc2+Yufjo75KwHbAFPsGxdpxkdUP8LXyY2fj3Kw="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+19 -10
pkgs/by-name/ta/tayga/package.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchurl, 4 + fetchFromGitHub, 5 5 nixosTests, 6 6 }: 7 7 8 8 stdenv.mkDerivation (finalAttrs: { 9 - version = "0.9.2"; 9 + version = "0.9.5"; 10 10 pname = "tayga"; 11 11 12 - src = fetchurl { 13 - url = "http://www.litech.org/tayga/tayga-${finalAttrs.version}.tar.bz2"; 14 - hash = "sha256-Kx95J6nS3P+Qla/zwnGSSwUsz9L6ypWIsndDGkTwAJw="; 12 + src = fetchFromGitHub { 13 + owner = "apalrd"; 14 + repo = "tayga"; 15 + tag = finalAttrs.version; 16 + hash = "sha256-xOm4fetFq2UGuhOojrT8WOcX78c6MLTMVbDv+O62x2E="; 15 17 }; 16 18 17 - env.NIX_CFLAGS_COMPILE = toString [ 18 - "-Wno-address-of-packed-member" 19 - "-Wno-implicit-function-declaration" 20 - ]; 19 + preBuild = '' 20 + echo "#define TAYGA_VERSION \"${finalAttrs.version}\"" > version.h 21 + ''; 22 + 23 + installPhase = '' 24 + install -Dm755 tayga $out/bin/tayga 25 + install -D tayga.conf.5 $out/share/man/man5/tayga.conf.5 26 + install -D tayga.8 $out/share/man/man8/tayga.8 27 + cp -R docs $out/share/ 28 + cp tayga.conf.example $out/share/docs/ 29 + ''; 21 30 22 31 passthru.tests.tayga = nixosTests.tayga; 23 32 ··· 30 39 It is intended to provide production-quality NAT64 service 31 40 for networks where dedicated NAT64 hardware would be overkill. 32 41 ''; 33 - homepage = "http://www.litech.org/tayga"; 42 + homepage = "https://github.com/apalrd/tayga"; 34 43 license = licenses.gpl2Plus; 35 44 maintainers = with maintainers; [ _0x4A6F ]; 36 45 platforms = platforms.linux;
+3 -3
pkgs/by-name/tf/tfupdate/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "tfupdate"; 9 - version = "0.9.1"; 9 + version = "0.9.2"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "minamijoyo"; 13 13 repo = "tfupdate"; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-hxg/hAfUjygBgkfql2ZpiskKPqwVmo2MZ4n9eod5Kn4="; 15 + sha256 = "sha256-izxvvR/wVNQlDWxJhUSAq2q0U0Y7fcFflEZRS2sfEIY="; 16 16 }; 17 17 18 - vendorHash = "sha256-dWp9onewCiemk3AUTgiaVwnLuVVMMTk/6hCWDS5NS88="; 18 + vendorHash = "sha256-gmIh1xlOXLASzY9E5phS48Bdj1agH5LdUUW0p/g4I5w="; 19 19 20 20 # Tests start http servers which need to bind to local addresses: 21 21 # panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted
+3 -3
pkgs/by-name/va/vacuum-go/package.nix
··· 7 7 8 8 buildGoModule (finalAttrs: { 9 9 pname = "vacuum-go"; 10 - version = "0.17.7"; 10 + version = "0.17.8"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "daveshanley"; 14 14 repo = "vacuum"; 15 15 # using refs/tags because simple version gives: 'the given path has multiple possibilities' error 16 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-RkJOBiannG98bqc3GdBzRGvDATjX0gtgn8PCdIIBdBc="; 17 + hash = "sha256-Vrvb4xLY7vxTaAlaPScBKmLfOgOzxGHpt4GJu8DnwUg="; 18 18 }; 19 19 20 - vendorHash = "sha256-6tBKlJa7fec0jc7/s1A6h86SwlZR7HzGes7hPEuwNmo="; 20 + vendorHash = "sha256-IOlJHVzmBR4Re3VxAwLjpws3DTJSzG8JBya6L3WTeoQ="; 21 21 22 22 env.CGO_ENABLED = 0; 23 23 ldflags = [
+6 -1
pkgs/by-name/va/valkey/package.nix
··· 97 97 sed -i '/^proc wait_load_handlers_disconnected/{n ; s/wait_for_condition 50 100/wait_for_condition 50 500/; }' \ 98 98 tests/support/util.tcl 99 99 100 + CLIENTS="$NIX_BUILD_CORES" 101 + if (( $CLIENTS > 4)); then 102 + CLIENTS=4 103 + fi 104 + 100 105 # Skip some more flaky tests. 101 106 # Skip test requiring custom jemalloc (unit/memefficiency). 102 107 ./runtest \ 103 108 --no-latency \ 104 109 --timeout 2000 \ 105 - --clients $NIX_BUILD_CORES \ 110 + --clients "$CLIENTS" \ 106 111 --tags -leaks \ 107 112 --skipunit unit/memefficiency \ 108 113 --skipunit integration/failover \
+308 -232
pkgs/by-name/ve/velocity/deps.json
··· 75 75 "module": "sha256-eYp7cGdyE27iijLt2GOx6fgWE6NJhAXXS+ilyb6/9U8=", 76 76 "pom": "sha256-20U7urXn2opDE5sNzTuuZykzIfKcTZH1p5XZ/2xS3d8=" 77 77 }, 78 + "io/papermc#fill-gradle/1.0.3": { 79 + "jar": "sha256-i0s+vAeA1bKfvpdqqwSx7RfW8nUt+91hgOLaTAkPHok=", 80 + "module": "sha256-RyHV6clYb0y/g1pDAdYF8p+v1ycn6pPhcHueG2vEjJ4=", 81 + "pom": "sha256-iQridlDWW/I2j8S0pp2rQKSqLsX6mtRKh+8enBJd5JA=" 82 + }, 83 + "io/papermc/fill/gradle#io.papermc.fill.gradle.gradle.plugin/1.0.3": { 84 + "pom": "sha256-mY28yKdtdiKCQgolhRc+El30dd3ROKN1PSNk70wA/BM=" 85 + }, 86 + "net/kyori#indra-git/3.1.3": { 87 + "jar": "sha256-Yj3GYLWoSQJgP1Ww4EnCX9w8Z3SckQWKEGOWPcYFae0=", 88 + "module": "sha256-V9JC+gioSOG2JGEvV/+6qY9p9d8DA9LBj3vbGpAyikU=", 89 + "pom": "sha256-Zp9TPudkCyfovE9RPkohPaBBz1wcJhVTx/GD1Qu21Jc=" 90 + }, 78 91 "org/apache#apache/29": { 79 92 "pom": "sha256-PkkDcXSCC70N9jQgqXclWIY5iVTCoGKR+mH3J6w1s3c=" 80 93 }, ··· 317 330 "com/fasterxml#oss-parent/50": { 318 331 "pom": "sha256-9dpV3XuI+xcMRoAdF3dKZS+y9FgftbHQpfyGqhgrhXc=" 319 332 }, 320 - "com/fasterxml#oss-parent/56": { 321 - "pom": "sha256-/UkfeIV0JBBtLj1gW815m1PTGlZc3IaEY8p+h120WlA=" 322 - }, 323 333 "com/fasterxml#oss-parent/58": { 324 334 "pom": "sha256-VnDmrBxN3MnUE8+HmXpdou+qTSq+Q5Njr57xAqCgnkA=" 325 335 }, 326 - "com/fasterxml/jackson#jackson-bom/2.16.0": { 327 - "pom": "sha256-Wqooh0QFvwT7qOLFcVkieCRGG6b31VKr246NOgum+L8=" 336 + "com/fasterxml#oss-parent/61": { 337 + "pom": "sha256-NklRPPWX6RhtoIVZhqjFQ+Er29gF7e75wSTbVt0DZUQ=" 338 + }, 339 + "com/fasterxml/jackson#jackson-base/2.18.1": { 340 + "pom": "sha256-m612py37mq3jx6MzQ3dUk4bbqlTCFeRYOiUEyIp81K8=" 328 341 }, 329 342 "com/fasterxml/jackson#jackson-bom/2.17.2": { 330 343 "pom": "sha256-H0crC8IATVz0IaxIhxQX+EGJ5481wElxg4f9i0T7nzI=" 331 344 }, 332 - "com/fasterxml/jackson#jackson-parent/2.16": { 333 - "pom": "sha256-i/YUKBIUiiq/aFCycvCvTD2P8RIe1gTEAvPzjJ5lRqs=" 345 + "com/fasterxml/jackson#jackson-bom/2.18.1": { 346 + "pom": "sha256-84SrzK8Mb712GDdi9yVv1nkBLtgdt/KiZofouWWgFKc=" 334 347 }, 335 348 "com/fasterxml/jackson#jackson-parent/2.17": { 336 349 "pom": "sha256-rubeSpcoOwQOQ/Ta1XXnt0eWzZhNiSdvfsdWc4DIop0=" 337 350 }, 351 + "com/fasterxml/jackson#jackson-parent/2.18.1": { 352 + "pom": "sha256-0IIvrBoCJoRLitRFySDEmk9hkWnQmxAQp9/u0ZkQmYw=" 353 + }, 354 + "com/fasterxml/jackson/core#jackson-annotations/2.18.1": { 355 + "jar": "sha256-t/nfXayahfR/2ydpRV7oupzy/pt8TPY24K7INHnXiC8=", 356 + "module": "sha256-DFBMd03V5mzpWoFiUnsAvNGR0e6S2kKPFhL5n3NMqYw=", 357 + "pom": "sha256-dRNr4/Jizrf75rkHuPJujGKMM+G1SSINS36CvdHQ5EY=" 358 + }, 359 + "com/fasterxml/jackson/core#jackson-core/2.18.1": { 360 + "jar": "sha256-6+GVlq0Z96BRTIu497Cs+FI5pO/1rgMinpdg0mjSnCI=", 361 + "module": "sha256-VHp3eJ1Ej1IoV37sUTwj2+eAhg98E4mecnrOCXDz3jE=", 362 + "pom": "sha256-36WWVD+Z1b7cE4aq4rr73v9mpnK7IXF4/CSMjT1Xf+0=" 363 + }, 364 + "com/fasterxml/jackson/core#jackson-databind/2.18.1": { 365 + "jar": "sha256-cRvDv4bTHQKWi5J577B6atYK38C6oOn+ZtcaCsJVYjQ=", 366 + "module": "sha256-xlQvXTA+kaQo5pElXhDIGcSyGvnsQ+a+Vnq8MSRNIWc=", 367 + "pom": "sha256-09m5HHTeS7LD9bNRhqq1FHFtqh1yEny2DQ0+Uk8xHyI=" 368 + }, 369 + "com/fasterxml/jackson/datatype#jackson-datatype-jsr310/2.18.1": { 370 + "jar": "sha256-b3nIdhO9ALH/3rx40jXLnz3Ndhl3+/h8G3cBeCiuiV8=", 371 + "module": "sha256-kOszPmMBRzhd8WMcq4L+YtkqVQB4b4Mskl6jbOgv2SM=", 372 + "pom": "sha256-m9eWNx4di6787izrlhPIF8k8t/xw3DVSIzmRcBvn46c=" 373 + }, 374 + "com/fasterxml/jackson/module#jackson-modules-java8/2.18.1": { 375 + "pom": "sha256-Pt9S8cWuqdNlMYMp6SUVLFJppU88C+7Enn0bBT+JA/4=" 376 + }, 338 377 "com/fasterxml/woodstox#woodstox-core/6.5.1": { 339 378 "jar": "sha256-ySjWBmXGQV+xw5d1z5XPxE9/RYDPWrAbHDgOv/12iH8=", 340 379 "pom": "sha256-SDllThaxcU509Rq8s3jYNWgUq49NUnPR3S8c6KOQrdw=" ··· 408 447 "jar": "sha256-0fPGaqkaxSVJ4Arjsgi6S5r31y1o8jBkNVO+s45hGKw=", 409 448 "pom": "sha256-9ZiID+766p1nTcQdsTqzcAS/A3drW7IcBN7ejpIMHxI=" 410 449 }, 450 + "com/google/errorprone#error_prone_annotations/2.36.0": { 451 + "jar": "sha256-d0QOJwsLyaJJkDxaB2w2pyLEiGyk9CZ18pA6HFPtYaU=", 452 + "pom": "sha256-15z9N8hfdta3VMdQHuHchEe3smQsI4LXeCUhZr0zHpw=" 453 + }, 411 454 "com/google/errorprone#error_prone_annotations/2.6.0": { 412 455 "pom": "sha256-d1CXiHMcDoMurQIJFPYFi5MxYBb8ZdfLKscDspNKmvY=" 413 456 }, ··· 427 470 "com/google/errorprone#error_prone_parent/2.21.1": { 428 471 "pom": "sha256-MrsLX/JB/Wuh/upEiuu5zt7xaZvnPLbzGTZTh7gr+Sw=" 429 472 }, 473 + "com/google/errorprone#error_prone_parent/2.36.0": { 474 + "pom": "sha256-Okz8imvtYetI6Wl5b8MeoNJwtj5nBZmUamGIOttwlNw=" 475 + }, 430 476 "com/google/errorprone#error_prone_parent/2.6.0": { 431 477 "pom": "sha256-+7tgNV14gZvGGYK0y1sBbGVyjMMNJb/qQckKYcZETzQ=" 432 478 }, ··· 437 483 "jar": "sha256-oXHuTHNN0tqDfksWvp30Zhr6typBra8x64Tf2vk2yiY=", 438 484 "pom": "sha256-6WBCznj+y6DaK+lkUilHyHtAopG1/TzWcqQ0kkEDxLk=" 439 485 }, 486 + "com/google/guava#failureaccess/1.0.3": { 487 + "jar": "sha256-y/w5BrGbj1XdfP1t/gqkUy6DQlDX8IC9jSEaPiRrWcs=", 488 + "pom": "sha256-xUvv839tQtQ+FHItVKUiya1R75f8W3knfmKj6/iC87s=" 489 + }, 440 490 "com/google/guava#guava-parent/21.0": { 441 491 "pom": "sha256-rNxtbwezRsrrF0kyeIvMxjwDXMXCsQCVjCH/4PbhmYg=" 442 492 }, ··· 455 505 "com/google/guava#guava-parent/31.1-jre": { 456 506 "pom": "sha256-RDliZ4O0StJe8F/wdiHdS7eWzE608pZqSkYf6kEw4Pw=" 457 507 }, 508 + "com/google/guava#guava-parent/33.4.0-android": { 509 + "pom": "sha256-ciDt5hAmWW+8cg7kuTJG+i0U8ygFhTK1nvBT3jl8fYM=" 510 + }, 511 + "com/google/guava#guava-parent/33.4.6-jre": { 512 + "pom": "sha256-Co0mEQgdOkd8L5S9lVY/6BDMdaZzUmqeSv2xGJEly0Q=" 513 + }, 458 514 "com/google/guava#guava/21.0": { 459 515 "jar": "sha256-lyE5cYq8ikiT+njLqM97LJA/Ncl6r0T6MDGwZplItIA=", 460 516 "pom": "sha256-wLAWqFx4TgHKUenWS/j+gM5AKyBv6ol7AyWNXm0P+A0=" ··· 475 531 "jar": "sha256-pC7cnKt5Ljn+ObuU8/ymVe0Vf/h6iveOHWulsHxKAKs=", 476 532 "pom": "sha256-kZPQe/T2YBCNc1jliyfSG0TjToDWc06Y4hkWN28nDeI=" 477 533 }, 534 + "com/google/guava#guava/33.4.6-jre": { 535 + "jar": "sha256-lYoDW3T/bH0M3/nDhFJLZF62GPcRe2Dh7pFfnP/Q5xY=", 536 + "module": "sha256-7+mDiJ/pKGiR0+ego5RsG2+l7AvG7qirnp4FOCYd1qc=", 537 + "pom": "sha256-nokisU/7NNGuKxzTOQZFWkPoc6Tum8sx+jYD529uQfI=" 538 + }, 478 539 "com/google/guava#listenablefuture/9999.0-empty-to-avoid-conflict-with-guava": { 479 540 "jar": "sha256-s3KgN9QjCqV/vv/e8w/WEj+cDC24XQrO0AyRuXTzP5k=", 480 541 "pom": "sha256-GNSx2yYVPU5VB5zh92ux/gXNuGLvmVSojLzE/zi4Z5s=" ··· 501 562 "jar": "sha256-Ia8wySJnvWEiwOC00gzMtmQaN+r5VsZUDsRx1YTmSns=", 502 563 "pom": "sha256-X6yoJLoRW+5FhzAzff2y/OpGui/XdNQwTtvzD6aj8FU=" 503 564 }, 565 + "com/google/j2objc#j2objc-annotations/3.0.0": { 566 + "jar": "sha256-iCQVc0Z93KRP/U10qgTCu/0Rv3wX4MNCyUyd56cKfGQ=", 567 + "pom": "sha256-I7PQOeForYndEUaY5t1744P0osV3uId9gsc6ZRXnShc=" 568 + }, 504 569 "com/googlecode/concurrent-trees#concurrent-trees/2.6.1": { 505 570 "jar": "sha256-BONySYTipcv1VgbPo3KlvT08XSohUzpwBOPN5Tl2H6U=", 506 571 "pom": "sha256-Q8K5sULnBV0fKlgn8QlEkl0idH2XVrMlDAeqtHU4qXE=" 507 572 }, 573 + "com/googlecode/javaewah#JavaEWAH/1.1.12": { 574 + "jar": "sha256-sZIEMxrG4gS++vUIpo9S7GtGONnZus3b69Q1+cTVAPI=", 575 + "pom": "sha256-BhhOmwWeCAkRgnE2r17Hj1fuTDvBn2MutWGw34+HiM4=" 576 + }, 508 577 "com/googlecode/javaewah#JavaEWAH/1.2.3": { 509 578 "jar": "sha256-1lImlJcTxMYaeE9BxRFn57Axb5N2Q5jrup5DNrPZVMI=", 510 579 "pom": "sha256-5O1sZpYgNm+ZOSBln+CsfLyD11PbwNwOseUplzr5byM=" 511 580 }, 581 + "com/gradleup/shadow#com.gradleup.shadow.gradle.plugin/8.3.6": { 582 + "pom": "sha256-NidtUGriR/nwGsf4gtmR/Om7klqlTGD8Cwt5QDINnFw=" 583 + }, 584 + "com/gradleup/shadow#shadow-gradle-plugin/8.3.6": { 585 + "jar": "sha256-fOIOvwHuKe7FJFY70UK6wpHXUTXtedDZUamP0skmXDs=", 586 + "module": "sha256-+8pm1Bwrz9HiUE9uzIIf4BqbAIx27qnJQM+Ay1aaI/8=", 587 + "pom": "sha256-lRJfSJrSuJ5gJXMmnK9h9tSF26gvHcuNCYDODfK2stA=" 588 + }, 512 589 "com/lmax#disruptor/4.0.0": { 513 590 "jar": "sha256-wrqAhBVBJyvIFbytq5ENLXFqpWPsoVdiRQq0yIlEBQU=", 514 591 "module": "sha256-/ccJZrzS41x5Tc4sF7mZwuZpUOFYUx6Z3BUfsOvCllM=", ··· 567 644 "jar": "sha256-7urpF5FxRKaKdB1MDf9mqlxcX9hVk/8he87T/Iyng7g=", 568 645 "pom": "sha256-1dgfzCiMDYxxHDAgB8raSqmiJu0aES1LqmTLHWMiFws=" 569 646 }, 570 - "commons-io#commons-io/2.15.1": { 571 - "jar": "sha256-pYrxLuG2jP0uuwwnyu8WTwhDgaAOyBpIzCdf1+pU4VQ=", 572 - "pom": "sha256-Fxoa+CtnWetXQLO4gJrKgBE96vEVMDby9ERZAd/T+R0=" 647 + "commons-io#commons-io/2.17.0": { 648 + "jar": "sha256-SqTKSPPf0wt4Igt4gdjLk+rECT7JQ2G2vvqUh5mKVQs=", 649 + "pom": "sha256-SEqTn/9TELjLXGuQKcLc8VXT+TuLjWKF8/VrsroJ/Ek=" 573 650 }, 574 651 "dev/equo/ide#solstice/1.7.5": { 575 652 "jar": "sha256-BuFLxDrMMx2ra16iAfxnNk7RI/mCyF+lEx8IF+1lrk8=", ··· 580 657 "jar": "sha256-DnGR++Mk+5340tIHwHtma43CW7vib1OkxS4v7OYkqXY=", 581 658 "pom": "sha256-+pvmlFd2A+LUy1X0UjctP2wPk+XzjuXNf7Yos3k8qbw=" 582 659 }, 583 - "io/fabric8#kubernetes-client-bom/5.12.4": { 584 - "pom": "sha256-0jI5KonD79yFqymcWpToud01vALzQM6ERv9lmqFZE6A=" 585 - }, 586 - "io/github/goooler/shadow#io.github.goooler.shadow.gradle.plugin/8.1.5": { 587 - "pom": "sha256-jzpPZuyZj2+w/T3lacYy607vycDvmIh0/pq2sF6OZAI=" 588 - }, 589 - "io/github/goooler/shadow#shadow-gradle-plugin/8.1.5": { 590 - "jar": "sha256-p7085GPChFndkIaPyJjNX+wyDD3/U0fw9oiFp72eQtU=", 591 - "module": "sha256-d07ZeQXwUHxpfxeKhAFy/bQ+pJz8L55Je4DAlfN6rtU=", 592 - "pom": "sha256-7Z4JpOOV2pTl7BNx1XynWglhZtS65b9W85cKD+3ttQc=" 593 - }, 594 660 "io/leangen/geantyref#geantyref/1.3.11": { 595 661 "jar": "sha256-wmJ0R0s4RLzbfYPPc6eFNm+EtFO8F6GRz6T4/D4CIjQ=", 596 662 "pom": "sha256-3Etrgt7DQXBSvBc7lC+5asogUIpLmkfp8b2yQAXkPuc=" 597 663 }, 598 - "io/netty#netty-bom/4.1.104.Final": { 599 - "pom": "sha256-WmXgahWdINO0gAYkpXDGRtvucQsrU5s0SaJoVYwonpw=" 664 + "io/netty#netty-buffer/4.2.1.Final": { 665 + "jar": "sha256-Ls6NhBPVqjWh0eD+lPafnp7dj3q7U/bFV6Rzyf0L/I4=", 666 + "pom": "sha256-kI8SXPGXUNqRcRIhTOuon6Rt0iZU3tvAQbmaGN516gg=" 600 667 }, 601 - "io/netty#netty-buffer/4.2.0.Final": { 602 - "jar": "sha256-wBkmAXvg2WcRhFhSomRt5L8AqSVCsC7ZFfW+5Ugi/g0=", 603 - "pom": "sha256-bBjzQVX17TipgvzKvnFjpPtKyIJT+mXMUO2UW5wqihA=" 668 + "io/netty#netty-codec-base/4.2.1.Final": { 669 + "jar": "sha256-wqGnr5kWlCcvdLt9qwEFkEl5DBS0U3YACYJ+EFUw07c=", 670 + "pom": "sha256-HhZaZI/68L/DUEepXastE8xH9MhaO60bpeX/GR9RTfw=" 604 671 }, 605 - "io/netty#netty-codec-base/4.2.0.Final": { 606 - "jar": "sha256-RrVqvXE66yfG9H1zo+SF6iHZbFUFQWJq0PYsoMrhGPQ=", 607 - "pom": "sha256-NiGpDs4IdW0xajveLg3IBxhIc/j/CC92+klZeguCNbU=" 608 - }, 609 - "io/netty#netty-codec-compression/4.2.0.Final": { 610 - "jar": "sha256-tl3evCEZwECx5W+bZkfs3vjc29zSAOkdY63atOsauRw=", 611 - "pom": "sha256-cuWm+0uQbKqiQxZebFNiyuAU4OAIE+11Hb5Y0B3p+eA=" 672 + "io/netty#netty-codec-compression/4.2.1.Final": { 673 + "jar": "sha256-x9UaT2nEv78EP5LRlvYabfQq0pxb0NBT0QcRciClykY=", 674 + "pom": "sha256-PUu9bTVQI2qrQ9FQxrKPBvV0QFpg0K7k7Z43G2nPF8U=" 612 675 }, 613 - "io/netty#netty-codec-haproxy/4.2.0.Final": { 614 - "jar": "sha256-Cyah1KJ7DmzZGp6w21n71bBBmukrZdaSBGbIynWzSFo=", 615 - "pom": "sha256-xlckSFjKcaOrz5xXjNN5eIl23x82aemjlo3U+TCggOg=" 676 + "io/netty#netty-codec-haproxy/4.2.1.Final": { 677 + "jar": "sha256-9tKNDNRcyZhLpihrVZdg9/q9Xc8K0XhwHvDq5SmfRlc=", 678 + "pom": "sha256-1/zgS3ordcAx0e/Fg7kZ7WT8OATQ+fe/cNtN83TIyrQ=" 616 679 }, 617 - "io/netty#netty-codec-http/4.2.0.Final": { 618 - "jar": "sha256-iG0GBiC164CipVNL5wpH/FFsYKvQVVcPDvNMr28dYeI=", 619 - "pom": "sha256-rI0zA731xoXJfFQQEzLGEqbrIc2KYI3mhtjfz1TFoJs=" 680 + "io/netty#netty-codec-http/4.2.1.Final": { 681 + "jar": "sha256-EOgxhiv32rzsz0/YKYnDHdo5qJ7Wac9+lt7glykHdUE=", 682 + "pom": "sha256-IgFVyOpvA50KfkncC8wJEDVCK63RJqtdTHJCcQKlzFo=" 620 683 }, 621 - "io/netty#netty-codec-marshalling/4.2.0.Final": { 622 - "jar": "sha256-vdBfpYoNkN4YJfHLFtUYuYNXGS3TA/f2u1QUFdCSi60=", 623 - "pom": "sha256-7q2vroWVahx6stgVkzy22BudMpyo6O9u1ANne3Dt7hY=" 684 + "io/netty#netty-codec-marshalling/4.2.1.Final": { 685 + "jar": "sha256-SFSZicclpwJXkTKathKhpMvksQ5T9KaxPkTJwMVCh2o=", 686 + "pom": "sha256-Jbo/nNzuOZQJYUr0NYs1SQKnVXqxLSgFTCE2WRom088=" 624 687 }, 625 - "io/netty#netty-codec-protobuf/4.2.0.Final": { 626 - "jar": "sha256-1hkWVKT52MRAv4VqAQxb1RhuwQAMEB03dUNSAESHjmU=", 627 - "pom": "sha256-KUWxLJErMIvF3X7Sdeaol/hsaMuDoi9adJ2HN04NKlo=" 688 + "io/netty#netty-codec-protobuf/4.2.1.Final": { 689 + "jar": "sha256-yQ/7MaBKMoAonacuY6r3oj+XwWmOLMm5a/pkad+C9Zg=", 690 + "pom": "sha256-1THFYFdSdgq6pFwwbPwyv9DdhrUjeVyYCv7qASifEDg=" 628 691 }, 629 - "io/netty#netty-codec/4.2.0.Final": { 630 - "jar": "sha256-fbLwyPRKH7ZoZPPvqG0DqZigfNOB1s0Oh0YR9GSKkM0=", 631 - "pom": "sha256-WhGKGtrJLpPpS63SMdxvMS0k2RkWEOo5O3X+1FDaYd8=" 692 + "io/netty#netty-codec/4.2.1.Final": { 693 + "jar": "sha256-7vbxj3GsXjLcJ6jVJUeRRsWf7DAJnUMaQGYq/329RvE=", 694 + "pom": "sha256-50zpmZRDPP4uWb0c5YR5fpCK1ddv47TZfp5xpzChvGQ=" 632 695 }, 633 - "io/netty#netty-common/4.2.0.Final": { 634 - "jar": "sha256-UjcLbBMfU2tgybHmQ+mptuf/7PeH1dNFOxaJr72JSIY=", 635 - "pom": "sha256-PPsQLAvAFyLCB/prp3iMnGkxbssK7NpZneT/rEw1nnM=" 696 + "io/netty#netty-common/4.2.1.Final": { 697 + "jar": "sha256-fupKlvYazgYzeQY3QVDLc8lPJIiX/aPahltcOKcQvf0=", 698 + "pom": "sha256-LuOladJw8oHrQ6uo6Mb9sgQXtV3D+wffbVPEwM39/Cs=" 636 699 }, 637 - "io/netty#netty-handler/4.2.0.Final": { 638 - "jar": "sha256-ZBJAh4MnA68MxjSeCj442TkkrQj9X6RzB+r5qug5YdA=", 639 - "pom": "sha256-VX4ITPkgVg6ZtVUKb8Vcy74jpTmtCURFdhVsAHmtSa8=" 700 + "io/netty#netty-handler/4.2.1.Final": { 701 + "jar": "sha256-uX0Fet//+4JM5rXZh2v+Hwv86yRQS2ONP2xik8//XcU=", 702 + "pom": "sha256-2eLP4nuNM9r9fSmHXLIaYV17+TD29tRfRP2wVQNn11Q=" 640 703 }, 641 - "io/netty#netty-parent/4.2.0.Final": { 642 - "pom": "sha256-r7Or46M80QKlWTbO40FwE4txcozZWEY78FDKE375qxw=" 704 + "io/netty#netty-parent/4.2.1.Final": { 705 + "pom": "sha256-w5aMzUh1X2OcSI0V9sFBOc76FWGZbEdiBcK+IdZngLQ=" 643 706 }, 644 - "io/netty#netty-resolver/4.2.0.Final": { 645 - "jar": "sha256-ySpDpbHanOEWv3PvuyNkT+acHNM9037ZDcxXnvWt0Sg=", 646 - "pom": "sha256-cGaHuj0B5olAF0hwSJ1Nt6R0Rj6UAv7p6QqySgnccK0=" 707 + "io/netty#netty-resolver/4.2.1.Final": { 708 + "jar": "sha256-+xxanxIwzFWJRKxjPltk0+TsmB2ODVcn1fWBIgCLIY4=", 709 + "pom": "sha256-yHpisHkPKXcurI6z3uY9Dm4ZQY2H57sbTZhK+E7LdQ4=" 647 710 }, 648 - "io/netty#netty-transport-classes-epoll/4.2.0.Final": { 649 - "jar": "sha256-tyKjARA3ByL1AljVtKIZcMKvHO+zgQCAwe+zFhJ8ZCg=", 650 - "pom": "sha256-TiF2aSsdI1maf2xsSAf7tBpHbGClxldxccW9WLxvftk=" 711 + "io/netty#netty-transport-classes-epoll/4.2.1.Final": { 712 + "jar": "sha256-zC+Xr6VoTxmVpfEAazbJuksjPB5oA4xQ5bd7FKuk7qQ=", 713 + "pom": "sha256-xDnVSdFm5hjdHluGEj62ZJmzf9Mo+UleCJh8TsduvS0=" 651 714 }, 652 - "io/netty#netty-transport-classes-io_uring/4.2.0.Final": { 653 - "jar": "sha256-Y1RIRQCPj9/wW4JcUOoiCWJQNMLPZfiFl/dvPKvH2O0=", 654 - "pom": "sha256-tjAC7xoEeJ9zHMIF7voNJM5z4bZ9kX34wxvbSj4xkkM=" 715 + "io/netty#netty-transport-classes-io_uring/4.2.1.Final": { 716 + "jar": "sha256-xt64sgz3ajfiz26QX9Pu5Ph+7WR41O11x3CfQOABkVY=", 717 + "pom": "sha256-pW283sTP9EwK3z21jILuXXTjtwxw+bgvstQljd1+mkk=" 655 718 }, 656 - "io/netty#netty-transport-classes-kqueue/4.2.0.Final": { 657 - "jar": "sha256-4PX/BxGBO+ynWQ9ST9J3oe8WXy7pxRlrq41y10LdbCE=", 658 - "pom": "sha256-KpL37GnxRY82aAnD1M99dRR23CxIuAZxdH0JWPk4sG0=" 719 + "io/netty#netty-transport-classes-kqueue/4.2.1.Final": { 720 + "jar": "sha256-jx1LTHuS7dMdGcF2q2DF4+ceeESBzJXH/FDHRRHTLVY=", 721 + "pom": "sha256-FZfud6TwQxu61IMSkFPYCpJxI9QEZKiMbK8mFfSJ0X0=" 659 722 }, 660 - "io/netty#netty-transport-native-epoll/4.2.0.Final": { 661 - "jar": "sha256-VHWlUTe9NaqZ8iA6nzjqX2N08BS4jfcp7bmZ9KgYo80=", 662 - "pom": "sha256-I0HScHWe5FI3f+gvtxRoHet1Wta4XdPnTrPSMi+HfB0=" 723 + "io/netty#netty-transport-native-epoll/4.2.1.Final": { 724 + "jar": "sha256-r7pS5ooybM9V+fDL5DKL3HdfTQfkmp/bBU7e4zKk1iY=", 725 + "pom": "sha256-jU8ZMnkjUd2dh18wKBgtGO380ot2HRmh/v28vTA53ho=" 663 726 }, 664 - "io/netty#netty-transport-native-epoll/4.2.0.Final/linux-aarch_64": { 665 - "jar": "sha256-o9xKVsE5jbEifUQcr0Ii2xaKXT9449X7tGu6lkmkOLU=" 727 + "io/netty#netty-transport-native-epoll/4.2.1.Final/linux-aarch_64": { 728 + "jar": "sha256-qKVqGCRta5N39nhh3ZnVRJd7eCKPvueD/pK291kebwo=" 666 729 }, 667 - "io/netty#netty-transport-native-epoll/4.2.0.Final/linux-x86_64": { 668 - "jar": "sha256-EQc20zqQ7V3p/HSEpDuopaJ+YRz57Bzl83f6Fu3wk6I=" 730 + "io/netty#netty-transport-native-epoll/4.2.1.Final/linux-x86_64": { 731 + "jar": "sha256-06vTRm3/oo01EC+Ig0a6TO9ZvBVm0AhLX6xf6yrasf0=" 669 732 }, 670 - "io/netty#netty-transport-native-io_uring/4.2.0.Final": { 671 - "jar": "sha256-oTzFZIYRhC4iEavTzG7QwHNqlF2OxgHE3Pa9kkPboGw=", 672 - "pom": "sha256-f45+F28dIA4O6ojEIu8fOPIbh1kmSsTNLsY2oLVCHDk=" 733 + "io/netty#netty-transport-native-io_uring/4.2.1.Final": { 734 + "jar": "sha256-cA85zEIqvjT0pypNb4vXrIN+IPkKaw19bqBioJPaRfQ=", 735 + "pom": "sha256-sIrz9A+m3YDNS7IHuKbDC056QnyqJQXplvELqKmsOcY=" 673 736 }, 674 - "io/netty#netty-transport-native-io_uring/4.2.0.Final/linux-aarch_64": { 675 - "jar": "sha256-YavxiRa4SKO7bAO0UnUyRxVeVb4YNWtdcTtaE0TInvs=" 737 + "io/netty#netty-transport-native-io_uring/4.2.1.Final/linux-aarch_64": { 738 + "jar": "sha256-Sz4XmKmexoj1p0KO0XdT7mi1ODY3RYVQ7KVycgFa27U=" 676 739 }, 677 - "io/netty#netty-transport-native-io_uring/4.2.0.Final/linux-x86_64": { 678 - "jar": "sha256-VjWAqkvFfpxORqWG90gz8LNKLL9M8z6CCIMgqodqtxY=" 740 + "io/netty#netty-transport-native-io_uring/4.2.1.Final/linux-x86_64": { 741 + "jar": "sha256-iWlfPXfnC3GSwonzezLC077qlQRhh0/mrZZTP8m5jXE=" 679 742 }, 680 - "io/netty#netty-transport-native-kqueue/4.2.0.Final": { 681 - "jar": "sha256-izT+uqOG2dFXVzP28oJDgaJcslyFhpUY98VvriN1AJg=", 682 - "pom": "sha256-sVEZGtkMTI/ScxJcB/2Z2nkYxIsW1TJ4EbeXhYd9Fr4=" 743 + "io/netty#netty-transport-native-kqueue/4.2.1.Final": { 744 + "jar": "sha256-yBOQD8hQKKmxDapY57E/gAdIByXWj5LSmIk6IX4TASo=", 745 + "pom": "sha256-2sqgyfd13F0mqip8Paewi5nMw++c/it0XEMJtJZRj00=" 683 746 }, 684 - "io/netty#netty-transport-native-kqueue/4.2.0.Final/osx-aarch_64": { 685 - "jar": "sha256-B7vau9N0Ngx7tGDqF4iaNlvC9q+yKUO6u6/fdv+nSA8=" 747 + "io/netty#netty-transport-native-kqueue/4.2.1.Final/osx-aarch_64": { 748 + "jar": "sha256-M1afocec8CjdrrAwZ2PiyUJx1shUTFkX0Pmc3pLjxKE=" 686 749 }, 687 - "io/netty#netty-transport-native-kqueue/4.2.0.Final/osx-x86_64": { 688 - "jar": "sha256-sCYa4U6hX5dz4ayf8uu3oNlyF9HauW0HWVnFYEVMQw4=" 750 + "io/netty#netty-transport-native-kqueue/4.2.1.Final/osx-x86_64": { 751 + "jar": "sha256-2Kh+nBDNnLxRsiJXq43HmfCywb87V4/gH4phdaxf2g4=" 689 752 }, 690 - "io/netty#netty-transport-native-unix-common/4.2.0.Final": { 691 - "jar": "sha256-7qfwGHxAlNWTQbFQ1K0fxEyWOuZHcn1fM6hkR00g9VI=", 692 - "pom": "sha256-kT7odeA5R97x91lJLS+ZNgKWAfE+6EET/zlCSd4NiSk=" 753 + "io/netty#netty-transport-native-unix-common/4.2.1.Final": { 754 + "jar": "sha256-fyp3RpUMyyJ5CK/j7iG5vPaczFhDe7F8FXmo1XL7OKk=", 755 + "pom": "sha256-XZQGqeIfeIg7nliBQp3VOFQ0bxEEXbs4H49By/LbdYE=" 693 756 }, 694 - "io/netty#netty-transport/4.2.0.Final": { 695 - "jar": "sha256-LAurKGrjmt+MKikn2C5v2WTcGbPtH729TG9OIg8FKP8=", 696 - "pom": "sha256-YNXY8UcYoSxfjYkUPjo2/7tWE72VAJLHyaol4sy+Urc=" 757 + "io/netty#netty-transport/4.2.1.Final": { 758 + "jar": "sha256-up/UVZj6BWBdKlAU1vRxEuQ5K6K5Es0eN4bkhRs5fPc=", 759 + "pom": "sha256-g8ryhVEg1V430/dDgX23gUOezAxMfra7Zv80sEDNjO8=" 697 760 }, 698 761 "it/unimi/dsi#fastutil/8.5.15": { 699 762 "jar": "sha256-z/62ZzvfHm5Dd9aE3y9VrDWc9c9t9hPgXmLe7qUAk2o=", ··· 724 787 "jar": "sha256-Yq4oGH7SsGKBPaap1We/7nM8NBWCaZti3ZgCMHKaAxM=", 725 788 "pom": "sha256-NYRJ1sc1OFhFCN2K5s/eVrr0o0t2e3HZzEZE8PH0IRo=" 726 789 }, 727 - "net/kyori#adventure-api/4.21.0": { 728 - "jar": "sha256-ZKdldgQB541DOofb1M2lcBazA4U8b9Hclwh7WjqmgTM=", 729 - "module": "sha256-+lKIKqUdj68bqml6drFHBnQUmNTKOkGg2MSrkTr6mV8=", 730 - "pom": "sha256-dRFiV0Q3x90YtMgLxL5lBOtRCVVTL6YGhO8xU5LhQCc=" 790 + "net/kyori#adventure-api/4.23.0": { 791 + "jar": "sha256-Ubn89img4yWTTyoyHpdL1tqCMzMmb/CZtK2GJC7cXvQ=", 792 + "module": "sha256-ssVpI4V4Sh8OZm+ETRp3aMFkoIqFDC+SjNxBW/lSLJ0=", 793 + "pom": "sha256-rXHK/j8ZankUdWLS1zFs2Xy4IEzWT1u7tDbaxsd69sk=" 731 794 }, 732 - "net/kyori#adventure-bom/4.21.0": { 733 - "module": "sha256-6oUg3iIrlad0iW1bqJtFbKHQs7+RZbPsyOwvLXZhKPM=", 734 - "pom": "sha256-fpuPxF10yGMnby42w0azTt+R2UJGxGgjRxv4w1hlenQ=" 795 + "net/kyori#adventure-bom/4.23.0": { 796 + "module": "sha256-c9ge6qJeY3eAOKKVCMQKFLwJ6bZWEjaIoUJHc5HDOeo=", 797 + "pom": "sha256-FGu/m1sl8kwUwlpmW76XgKXsCUmgPGttk7c/PfaQ9fM=" 735 798 }, 736 - "net/kyori#adventure-key/4.21.0": { 737 - "jar": "sha256-apOYydQCCJ+doGCla0XK59WMvxmTcabY7Bom2PlMxrs=", 738 - "module": "sha256-aepciDIN/bFf/lUqRKf0G8gBQqu6Kuds6nG3g4uF4Ho=", 739 - "pom": "sha256-BERAvYv/A9TmYDNK3F5V8/bPlLf/ddBzS4DEHjqCgJc=" 799 + "net/kyori#adventure-key/4.23.0": { 800 + "jar": "sha256-gDd4WEpb+PpfF7q5s7YkUO4TEP2SjyAPFoOSmkMMJmQ=", 801 + "module": "sha256-o4U17pVdUtrTEco9rneVLJRybh55ytyr98WMYusqn0U=", 802 + "pom": "sha256-iaYmnO5F3YJsKqD5mSQebjvq79mtSfkyxSZNvNcxewk=" 740 803 }, 741 - "net/kyori#adventure-nbt/4.21.0": { 742 - "jar": "sha256-r27AXxaClKLmiLs8UhGxI70NTXh5HiS7fxE5rZi16zU=", 743 - "module": "sha256-AGs77o7gGbcDYQ2MfBgzRW5OQ7nhEJO5yFF6Ck0M+B0=", 744 - "pom": "sha256-0DAw5LnLm+QZSU42YB/opYAbt0nfH4pY8Xhn4SBwRzE=" 804 + "net/kyori#adventure-nbt/4.23.0": { 805 + "jar": "sha256-2HqbMvVCeqeGOjG7+8q6t36WIExdKKYvf4DWalJtcEY=", 806 + "module": "sha256-cdaqmcJYMWM5RELtBF4FrGyY3KvHEtMi5KBpBbdKOTY=", 807 + "pom": "sha256-lKa0XCvcLlfTGwOL2sLeaV8qRp4TlpDLskiFuG4vOM4=" 745 808 }, 746 809 "net/kyori#adventure-platform-api/4.3.4": { 747 810 "jar": "sha256-7GBGKMK3wWXqdMH8s6LQ8DNZwsd6FJYOOgvC43lnCsI=", ··· 753 816 "module": "sha256-VYXzbUzK6MaYbW4tmAjZs5ywl28CLK8sANPP5v1HTQQ=", 754 817 "pom": "sha256-wP6w6syf5B8iL5iXsS4lrDw0Ub3VYWwUhclppgBO2eE=" 755 818 }, 756 - "net/kyori#adventure-text-logger-slf4j/4.21.0": { 757 - "jar": "sha256-RyStz+/740AsjoMhhGkGArN0uxZuvRfm7ACMRFxTeTU=", 758 - "module": "sha256-5WCx5qig2rD9wE+mseKirWZ3EkMJiyolz7A76DFNxtU=", 759 - "pom": "sha256-7V/qFBbC6VjJcntV4fEaRoDmyM52WLE8FVt7UrEKPso=" 819 + "net/kyori#adventure-text-logger-slf4j/4.23.0": { 820 + "jar": "sha256-e41RpiLFfZgt64llKz4tbukSj2V82lSRKtkmaL2r42Q=", 821 + "module": "sha256-/xZGn2LzFSLEpmN50bXR0/vJfGKBNd1fpVG3Nkck8Eo=", 822 + "pom": "sha256-zSk39q2IjiVO5SB9RWW2jmd2XErDNHAezauWoWQjC2s=" 760 823 }, 761 - "net/kyori#adventure-text-minimessage/4.21.0": { 762 - "jar": "sha256-UctIeIUbcmM76h0bWyTo3jRhS8koroodupa2OOmk6MQ=", 763 - "module": "sha256-c/i/PZOmL76h8kLHmSq0qLNhuml92HWZCku22tY3qCs=", 764 - "pom": "sha256-zwtZrXXi99pqoHZ0wlrwAKD4UNXmceXSs8aKgtTeVxA=" 824 + "net/kyori#adventure-text-minimessage/4.23.0": { 825 + "jar": "sha256-Vu0nZroiOLQBuuqWDTquRftY/aFhTalo/iuR/bnDgTw=", 826 + "module": "sha256-H19hklBkEB3mY1LP0Qq43fWu/2RyVZt7KL1wERxaf2c=", 827 + "pom": "sha256-fxTmmBxHbcYjPE5oGCZWIP4vV0uxfdj3UzKd8J8Cd2Q=" 765 828 }, 766 - "net/kyori#adventure-text-serializer-ansi/4.21.0": { 767 - "jar": "sha256-LwrIh56+RgbvZhviUgAzqVEo6TDK0wr1vAxpy1kSmcU=", 768 - "module": "sha256-V+Qm8xoIWTqA1aZvxnr/Y1y9Cqh8x8RWicmTpqoGwU0=", 769 - "pom": "sha256-+cXbfm4x6DLrME+ZtgqP8AbTZ39XZOSqH1muT0KgDUU=" 829 + "net/kyori#adventure-text-serializer-ansi/4.23.0": { 830 + "jar": "sha256-rF6iq0xE0wLnlkag9NRfSsmESi6sBpDoCnPc/SOy5Vw=", 831 + "module": "sha256-/65qUt91zjFf3gi4HVKZ9JfEyfxcbGw3cCcfOMR2NQA=", 832 + "pom": "sha256-9zq7B/otQpS9CaSm9Gpbu/WzbcUNpx/zPOPFuBlesKU=" 770 833 }, 771 - "net/kyori#adventure-text-serializer-commons/4.21.0": { 772 - "jar": "sha256-LusmYFxyOlfltj0kwt1kGCFToUhsqOnzC8ukLSB/LCo=", 773 - "module": "sha256-2SyvdO7dl496C1Q9dH4bNGD2+incUK9KAJEXKyyYJqM=", 774 - "pom": "sha256-iSySW39EOPgDnk93KciCbI84LICMDDTIhoOtNqEN3PI=" 834 + "net/kyori#adventure-text-serializer-commons/4.23.0": { 835 + "jar": "sha256-7ol3hRw6RFAN4rCOuqvVOX7Anzs2foblMInROHty+p0=", 836 + "module": "sha256-YjLHYBQobnByp5HHWVWahxFizy18z81tDqGE3juXwgY=", 837 + "pom": "sha256-ZyydJyIj/+Q6qskmSMNidr3yFBPKIG1Z0dOfAAjGEg0=" 775 838 }, 776 - "net/kyori#adventure-text-serializer-gson/4.21.0": { 777 - "jar": "sha256-ObUc+poE324dL0MdJqaX7WGWI2ls3rHAChr9NHxc4IQ=", 778 - "module": "sha256-xSvs+73VcbpmWXy7iHfbGxeBYfCNA44zYIv9P54aD28=", 779 - "pom": "sha256-aEx9Da6SK8h5u+4lweWm/L6vCdnbDhijb9IuUZlqWsM=" 839 + "net/kyori#adventure-text-serializer-gson/4.23.0": { 840 + "jar": "sha256-PiaD2i0UAwMjzJZFu6TNhtfLq/zkK9Fi7C2lDF59Yig=", 841 + "module": "sha256-bX0ip7YdYnZqtPATdojSzM3ensdkP6OTzOlswwyX9vw=", 842 + "pom": "sha256-bD3I0ry/SXG30bxzV8i+Xg5w4EqKhEt8RPQdada4XWo=" 780 843 }, 781 - "net/kyori#adventure-text-serializer-json-legacy-impl/4.21.0": { 782 - "jar": "sha256-zMCsXIBSo1C/yrpnyk03xyFL5aH42Syq44wcrWz4v1U=", 783 - "module": "sha256-b4OuzShhdN3x79WpDiGuHB2uI3dxU71gx5C0BM8mgAQ=", 784 - "pom": "sha256-ix6svUQKhS+N0V5SekEvDIU+uAaJc72krT+6K+Eq/QQ=" 844 + "net/kyori#adventure-text-serializer-json-legacy-impl/4.23.0": { 845 + "jar": "sha256-ovBQ7uMdiedww3bnPZoxt/b8QaORU0QTyUvksIF4vuQ=", 846 + "module": "sha256-5Zqpg2TubngVdr3o0r6KLAd9quhvOqXKmUjAbW8s+XM=", 847 + "pom": "sha256-iPCayPZoGa4ib7nDqSt2ZzrG4m9VMH+adhOVhraDO40=" 785 848 }, 786 - "net/kyori#adventure-text-serializer-json/4.21.0": { 787 - "jar": "sha256-kocXstx2RathZhfAvVXoCpwDWHYrWQoNPAu+MCsuVIE=", 788 - "module": "sha256-wTimiDaAyLv+TCvGCGU/AKxhu/QGqbXYHSityPXo3Q0=", 789 - "pom": "sha256-XAMhaDcf2h9er2XKH0YsCV/ci8qGlyxL15T9CsaVLtg=" 849 + "net/kyori#adventure-text-serializer-json/4.23.0": { 850 + "jar": "sha256-/CvHvwb8Cv5wbWJ493GDcqRoTSGhblLk1iJldxUomE8=", 851 + "module": "sha256-KNC8Tk4rwY5zi1eBI+hXFug0GOlabO+KMeCPiVvw1MQ=", 852 + "pom": "sha256-9b8uVtQSdYvaYyQEpwh2LILTQDI8zz1AEkHGdz1oeqw=" 790 853 }, 791 - "net/kyori#adventure-text-serializer-legacy/4.21.0": { 792 - "jar": "sha256-msG5n4KEWOGQCPZ1eBoOjIUXzfoiofxbuHp79pVUw1w=", 793 - "module": "sha256-mJvCjUI2jqtsZERpc3oocvgf+BTCp+wWGwUqHRgkQQg=", 794 - "pom": "sha256-KpOkDYdQEqmRPf4z6W5LXIUlRwDqVDSndkjHNLDFAhk=" 854 + "net/kyori#adventure-text-serializer-legacy/4.23.0": { 855 + "jar": "sha256-1SgOt1vypertB5eXGmzJAtxrjLtv6sJwEcyGJGEIIJ0=", 856 + "module": "sha256-ci7v3AmzXyiOb6kKZ/CviLiS+ySDGUNqbg0QAxo4ADU=", 857 + "pom": "sha256-9jjCmc72C3tNLOpg7vXYMntHW5d2HxxNq5VOHUWXUik=" 795 858 }, 796 - "net/kyori#adventure-text-serializer-plain/4.21.0": { 797 - "jar": "sha256-Ep1piIu5P+lvUS8eWBodNvAog2G4Xo7IBP1u7LzvMS4=", 798 - "module": "sha256-qtwvfOI85wiFn3c/Bti6y6r1fWsGfG1vtSwx40gCrt4=", 799 - "pom": "sha256-kqv+DaajY+E0gwjXNMuwTfyZkzjKq5zqVV4/JN9WLD0=" 859 + "net/kyori#adventure-text-serializer-plain/4.23.0": { 860 + "jar": "sha256-wuHYBMob54Q09K1r29U8yXoROtkpXLTJNs87nZAsWR4=", 861 + "module": "sha256-OwEWAKJgf8zpq1+u7fWcvNQkgUmlMlXXfHZJJmO+IxM=", 862 + "pom": "sha256-qVKWXEA9cuZKvM5m+BgxxE7dgimWU/sqlhbwzWfgAQI=" 800 863 }, 801 864 "net/kyori#ansi/1.1.1": { 802 865 "jar": "sha256-tsVp4aCSW57rNJ4S2zXiI3VWEH4zNmV+Cy694mHYr9c=", ··· 812 875 "jar": "sha256-fQH8JaS7OvDhZiaFRV9FQfv0YmIW6lhG5FXBSR4Va4w=", 813 876 "module": "sha256-qfpHivwqQ0b4pb4JH14UZmhgGS3YZbHj2FkilmRsdP4=", 814 877 "pom": "sha256-XuAEEIIvNukBnZR2LOAbzWA5VpdlNRvvBmCUXNT5pW4=" 878 + }, 879 + "net/kyori#mammoth/1.4.0": { 880 + "jar": "sha256-sEq7lrZm92PS10Z7AwjyP+jYt1P4rYkUOBTLXqmQHrM=", 881 + "module": "sha256-wgR2ao8Uzk4aEkpTAqmDkQH82hGN4qumt2zGKGUmSq4=", 882 + "pom": "sha256-uKJc0TFMWmsbn7lUg/132CUjKF/vpwW9dL+Ta65yRCE=" 815 883 }, 816 884 "net/kyori#option/1.1.0": { 817 885 "jar": "sha256-l7abSxff4CIXyRMa00JWTLya69BMdetoljm194/UsRw=", ··· 856 924 "org/apache#apache/33": { 857 925 "pom": "sha256-14vYUkxfg4ChkKZSVoZimpXf5RLfIRETg6bYwJI6RBU=" 858 926 }, 859 - "org/apache/ant#ant-launcher/1.10.14": { 860 - "jar": "sha256-8JCXJaeiTjk4iPP7tVg0er9QbOL368WB/yYzG5TZUaU=", 861 - "pom": "sha256-nJ2qQSPp63BzVnk2UsOIo1UQqqWm0UW0T4VdCN1LK7w=" 927 + "org/apache/ant#ant-launcher/1.10.15": { 928 + "jar": "sha256-XIVRmQMHoDIzbZjdrtVJo5ponwfU1Ma5UGAb8is9ahs=", 929 + "pom": "sha256-ea+EKil53F/gAivAc8SYgQ7q2DvGKD7t803E3+MNrJU=" 862 930 }, 863 - "org/apache/ant#ant-parent/1.10.14": { 864 - "pom": "sha256-CBYQamBniMJw767yFWLPy9j0uvfafBG85RSetWYbMx8=" 931 + "org/apache/ant#ant-parent/1.10.15": { 932 + "pom": "sha256-SYhPGHPFEHzCN/QoXER3R5uwgEvwc3OUgBsI114rvrA=" 865 933 }, 866 - "org/apache/ant#ant/1.10.14": { 867 - "jar": "sha256-TLvZJD3kwQQtYdmhXbTEPJD/k7FteLOUgdoclWyOlnE=", 868 - "pom": "sha256-L6QmnmscRXI6iojmnZhKdm27IEzQ/pgUlMzfP+469lw=" 934 + "org/apache/ant#ant/1.10.15": { 935 + "jar": "sha256-djrNpKaViMnqiBepUoUf8ML8S/+h0IHCVl3EB/KdV5Q=", 936 + "pom": "sha256-R4DmHoeBbu4fIdGE7Jl7Zfk9tfS5BCwXitsp4j50JdY=" 869 937 }, 870 938 "org/apache/commons#commons-parent/39": { 871 939 "pom": "sha256-h80n4aAqXD622FBZzphpa7G0TCuLZQ8FZ8ht9g+mHac=" ··· 879 947 "org/apache/commons#commons-parent/58": { 880 948 "pom": "sha256-LUsS4YiZBjq9fHUni1+pejcp2Ah4zuy2pA2UbpwNVZA=" 881 949 }, 882 - "org/apache/commons#commons-parent/65": { 883 - "pom": "sha256-bPNJX8LmrJE6K38uA/tZCPs/Ip+wbTNY3EVnjVrz424=" 950 + "org/apache/commons#commons-parent/74": { 951 + "pom": "sha256-gOthsMh/3YJqBpMTsotnLaPxiFgy2kR7Uebophl+fss=" 884 952 }, 885 953 "org/apache/groovy#groovy-bom/4.0.22": { 886 954 "module": "sha256-Ul0/SGvArfFvN+YAL9RlqygCpb2l9MZWf778copo5mY=", ··· 907 975 "jar": "sha256-8r8vLHdyFpyeMGmXGWZ60w+bRsTp14QZB96y0S2ZI/4=", 908 976 "pom": "sha256-f8K4BFgJ8/J6ydTZ6ZudNGIbY3HPk8cxPs2Epa8Om64=" 909 977 }, 910 - "org/apache/logging#logging-parent/10.5.0": { 911 - "pom": "sha256-ngk5zAKXfp/1KOdmBj4PMiTTbok7pMkh8JINtI86xqk=" 912 - }, 913 978 "org/apache/logging#logging-parent/11.3.0": { 914 979 "pom": "sha256-pcmFtW/hxYQzOTtQkabznlufeFGN2PySE0aQWZtk19A=" 915 980 }, 916 - "org/apache/logging/log4j#log4j-api/2.22.1": { 917 - "jar": "sha256-XXvq5/8V2FFtZRcSHX8Sp5pqwYDfZLX87FXVviEFblM=", 918 - "pom": "sha256-bVdUd3E5Sz7hj57T7/ohWXGeLzY0Ynhj0FAjup/Y4Ys=" 919 - }, 920 981 "org/apache/logging/log4j#log4j-api/2.24.1": { 921 982 "jar": "sha256-bne7Ip/I3K8JA4vutekDCyLp4BtRtFiwGDzmaevMku8=", 922 983 "pom": "sha256-IzAaISnUEAiZJfSvQa7LUlhKPcxFJoI+EyNOyst+c+M=" 923 984 }, 924 - "org/apache/logging/log4j#log4j-bom/2.22.1": { 925 - "pom": "sha256-nxUjceNriy6m6yyb0YgnYAafNhgKbygXfmpIwoFMDyM=" 985 + "org/apache/logging/log4j#log4j-api/2.24.3": { 986 + "jar": "sha256-W0oKDNDnUd7UMcFiRCvb3VMyjR+Lsrrl/Bu+7g9m2A8=", 987 + "pom": "sha256-vAXeM1M6Elmtusv8yCbNZjdqLZxO5T+4NgCfRKRbgjk=" 926 988 }, 927 989 "org/apache/logging/log4j#log4j-bom/2.24.1": { 928 990 "pom": "sha256-vGPPsrS5bbS9cwyWLoJPtpKMuEkCwUFuR3q1y3KwsNM=" 929 991 }, 930 - "org/apache/logging/log4j#log4j-core/2.22.1": { 931 - "jar": "sha256-RtzOysVWYj2OLOhkhJaCSoKVHROQYqTmEUiv8aJe0Y0=", 932 - "pom": "sha256-HPf2SP7UPwv6wzKNk/yCPHSZB4/XkE4YtlSbsQeKnFI=" 992 + "org/apache/logging/log4j#log4j-bom/2.24.3": { 993 + "pom": "sha256-sXq38yj0WGt+cfjJT8NaXaK86AcFpdYwBAIsGSiDNVg=" 933 994 }, 934 995 "org/apache/logging/log4j#log4j-core/2.24.1": { 935 996 "jar": "sha256-ALzziEcsqApocBQYF2O2bXdxd/Isu/F5/WDhsaybybA=", 936 997 "pom": "sha256-JyQstBek3xl47t/GlYtFyJgg+WzH9NFtH0gr/CN24M0=" 937 998 }, 938 - "org/apache/logging/log4j#log4j-iostreams/2.24.1": { 939 - "jar": "sha256-oPXv2zMWaqrvEs1U+bXKlA1/oXV113BVD4KPMnAu+H4=", 940 - "pom": "sha256-trWodrJTUpAmlQNSQxFnfefgkum9GfwgKWsKOYHD918=" 999 + "org/apache/logging/log4j#log4j-core/2.24.3": { 1000 + "jar": "sha256-frQIRZauJb08YWmOSOjQq2WpJgdYiE7Vy7nG5VxEpWo=", 1001 + "pom": "sha256-v9XAxKrGECQsy2H/ABCK1zeA2iCi9ym+Bjg2qXZXf1c=" 941 1002 }, 942 - "org/apache/logging/log4j#log4j-jul/2.24.1": { 943 - "jar": "sha256-7Rj4dHi+aaLXYKKJVmdkX/LAvry2xJQGeaSfRYi44FE=", 944 - "pom": "sha256-mwbQSbyXT+bSXCcutp94QhoQeW6A6PnDl8lxtjFXjRw=" 1003 + "org/apache/logging/log4j#log4j-iostreams/2.24.3": { 1004 + "jar": "sha256-Vv6AD/RhVeY2DfFxUOhpud49NUltsu/2QRWp0NvDGG8=", 1005 + "pom": "sha256-EcMCVtRz/apOYTuUqYoeVsLGAhYY2TK/Iqujeb4w4Co=" 945 1006 }, 946 - "org/apache/logging/log4j#log4j-slf4j2-impl/2.24.1": { 947 - "jar": "sha256-ZEtuPwxA5WmeoMoBOESxOK9EBWHSciZnLoC3qh/fwVY=", 948 - "pom": "sha256-dip5v73nPP9Pmc6Gy2ar3w4S9c+K/5eefTe2XVVzb8Q=" 1007 + "org/apache/logging/log4j#log4j-jul/2.24.3": { 1008 + "jar": "sha256-52uSXNbnCoI2SoBZ4G2zAxK3Ron/RlAQSnVbr/k3ENU=", 1009 + "pom": "sha256-c2tbLEv0UUuqrO+h27sGUF+gigliEHMv7roDMvY8sic=" 949 1010 }, 950 - "org/apache/logging/log4j#log4j/2.22.1": { 951 - "pom": "sha256-7Zibb7CaJW69TP3MIZaIuhw9beS087UUVC0WVj3CkJc=" 1011 + "org/apache/logging/log4j#log4j-slf4j2-impl/2.24.3": { 1012 + "jar": "sha256-zarCLkDsMMQJbh6+jEVMiCbA0cN419tdezrRZjVLC9M=", 1013 + "pom": "sha256-fMloVddd24RWLjUHM0kF0NNTDECttyCAGTmIHgk3OKM=" 952 1014 }, 953 1015 "org/apache/logging/log4j#log4j/2.24.1": { 954 1016 "pom": "sha256-+NcAm1Rl2KhT0QuEG8Bve3JnXwza71OoDprNFDMkfto=" 1017 + }, 1018 + "org/apache/logging/log4j#log4j/2.24.3": { 1019 + "pom": "sha256-wUG0hj/AzqtYOJShPh+eUsAfwtdYcn1nR/a5nVBA87E=" 955 1020 }, 956 1021 "org/apache/maven#maven-api-meta/4.0.0-alpha-9": { 957 1022 "jar": "sha256-MsT1yturaAw0lS+ctXBFehODzOxMmlewOSYH1xkcaUk=", ··· 1013 1078 "org/codehaus#codehaus-parent/4": { 1014 1079 "pom": "sha256-a4cjfejC4XQM+AYnx/POPhXeGTC7JQxVoeypT6PgFN8=" 1015 1080 }, 1016 - "org/codehaus/groovy#groovy-bom/3.0.19": { 1017 - "pom": "sha256-E+POc+1L+fxu4rVA2FVWh/astwf4SSOUFMgnfUMd7KE=" 1018 - }, 1019 1081 "org/codehaus/mojo#animal-sniffer-annotations/1.14": { 1020 1082 "jar": "sha256-IGgyC9a610TDZzqwSPZ+ML749RiZb6OAAzVWYAZpkF0=", 1021 1083 "pom": "sha256-GHnxmgWZHj7ZWRC5ZokzM5awxGeiFdxNH5ABhAS3KiY=" ··· 1036 1098 "org/codehaus/mojo#mojo-parent/40": { 1037 1099 "pom": "sha256-/GSNzcQE+L9m4Fg5FOz5gBdmGCASJ76hFProUEPLdV4=" 1038 1100 }, 1039 - "org/codehaus/plexus#plexus-utils/4.0.0": { 1040 - "jar": "sha256-JwzXA7SMblyMaR8YdfItYtIs/gcsc64vWBTYPWjB2gs=", 1041 - "pom": "sha256-pExUeUJt6g57//0uw630nGhRUBl4iWXE0jH8PwTaQSk=" 1101 + "org/codehaus/plexus#plexus-utils/4.0.2": { 1102 + "jar": "sha256-iVcnTnX+LCeLFCjdFqDa7uHdOBUstu/4Fhd6wo/Mtpc=", 1103 + "pom": "sha256-UVHBO918w6VWlYOn9CZzkvAT/9MRXquNtfht5CCjZq8=" 1042 1104 }, 1043 - "org/codehaus/plexus#plexus-xml/4.0.3": { 1044 - "jar": "sha256-eqWeb9aTuGF8hydq7KnnoUmhC9qWB4iJO5TYpUcDc/c=", 1045 - "pom": "sha256-JzxQW2WJJwZxENYbbo/hL8tzcPVZgMk7r+lc4Lgt0FY=" 1046 - }, 1047 - "org/codehaus/plexus#plexus/13": { 1048 - "pom": "sha256-V1lF3AiWbGbrA9W66RNb0iyjkgoYZbuZ0+zZO+9Vq9M=" 1105 + "org/codehaus/plexus#plexus-xml/4.0.4": { 1106 + "jar": "sha256-Bp54tTcQjcYSSmcHP8mYJkeR9rZJnpVaOOcrs+T+Gt8=", 1107 + "pom": "sha256-Ohb3yn7CRzFFtGHgpylREI1H4SThjIRMCFsaY3jGEVE=" 1049 1108 }, 1050 - "org/codehaus/plexus#plexus/16": { 1051 - "pom": "sha256-aNTu1lo9u8NC7YDdE4++nGfLf7TCq8T1IBzbW59kWGg=" 1109 + "org/codehaus/plexus#plexus/18": { 1110 + "pom": "sha256-tD7onIiQueW8SNB5/LTETwgrUTklM1bcRVgGozw92P0=" 1052 1111 }, 1053 1112 "org/codehaus/woodstox#stax2-api/4.2.1": { 1054 1113 "jar": "sha256-Z4Vn5ItRpCxlxpnyZlOa09Z21LGlsK19iezoudV3JXk=", ··· 1060 1119 "org/eclipse/ee4j#project/1.0.7": { 1061 1120 "pom": "sha256-IFwDmkLLrjVW776wSkg+s6PPlVC9db+EJg3I8oIY8QU=" 1062 1121 }, 1063 - "org/eclipse/jetty#jetty-bom/9.4.53.v20231009": { 1064 - "pom": "sha256-+vlzoZh0JmzQhlsCmeup8WfLsHB13U/tvj1hVjV+ndU=" 1122 + "org/eclipse/jgit#org.eclipse.jgit-parent/5.13.0.202109080827-r": { 1123 + "pom": "sha256-oY/X0MQf2o2PHEoktQAKhmRWFHokdG7mzEcx54ihje4=" 1065 1124 }, 1066 1125 "org/eclipse/jgit#org.eclipse.jgit-parent/6.7.0.202309050840-r": { 1067 1126 "pom": "sha256-u56FQW2Y0HMfx2f41w6EaAQWAdZnKuItsqx5n3qjkR8=" 1068 1127 }, 1128 + "org/eclipse/jgit#org.eclipse.jgit/5.13.0.202109080827-r": { 1129 + "jar": "sha256-2r+DafDN+M8Xt/faS9qTIMVwu3VMiOC+t7hSgSz1zSU=", 1130 + "pom": "sha256-qEF3Rc+i2V1qlxHpQT/KmE/FZmt2J7rRVAzyfUYq6BM=" 1131 + }, 1069 1132 "org/eclipse/jgit#org.eclipse.jgit/6.7.0.202309050840-r": { 1070 1133 "jar": "sha256-tWRHfQkiQaqrUMhKxd0aw3XAGCBE1+VlnTpgqQ4ugBo=", 1071 1134 "pom": "sha256-BNB83b8ZjfpuRIuan7lA94HAEq2T2eqCBv4KTTplwZI=" ··· 1077 1140 "org/fusesource#fusesource-pom/1.12": { 1078 1141 "pom": "sha256-xA2WDarc73sBwbHGZXr7rE//teUxaPj8sLKLhOb9zKE=" 1079 1142 }, 1080 - "org/fusesource/jansi#jansi/2.4.1": { 1081 - "jar": "sha256-Ll53Wp3Fj/prvWqm8JnWL4ti3N60w8O7vlzyMBvC3ME=", 1082 - "pom": "sha256-P5jZeaTTVZ+HefuwBLNK51Fq+t9RDhHffMPNBz6xuzs=" 1143 + "org/fusesource/jansi#jansi/2.4.2": { 1144 + "jar": "sha256-C3uLADqQ6kkVebYvURiCjkURKRTGVYmwD6pJ1ux4WDk=", 1145 + "pom": "sha256-Lory+B0MmVUIvWfJid4ewhbrakdgk/WY9CFOz2ESjfA=" 1083 1146 }, 1084 1147 "org/javassist#javassist/3.28.0-GA": { 1085 1148 "jar": "sha256-V9Cp6ShvgvTqqFESUYaZf4Eb784OIGD/ChWnf1qd2ac=", ··· 1212 1275 "module": "sha256-DZTIpBSD58Jwfr1pPhsTV6hBUpmM6FVQ67xUykMho6c=", 1213 1276 "pom": "sha256-Cdlg+FkikDwuUuEmsX6fpQILQlxGnsYZRLPAGDVUciQ=" 1214 1277 }, 1215 - "org/jline#jline-native/3.27.1": { 1216 - "jar": "sha256-Y2ZG2kBBPnSWOz9LQMnF3PtC89Ds8bk9bd9ciV7/5CI=", 1217 - "pom": "sha256-n/4orsyfVG7JaV8tUh9nRZtLNpFxSMCNFvRVazg9Mo8=" 1278 + "org/jline#jline-native/3.30.2": { 1279 + "jar": "sha256-b6b1DhFWEJNMs/1CO0Mab9+QAGUunHg0+0gTMSnkUTM=", 1280 + "pom": "sha256-Nf+jS0HVcYVpXIW6KxEjx/+tOCf4HVNSlq2oolecl0E=" 1218 1281 }, 1219 1282 "org/jline#jline-parent/3.20.0": { 1220 1283 "pom": "sha256-cXjGACAsS8Jux6S2IlXu829wVsrSpeYjnFdL7qXCEMo=" 1221 1284 }, 1222 - "org/jline#jline-parent/3.27.1": { 1223 - "pom": "sha256-6WT9B2wgziTdtI3XN6CNYFA0cAXj5u7IL/XrBD1WFYE=" 1224 - }, 1225 1285 "org/jline#jline-reader/3.20.0": { 1226 1286 "jar": "sha256-rNHJTR4iiqe3li9psh7Tqf2CjrOmPkuvkIaVTmJq8fA=", 1227 1287 "pom": "sha256-2fF+3XIcAqExcgN21sB4eHgutrb6/rX/QkBKtXFD4TY=" 1228 1288 }, 1229 - "org/jline#jline-terminal-jansi/3.27.1": { 1230 - "jar": "sha256-mWvM6OpUHXH3Du3/+dEHpIJ39lVzReIdHzDGDmZIRnQ=", 1231 - "pom": "sha256-XWrgbTzxQG2C+kk2K8yZxImpu4l3c9baUiJnTT+K/+g=" 1289 + "org/jline#jline-terminal-jansi/3.30.2": { 1290 + "jar": "sha256-AXOC7/q4HAn4O0Ecic4gPzLQWR2t4KjYygUTmqThtDI=", 1291 + "pom": "sha256-cb0W3CMPlL82lQ4md+JKSF0kv59UoWCyfx/SkqqeaB4=" 1232 1292 }, 1233 1293 "org/jline#jline-terminal/3.20.0": { 1234 1294 "jar": "sha256-EhJRcOeVUZum3IAQwHC1PHaq6StIXB43Uw5Uq13QjUM=", 1235 1295 "pom": "sha256-EMo7z1F48YUH8hCmOtljeJaFM0OtHBKRoBmhFvIWpUg=" 1236 1296 }, 1237 - "org/jline#jline-terminal/3.27.1": { 1238 - "jar": "sha256-Qre3VlBrypi1BZOEJqNcmQgveBnDM+0lvUEUv7DjtfI=", 1239 - "pom": "sha256-hHjnmqIupq95eWRD+O0w//pdxkfrPS0YYLrC4j800pc=" 1297 + "org/jline#jline-terminal/3.30.2": { 1298 + "jar": "sha256-HqoUwqI6kVMxzNTqp11iTCN/sMoNI6UHgQt/kYFhCgw=", 1299 + "pom": "sha256-RGzvv38zbLWZGzML8w9v5NP6g0OGLGp8MjCl33sePvc=" 1240 1300 }, 1241 1301 "org/jspecify#jspecify/0.3.0": { 1242 1302 "module": "sha256-M7jCLyQkwpAyQaf+olj8QasMTWiJd2V2xRkEdWLuQ6U=", ··· 1259 1319 "module": "sha256-qnlAydaDEuOdiaZShaqa9F8U2PQ02FDujZPbalbRZ7s=", 1260 1320 "pom": "sha256-EJN9RMQlmEy4c5Il00cS4aMUVkHKk6w/fvGG+iX2urw=" 1261 1321 }, 1322 + "org/junit#junit-bom/5.11.0": { 1323 + "module": "sha256-9+2+Z/IgQnCMQQq8VHQI5cR29An1ViNqEXkiEnSi7S0=", 1324 + "pom": "sha256-5nRZ1IgkJKxjdPQNscj0ouiJRrNAugcsgL6TKivkZE0=" 1325 + }, 1262 1326 "org/junit#junit-bom/5.9.1": { 1263 1327 "module": "sha256-kCbBZWaQ+hRa117Og2dCEaoSrYkwqRsQfC9c3s4vGxw=", 1264 1328 "pom": "sha256-sWPBz8j8H9WLRXoA1YbATEbphtdZBOnKVMA6l9ZbSWw=" ··· 1297 1361 "module": "sha256-4dG63P7cJyRFQeC+XV6EtyoicNevYWhrJvEc/Edw2kI=", 1298 1362 "pom": "sha256-EqqGyhwNZIoiXU58aWBUwfx26IeCxcOft983muI7728=" 1299 1363 }, 1364 + "org/junit/platform#junit-platform-launcher/1.10.2": { 1365 + "jar": "sha256-rtT0L7kK2ps0fCMfE2VvwJEhuiDattxkamvZ1Nox5Ko=", 1366 + "module": "sha256-/1YhIQJQJSv9rbYiu+LqZuzsMahnc2zqSz1K3yGcp/8=", 1367 + "pom": "sha256-WjEXCOeQa7l0YpwayHC8EWV0ZbmJ2koHfkVBa9mHJeQ=" 1368 + }, 1300 1369 "org/lanternpowered#lmbda/2.0.0": { 1301 1370 "jar": "sha256-v7mL90YQgkvVbhDYJSM6Zg66M7qRXPlHJGJX9QPadfM=", 1302 1371 "pom": "sha256-KRybm3znFPdLpG0zsmSEpYS+NPXHXGyTDsIF8iGbVfg=" ··· 1326 1395 "org/ow2#ow2/1.5.1": { 1327 1396 "pom": "sha256-Mh3bt+5v5PU96mtM1tt0FU1r+kI5HB92OzYbn0hazwU=" 1328 1397 }, 1329 - "org/ow2/asm#asm-commons/9.6": { 1330 - "jar": "sha256-eu/Q1cCQFwHGn3UT/tp2X7a+M68s56oXxXgfyHZXxRE=", 1331 - "pom": "sha256-qYrkiVM0uvj/hr1mUWIQ29mgPxpuFeR92oKvz2tT13w=" 1398 + "org/ow2/asm#asm-commons/9.7.1": { 1399 + "jar": "sha256-mlebVNKSrZvhcdQxP9RznGNVksK1rDpFm70QSc3exqA=", 1400 + "pom": "sha256-C/HTHaDJ+djtwvJ9u/279z8acVtyzS+ijz8ZWZTXStE=" 1332 1401 }, 1333 - "org/ow2/asm#asm-tree/9.6": { 1334 - "jar": "sha256-xD7PF7U5x3fhXae1uGVTs3fi05poPeYoVWfVKDiI5+8=", 1335 - "pom": "sha256-G8tIHX/Ba5VbtgygfIz6JCS87ni9xAW7oxx9b13C0RM=" 1336 - }, 1337 - "org/ow2/asm#asm/9.6": { 1338 - "jar": "sha256-PG+sJCTbPUqFO2afTj0dnDxVIjXhmjGWc/iHCDwjA6E=", 1339 - "pom": "sha256-ku7iS8PIQ+SIHUbB3WUFRx7jFC+s+0ZrQoz+paVsa2A=" 1402 + "org/ow2/asm#asm-tree/9.7.1": { 1403 + "jar": "sha256-mSmIH1nra4QOhtVFcMd7Wc5yHRBObf16QJeJkcLTtB8=", 1404 + "pom": "sha256-E7kF9l5/1DynZ09Azao3Z5ukhYxsnZ+48Xp6/ZuqvJ4=" 1340 1405 }, 1341 1406 "org/ow2/asm#asm/9.7.1": { 1342 1407 "jar": "sha256-jK3UOsXrbQneBfrsyji5F6BAu5E5x+3rTMgcdAtxMoE=", 1343 1408 "pom": "sha256-cimwOzCnPukQCActnkVppR2FR/roxQ9SeEGu9MGwuqg=" 1344 1409 }, 1410 + "org/ow2/asm#asm/9.8": { 1411 + "jar": "sha256-h26raoPa7K1cpn65/KuwY8l7WuuM8fynqYns3hdSIFE=", 1412 + "pom": "sha256-wTZ8O7OD12Gef3l+ON91E4hfLu8ErntZCPaCImV7W6o=" 1413 + }, 1345 1414 "org/reflections#reflections/0.10.2": { 1346 1415 "jar": "sha256-k4otCP5UBQ12ELlE2N3DoJNVcQ2ea+CqyDjbwE6aKCU=", 1347 1416 "pom": "sha256-tsqj6301vXVu1usKKoGGi408D29CJE/q5BdgrGYwbYc=" 1348 1417 }, 1418 + "org/slf4j#slf4j-api/1.7.30": { 1419 + "jar": "sha256-zboHlk0btAoHYUhcax6ML4/Z6x0ZxTkorA1/lRAQXFc=", 1420 + "pom": "sha256-fgdHdR6bZ+Gdy1IG8E6iLMA9JQxCJCZALq3QNRPywxQ=" 1421 + }, 1349 1422 "org/slf4j#slf4j-api/1.7.36": { 1350 1423 "jar": "sha256-0+9XXj5JeWeNwBvx3M5RAhSTtNEft/G+itmCh3wWocA=", 1351 1424 "pom": "sha256-+wRqnCKUN5KLsRwtJ8i113PriiXmDL0lPZhSEN7cJoQ=" 1352 1425 }, 1353 - "org/slf4j#slf4j-api/2.0.12": { 1354 - "jar": "sha256-p5UCuKvfvXIoRqJ2kSJqQIhoLW01ZU+bgOKpzKz37Uc=", 1355 - "pom": "sha256-Udh5pZmPWCJ0Dc9VIsDtaXGtXEpeowtw9bVGCT5rQmM=" 1356 - }, 1357 1426 "org/slf4j#slf4j-api/2.0.16": { 1358 1427 "jar": "sha256-oSV43eG6AL2bgW04iguHmSjQC6s8g8JA9wE79BlsV5o=", 1359 1428 "pom": "sha256-saAPWxxNvmK4BdZdI5Eab3cGOInXyx6G/oOJ1hkEc/c=" 1360 1429 }, 1361 - "org/slf4j#slf4j-bom/2.0.12": { 1362 - "pom": "sha256-SH70mE1wFY9Yw3zodmkxukx+VzdYZYhLdWORv9bQDDk=" 1430 + "org/slf4j#slf4j-api/2.0.17": { 1431 + "jar": "sha256-e3UdlSBhlU1av+1xgcH2RdM2CRtnmJFZHWMynGIuuDI=", 1432 + "pom": "sha256-FQxAKH987NwhuTgMqsmOkoxPM8Aj22s0jfHFrJdwJr8=" 1363 1433 }, 1364 1434 "org/slf4j#slf4j-bom/2.0.16": { 1365 1435 "pom": "sha256-BWYEjsglzfKHWGIK9k2eFK44qc2HSN1vr6bfSkGUwnk=" 1436 + }, 1437 + "org/slf4j#slf4j-bom/2.0.17": { 1438 + "pom": "sha256-940ntkK0uIbrg5/BArXNn+fzDzdZn/5oGFvk4WCQMek=" 1439 + }, 1440 + "org/slf4j#slf4j-parent/1.7.30": { 1441 + "pom": "sha256-EWR5VuSKDFv7OsM/bafoPzQQAraFfv0zWlBbaHvjS3U=" 1366 1442 }, 1367 1443 "org/slf4j#slf4j-parent/1.7.36": { 1368 1444 "pom": "sha256-uziNN/vN083mTDzt4hg4aTIY3EUfBAQMXfNgp47X6BI=" 1369 1445 }, 1370 - "org/slf4j#slf4j-parent/2.0.12": { 1371 - "pom": "sha256-fGvEdX5NSZJN3w/sX1zkAvg6bGzz4QUtGVsSgqeFVd4=" 1372 - }, 1373 1446 "org/slf4j#slf4j-parent/2.0.16": { 1374 1447 "pom": "sha256-CaC0zIFNcnRhbJsW1MD9mq8ezIEzNN5RMeVHJxsZguU=" 1448 + }, 1449 + "org/slf4j#slf4j-parent/2.0.17": { 1450 + "pom": "sha256-lc1x6FLf2ykSbli3uTnVfsKy5gJDkYUuC1Rd7ggrvzs=" 1375 1451 }, 1376 1452 "org/sonatype/oss#oss-parent/5": { 1377 1453 "pom": "sha256-FnjUEgpYXYpjATGu7ExSTZKDmFg7fqthbufVqH9SDT0=" ··· 1430 1506 "jar": "sha256-IRswbPxE+Plt86Cj3a91uoxSie7XfWDXL4ibuFX1NeU=", 1431 1507 "pom": "sha256-CTvhsDMxvOKTLWglw36YJy12Ieap6fuTKJoAJRi43Vo=" 1432 1508 }, 1433 - "org/vafer#jdependency/2.10": { 1434 - "jar": "sha256-Hc2DVauevO1odxW/ElLrKu5dDnRJeiAU/TOHz86N+F8=", 1435 - "pom": "sha256-q1PyWatfZIPT27AjVGngeNSiLP2JB3GrBPh9s6W0YGc=" 1509 + "org/vafer#jdependency/2.12": { 1510 + "jar": "sha256-xuxNA/nwT7ZEjTavQ6HMBpoh7LXocBM90Y/tT02x3mg=", 1511 + "pom": "sha256-LY6Zq9RS9eZCxtK74xACuSh5naw6CeA+PknyE3ozt+s=" 1436 1512 }, 1437 1513 "org/xmlresolver#xmlresolver/5.1.1": { 1438 1514 "jar": "sha256-MSL4rkDERq27MDzVUldoA/2/bq77hL985D0TNlsnymg=",
+7 -6
pkgs/by-name/ve/velocity/fix-version.patch
··· 1 1 --- a/build-logic/src/main/kotlin/velocity-init-manifest.gradle.kts 2 2 +++ b/build-logic/src/main/kotlin/velocity-init-manifest.gradle.kts 3 - @@ -2,28 +2,9 @@ import org.gradle.jvm.tasks.Jar 4 - import org.gradle.kotlin.dsl.withType 5 - import java.io.ByteArrayOutputStream 3 + @@ -8,29 +8,10 @@ interface Injected { 4 + val execOps: ExecOperations 5 + } 6 6 7 7 -val currentShortRevision = ByteArrayOutputStream().use { 8 - - exec { 8 + - val execOps = objects.newInstance<Injected>().execOps 9 + - execOps.exec { 9 10 - executable = "git" 10 11 - args = listOf("rev-parse", "HEAD") 11 12 - standardOutput = it ··· 15 16 - 16 17 tasks.withType<Jar> { 17 18 manifest { 18 - - val buildNumber = System.getenv("BUILD_NUMBER") 19 + val buildNumber = System.getenv("BUILD_NUMBER") 19 20 - val velocityHumanVersion: String = 20 21 - if (project.version.toString().endsWith("-SNAPSHOT")) { 21 22 - if (buildNumber == null) { ··· 26 27 - } else { 27 28 - archiveVersion.get() 28 29 - } 29 - + val velocityHumanVersion = System.getenv("BUILD_VERSION") 30 + + val velocityHumanVersion = System.getenv("BUILD_VERSION"); 30 31 attributes["Implementation-Version"] = velocityHumanVersion 31 32 } 32 33 }
+3 -3
pkgs/by-name/ve/velocity/package.nix
··· 35 35 in 36 36 stdenv.mkDerivation (finalAttrs: { 37 37 pname = "velocity"; 38 - version = "3.4.0-unstable-2025-06-11"; 38 + version = "3.4.0-unstable-2025-08-02"; 39 39 40 40 src = fetchFromGitHub { 41 41 owner = "PaperMC"; 42 42 repo = "Velocity"; 43 - rev = "669fda298c670c55686f34d868383052b192518d"; 44 - hash = "sha256-UI6SqVAaM4NANf9cGvsIgYO1jSkWDOk5ysyufrPWTgg="; 43 + rev = "d47848cb93a5f94a95059c2794c0197df6360f29"; 44 + hash = "sha256-bCvUXWv4rdoZEU1GpVSlXROC9kBtSGisvmCgRPKVZ4o="; 45 45 }; 46 46 47 47 nativeBuildInputs = [
+2 -2
pkgs/by-name/vi/virtnbdbackup/package.nix
··· 7 7 8 8 python3Packages.buildPythonApplication rec { 9 9 pname = "virtnbdbackup"; 10 - version = "2.32"; 10 + version = "2.34"; 11 11 pyproject = true; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "abbbi"; 15 15 repo = "virtnbdbackup"; 16 16 tag = "v${version}"; 17 - hash = "sha256-SCt+RvtY17wTGeCcMbmK7q7cLz17upTEgoKZM4pDh7s="; 17 + hash = "sha256-3qB1y9iFt8GKDRzc6mvq8d4M6BczlmlAaColH4MssdI="; 18 18 }; 19 19 20 20 build-system = with python3Packages; [
+2 -2
pkgs/by-name/wi/wiliwili/package.nix
··· 18 18 19 19 stdenv.mkDerivation (finalAttrs: { 20 20 pname = "wiliwili"; 21 - version = "1.5.1"; 21 + version = "1.5.2"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "xfangfang"; 25 25 repo = "wiliwili"; 26 26 tag = "v${finalAttrs.version}"; 27 27 fetchSubmodules = true; 28 - hash = "sha256-37DQafP+PFjrfNXJt88oK0ghqQEVQjDdVbYsf1tHAN4="; 28 + hash = "sha256-lcHKbEYlOznu9WhWX7ZoOCnxr6h/AJCLbjLmc2ZZTbg="; 29 29 }; 30 30 31 31 nativeBuildInputs = [
+2 -2
pkgs/by-name/wo/workout-tracker/package.nix
··· 9 9 }: 10 10 let 11 11 pname = "workout-tracker"; 12 - version = "2.4.0"; 12 + version = "2.4.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "jovandeginste"; 16 16 repo = "workout-tracker"; 17 17 tag = "v${version}"; 18 - hash = "sha256-CJiUSN0QmZD5B/KPlHY2SySQC3D/+aVdydS4mYTabz0="; 18 + hash = "sha256-MS4+dbJUh+oHWcQKe84VWW2e3hbZM4dgDWl6ZkFQkDo="; 19 19 }; 20 20 21 21 assets = buildNpmPackage {
+2 -2
pkgs/by-name/zo/zoom-us/package.nix
··· 62 62 versions.x86_64-darwin = "6.5.7.60598"; 63 63 64 64 # This is the fallback version so that evaluation can produce a meaningful result. 65 - versions.x86_64-linux = "6.5.7.3298"; 65 + versions.x86_64-linux = "6.5.8.3527"; 66 66 67 67 srcs = { 68 68 aarch64-darwin = fetchurl { ··· 76 76 }; 77 77 x86_64-linux = fetchurl { 78 78 url = "https://zoom.us/client/${versions.x86_64-linux}/zoom_x86_64.pkg.tar.xz"; 79 - hash = "sha256-6gzgJmB+/cwcEToQpniVVZyQZcqzblQG/num0X+xUIE="; 79 + hash = "sha256-qTehkDMyc28XHtta7taNYn8gPCYS/Qdr2VMUIDDC/68="; 80 80 }; 81 81 }; 82 82
+52
pkgs/development/python-modules/airos/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + pythonOlder, 6 + setuptools, 7 + aiohttp, 8 + mashumaro, 9 + aiofiles, 10 + aioresponses, 11 + pytest-asyncio, 12 + pytestCheckHook, 13 + }: 14 + 15 + buildPythonPackage rec { 16 + pname = "airos"; 17 + version = "0.2.4"; 18 + pyproject = true; 19 + 20 + disabled = pythonOlder "3.13"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "CoMPaTech"; 24 + repo = "python-airos"; 25 + tag = "v${version}"; 26 + hash = "sha256-zY0XPucCXiJDo9C4GiDqs/lxQDTphs/mBXBqSYPvkoI="; 27 + }; 28 + 29 + build-system = [ setuptools ]; 30 + 31 + dependencies = [ 32 + aiohttp 33 + mashumaro 34 + ]; 35 + 36 + nativeCheckInputs = [ 37 + aiofiles 38 + aioresponses 39 + pytest-asyncio 40 + pytestCheckHook 41 + ]; 42 + 43 + pythonImportsCheck = [ "airos" ]; 44 + 45 + meta = { 46 + description = "Ubiquity airOS module(s) for Python 3"; 47 + homepage = "https://github.com/CoMPaTech/python-airos"; 48 + changelog = "https://github.com/CoMPaTech/python-airos/releases/tag/v${version}"; 49 + license = lib.licenses.mit; 50 + maintainers = [ lib.maintainers.jamiemagee ]; 51 + }; 52 + }
+2
pkgs/development/python-modules/django-stubs-ext/default.nix
··· 52 52 "tests/typecheck" 53 53 ]; 54 54 55 + # Tests are not shipped with PyPI 56 + 55 57 pythonImportsCheck = [ "django_stubs_ext" ]; 56 58 57 59 meta = with lib; {
+12 -3
pkgs/development/python-modules/django-stubs/default.nix
··· 1 1 { 2 2 lib, 3 3 buildPythonPackage, 4 - django, 5 4 django-stubs-ext, 5 + django, 6 6 fetchFromGitHub, 7 + hatchling, 8 + redis, 7 9 mypy, 8 10 pytest-mypy-plugins, 11 + oracledb, 9 12 pytestCheckHook, 10 13 pythonOlder, 11 - hatchling, 12 14 tomli, 13 15 types-pytz, 14 16 types-pyyaml, 17 + types-redis, 15 18 typing-extensions, 16 19 }: 17 20 ··· 40 43 41 44 optional-dependencies = { 42 45 compatible-mypy = [ mypy ]; 46 + oracle = [ oracledb ]; 47 + redis = [ 48 + redis 49 + types-redis 50 + ]; 43 51 }; 44 52 45 53 nativeCheckInputs = [ ··· 54 62 ]; 55 63 56 64 disabledTestPaths = [ 57 - "tests/typecheck" 65 + # Skip type checking 66 + "tests/typecheck/" 58 67 ]; 59 68 60 69 pythonImportsCheck = [ "django-stubs" ];
+9 -4
pkgs/development/python-modules/djangorestframework-stubs/default.nix
··· 22 22 version = "3.16.1"; 23 23 pyproject = true; 24 24 25 - disabled = pythonOlder "3.9"; 25 + disabled = pythonOlder "3.10"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "typeddjango"; ··· 31 31 hash = "sha256-TTv6v7G3LODrUDSYSNNa4+dujih7QElmvK3mMQg9EuQ="; 32 32 }; 33 33 34 - nativeBuildInputs = [ setuptools ]; 34 + postPatch = '' 35 + substituteInPlace pyproject.toml \ 36 + --replace-fail "<79.0.0" "" 37 + ''; 38 + 39 + build-system = [ setuptools ]; 35 40 36 - propagatedBuildInputs = [ 41 + dependencies = [ 37 42 django-stubs 38 43 requests 39 44 types-pyyaml ··· 54 59 ] 55 60 ++ lib.flatten (builtins.attrValues optional-dependencies); 56 61 57 - # Upstream recommends mypy > 1.7 which we don't have yet, thus all testsare failing with 3.14.5 and below 62 + # Upstream recommends mypy > 1.7 which we don't have yet, thus all tests are failing with 3.14.5 and below 58 63 doCheck = false; 59 64 60 65 pythonImportsCheck = [ "rest_framework-stubs" ];
+2 -2
pkgs/development/python-modules/fastai/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "fastai"; 21 - version = "2.8.2"; 21 + version = "2.8.3"; 22 22 format = "setuptools"; 23 23 24 24 disabled = pythonOlder "3.7"; 25 25 26 26 src = fetchPypi { 27 27 inherit pname version; 28 - hash = "sha256-ix3Sp/IKj7BLmuuGd/763LB0llSUYAbMWJD8fvWe/u8="; 28 + hash = "sha256-lgUBxf8vef9HnAWh2eNxtFRMeHxDjucJrZEcONq9DK8="; 29 29 }; 30 30 31 31 propagatedBuildInputs = [
+3 -1
pkgs/development/python-modules/ldap3/default.nix
··· 24 24 prePatch = '' 25 25 # patch fails to apply because of line endings 26 26 dos2unix ldap3/utils/asn1.py 27 + substituteInPlace _version.json \ 28 + --replace-fail '"version": "2.9",' '"version": "${version}",' 27 29 ''; 28 30 29 31 patches = [ ··· 52 54 meta = with lib; { 53 55 homepage = "https://github.com/cannatag/ldap3"; 54 56 description = "Strictly RFC 4510 conforming LDAP V3 pure Python client library"; 55 - license = licenses.lgpl3; 57 + license = licenses.lgpl3Plus; 56 58 maintainers = [ ]; 57 59 }; 58 60 }
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "publicsuffixlist"; 14 - version = "1.0.2.20250802"; 14 + version = "1.0.2.20250809"; 15 15 pyproject = true; 16 16 17 17 disabled = pythonOlder "3.7"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - hash = "sha256-/Liz65F7Rk/TJr5xICfRsK10Flzgojw2m4otnh4+y5A="; 21 + hash = "sha256-eTvYGTwuSjT7ban7B9xS+8HzJfiMHnEIZSXimjMykJE="; 22 22 }; 23 23 24 24 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/pybind11-stubgen/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pybind11-stubgen"; 10 - version = "2.5.4"; 10 + version = "2.5.5"; 11 11 pyproject = true; 12 12 13 13 build-system = [ setuptools ]; ··· 16 16 owner = "sizmailov"; 17 17 repo = "pybind11-stubgen"; 18 18 tag = "v${version}"; 19 - hash = "sha256-xOvh5H2n7KOOvsRecwWlaWgFIHUPYxTEOTvM9RIpTTQ="; 19 + hash = "sha256-J2LydgkiNQp+2/agwBCSTtr+Ci4zONLkHmnMLFBww24="; 20 20 }; 21 21 22 22 # For testing purposes, the upstream source uses a shell script to build the pybind11
+31
pkgs/development/python-modules/pyitachip2ir/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchPypi, 5 + setuptools, 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "pyitachip2ir"; 10 + version = "0.0.7"; 11 + pyproject = true; 12 + 13 + src = fetchPypi { 14 + inherit pname version; 15 + hash = "sha256-T/Q3tZTTwqlaHDR2l2nRLISC4LLrOPZZv14sRxYyqDQ="; 16 + }; 17 + 18 + build-system = [ setuptools ]; 19 + 20 + # Package has no tests 21 + doCheck = false; 22 + 23 + pythonImportsCheck = [ "pyitachip2ir" ]; 24 + 25 + meta = { 26 + description = "Library for sending IR commands to an ITach IP2IR gateway"; 27 + homepage = "https://github.com/alanfischer/itachip2ir"; 28 + license = lib.licenses.mit; 29 + maintainers = [ lib.maintainers.jamiemagee ]; 30 + }; 31 + }
+12 -4
pkgs/development/python-modules/pymavlink/default.nix
··· 1 1 { 2 2 lib, 3 3 buildPythonPackage, 4 + cython, 5 + fastcrc, 4 6 fetchPypi, 5 - future, 6 7 lxml, 8 + setuptools, 7 9 }: 8 10 9 11 buildPythonPackage rec { 10 12 pname = "pymavlink"; 11 13 version = "2.4.49"; 12 - format = "setuptools"; 14 + pyproject = true; 13 15 14 16 src = fetchPypi { 15 17 inherit pname version; 16 18 hash = "sha256-188Q1VktA4oYqpcnERd+u4i+IUPvzCWN9jCwUT6dosI="; 17 19 }; 18 20 19 - propagatedBuildInputs = [ 20 - future 21 + build-system = [ 22 + cython 23 + setuptools 24 + ]; 25 + 26 + dependencies = [ 27 + fastcrc 21 28 lxml 22 29 ]; 23 30 ··· 32 39 meta = with lib; { 33 40 description = "Python MAVLink interface and utilities"; 34 41 homepage = "https://github.com/ArduPilot/pymavlink"; 42 + changelog = "https://github.com/ArduPilot/pymavlink/releases/tag/${version}"; 35 43 license = with licenses; [ 36 44 lgpl3Plus 37 45 mit
+2 -2
pkgs/development/python-modules/pymiele/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "pymiele"; 12 - version = "0.5.2"; 12 + version = "0.5.3"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.13"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - hash = "sha256-pU1PC1DXoXjZVkml3OFPhKgLVqhB9LbPPE1NzphyOSk="; 19 + hash = "sha256-sz8yNyh8cmgmnElEhjw7yUUUiG6bpdB4LXze6ZWFjMo="; 20 20 }; 21 21 22 22 build-system = [ setuptools ];
+59
pkgs/development/python-modules/pypasser/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + setuptools, 6 + pythonRelaxDepsHook, 7 + pydub, 8 + pysocks, 9 + requests, 10 + selenium, 11 + speechrecognition, 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "pypasser"; 16 + version = "0.0.5"; 17 + pyproject = true; 18 + 19 + src = fetchFromGitHub { 20 + owner = "xHossein"; 21 + repo = "PyPasser"; 22 + tag = version; 23 + hash = "sha256-vqa+Xap9dYvjJMiGNGNmegh7rmAqwf3//MH47xwr/T0="; 24 + }; 25 + 26 + build-system = [ setuptools ]; 27 + 28 + nativeBuildInputs = [ 29 + pythonRelaxDepsHook 30 + ]; 31 + 32 + pythonRelaxDeps = [ 33 + "speechrecognition" 34 + ]; 35 + 36 + dependencies = [ 37 + pydub 38 + pysocks 39 + requests 40 + selenium 41 + speechrecognition 42 + ]; 43 + 44 + pythonImportsCheck = [ 45 + "pypasser" 46 + "pypasser.reCaptchaV2" 47 + "pypasser.reCaptchaV3" 48 + ]; 49 + 50 + # Package has no tests 51 + doCheck = false; 52 + 53 + meta = { 54 + description = "Bypassing reCaptcha V3 by sending HTTP requests & solving reCaptcha V2 using speech to text"; 55 + homepage = "https://github.com/xHossein/PyPasser"; 56 + license = lib.licenses.mit; 57 + maintainers = [ lib.maintainers.jamiemagee ]; 58 + }; 59 + }
+45
pkgs/development/python-modules/pypjlink2/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + appdirs, 6 + pytestCheckHook, 7 + setuptools, 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "pypjlink2"; 12 + version = "1.2.1"; 13 + pyproject = true; 14 + 15 + src = fetchFromGitHub { 16 + owner = "benoitlouy"; 17 + repo = "pypjlink"; 18 + tag = "v${version}"; 19 + hash = "sha256-0RVI9DX5JaVWntSu5du5SU45NC70TZJyVrvMuVR7grA="; 20 + }; 21 + 22 + build-system = [ 23 + setuptools 24 + ]; 25 + 26 + dependencies = [ 27 + appdirs 28 + ]; 29 + 30 + nativeCheckInputs = [ 31 + pytestCheckHook 32 + ]; 33 + 34 + pythonImportsCheck = [ 35 + "pypjlink" 36 + ]; 37 + 38 + meta = { 39 + description = "Python implementation of the PJLink protocol for controlling digital projectors"; 40 + homepage = "https://github.com/benoitlouy/pypjlink"; 41 + changelog = "https://github.com/benoitlouy/pypjlink/releases/tag/v${version}"; 42 + license = lib.licenses.asl20; 43 + maintainers = [ lib.maintainers.jamiemagee ]; 44 + }; 45 + }
+2 -2
pkgs/development/python-modules/pytenable/default.nix
··· 28 28 29 29 buildPythonPackage rec { 30 30 pname = "pytenable"; 31 - version = "1.8.2"; 31 + version = "1.8.3"; 32 32 pyproject = true; 33 33 34 34 disabled = pythonOlder "3.10"; ··· 37 37 owner = "tenable"; 38 38 repo = "pyTenable"; 39 39 tag = version; 40 - hash = "sha256-21vKR9W2Bpi+9YfmMQ+vgQIGchb7cYA2Sx493/XuYU0="; 40 + hash = "sha256-91V2R29M/+kiosfkl5t6Y8qT/E041Wl1jhXCw3eQ7us="; 41 41 }; 42 42 43 43 pythonRelaxDeps = [
+2 -2
pkgs/development/python-modules/python-roborock/default.nix
··· 25 25 26 26 buildPythonPackage rec { 27 27 pname = "python-roborock"; 28 - version = "2.27.0"; 28 + version = "2.29.1"; 29 29 pyproject = true; 30 30 31 31 disabled = pythonOlder "3.11"; ··· 34 34 owner = "humbertogontijo"; 35 35 repo = "python-roborock"; 36 36 tag = "v${version}"; 37 - hash = "sha256-3iNqeRCdkkL77hYlh+LRo8ZKExcpk075eBbnp8oJQ8w="; 37 + hash = "sha256-6Y/nqgGZQgmgaMjdAcYEidhr2h913deWtBoWnQz966o="; 38 38 }; 39 39 40 40 postPatch = ''
+40
pkgs/development/python-modules/pywmspro/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + hatchling, 6 + hatch-vcs, 7 + aiohttp, 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "pywmspro"; 12 + version = "0.3.2"; 13 + pyproject = true; 14 + 15 + src = fetchFromGitHub { 16 + owner = "mback2k"; 17 + repo = "pywmspro"; 18 + tag = version; 19 + hash = "sha256-o/+WjdU9+Vh1CnZYF2IsNpK5cubAFvsqANZ4GxrKFHI="; 20 + }; 21 + 22 + build-system = [ 23 + hatchling 24 + hatch-vcs 25 + ]; 26 + 27 + dependencies = [ aiohttp ]; 28 + 29 + # Package has no tests 30 + doCheck = false; 31 + 32 + pythonImportsCheck = [ "wmspro" ]; 33 + 34 + meta = { 35 + description = "Python library for WMS WebControl pro API"; 36 + homepage = "https://github.com/mback2k/pywmspro"; 37 + license = lib.licenses.asl20; 38 + maintainers = [ lib.maintainers.jamiemagee ]; 39 + }; 40 + }
+2 -2
pkgs/development/python-modules/sagemaker-core/default.nix
··· 28 28 29 29 buildPythonPackage rec { 30 30 pname = "sagemaker-core"; 31 - version = "1.0.47"; 31 + version = "1.0.49"; 32 32 pyproject = true; 33 33 34 34 src = fetchFromGitHub { 35 35 owner = "aws"; 36 36 repo = "sagemaker-core"; 37 37 tag = "v${version}"; 38 - hash = "sha256-PfAv4w+egB0fIkL6nexjtoqcXyvnx52RTQu6QwKjpNU="; 38 + hash = "sha256-xDtBtsrromqfciVOxGTTWhTZG08qUjk9EJ9yMvYS7+Y="; 39 39 }; 40 40 41 41 build-system = [
+3 -3
pkgs/development/python-modules/storage3/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "storage3"; 14 - version = "0.12.0"; 14 + version = "0.12.1"; 15 15 pyproject = true; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "supabase"; 19 19 repo = "storage-py"; 20 - rev = "v${version}"; 21 - hash = "sha256-3Z+j9n/seL1ZuB1djOVpA6Qci/Ygi9g8g2lLQGKRUHM="; 20 + tag = "v${version}"; 21 + hash = "sha256-Ef309CTnzbaqKAVMdvroUYAy9RImWZZqhsnwRdpGVkk="; 22 22 }; 23 23 24 24 dependencies = [
+46
pkgs/development/python-modules/tami4edgeapi/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + setuptools, 6 + pyjwt, 7 + pypasser, 8 + requests, 9 + pythonOlder, 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "tami4edgeapi"; 14 + version = "3.0"; 15 + pyproject = true; 16 + 17 + disabled = pythonOlder "3.7"; 18 + 19 + src = fetchFromGitHub { 20 + owner = "Guy293"; 21 + repo = "Tami4EdgeAPI"; 22 + tag = "v${version}"; 23 + hash = "sha256-rhJ8L6qLDnO50Xp2eqquRinDTQjMxWVSjNL5GQI1gvM="; 24 + }; 25 + 26 + build-system = [ setuptools ]; 27 + 28 + dependencies = [ 29 + pyjwt 30 + pypasser 31 + requests 32 + ]; 33 + 34 + # Package has no tests 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ "Tami4EdgeAPI" ]; 38 + 39 + meta = { 40 + description = "Python API client for Tami4 Edge / Edge+ devices"; 41 + homepage = "https://github.com/Guy293/Tami4EdgeAPI"; 42 + changelog = "https://github.com/Guy293/Tami4EdgeAPI/releases/tag/v${version}"; 43 + license = lib.licenses.mit; 44 + maintainers = [ lib.maintainers.jamiemagee ]; 45 + }; 46 + }
+64
pkgs/development/python-modules/thingspeak/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + docopt, 5 + fetchFromGitHub, 6 + poetry-core, 7 + pytest-vcr, 8 + pytestCheckHook, 9 + requests, 10 + setuptools, 11 + vcrpy, 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "thingspeak"; 16 + version = "1.0.0"; 17 + pyproject = true; 18 + 19 + src = fetchFromGitHub { 20 + owner = "mchwalisz"; 21 + repo = "thingspeak"; 22 + tag = "v${version}"; 23 + hash = "sha256-9YvudzksWp130hkG8WxiX9WHegAVH2TT1vwMbLJ13qE="; 24 + }; 25 + 26 + postPatch = '' 27 + substituteInPlace pyproject.toml \ 28 + --replace-fail "poetry.masonry.api" "poetry.core.masonry.api" \ 29 + --replace-fail 'requires = ["poetry>=0.12"]' 'requires = ["poetry-core"]' 30 + ''; 31 + 32 + build-system = [ 33 + poetry-core 34 + ]; 35 + 36 + dependencies = [ 37 + docopt 38 + requests 39 + setuptools 40 + ]; 41 + 42 + nativeCheckInputs = [ 43 + pytest-vcr 44 + pytestCheckHook 45 + vcrpy 46 + ]; 47 + 48 + disabledTests = [ 49 + # VCR cassette conflicts with different API keys 50 + "test_get_with_key" 51 + ]; 52 + 53 + pythonImportsCheck = [ 54 + "thingspeak" 55 + ]; 56 + 57 + meta = { 58 + description = "Client library for the thingspeak.com API"; 59 + homepage = "https://github.com/mchwalisz/thingspeak"; 60 + changelog = "https://github.com/mchwalisz/thingspeak/releases/tag/v${version}"; 61 + license = lib.licenses.lgpl3Only; 62 + maintainers = [ lib.maintainers.jamiemagee ]; 63 + }; 64 + }
+48
pkgs/development/python-modules/volvocarsapi/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + pythonOlder, 6 + aiohttp, 7 + yarl, 8 + hatchling, 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "volvocarsapi"; 13 + version = "0.4.1"; 14 + pyproject = true; 15 + 16 + disabled = pythonOlder "3.12"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "thomasddn"; 20 + repo = "volvo-cars-api"; 21 + tag = "v${version}"; 22 + hash = "sha256-YMrhVxDm8Cp8vbMVtdq6yoaAu8nUB7L2YG+LSkvMdZs="; 23 + }; 24 + 25 + build-system = [ 26 + hatchling 27 + ]; 28 + 29 + dependencies = [ 30 + aiohttp 31 + yarl 32 + ]; 33 + 34 + # Package has no tests 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ 38 + "volvocarsapi" 39 + ]; 40 + 41 + meta = { 42 + description = "Python client for the Volvo Cars API"; 43 + homepage = "https://github.com/thomasddn/volvo-cars-api"; 44 + changelog = "https://github.com/thomasddn/volvo-cars-api/releases/tag/v${version}"; 45 + license = lib.licenses.gpl3Only; 46 + maintainers = [ lib.maintainers.jamiemagee ]; 47 + }; 48 + }
+6 -9
pkgs/development/tools/electron/info.json
··· 4 4 "chromium": { 5 5 "deps": { 6 6 "gn": { 7 - "hash": "sha256-EqbwCLkseND1v3UqM+49N7GuoXJ3PlJjWOes4OijQ3U=", 7 + "hash": "sha256-U0f/Q134UJrSke+/o9Hs4+mQa/vSM2hdkRXhLfhnqME=", 8 8 "rev": "ed1abc107815210dc66ec439542bee2f6cbabc00", 9 - "url": "https://gn.googlesource.com/gn", 10 - "version": "2025-01-13" 9 + "version": "0-unstable-2025-01-13" 11 10 } 12 11 }, 13 12 "version": "134.0.6998.205" ··· 1313 1312 "chromium": { 1314 1313 "deps": { 1315 1314 "gn": { 1316 - "hash": "sha256-vDKMt23RMDI+KX6CmjfeOhRv2haf/mDOuHpWKnlODcg=", 1315 + "hash": "sha256-MnGl+D9ahQibUHCtyOUf1snvmeupUn4D2yrDj55JTe4=", 1317 1316 "rev": "6e8e0d6d4a151ab2ed9b4a35366e630c55888444", 1318 - "url": "https://gn.googlesource.com/gn", 1319 - "version": "2025-03-24" 1317 + "version": "0-unstable-2025-03-24" 1320 1318 } 1321 1319 }, 1322 1320 "version": "136.0.7103.177" ··· 2638 2636 "chromium": { 2639 2637 "deps": { 2640 2638 "gn": { 2641 - "hash": "sha256-UB9a7Fr1W0yYld6WbXyRR8dFqWsj/zx4KumDZ5JQKSM=", 2639 + "hash": "sha256-BplU8qNKObVrKMLKTyqivPF1L6bbJulFC+Zop9UpmZY=", 2642 2640 "rev": "ebc8f16ca7b0d36a3e532ee90896f9eb48e5423b", 2643 - "url": "https://gn.googlesource.com/gn", 2644 - "version": "2025-05-21" 2641 + "version": "0-unstable-2025-05-21" 2645 2642 } 2646 2643 }, 2647 2644 "version": "138.0.7204.185"
+26 -15
pkgs/development/tools/electron/update.py
··· 1 1 #! /usr/bin/env nix-shell 2 - #! nix-shell -i python -p python3.pkgs.joblib python3.pkgs.click python3.pkgs.click-log nix nix-prefetch-git prefetch-yarn-deps prefetch-npm-deps gclient2nix 2 + #! nix-shell -i python -p python3.pkgs.joblib python3.pkgs.click python3.pkgs.click-log nix nurl prefetch-yarn-deps prefetch-npm-deps gclient2nix 3 3 """ 4 4 electron updater 5 5 ··· 32 32 import click 33 33 import click_log 34 34 35 - from datetime import datetime 35 + from datetime import datetime, UTC 36 36 from typing import Iterable, Tuple 37 37 from urllib.request import urlopen 38 38 from joblib import Parallel, delayed, Memory ··· 44 44 45 45 os.chdir(os.path.dirname(__file__)) 46 46 47 + # Absolute path of nixpkgs top-level directory 48 + NIXPKGS_PATH = subprocess.check_output(["git", "rev-parse", "--show-toplevel"]).decode("utf-8").strip() 49 + 47 50 memory: Memory = Memory("cache", verbose=0) 48 51 49 52 logger = logging.getLogger(__name__) ··· 79 82 80 83 81 84 @memory.cache 85 + def get_gn_hash(gn_version, gn_commit): 86 + print("gn.override", file=sys.stderr) 87 + expr = f'(import {NIXPKGS_PATH} {{}}).gn.override {{ version = "{gn_version}"; rev = "{gn_commit}"; hash = ""; }}' 88 + out = subprocess.check_output(["nurl", "--hash", "--expr", expr]) 89 + return out.decode("utf-8").strip() 90 + 91 + @memory.cache 82 92 def get_chromium_gn_source(chromium_tag: str) -> dict: 83 93 gn_pattern = r"'gn_version': 'git_revision:([0-9a-f]{40})'" 84 94 gn_commit = re.search(gn_pattern, get_chromium_file(chromium_tag, "DEPS")).group(1) 85 - gn_prefetch: bytes = subprocess.check_output( 86 - [ 87 - "nix-prefetch-git", 88 - "--quiet", 89 - "https://gn.googlesource.com/gn", 90 - "--rev", 91 - gn_commit, 92 - ] 95 + 96 + gn_commit_info = json.loads( 97 + urlopen(f"https://gn.googlesource.com/gn/+/{gn_commit}?format=json") 98 + .read() 99 + .decode("utf-8") 100 + .split(")]}'\n")[1] 93 101 ) 94 - gn: dict = json.loads(gn_prefetch) 102 + 103 + gn_commit_date = datetime.strptime(gn_commit_info["commiter"]["time"], "%a %b %d %H:%M:%S %Y %z") 104 + gn_date = gn_commit_date.astimezone(UTC).date().isoformat() 105 + gn_version = f"0-unstable-{gn_date}" 106 + 95 107 return { 96 108 "gn": { 97 - "version": datetime.fromisoformat(gn["date"]).date().isoformat(), 98 - "url": gn["url"], 99 - "rev": gn["rev"], 100 - "hash": gn["hash"], 109 + "version": gn_version, 110 + "rev": gn_commit, 111 + "hash": get_gn_hash(gn_version, gn_commit), 101 112 } 102 113 } 103 114
+11 -4
pkgs/os-specific/linux/kernel/generic.nix
··· 141 141 { 142 142 structuredExtraConfig ? { }, 143 143 ... 144 - }: 145 - { 146 - settings = structuredExtraConfig; 147 - } 144 + }@args: 145 + if args ? extraStructuredConfig then 146 + throw '' 147 + Passing `extraStructuredConfig` to the Linux kernel (e.g. 148 + via `boot.kernelPatches` in NixOS) is not supported anymore. Use 149 + `structuredExtraConfig` instead. 150 + '' 151 + else 152 + { 153 + settings = structuredExtraConfig; 154 + } 148 155 ) kernelPatches; 149 156 150 157 # appends kernel patches extraConfig
+2 -2
pkgs/os-specific/linux/kernel/zen-kernels.nix
··· 16 16 variants = { 17 17 # ./update-zen.py zen 18 18 zen = { 19 - version = "6.15.8"; # zen 19 + version = "6.16"; # zen 20 20 suffix = "zen1"; # zen 21 - sha256 = "010k50c9anjbcrwh9cgc6wn91hh3xa1x3mpxbaa2x1v8f5773vd4"; # zen 21 + sha256 = "1ckysnshlrhfycz0yppna6jrnvgc9k49wr5srvl15wj1hck84p7d"; # zen 22 22 isLqx = false; 23 23 }; 24 24 # ./update-zen.py lqx
+4 -16
pkgs/os-specific/linux/systemd/default.nix
··· 256 256 ./0019-meson-Don-t-link-ssh-dropins.patch 257 257 258 258 ./0020-install-unit_file_exists_full-follow-symlinks.patch 259 - 260 - # add nspawn build option flag 261 - # required to disable nspawn for systemdLibs to avoid dependency on getent 262 - # https://github.com/systemd/systemd/pull/36876, remove for systemd 258 263 - (fetchpatch { 264 - # required for the actual patch to apply 265 - url = "https://github.com/systemd/systemd/commit/b1fb2d971c810e0bdf9ff0ae567a1c6c230e4e5d.patch"; 266 - hash = "sha256-JBheazg1OFkx8vUl2l8+34BoEPVURBQJHxqntOBYB60="; 267 - includes = [ "src/nspawn/meson.build" ]; 268 - }) 269 - (fetchpatch { 270 - url = "https://github.com/systemd/systemd/commit/d95818f5221d9b9b19648cffa0cb2407f023b27e.patch"; 271 - hash = "sha256-FTpWGec5ivlkyEEDMCPaLE+BH91e7JI0kH8pS88bBDY="; 272 - excludes = [ "test/fuzz/meson.build" ]; 273 - }) 274 259 ] 275 260 ++ lib.optionals (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 276 261 ./0021-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch ··· 600 585 (lib.mesonEnable "gnutls" false) 601 586 (lib.mesonEnable "xkbcommon" false) 602 587 (lib.mesonEnable "man" true) 603 - (lib.mesonEnable "nspawn" withNspawn) 588 + # (lib.mesonEnable "nspawn" withNspawn) # nspawn build can be turned off on systemd 258, on 257.x it will just not be installed in systemdLibs but the build is unconditional 604 589 605 590 (lib.mesonBool "analyze" withAnalyze) 606 591 (lib.mesonBool "logind" withLogind) ··· 697 682 ] 698 683 ++ lib.optionals withNspawn [ 699 684 { 685 + # we only need to patch getent when nspawn will actually be built/installed 686 + # as of systemd 257.x, nspawn will not be installed on systemdLibs, so we don't need to patch it 687 + # patching getent unconditionally here introduces infinite recursion on musl 700 688 search = "/usr/bin/getent"; 701 689 replacement = "${getent}/bin/getent"; 702 690 where = [ "src/nspawn/nspawn-setuid.c" ];
+19 -7
pkgs/servers/home-assistant/component-packages.nix
··· 114 114 ]; 115 115 "airos" = 116 116 ps: with ps; [ 117 - ]; # missing inputs: airos 117 + airos 118 + ]; 118 119 "airq" = 119 120 ps: with ps; [ 120 121 aioairq ··· 2835 2836 ]; 2836 2837 "itach" = 2837 2838 ps: with ps; [ 2838 - ]; # missing inputs: pyitachip2ir 2839 + pyitachip2ir 2840 + ]; 2839 2841 "itunes" = 2840 2842 ps: with ps; [ 2841 2843 ]; ··· 4464 4466 ]; 4465 4467 "pjlink" = 4466 4468 ps: with ps; [ 4467 - ]; # missing inputs: pypjlink2 4469 + pypjlink2 4470 + ]; 4468 4471 "plaato" = 4469 4472 ps: with ps; [ 4470 4473 aiohasupervisor ··· 5817 5820 ]; 5818 5821 "tami4" = 5819 5822 ps: with ps; [ 5820 - ]; # missing inputs: Tami4EdgeAPI 5823 + tami4edgeapi 5824 + ]; 5821 5825 "tank_utility" = 5822 5826 ps: with ps; [ 5823 5827 tank-utility ··· 5979 5983 ]; 5980 5984 "thingspeak" = 5981 5985 ps: with ps; [ 5982 - ]; # missing inputs: thingspeak 5986 + thingspeak 5987 + ]; 5983 5988 "thinkingcleaner" = 5984 5989 ps: with ps; [ 5985 5990 ]; # missing inputs: pythinkingcleaner ··· 6430 6435 ]; 6431 6436 "volvo" = 6432 6437 ps: with ps; [ 6433 - ]; # missing inputs: volvocarsapi 6438 + volvocarsapi 6439 + ]; 6434 6440 "volvooncall" = 6435 6441 ps: with ps; [ 6436 6442 volvooncall ··· 6574 6580 ]; 6575 6581 "wmspro" = 6576 6582 ps: with ps; [ 6577 - ]; # missing inputs: pywmspro 6583 + pywmspro 6584 + ]; 6578 6585 "wolflink" = 6579 6586 ps: with ps; [ 6580 6587 wolf-comm ··· 6867 6874 "airgradient" 6868 6875 "airly" 6869 6876 "airnow" 6877 + "airos" 6870 6878 "airq" 6871 6879 "airthings" 6872 6880 "airthings_ble" ··· 7479 7487 "pi_hole" 7480 7488 "picnic" 7481 7489 "ping" 7490 + "pjlink" 7482 7491 "plaato" 7483 7492 "plant" 7484 7493 "playstation_network" ··· 7671 7680 "tag" 7672 7681 "tailscale" 7673 7682 "tailwind" 7683 + "tami4" 7674 7684 "tankerkoenig" 7675 7685 "tasmota" 7676 7686 "tautulli" ··· 7765 7775 "voicerss" 7766 7776 "voip" 7767 7777 "volumio" 7778 + "volvo" 7768 7779 "volvooncall" 7769 7780 "vulcan" 7770 7781 "vultr" ··· 7794 7805 "withings" 7795 7806 "wiz" 7796 7807 "wled" 7808 + "wmspro" 7797 7809 "wolflink" 7798 7810 "workday" 7799 7811 "worldclock"
+3 -3
pkgs/servers/home-assistant/custom-components/fellow/package.nix
··· 10 10 buildHomeAssistantComponent { 11 11 owner = "NewsGuyTor"; 12 12 domain = "fellow"; 13 - version = "0.3.2"; 13 + version = "0-unstable-2025-08-06"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "NewsGuyTor"; 17 17 repo = "FellowAiden-HomeAssistant"; 18 - rev = "2268880c7727b1d2e488dcebbdc5b2675d664ddf"; 19 - hash = "sha256-Wg6EFUQNhlK2GQjC90c5lA3b/y40LhXdInba/iTtUWc="; 18 + rev = "bb0f3042e974a149a3597d06312e6be9b8d265ff"; 19 + hash = "sha256-cplIiFt0CkeOXjypvG0MR/t7PWzeaa2G6uScWSLbEpo="; 20 20 }; 21 21 22 22 passthru.updateScript = unstableGitUpdater { };
+3 -3
pkgs/servers/monitoring/prometheus/redis-exporter.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "redis_exporter"; 13 - version = "1.74.0"; 13 + version = "1.75.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "oliver006"; 17 17 repo = "redis_exporter"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-TPMbRyz476ylo6OEYYtLQCNL01dLShnJu0ncVgzL5kY="; 19 + sha256 = "sha256-Z74AB3loT6KJgJBXGh3q1v49ro0gXPvIwd3URRikUa0="; 20 20 }; 21 21 22 - vendorHash = "sha256-q/RMdGFwZuFnjE0txb7ShhHlxLpLNF5S6KmmAKKYnaE="; 22 + vendorHash = "sha256-y1j7s8R8pd3sp9yOlG2aopQ+GNO2Z7OCO1a9i9L6KM4="; 23 23 24 24 ldflags = [ 25 25 "-X main.BuildVersion=${version}"
+2 -2
pkgs/servers/sql/postgresql/ext/pg_net.nix
··· 8 8 9 9 postgresqlBuildExtension (finalAttrs: { 10 10 pname = "pg_net"; 11 - version = "0.19.4"; 11 + version = "0.19.5"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "supabase"; 15 15 repo = "pg_net"; 16 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-uHsfRQ5RKhTvqokF94s/RzTQ23BRTBV+yyIW41Djjgo="; 17 + hash = "sha256-Cpi2iASi1QJoED0Qs1dANqg/BNZTsz5S+pw8iYyW03Y="; 18 18 }; 19 19 20 20 buildInputs = [ curl ];
+3 -3
pkgs/servers/sql/postgresql/ext/timescaledb.nix
··· 13 13 14 14 postgresqlBuildExtension (finalAttrs: { 15 15 pname = "timescaledb${lib.optionalString (!enableUnfree) "-apache"}"; 16 - version = "2.21.1"; 16 + version = "2.21.2"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "timescale"; 20 20 repo = "timescaledb"; 21 21 tag = finalAttrs.version; 22 - hash = "sha256-oZaEUz6g/8oVdVyPCkAE0quzYBxO911MZcgd8rFFA3c="; 22 + hash = "sha256-pNF75Wh8WMXqxjU19KBiH/jYzT/4uBYuUMH1vRilU94="; 23 23 }; 24 24 25 25 nativeBuildInputs = [ cmake ]; ··· 106 106 || 107 107 # PostgreSQL 18 support issue upstream: https://github.com/timescale/timescaledb/issues/8233 108 108 # Check after next package update. 109 - lib.warnIf (finalAttrs.version != "2.21.1") "Is postgresql18Packages.timescaledb still broken?" ( 109 + lib.warnIf (finalAttrs.version != "2.21.2") "Is postgresql18Packages.timescaledb still broken?" ( 110 110 lib.versionAtLeast postgresql.version "18" 111 111 ); 112 112 };
+2 -2
pkgs/tools/security/pinentry/default.nix
··· 67 67 in 68 68 stdenv.mkDerivation rec { 69 69 pname = "pinentry-${pinentryExtraPname}"; 70 - version = "1.3.1"; 70 + version = "1.3.2"; 71 71 72 72 src = fetchurl { 73 73 url = "mirror://gnupg/pinentry/pinentry-${version}.tar.bz2"; 74 - hash = "sha256-vHLuJ8cjkAerGJbDwvrlOwduLJvSSD3CdpoWkCvOjAQ="; 74 + hash = "sha256-jphu2IVhtNpunv4MVPpMqJIwNcmSZN8LBGRJfF+5Tp4="; 75 75 }; 76 76 77 77 nativeBuildInputs = [
+16
pkgs/top-level/python-packages.nix
··· 554 554 555 555 airly = callPackage ../development/python-modules/airly { }; 556 556 557 + airos = callPackage ../development/python-modules/airos { }; 558 + 557 559 airportsdata = callPackage ../development/python-modules/airportsdata { }; 558 560 559 561 airthings-ble = callPackage ../development/python-modules/airthings-ble { }; ··· 13032 13034 13033 13035 pyisy = callPackage ../development/python-modules/pyisy { }; 13034 13036 13037 + pyitachip2ir = callPackage ../development/python-modules/pyitachip2ir { }; 13038 + 13035 13039 pyituran = callPackage ../development/python-modules/pyituran { }; 13036 13040 13037 13041 pyixapi = callPackage ../development/python-modules/pyixapi { }; ··· 13507 13511 13508 13512 pypass = callPackage ../development/python-modules/pypass { }; 13509 13513 13514 + pypasser = callPackage ../development/python-modules/pypasser { }; 13515 + 13510 13516 pypblib = callPackage ../development/python-modules/pypblib { }; 13511 13517 13512 13518 pypca = callPackage ../development/python-modules/pypca { }; ··· 13548 13554 pypiserver = callPackage ../development/python-modules/pypiserver { }; 13549 13555 13550 13556 pypitoken = callPackage ../development/python-modules/pypitoken { }; 13557 + 13558 + pypjlink2 = callPackage ../development/python-modules/pypjlink2 { }; 13551 13559 13552 13560 pyplaato = callPackage ../development/python-modules/pyplaato { }; 13553 13561 ··· 15150 15158 15151 15159 pywlroots = callPackage ../development/python-modules/pywlroots { wlroots = pkgs.wlroots_0_17; }; 15152 15160 15161 + pywmspro = callPackage ../development/python-modules/pywmspro { }; 15162 + 15153 15163 pyworld = callPackage ../development/python-modules/pyworld { }; 15154 15164 15155 15165 pyws66i = callPackage ../development/python-modules/pyws66i { }; ··· 17668 17678 17669 17679 takethetime = callPackage ../development/python-modules/takethetime { }; 17670 17680 17681 + tami4edgeapi = callPackage ../development/python-modules/tami4edgeapi { }; 17682 + 17671 17683 tank-utility = callPackage ../development/python-modules/tank-utility { }; 17672 17684 17673 17685 tappy = callPackage ../development/python-modules/tappy { }; ··· 17980 17992 thespian = callPackage ../development/python-modules/thespian { }; 17981 17993 17982 17994 thinc = callPackage ../development/python-modules/thinc { }; 17995 + 17996 + thingspeak = callPackage ../development/python-modules/thingspeak { }; 17983 17997 17984 17998 thinqconnect = callPackage ../development/python-modules/thinqconnect { }; 17985 17999 ··· 19443 19457 voluptuous-serialize = callPackage ../development/python-modules/voluptuous-serialize { }; 19444 19458 19445 19459 voluptuous-stubs = callPackage ../development/python-modules/voluptuous-stubs { }; 19460 + 19461 + volvocarsapi = callPackage ../development/python-modules/volvocarsapi { }; 19446 19462 19447 19463 volvooncall = callPackage ../development/python-modules/volvooncall { }; 19448 19464