Merge staging-next into staging

authored by nixpkgs-ci[bot] and committed by GitHub 7a955016 e923af99

+2272 -1150
+1
.github/workflows/pr.yml
··· 3 on: 4 pull_request: 5 paths: 6 - .github/workflows/build.yml 7 - .github/workflows/check.yml 8 - .github/workflows/eval.yml
··· 3 on: 4 pull_request: 5 paths: 6 + - .github/actions/get-merge-commit/action.yml 7 - .github/workflows/build.yml 8 - .github/workflows/check.yml 9 - .github/workflows/eval.yml
+1 -1
doc/packages/linux.section.md
··· 25 ignoreConfigErrors = true; 26 autoModules = false; 27 kernelPreferBuiltin = true; 28 - extraStructuredConfig = with lib.kernel; { 29 DEBUG_KERNEL = yes; 30 FRAME_POINTER = yes; 31 KGDB = yes;
··· 25 ignoreConfigErrors = true; 26 autoModules = false; 27 kernelPreferBuiltin = true; 28 + structuredExtraConfig = with lib.kernel; { 29 DEBUG_KERNEL = yes; 30 FRAME_POINTER = yes; 31 KGDB = yes;
+10
lib/attrsets.nix
··· 633 634 : Predicate taking an attribute name and an attribute value, which returns `true` to include the attribute, or `false` to exclude the attribute. 635 636 `set` 637 638 : The attribute set to filter
··· 633 634 : Predicate taking an attribute name and an attribute value, which returns `true` to include the attribute, or `false` to exclude the attribute. 635 636 + <!-- TIP --> 637 + If possible, decide on `name` first and on `value` only if necessary. 638 + This avoids evaluating the value if the name is already enough, making it possible, potentially, to have the argument reference the return value. 639 + (Depending on context, that could still be considered a self reference by users; a common pattern in Nix.) 640 + 641 + <!-- TIP --> 642 + `filterAttrs` is occasionally the cause of infinite recursion in configuration systems that allow self-references. 643 + To support the widest range of user-provided logic, perform the `filterAttrs` call as late as possible. 644 + Typically that's right before using it in a derivation, as opposed to an implicit conversion whose result is accessible to the user's expressions. 645 + 646 `set` 647 648 : The attribute set to filter
-5
maintainers/maintainer-list.nix
··· 26093 githubId = 57819359; 26094 name = "Binh Nguyen"; 26095 }; 26096 - tuynia = { 26097 - github = "mivorasu"; 26098 - githubId = 221005165; 26099 - name = "Qylia Vorlaque"; 26100 - }; 26101 tv = { 26102 email = "tv@krebsco.de"; 26103 github = "4z3";
··· 26093 githubId = 57819359; 26094 name = "Binh Nguyen"; 26095 }; 26096 tv = { 26097 email = "tv@krebsco.de"; 26098 github = "4z3";
+35 -8
nixos/modules/config/debug-info.nix
··· 1 - { config, lib, ... }: 2 { 3 4 options = { ··· 23 ''; 24 }; 25 26 }; 27 28 - config = lib.mkIf config.environment.enableDebugInfo { 29 30 - # FIXME: currently disabled because /lib is already in 31 - # environment.pathsToLink, and we can't have both. 32 - #environment.pathsToLink = [ "/lib/debug/.build-id" ]; 33 34 - environment.extraOutputsToInstall = [ "debug" ]; 35 36 - environment.variables.NIX_DEBUG_INFO_DIRS = [ "/run/current-system/sw/lib/debug" ]; 37 38 - }; 39 40 }
··· 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 7 { 8 9 options = { ··· 28 ''; 29 }; 30 31 + environment.debuginfodServers = lib.mkOption { 32 + type = lib.types.listOf lib.types.str; 33 + default = [ ]; 34 + description = '' 35 + List of urls of debuginfod servers for tools like {command}`gdb` and {command}`valgrind` to use. 36 + 37 + Unrelated to {option}`environment.enableDebugInfo`. 38 + ''; 39 + }; 40 + 41 }; 42 43 + config = lib.mkMerge [ 44 + (lib.mkIf config.environment.enableDebugInfo { 45 + 46 + # FIXME: currently disabled because /lib is already in 47 + # environment.pathsToLink, and we can't have both. 48 + #environment.pathsToLink = [ "/lib/debug/.build-id" ]; 49 50 + environment.extraOutputsToInstall = [ "debug" ]; 51 + 52 + environment.variables.NIX_DEBUG_INFO_DIRS = [ "/run/current-system/sw/lib/debug" ]; 53 54 + }) 55 + (lib.mkIf (config.environment.debuginfodServers != [ ]) { 56 + environment.variables.DEBUGINFOD_URLS = lib.strings.concatStringsSep " " config.environment.debuginfodServers; 57 58 + environment.systemPackages = [ 59 + # valgrind support requires debuginfod-find on PATH 60 + (lib.getBin pkgs.elfutils) 61 + ]; 62 63 + environment.etc."gdb/gdbinit.d/nixseparatedebuginfod2.gdb".text = "set debuginfod enabled on"; 64 + }) 65 + ]; 66 67 }
+65 -36
nixos/modules/config/system-path.nix
··· 8 }: 9 let 10 11 - requiredPackages = 12 - map (pkg: lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg) 13 - [ 14 - pkgs.acl 15 - pkgs.attr 16 - pkgs.bashInteractive # bash with ncurses support 17 - pkgs.bzip2 18 - pkgs.coreutils-full 19 - pkgs.cpio 20 - pkgs.curl 21 - pkgs.diffutils 22 - pkgs.findutils 23 - pkgs.gawk 24 - pkgs.stdenv.cc.libc 25 - pkgs.getent 26 - pkgs.getconf 27 - pkgs.gnugrep 28 - pkgs.gnupatch 29 - pkgs.gnused 30 - pkgs.gnutar 31 - pkgs.gzip 32 - pkgs.xz 33 - pkgs.less 34 - pkgs.libcap 35 - pkgs.ncurses 36 - pkgs.netcat 37 - config.programs.ssh.package 38 - pkgs.mkpasswd 39 - pkgs.procps 40 - pkgs.su 41 - pkgs.time 42 - pkgs.util-linux 43 - pkgs.which 44 - pkgs.zstd 45 - ]; 46 47 defaultPackageNames = [ 48 "perl" ··· 77 configuration. (The latter is the main difference with 78 installing them in the default profile, 79 {file}`/nix/var/nix/profiles/default`. 80 ''; 81 }; 82 ··· 151 152 config = { 153 154 - environment.systemPackages = requiredPackages ++ config.environment.defaultPackages; 155 156 environment.pathsToLink = [ 157 "/bin"
··· 8 }: 9 let 10 11 + corePackageNames = [ 12 + "acl" 13 + "attr" 14 + "bashInteractive" # bash with ncurses support 15 + "bzip2" 16 + "coreutils-full" 17 + "cpio" 18 + "curl" 19 + "diffutils" 20 + "findutils" 21 + "gawk" 22 + "getent" 23 + "getconf" 24 + "gnugrep" 25 + "gnupatch" 26 + "gnused" 27 + "gnutar" 28 + "gzip" 29 + "xz" 30 + "less" 31 + "libcap" 32 + "ncurses" 33 + "netcat" 34 + "mkpasswd" 35 + "procps" 36 + "su" 37 + "time" 38 + "util-linux" 39 + "which" 40 + "zstd" 41 + ]; 42 + corePackages = 43 + (map ( 44 + n: 45 + let 46 + pkg = pkgs.${n}; 47 + in 48 + lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg 49 + ) corePackageNames) 50 + ++ [ pkgs.stdenv.cc.libc ]; 51 + corePackagesText = "[ ${lib.concatMapStringsSep " " (n: "pkgs.${n}") corePackageNames} ]"; 52 53 defaultPackageNames = [ 54 "perl" ··· 83 configuration. (The latter is the main difference with 84 installing them in the default profile, 85 {file}`/nix/var/nix/profiles/default`. 86 + ''; 87 + }; 88 + 89 + corePackages = lib.mkOption { 90 + type = lib.types.listOf lib.types.package; 91 + default = corePackages; 92 + defaultText = lib.literalMD '' 93 + these packages, with their `meta.priority` numerically increased 94 + (thus lowering their installation priority): 95 + 96 + ${corePackagesText} 97 + ''; 98 + example = [ ]; 99 + description = '' 100 + Set of core packages for a normal interactive system. 101 + 102 + Only change this if you know what you're doing! 103 + 104 + Like with systemPackages, packages are installed to 105 + {file}`/run/current-system/sw`. They are 106 + automatically available to all users, and are 107 + automatically updated every time you rebuild the system 108 + configuration. 109 ''; 110 }; 111 ··· 180 181 config = { 182 183 + environment.systemPackages = config.environment.corePackages ++ config.environment.defaultPackages; 184 185 environment.pathsToLink = [ 186 "/bin"
+1
nixos/modules/module-list.nix
··· 591 ./services/development/jupyterhub/default.nix 592 ./services/development/livebook.nix 593 ./services/development/lorri.nix 594 ./services/development/nixseparatedebuginfod.nix 595 ./services/development/rstudio-server/default.nix 596 ./services/development/vsmartcard-vpcd.nix
··· 591 ./services/development/jupyterhub/default.nix 592 ./services/development/livebook.nix 593 ./services/development/lorri.nix 594 + ./services/development/nixseparatedebuginfod2.nix 595 ./services/development/nixseparatedebuginfod.nix 596 ./services/development/rstudio-server/default.nix 597 ./services/development/vsmartcard-vpcd.nix
+97 -103
nixos/modules/programs/bash/bash.nix
··· 23 in 24 25 { 26 - imports = [ 27 - (lib.mkRemovedOptionModule [ "programs" "bash" "enable" ] "") 28 - ]; 29 30 options = { 31 32 programs.bash = { 33 34 - /* 35 - enable = lib.mkOption { 36 - default = true; 37 - description = '' 38 - Whenever to configure Bash as an interactive shell. 39 - Note that this tries to make Bash the default 40 - {option}`users.defaultUserShell`, 41 - which in turn means that you might need to explicitly 42 - set this variable if you have another shell configured 43 - with NixOS. 44 - ''; 45 - type = lib.types.bool; 46 - }; 47 - */ 48 49 shellAliases = lib.mkOption { 50 default = { }; ··· 129 130 }; 131 132 - config = # lib.mkIf cfg.enable 133 - { 134 135 - programs.bash = { 136 137 - shellAliases = builtins.mapAttrs (name: lib.mkDefault) cfge.shellAliases; 138 139 - shellInit = '' 140 - if [ -z "$__NIXOS_SET_ENVIRONMENT_DONE" ]; then 141 - . ${config.system.build.setEnvironment} 142 - fi 143 144 - ${cfge.shellInit} 145 - ''; 146 147 - loginShellInit = cfge.loginShellInit; 148 149 - interactiveShellInit = '' 150 - # Check the window size after every command. 151 - shopt -s checkwinsize 152 153 - # Disable hashing (i.e. caching) of command lookups. 154 - set +h 155 156 - ${cfg.promptInit} 157 - ${cfg.promptPluginInit} 158 - ${bashAliases} 159 160 - ${cfge.interactiveShellInit} 161 - ''; 162 163 - }; 164 165 - environment.etc.profile.text = '' 166 - # /etc/profile: DO NOT EDIT -- this file has been generated automatically. 167 - # This file is read for login shells. 168 169 - # Only execute this file once per shell. 170 - if [ -n "$__ETC_PROFILE_SOURCED" ]; then return; fi 171 - __ETC_PROFILE_SOURCED=1 172 173 - # Prevent this file from being sourced by interactive non-login child shells. 174 - export __ETC_PROFILE_DONE=1 175 176 - ${cfg.shellInit} 177 - ${cfg.loginShellInit} 178 179 - # Read system-wide modifications. 180 - if test -f /etc/profile.local; then 181 - . /etc/profile.local 182 - fi 183 184 - if [ -n "''${BASH_VERSION:-}" ]; then 185 - . /etc/bashrc 186 - fi 187 - ''; 188 189 - environment.etc.bashrc.text = '' 190 - # /etc/bashrc: DO NOT EDIT -- this file has been generated automatically. 191 192 - # Only execute this file once per shell. 193 - if [ -n "$__ETC_BASHRC_SOURCED" ] || [ -n "$NOSYSBASHRC" ]; then return; fi 194 - __ETC_BASHRC_SOURCED=1 195 196 - # If the profile was not loaded in a parent process, source 197 - # it. But otherwise don't do it because we don't want to 198 - # clobber overridden values of $PATH, etc. 199 - if [ -z "$__ETC_PROFILE_DONE" ]; then 200 - . /etc/profile 201 - fi 202 203 - # We are not always an interactive shell. 204 - if [ -n "$PS1" ]; then 205 - ${cfg.interactiveShellInit} 206 - fi 207 208 - # Read system-wide modifications. 209 - if test -f /etc/bashrc.local; then 210 - . /etc/bashrc.local 211 - fi 212 - ''; 213 214 - environment.etc.bash_logout.text = '' 215 - # /etc/bash_logout: DO NOT EDIT -- this file has been generated automatically. 216 217 - # Only execute this file once per shell. 218 - if [ -n "$__ETC_BASHLOGOUT_SOURCED" ] || [ -n "$NOSYSBASHLOGOUT" ]; then return; fi 219 - __ETC_BASHLOGOUT_SOURCED=1 220 221 - ${cfg.logout} 222 223 - # Read system-wide modifications. 224 - if test -f /etc/bash_logout.local; then 225 - . /etc/bash_logout.local 226 - fi 227 - ''; 228 229 - # Configuration for readline in bash. We use "option default" 230 - # priority to allow user override using both .text and .source. 231 - environment.etc.inputrc.source = lib.mkOptionDefault ./inputrc; 232 233 - users.defaultUserShell = lib.mkDefault pkgs.bashInteractive; 234 235 - environment.pathsToLink = lib.optionals cfg.completion.enable [ 236 - "/etc/bash_completion.d" 237 - "/share/bash-completion" 238 - ]; 239 240 - environment.shells = [ 241 - "/run/current-system/sw/bin/bash" 242 - "/run/current-system/sw/bin/sh" 243 - "${pkgs.bashInteractive}/bin/bash" 244 - "${pkgs.bashInteractive}/bin/sh" 245 - ]; 246 247 - }; 248 249 }
··· 23 in 24 25 { 26 27 options = { 28 29 programs.bash = { 30 31 + enable = lib.mkOption { 32 + default = true; 33 + description = '' 34 + Whenever to configure Bash as an interactive shell. 35 + Note that this tries to make Bash the default 36 + {option}`users.defaultUserShell`, 37 + which in turn means that you might need to explicitly 38 + set this variable if you have another shell configured 39 + with NixOS. 40 + ''; 41 + type = lib.types.bool; 42 + }; 43 44 shellAliases = lib.mkOption { 45 default = { }; ··· 124 125 }; 126 127 + config = lib.mkIf cfg.enable { 128 129 + programs.bash = { 130 131 + shellAliases = builtins.mapAttrs (name: lib.mkDefault) cfge.shellAliases; 132 133 + shellInit = '' 134 + if [ -z "$__NIXOS_SET_ENVIRONMENT_DONE" ]; then 135 + . ${config.system.build.setEnvironment} 136 + fi 137 138 + ${cfge.shellInit} 139 + ''; 140 141 + loginShellInit = cfge.loginShellInit; 142 143 + interactiveShellInit = '' 144 + # Check the window size after every command. 145 + shopt -s checkwinsize 146 147 + # Disable hashing (i.e. caching) of command lookups. 148 + set +h 149 150 + ${cfg.promptInit} 151 + ${cfg.promptPluginInit} 152 + ${bashAliases} 153 154 + ${cfge.interactiveShellInit} 155 + ''; 156 157 + }; 158 159 + environment.etc.profile.text = '' 160 + # /etc/profile: DO NOT EDIT -- this file has been generated automatically. 161 + # This file is read for login shells. 162 163 + # Only execute this file once per shell. 164 + if [ -n "$__ETC_PROFILE_SOURCED" ]; then return; fi 165 + __ETC_PROFILE_SOURCED=1 166 167 + # Prevent this file from being sourced by interactive non-login child shells. 168 + export __ETC_PROFILE_DONE=1 169 170 + ${cfg.shellInit} 171 + ${cfg.loginShellInit} 172 173 + # Read system-wide modifications. 174 + if test -f /etc/profile.local; then 175 + . /etc/profile.local 176 + fi 177 178 + if [ -n "''${BASH_VERSION:-}" ]; then 179 + . /etc/bashrc 180 + fi 181 + ''; 182 183 + environment.etc.bashrc.text = '' 184 + # /etc/bashrc: DO NOT EDIT -- this file has been generated automatically. 185 186 + # Only execute this file once per shell. 187 + if [ -n "$__ETC_BASHRC_SOURCED" ] || [ -n "$NOSYSBASHRC" ]; then return; fi 188 + __ETC_BASHRC_SOURCED=1 189 190 + # If the profile was not loaded in a parent process, source 191 + # it. But otherwise don't do it because we don't want to 192 + # clobber overridden values of $PATH, etc. 193 + if [ -z "$__ETC_PROFILE_DONE" ]; then 194 + . /etc/profile 195 + fi 196 197 + # We are not always an interactive shell. 198 + if [ -n "$PS1" ]; then 199 + ${cfg.interactiveShellInit} 200 + fi 201 202 + # Read system-wide modifications. 203 + if test -f /etc/bashrc.local; then 204 + . /etc/bashrc.local 205 + fi 206 + ''; 207 208 + environment.etc.bash_logout.text = '' 209 + # /etc/bash_logout: DO NOT EDIT -- this file has been generated automatically. 210 211 + # Only execute this file once per shell. 212 + if [ -n "$__ETC_BASHLOGOUT_SOURCED" ] || [ -n "$NOSYSBASHLOGOUT" ]; then return; fi 213 + __ETC_BASHLOGOUT_SOURCED=1 214 215 + ${cfg.logout} 216 217 + # Read system-wide modifications. 218 + if test -f /etc/bash_logout.local; then 219 + . /etc/bash_logout.local 220 + fi 221 + ''; 222 223 + # Configuration for readline in bash. We use "option default" 224 + # priority to allow user override using both .text and .source. 225 + environment.etc.inputrc.source = lib.mkOptionDefault ./inputrc; 226 227 + users.defaultUserShell = lib.mkDefault pkgs.bashInteractive; 228 229 + environment.pathsToLink = lib.optionals cfg.completion.enable [ 230 + "/etc/bash_completion.d" 231 + "/share/bash-completion" 232 + ]; 233 234 + environment.shells = [ 235 + "/run/current-system/sw/bin/bash" 236 + "/run/current-system/sw/bin/sh" 237 + "${pkgs.bashInteractive}/bin/bash" 238 + "${pkgs.bashInteractive}/bin/sh" 239 + ]; 240 241 + }; 242 243 }
+31 -2
nixos/modules/programs/fuse.nix
··· 1 - { config, lib, ... }: 2 3 let 4 cfg = config.programs.fuse; ··· 7 meta.maintainers = with lib.maintainers; [ ]; 8 9 options.programs.fuse = { 10 mountMax = lib.mkOption { 11 # In the C code it's an "int" (i.e. signed and at least 16 bit), but 12 # negative numbers obviously make no sense: ··· 27 }; 28 }; 29 30 - config = { 31 environment.etc."fuse.conf".text = '' 32 ${lib.optionalString (!cfg.userAllowOther) "#"}user_allow_other 33 mount_max = ${builtins.toString cfg.mountMax} 34 ''; 35 }; 36 }
··· 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 7 8 let 9 cfg = config.programs.fuse; ··· 12 meta.maintainers = with lib.maintainers; [ ]; 13 14 options.programs.fuse = { 15 + enable = lib.mkEnableOption "fuse" // { 16 + default = true; 17 + }; 18 + 19 mountMax = lib.mkOption { 20 # In the C code it's an "int" (i.e. signed and at least 16 bit), but 21 # negative numbers obviously make no sense: ··· 36 }; 37 }; 38 39 + config = lib.mkIf cfg.enable { 40 + environment.systemPackages = [ 41 + pkgs.fuse 42 + pkgs.fuse3 43 + ]; 44 + 45 + security.wrappers = 46 + let 47 + mkSetuidRoot = source: { 48 + setuid = true; 49 + owner = "root"; 50 + group = "root"; 51 + inherit source; 52 + }; 53 + in 54 + { 55 + fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount"; 56 + fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3"; 57 + }; 58 + 59 environment.etc."fuse.conf".text = '' 60 ${lib.optionalString (!cfg.userAllowOther) "#"}user_allow_other 61 mount_max = ${builtins.toString cfg.mountMax} 62 ''; 63 + 64 }; 65 }
+2
nixos/modules/programs/ssh.nix
··· 335 } 336 ); 337 338 # SSH configuration. Slight duplication of the sshd_config 339 # generation in the sshd service. 340 environment.etc."ssh/ssh_config".text = ''
··· 335 } 336 ); 337 338 + environment.corePackages = [ cfg.package ]; 339 + 340 # SSH configuration. Slight duplication of the sshd_config 341 # generation in the sshd service. 342 environment.etc."ssh/ssh_config".text = ''
-2
nixos/modules/security/wrappers/default.nix
··· 266 in 267 { 268 # These are mount related wrappers that require the +s permission. 269 - fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount"; 270 - fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3"; 271 mount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/mount"; 272 umount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/umount"; 273 };
··· 266 in 267 { 268 # These are mount related wrappers that require the +s permission. 269 mount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/mount"; 270 umount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/umount"; 271 };
+1 -9
nixos/modules/services/development/nixseparatedebuginfod.nix
··· 101 extra-allowed-users = [ "nixseparatedebuginfod" ]; 102 }; 103 104 - environment.variables.DEBUGINFOD_URLS = "http://${url}"; 105 - 106 - environment.systemPackages = [ 107 - # valgrind support requires debuginfod-find on PATH 108 - (lib.getBin pkgs.elfutils) 109 - ]; 110 - 111 - environment.etc."gdb/gdbinit.d/nixseparatedebuginfod.gdb".text = "set debuginfod enabled on"; 112 - 113 }; 114 }
··· 101 extra-allowed-users = [ "nixseparatedebuginfod" ]; 102 }; 103 104 + environment.debuginfodServers = [ "http://${url}" ]; 105 }; 106 }
+97
nixos/modules/services/development/nixseparatedebuginfod2.nix
···
··· 1 + { 2 + pkgs, 3 + lib, 4 + config, 5 + utils, 6 + ... 7 + }: 8 + let 9 + cfg = config.services.nixseparatedebuginfod2; 10 + url = "127.0.0.1:${toString cfg.port}"; 11 + in 12 + { 13 + options = { 14 + services.nixseparatedebuginfod2 = { 15 + enable = lib.mkEnableOption "nixseparatedebuginfod2, a debuginfod server providing source and debuginfo for nix packages"; 16 + port = lib.mkOption { 17 + description = "port to listen"; 18 + default = 1950; 19 + type = lib.types.port; 20 + }; 21 + package = lib.mkPackageOption pkgs "nixseparatedebuginfod2" { }; 22 + substituter = lib.mkOption { 23 + description = "nix substituter to fetch debuginfo from. Either http/https substituters, or `local:` to use debuginfo present in the local store."; 24 + default = "https://cache.nixos.org"; 25 + example = "local:"; 26 + type = lib.types.str; 27 + }; 28 + cacheExpirationDelay = lib.mkOption { 29 + description = "keep unused cache entries for this long. A number followed by a unit"; 30 + default = "1d"; 31 + type = lib.types.str; 32 + }; 33 + }; 34 + }; 35 + config = lib.mkIf cfg.enable { 36 + systemd.services.nixseparatedebuginfod2 = { 37 + wantedBy = [ "multi-user.target" ]; 38 + path = [ config.nix.package ]; 39 + serviceConfig = { 40 + ExecStart = [ 41 + (utils.escapeSystemdExecArgs [ 42 + (lib.getExe cfg.package) 43 + "--listen-address" 44 + url 45 + "--substituter" 46 + cfg.substituter 47 + "--expiration" 48 + cfg.cacheExpirationDelay 49 + ]) 50 + ]; 51 + Restart = "on-failure"; 52 + CacheDirectory = "nixseparatedebuginfod2"; 53 + DynamicUser = true; 54 + 55 + # hardening 56 + # Filesystem stuff 57 + ProtectSystem = "strict"; # Prevent writing to most of / 58 + ProtectHome = true; # Prevent accessing /home and /root 59 + PrivateTmp = true; # Give an own directory under /tmp 60 + PrivateDevices = true; # Deny access to most of /dev 61 + ProtectKernelTunables = true; # Protect some parts of /sys 62 + ProtectControlGroups = true; # Remount cgroups read-only 63 + RestrictSUIDSGID = true; # Prevent creating SETUID/SETGID files 64 + PrivateMounts = true; # Give an own mount namespace 65 + RemoveIPC = true; 66 + UMask = "0077"; 67 + 68 + # Capabilities 69 + CapabilityBoundingSet = ""; # Allow no capabilities at all 70 + NoNewPrivileges = true; # Disallow getting more capabilities. This is also implied by other options. 71 + 72 + # Kernel stuff 73 + ProtectKernelModules = true; # Prevent loading of kernel modules 74 + SystemCallArchitectures = "native"; # Usually no need to disable this 75 + SystemCallFilter = "@system-service"; 76 + ProtectKernelLogs = true; # Prevent access to kernel logs 77 + ProtectClock = true; # Prevent setting the RTC 78 + ProtectProc = "noaccess"; 79 + ProcSubset = "pid"; 80 + 81 + # Networking 82 + RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6"; 83 + 84 + # Misc 85 + LockPersonality = true; # Prevent change of the personality 86 + ProtectHostname = true; # Give an own UTS namespace 87 + RestrictRealtime = true; # Prevent switching to RT scheduling 88 + MemoryDenyWriteExecute = true; # Maybe disable this for interpreters like python 89 + RestrictNamespaces = true; 90 + 91 + }; 92 + }; 93 + 94 + environment.debuginfodServers = [ "http://${url}" ]; 95 + 96 + }; 97 + }
+1 -1
nixos/modules/services/networking/netbird.nix
··· 310 mkdir -p "$out/share/applications" 311 substitute ${cfg.ui.package}/share/applications/netbird.desktop \ 312 "$out/share/applications/${mkBin "netbird"}.desktop" \ 313 - --replace-fail 'Name=NetBird' "Name=NetBird @ ${client.service.name}" \ 314 --replace-fail '${lib.getExe cfg.ui.package}' "$out/bin/${mkBin "netbird-ui"}" 315 '') 316 ];
··· 310 mkdir -p "$out/share/applications" 311 substitute ${cfg.ui.package}/share/applications/netbird.desktop \ 312 "$out/share/applications/${mkBin "netbird"}.desktop" \ 313 + --replace-fail 'Name=Netbird' "Name=NetBird @ ${client.service.name}" \ 314 --replace-fail '${lib.getExe cfg.ui.package}' "$out/bin/${mkBin "netbird-ui"}" 315 '') 316 ];
+8 -12
nixos/modules/services/networking/prosody.nix
··· 567 568 ${lib.concatMapStrings (muc: '' 569 Component ${toLua muc.domain} "muc" 570 - modules_enabled = {${optionalString cfg.modules.mam ''" muc_mam",''}${optionalString muc.allowners_muc ''" muc_allowners",''} } 571 name = ${toLua muc.name} 572 restrict_room_creation = ${toLua muc.restrictRoomCreation} 573 max_history_messages = ${toLua muc.maxHistoryMessages} ··· 585 ${muc.extraConfig} 586 '') cfg.muc} 587 588 - ${ 589 - lib.optionalString (cfg.httpFileShare != null) '' 590 - Component ${toLua cfg.httpFileShare.domain} "http_file_share" 591 - modules_disabled = { "s2s" } 592 - '' 593 - + lib.optionalString (cfg.httpFileShare.http_host != null) '' 594 http_host = "${cfg.httpFileShare.http_host}" 595 - '' 596 - + '' 597 - ${settingsToLua " http_file_share_" (cfg.httpFileShare // { domain = null; })} 598 - '' 599 - } 600 601 ${lib.concatStringsSep "\n" ( 602 lib.mapAttrsToList (n: v: ''
··· 567 568 ${lib.concatMapStrings (muc: '' 569 Component ${toLua muc.domain} "muc" 570 + modules_enabled = {${optionalString cfg.modules.mam ''"muc_mam",''}${optionalString muc.allowners_muc ''"muc_allowners",''} } 571 name = ${toLua muc.name} 572 restrict_room_creation = ${toLua muc.restrictRoomCreation} 573 max_history_messages = ${toLua muc.maxHistoryMessages} ··· 585 ${muc.extraConfig} 586 '') cfg.muc} 587 588 + ${lib.optionalString (cfg.httpFileShare != null) '' 589 + Component ${toLua cfg.httpFileShare.domain} "http_file_share" 590 + modules_disabled = { "s2s" } 591 + ${lib.optionalString (cfg.httpFileShare.http_host != null) '' 592 http_host = "${cfg.httpFileShare.http_host}" 593 + ''} 594 + ${settingsToLua " http_file_share_" (cfg.httpFileShare // { domain = null; })} 595 + ''} 596 597 ${lib.concatStringsSep "\n" ( 598 lib.mapAttrsToList (n: v: ''
+25 -1
nixos/modules/services/networking/tayga.nix
··· 23 data-dir ${cfg.dataDir} 24 25 ${concatStringsSep "\n" (mapAttrsToList (ipv4: ipv6: "map " + ipv4 + " " + ipv6) cfg.mappings)} 26 ''; 27 28 addrOpts = ··· 132 } 133 ''; 134 }; 135 }; 136 }; 137 ··· 171 }; 172 }; 173 174 systemd.services.tayga = { 175 description = "Stateless NAT64 implementation"; 176 wantedBy = [ "multi-user.target" ]; 177 after = [ "network.target" ]; 178 179 serviceConfig = { 180 - ExecStart = "${cfg.package}/bin/tayga -d --nodetach --config ${configFile}"; 181 ExecReload = "${pkgs.coreutils}/bin/kill -SIGHUP $MAINPID"; 182 Restart = "always"; 183
··· 23 data-dir ${cfg.dataDir} 24 25 ${concatStringsSep "\n" (mapAttrsToList (ipv4: ipv6: "map " + ipv4 + " " + ipv6) cfg.mappings)} 26 + 27 + ${optionalString ((builtins.length cfg.log) > 0) '' 28 + log ${concatStringsSep " " cfg.log} 29 + ''} 30 + 31 + wkpf-strict ${if cfg.wkpfStrict then "yes" else "no"} 32 ''; 33 34 addrOpts = ··· 138 } 139 ''; 140 }; 141 + 142 + log = mkOption { 143 + type = types.listOf types.str; 144 + default = [ ]; 145 + description = "Packet errors to log (drop, reject, icmp, self)"; 146 + example = literalExpression '' 147 + [ "drop" "reject" "icmp" "self" ] 148 + ''; 149 + }; 150 + 151 + wkpfStrict = mkOption { 152 + type = types.bool; 153 + default = true; 154 + description = "Enable restrictions on the use of the well-known prefix (64:ff9b::/96) - prevents translation of non-global IPv4 ranges when using the well-known prefix. Must be enabled for RFC 6052 compatibility."; 155 + }; 156 }; 157 }; 158 ··· 192 }; 193 }; 194 195 + environment.etc."tayga.conf".source = configFile; 196 + 197 systemd.services.tayga = { 198 description = "Stateless NAT64 implementation"; 199 wantedBy = [ "multi-user.target" ]; 200 after = [ "network.target" ]; 201 202 + reloadTriggers = [ configFile ]; 203 serviceConfig = { 204 + ExecStart = "${cfg.package}/bin/tayga -d --nodetach --config /etc/tayga.conf"; 205 ExecReload = "${pkgs.coreutils}/bin/kill -SIGHUP $MAINPID"; 206 Restart = "always"; 207
+39 -1
nixos/modules/services/video/frigate.nix
··· 13 elem 14 filterAttrsRecursive 15 hasPrefix 16 makeLibraryPath 17 mkDefault 18 mkEnableOption ··· 29 format = pkgs.formats.yaml { }; 30 31 filteredConfig = converge (filterAttrsRecursive (_: v: !elem v [ null ])) cfg.settings; 32 33 cameraFormat = 34 with types; ··· 163 164 - https://docs.frigate.video/configuration/hardware_acceleration 165 - https://docs.frigate.video/configuration/ffmpeg_presets#hwaccel-presets 166 ''; 167 }; 168 ··· 636 rm --recursive --force /var/cache/frigate/!(model_cache) 637 '') 638 (pkgs.writeShellScript "frigate-create-writable-config" '' 639 - cp --no-preserve=mode "${format.generate "frigate.yml" filteredConfig}" /run/frigate/frigate.yml 640 '') 641 ]; 642 ExecStart = "${cfg.package.python.interpreter} -m frigate";
··· 13 elem 14 filterAttrsRecursive 15 hasPrefix 16 + literalExpression 17 makeLibraryPath 18 mkDefault 19 mkEnableOption ··· 30 format = pkgs.formats.yaml { }; 31 32 filteredConfig = converge (filterAttrsRecursive (_: v: !elem v [ null ])) cfg.settings; 33 + 34 + configFileUnchecked = format.generate "frigate.yaml" filteredConfig; 35 + configFileChecked = 36 + pkgs.runCommand "frigate-config" 37 + { 38 + preferLocalBuilds = true; 39 + } 40 + '' 41 + function error() { 42 + cat << 'HEREDOC' 43 + 44 + Note that not all configurations can be reliably checked in the 45 + build sandbox. 46 + 47 + This check can be disabled using `services.frigate.checkConfig`. 48 + HEREDOC 49 + 50 + exit 1 51 + } 52 + 53 + cp ${configFileUnchecked} $out 54 + export CONFIG_FILE=$out 55 + export PYTHONPATH=${cfg.package.pythonPath} 56 + ${cfg.package.python.interpreter} -m frigate --validate-config || error 57 + ''; 58 + configFile = if cfg.checkConfig then configFileChecked else configFileUnchecked; 59 60 cameraFormat = 61 with types; ··· 190 191 - https://docs.frigate.video/configuration/hardware_acceleration 192 - https://docs.frigate.video/configuration/ffmpeg_presets#hwaccel-presets 193 + ''; 194 + }; 195 + 196 + checkConfig = mkOption { 197 + type = bool; 198 + default = pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform; 199 + defaultText = literalExpression '' 200 + pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform 201 + ''; 202 + description = '' 203 + Whether to check the configuration at build time. 204 ''; 205 }; 206 ··· 674 rm --recursive --force /var/cache/frigate/!(model_cache) 675 '') 676 (pkgs.writeShellScript "frigate-create-writable-config" '' 677 + cp --no-preserve=mode ${configFile} /run/frigate/frigate.yml 678 '') 679 ]; 680 ExecStart = "${cfg.package.python.interpreter} -m frigate";
+1 -1
nixos/modules/services/web-apps/jitsi-meet.nix
··· 235 236 # required for muc_breakout_rooms 237 package = lib.mkDefault ( 238 - config.services.prosody.package.override { 239 withExtraLuaPackages = p: with p; [ cjson ]; 240 } 241 );
··· 235 236 # required for muc_breakout_rooms 237 package = lib.mkDefault ( 238 + pkgs.prosody.override { 239 withExtraLuaPackages = p: with p; [ cjson ]; 240 } 241 );
+2 -2
nixos/modules/services/web-apps/mediawiki.nix
··· 711 tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c 64 > ${stateDir}/secret.key 712 fi 713 714 - echo "exit( wfGetDB( DB_PRIMARY )->tableExists( 'user' ) ? 1 : 0 );" | \ 715 - ${php}/bin/php ${pkg}/share/mediawiki/maintenance/eval.php --conf ${mediawikiConfig} && \ 716 ${php}/bin/php ${pkg}/share/mediawiki/maintenance/install.php \ 717 --confpath /tmp \ 718 --scriptpath / \
··· 711 tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c 64 > ${stateDir}/secret.key 712 fi 713 714 + echo "exit( \$this->getPrimaryDB()->tableExists( 'user' ) ? 1 : 0 );" | \ 715 + ${php}/bin/php ${pkg}/share/mediawiki/maintenance/run.php eval --conf ${mediawikiConfig} && \ 716 ${php}/bin/php ${pkg}/share/mediawiki/maintenance/install.php \ 717 --confpath /tmp \ 718 --scriptpath / \
+1 -1
nixos/modules/system/activation/activation-script.nix
··· 317 source ${config.system.build.earlyMountScript} 318 ''; 319 320 - systemd.user = { 321 services.nixos-activation = { 322 description = "Run user-specific NixOS activation"; 323 script = config.system.userActivationScripts.script;
··· 317 source ${config.system.build.earlyMountScript} 318 ''; 319 320 + systemd.user = lib.mkIf config.system.activatable { 321 services.nixos-activation = { 322 description = "Run user-specific NixOS activation"; 323 script = config.system.userActivationScripts.script;
+6 -4
nixos/modules/system/boot/kernel.nix
··· 102 { 103 name = "foo"; 104 patch = ./foo.patch; 105 - extraStructuredConfig.FOO = lib.kernel.yes; 106 features.foo = true; 107 } 108 { ··· 127 # (required, but can be null if only config changes 128 # are needed) 129 130 - extraStructuredConfig = { # attrset of extra configuration parameters without the CONFIG_ prefix 131 FOO = lib.kernel.yes; # (optional) 132 }; # values should generally be lib.kernel.yes, 133 # lib.kernel.no or lib.kernel.module ··· 138 139 extraConfig = "FOO y"; # extra configuration options in string form without the CONFIG_ prefix 140 # (optional, multiple lines allowed to specify multiple options) 141 - # (deprecated, use extraStructuredConfig instead) 142 } 143 ``` 144 ··· 414 415 ln -s ${initrdPath} $out/initrd 416 417 - ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out 418 419 ln -s ${config.hardware.firmware}/lib/firmware $out/firmware 420 '';
··· 102 { 103 name = "foo"; 104 patch = ./foo.patch; 105 + structuredExtraConfig.FOO = lib.kernel.yes; 106 features.foo = true; 107 } 108 { ··· 127 # (required, but can be null if only config changes 128 # are needed) 129 130 + structuredExtraConfig = { # attrset of extra configuration parameters without the CONFIG_ prefix 131 FOO = lib.kernel.yes; # (optional) 132 }; # values should generally be lib.kernel.yes, 133 # lib.kernel.no or lib.kernel.module ··· 138 139 extraConfig = "FOO y"; # extra configuration options in string form without the CONFIG_ prefix 140 # (optional, multiple lines allowed to specify multiple options) 141 + # (deprecated, use structuredExtraConfig instead) 142 } 143 ``` 144 ··· 414 415 ln -s ${initrdPath} $out/initrd 416 417 + ${optionalString (config.boot.initrd.secrets != { }) '' 418 + ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out 419 + ''} 420 421 ln -s ${config.hardware.firmware}/lib/firmware $out/firmware 422 '';
+17 -2
nixos/modules/system/boot/kexec.nix
··· 1 - { pkgs, lib, ... }: 2 3 { 4 - config = lib.mkIf (lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools) { 5 environment.systemPackages = [ pkgs.kexec-tools ]; 6 7 systemd.services.prepare-kexec = {
··· 1 + { 2 + config, 3 + pkgs, 4 + lib, 5 + ... 6 + }: 7 8 + let 9 + cfg = config.boot.kexec; 10 + in 11 { 12 + options.boot.kexec = { 13 + enable = lib.mkEnableOption "kexec" // { 14 + default = lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools; 15 + defaultText = lib.literalExpression ''lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools''; 16 + }; 17 + }; 18 + 19 + config = lib.mkIf cfg.enable { 20 environment.systemPackages = [ pkgs.kexec-tools ]; 21 22 systemd.services.prepare-kexec = {
+1 -7
nixos/modules/tasks/filesystems.nix
··· 461 # Add the mount helpers to the system path so that `mount' can find them. 462 system.fsPackages = [ pkgs.dosfstools ]; 463 464 - environment.systemPackages = 465 - with pkgs; 466 - [ 467 - fuse3 468 - fuse 469 - ] 470 - ++ config.system.fsPackages; 471 472 environment.etc.fstab.text = 473 let
··· 461 # Add the mount helpers to the system path so that `mount' can find them. 462 system.fsPackages = [ pkgs.dosfstools ]; 463 464 + environment.systemPackages = config.system.fsPackages; 465 466 environment.etc.fstab.text = 467 let
+13 -11
nixos/modules/tasks/network-interfaces.nix
··· 1767 text = cfg.hostName + "\n"; 1768 }; 1769 1770 - environment.systemPackages = [ 1771 - pkgs.host 1772 - pkgs.hostname-debian 1773 - pkgs.iproute2 1774 - pkgs.iputils 1775 - ] 1776 - ++ optionals config.networking.wireless.enable [ 1777 - pkgs.wirelesstools # FIXME: obsolete? 1778 - pkgs.iw 1779 - ] 1780 - ++ bridgeStp; 1781 1782 # Wake-on-LAN configuration is shared by the scripted and networkd backends. 1783 systemd.network.links = pipe interfaces [
··· 1767 text = cfg.hostName + "\n"; 1768 }; 1769 1770 + environment.corePackages = lib.mkOptionDefault ( 1771 + [ 1772 + pkgs.host 1773 + pkgs.hostname-debian 1774 + pkgs.iproute2 1775 + pkgs.iputils 1776 + ] 1777 + ++ optionals config.networking.wireless.enable [ 1778 + pkgs.wirelesstools # FIXME: obsolete? 1779 + pkgs.iw 1780 + ] 1781 + ++ bridgeStp 1782 + ); 1783 1784 # Wake-on-LAN configuration is shared by the scripted and networkd backends. 1785 systemd.network.links = pipe interfaces [
+1
nixos/tests/all-tests.nix
··· 1059 }; 1060 nixpkgs = pkgs.callPackage ../modules/misc/nixpkgs/test.nix { inherit evalMinimalConfig; }; 1061 nixseparatedebuginfod = runTest ./nixseparatedebuginfod.nix; 1062 node-red = runTest ./node-red.nix; 1063 nomad = runTest ./nomad.nix; 1064 nominatim = runTest ./nominatim.nix;
··· 1059 }; 1060 nixpkgs = pkgs.callPackage ../modules/misc/nixpkgs/test.nix { inherit evalMinimalConfig; }; 1061 nixseparatedebuginfod = runTest ./nixseparatedebuginfod.nix; 1062 + nixseparatedebuginfod2 = runTest ./nixseparatedebuginfod2.nix; 1063 node-red = runTest ./node-red.nix; 1064 nomad = runTest ./nomad.nix; 1065 nominatim = runTest ./nominatim.nix;
+13 -12
nixos/tests/nixseparatedebuginfod.nix
··· 5 in 6 { 7 name = "nixseparatedebuginfod"; 8 - # A binary cache with debug info and source for nix 9 nodes.cache = 10 { pkgs, ... }: 11 { ··· 15 openFirewall = true; 16 }; 17 system.extraDependencies = [ 18 - pkgs.nix.debug 19 - pkgs.nix.src 20 pkgs.sl 21 ]; 22 }; ··· 33 environment.systemPackages = [ 34 pkgs.valgrind 35 pkgs.gdb 36 (pkgs.writeShellScriptBin "wait_for_indexation" '' 37 set -x 38 - while debuginfod-find debuginfo /run/current-system/sw/bin/nix |& grep 'File too large'; do 39 sleep 1; 40 done 41 '') ··· 56 57 # nixseparatedebuginfod needs .drv to associate executable -> source 58 # on regular systems this would be provided by nixos-rebuild 59 - machine.succeed("nix-instantiate '<nixpkgs>' -A nix") 60 61 machine.succeed("timeout 600 wait_for_indexation") 62 63 # test debuginfod-find 64 - machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/nix") 65 66 # test that gdb can fetch source 67 - out = machine.succeed("gdb /run/current-system/sw/bin/nix --batch -x ${builtins.toFile "commands" '' 68 start 69 l 70 ''}") 71 print(out) 72 - assert 'int main(' in out 73 74 # test that valgrind can display location information 75 - # this relies on the fact that valgrind complains about nix 76 - # libgc helps in this regard, and we also ask valgrind to show leak kinds 77 # which are usually false positives. 78 - out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all nix-env --version 2>&1") 79 print(out) 80 - assert 'main.cc' in out 81 ''; 82 }
··· 5 in 6 { 7 name = "nixseparatedebuginfod"; 8 + # A binary cache with debug info and source for gnumake 9 nodes.cache = 10 { pkgs, ... }: 11 { ··· 15 openFirewall = true; 16 }; 17 system.extraDependencies = [ 18 + pkgs.gnumake.debug 19 + pkgs.gnumake.src 20 pkgs.sl 21 ]; 22 }; ··· 33 environment.systemPackages = [ 34 pkgs.valgrind 35 pkgs.gdb 36 + pkgs.gnumake 37 (pkgs.writeShellScriptBin "wait_for_indexation" '' 38 set -x 39 + while debuginfod-find debuginfo /run/current-system/sw/bin/make |& grep 'File too large'; do 40 sleep 1; 41 done 42 '') ··· 57 58 # nixseparatedebuginfod needs .drv to associate executable -> source 59 # on regular systems this would be provided by nixos-rebuild 60 + machine.succeed("nix-instantiate '<nixpkgs>' -A gnumake") 61 62 machine.succeed("timeout 600 wait_for_indexation") 63 64 # test debuginfod-find 65 + machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/make") 66 67 # test that gdb can fetch source 68 + out = machine.succeed("gdb /run/current-system/sw/bin/make --batch -x ${builtins.toFile "commands" '' 69 start 70 l 71 ''}") 72 print(out) 73 + assert 'main (int argc, char **argv, char **envp)' in out 74 75 # test that valgrind can display location information 76 + # this relies on the fact that valgrind complains about gnumake 77 + # because we also ask valgrind to show leak kinds 78 # which are usually false positives. 79 + out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all make --version 2>&1") 80 print(out) 81 + assert 'main.c' in out 82 ''; 83 }
+72
nixos/tests/nixseparatedebuginfod2.nix
···
··· 1 + { pkgs, lib, ... }: 2 + { 3 + name = "nixseparatedebuginfod2"; 4 + # A binary cache with debug info and source for gnumake 5 + nodes.cache = 6 + { pkgs, ... }: 7 + { 8 + services.nginx = { 9 + enable = true; 10 + virtualHosts.default = { 11 + default = true; 12 + addSSL = false; 13 + root = "/var/lib/thebinarycache"; 14 + }; 15 + }; 16 + networking.firewall.allowedTCPPorts = [ 80 ]; 17 + systemd.services.buildthebinarycache = { 18 + before = [ "nginx.service" ]; 19 + wantedBy = [ "nginx.service" ]; 20 + script = '' 21 + ${pkgs.nix}/bin/nix --extra-experimental-features nix-command copy --to file:///var/lib/thebinarycache?index-debug-info=true ${pkgs.gnumake.debug} ${pkgs.gnumake} ${pkgs.gnumake.src} ${pkgs.sl} 22 + ''; 23 + serviceConfig = { 24 + User = "nginx"; 25 + Group = "nginx"; 26 + StateDirectory = "thebinarycache"; 27 + Type = "oneshot"; 28 + }; 29 + }; 30 + }; 31 + # the machine where we need the debuginfo 32 + nodes.machine = { 33 + services.nixseparatedebuginfod2 = { 34 + enable = true; 35 + substituter = "http://cache"; 36 + }; 37 + environment.systemPackages = [ 38 + pkgs.valgrind 39 + pkgs.gdb 40 + pkgs.gnumake 41 + ]; 42 + }; 43 + testScript = '' 44 + start_all() 45 + cache.wait_for_unit("nginx.service") 46 + cache.wait_for_open_port(80) 47 + machine.wait_for_unit("nixseparatedebuginfod2.service") 48 + machine.wait_for_open_port(1950) 49 + 50 + with subtest("check that the binary cache works"): 51 + machine.succeed("nix-store --extra-substituters http://cache --option require-sigs false -r ${pkgs.sl}") 52 + 53 + # test debuginfod-find 54 + machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/make") 55 + 56 + # test that gdb can fetch source 57 + out = machine.succeed("gdb /run/current-system/sw/bin/make --batch -x ${builtins.toFile "commands" '' 58 + start 59 + l 60 + ''}") 61 + print(out) 62 + assert 'main (int argc, char **argv, char **envp)' in out 63 + 64 + # test that valgrind can display location information 65 + # this relies on the fact that valgrind complains about gnumake 66 + # because we also ask valgrind to show leak kinds 67 + # which are usually false positives. 68 + out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all make --version 2>&1") 69 + print(out) 70 + assert 'main.c' in out 71 + ''; 72 + }
+24 -5
nixos/tests/tayga.nix
··· 31 }; 32 33 nodes = { 34 - # The server is configured with static IPv4 addresses. RFC 6052 Section 3.1 35 - # disallows the mapping of non-global IPv4 addresses like RFC 1918 into the 36 - # Well-Known Prefix 64:ff9b::/96. TAYGA also does not allow the mapping of 37 - # documentation space (RFC 5737). To circumvent this, 100.64.0.2/24 from 38 - # RFC 6589 (Carrier Grade NAT) is used here. 39 # To reach the IPv4 address pool of the NAT64 gateway, there is a static 40 # route configured. In normal cases, where the router would also source NAT 41 # the pool addresses to one IPv4 addresses, this would not be needed. ··· 63 }; 64 }; 65 programs.mtr.enable = true; 66 }; 67 68 # The router is configured with static IPv4 addresses towards the server ··· 87 ]; 88 89 networking = { 90 useDHCP = false; 91 useNetworkd = true; 92 firewall.enable = false; ··· 137 mappings = { 138 "192.0.2.42" = "2001:db8::2"; 139 }; 140 }; 141 }; 142 143 router_nixos = { ··· 152 ]; 153 154 networking = { 155 useDHCP = false; 156 firewall.enable = false; 157 interfaces.eth1 = lib.mkForce { ··· 201 mappings = { 202 "192.0.2.42" = "2001:db8::2"; 203 }; 204 }; 205 }; 206 207 # The client is configured with static IPv6 addresses. It has also a static ··· 233 }; 234 }; 235 programs.mtr.enable = true; 236 }; 237 }; 238
··· 31 }; 32 33 nodes = { 34 + # The server is configured with static IPv4 addresses. We have to disable the 35 + # well-known prefix restrictions (as required by RFC 6052 Section 3.1) because 36 + # we're using private space (TAYGA also considers documentation space non-global, 37 + # unfortunately). 38 # To reach the IPv4 address pool of the NAT64 gateway, there is a static 39 # route configured. In normal cases, where the router would also source NAT 40 # the pool addresses to one IPv4 addresses, this would not be needed. ··· 62 }; 63 }; 64 programs.mtr.enable = true; 65 + environment.systemPackages = [ pkgs.tcpdump ]; 66 }; 67 68 # The router is configured with static IPv4 addresses towards the server ··· 87 ]; 88 89 networking = { 90 + hostName = "router-systemd"; 91 useDHCP = false; 92 useNetworkd = true; 93 firewall.enable = false; ··· 138 mappings = { 139 "192.0.2.42" = "2001:db8::2"; 140 }; 141 + log = [ 142 + "drop" 143 + "reject" 144 + "icmp" 145 + "self" 146 + ]; 147 + wkpfStrict = false; 148 }; 149 + environment.systemPackages = [ pkgs.tcpdump ]; 150 }; 151 152 router_nixos = { ··· 161 ]; 162 163 networking = { 164 + hostName = "router-nixos"; 165 useDHCP = false; 166 firewall.enable = false; 167 interfaces.eth1 = lib.mkForce { ··· 211 mappings = { 212 "192.0.2.42" = "2001:db8::2"; 213 }; 214 + log = [ 215 + "drop" 216 + "reject" 217 + "icmp" 218 + "self" 219 + ]; 220 + wkpfStrict = false; 221 }; 222 + environment.systemPackages = [ pkgs.tcpdump ]; 223 }; 224 225 # The client is configured with static IPv6 addresses. It has also a static ··· 251 }; 252 }; 253 programs.mtr.enable = true; 254 + environment.systemPackages = [ pkgs.tcpdump ]; 255 }; 256 }; 257
+2 -2
nixos/tests/velocity.nix
··· 37 (mkVelocityService "velocity-with-native" (pkgs.velocity.override { withVelocityNative = true; })) 38 ]; 39 40 - environment.systemPackages = [ pkgs.mcstatus ]; 41 }; 42 43 testScript = '' ··· 50 server.wait_until_succeeds(f"journalctl -b -u {name} | grep -q -E '{connections_startup_query}'") 51 server.wait_until_succeeds(f"journalctl -b -u {name} | grep -q 'Done ([0-9]*.[0-9]*s)!'"); 52 53 - _, status_result = server.execute("mcstatus localhost:25565 status") 54 assert "A Velocity Server" in status_result 55 56 server.execute(f"echo stop > /run/{name}.stdin")
··· 37 (mkVelocityService "velocity-with-native" (pkgs.velocity.override { withVelocityNative = true; })) 38 ]; 39 40 + environment.systemPackages = [ (pkgs.python3.withPackages (p: [ p.mcstatus ])) ]; 41 }; 42 43 testScript = '' ··· 50 server.wait_until_succeeds(f"journalctl -b -u {name} | grep -q -E '{connections_startup_query}'") 51 server.wait_until_succeeds(f"journalctl -b -u {name} | grep -q 'Done ([0-9]*.[0-9]*s)!'"); 52 53 + _, status_result = server.execute("python -m mcstatus localhost:25565 status") 54 assert "A Velocity Server" in status_result 55 56 server.execute(f"echo stop > /run/{name}.stdin")
+13
pkgs/applications/editors/vim/plugins/generated.nix
··· 21974 meta.hydraPlatforms = [ ]; 21975 }; 21976 21977 wrapping-nvim = buildVimPlugin { 21978 pname = "wrapping.nvim"; 21979 version = "2025-01-16";
··· 21974 meta.hydraPlatforms = [ ]; 21975 }; 21976 21977 + workspaces-nvim = buildVimPlugin { 21978 + pname = "workspaces.nvim"; 21979 + version = "2024-10-08"; 21980 + src = fetchFromGitHub { 21981 + owner = "natecraddock"; 21982 + repo = "workspaces.nvim"; 21983 + rev = "55a1eb6f5b72e07ee8333898254e113e927180ca"; 21984 + sha256 = "143xzg60yiw1aam7sc5rva9bzzmshfzpm2sacimwr8188qsz8xvb"; 21985 + }; 21986 + meta.homepage = "https://github.com/natecraddock/workspaces.nvim/"; 21987 + meta.hydraPlatforms = [ ]; 21988 + }; 21989 + 21990 wrapping-nvim = buildVimPlugin { 21991 pname = "wrapping.nvim"; 21992 version = "2025-01-16";
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 1687 https://github.com/wannesm/wmgraphviz.vim/,, 1688 https://github.com/vim-scripts/wombat256.vim/,, 1689 https://github.com/lukaszkorecki/workflowish/,, 1690 https://github.com/andrewferrier/wrapping.nvim/,HEAD, 1691 https://github.com/tweekmonster/wstrip.vim/,, 1692 https://github.com/piersolenski/wtf.nvim/,HEAD,
··· 1687 https://github.com/wannesm/wmgraphviz.vim/,, 1688 https://github.com/vim-scripts/wombat256.vim/,, 1689 https://github.com/lukaszkorecki/workflowish/,, 1690 + https://github.com/natecraddock/workspaces.nvim/,HEAD, 1691 https://github.com/andrewferrier/wrapping.nvim/,HEAD, 1692 https://github.com/tweekmonster/wstrip.vim/,, 1693 https://github.com/piersolenski/wtf.nvim/,HEAD,
+2 -2
pkgs/applications/editors/vscode/extensions/WakaTime.vscode-wakatime/default.nix
··· 7 mktplcRef = { 8 name = "vscode-wakatime"; 9 publisher = "WakaTime"; 10 - version = "25.2.2"; 11 - hash = "sha256-9Ldb45tCgLaTdntmQlcIPe13ZTeIVGKrHYXLRgLlB0w="; 12 }; 13 14 meta = {
··· 7 mktplcRef = { 8 name = "vscode-wakatime"; 9 publisher = "WakaTime"; 10 + version = "25.3.0"; 11 + hash = "sha256-cw3wcMr8QKG75VofIsAmlD2RqN/0fGdqhugen/vmJlo="; 12 }; 13 14 meta = {
+2 -2
pkgs/applications/editors/vscode/extensions/dbaeumer.vscode-eslint/default.nix
··· 7 mktplcRef = { 8 name = "vscode-eslint"; 9 publisher = "dbaeumer"; 10 - version = "3.0.15"; 11 - hash = "sha256-oeudNCBrHO3yvw3FrFA4EZk1yODcRRfF/y3U5tdEz4I="; 12 }; 13 14 meta = {
··· 7 mktplcRef = { 8 name = "vscode-eslint"; 9 publisher = "dbaeumer"; 10 + version = "3.0.16"; 11 + hash = "sha256-UxD07bouMK8nuysh5TAV7ZVhkLiOV6R1qfvVZcXB2Hc="; 12 }; 13 14 meta = {
+12 -12
pkgs/applications/editors/vscode/extensions/default.nix
··· 477 mktplcRef = { 478 publisher = "ban"; 479 name = "spellright"; 480 - version = "3.0.144"; 481 - hash = "sha256-+JNvChnAi2p04X3VVWgBZQAsF5UpAQpG7fROYtjaHRo="; 482 }; 483 meta = { 484 description = "Visual Studio Code extension for Spellchecker"; ··· 493 mktplcRef = { 494 publisher = "banacorn"; 495 name = "agda-mode"; 496 - version = "0.6.2"; 497 - hash = "sha256-OQHNbzlTnpv2V5ICNTfAC1QM3bDnRgtJvgJKONxvU5M="; 498 }; 499 meta = { 500 changelog = "https://marketplace.visualstudio.com/items/banacorn.agda-mode/changelog"; ··· 788 mktplcRef = { 789 name = "vscode-tailwindcss"; 790 publisher = "bradlc"; 791 - version = "0.14.25"; 792 - hash = "sha256-NXA7UDSo6G0Did6tzwgIYnjR+ymoY7V5aUtaFzqlVik="; 793 }; 794 meta = { 795 changelog = "https://marketplace.visualstudio.com/items/bradlc.vscode-tailwindcss/changelog"; ··· 1212 mktplcRef = { 1213 publisher = "DanielSanMedium"; 1214 name = "dscodegpt"; 1215 - version = "3.13.40"; 1216 - hash = "sha256-2O96Bey2VKj2FdK1nJSYSKE9fltciNbqD/UI7rKlFgY="; 1217 }; 1218 meta = { 1219 changelog = "https://marketplace.visualstudio.com/items/DanielSanMedium.dscodegpt/changelog"; ··· 3169 mktplcRef = { 3170 name = "compare-folders"; 3171 publisher = "moshfeu"; 3172 - version = "0.25.1"; 3173 - hash = "sha256-axNTdnSkMkFs7LSZCc7VinjbrDncsRHlRtDG9+eh2qQ="; 3174 }; 3175 3176 meta = { ··· 5255 mktplcRef = { 5256 name = "volar"; 5257 publisher = "Vue"; 5258 - version = "3.0.4"; 5259 - hash = "sha256-Eqg4+jX1dARryfb9Ueb2qng5xwhyaU6cDG089nlLNgc="; 5260 }; 5261 meta = { 5262 changelog = "https://github.com/vuejs/language-tools/blob/master/CHANGELOG.md";
··· 477 mktplcRef = { 478 publisher = "ban"; 479 name = "spellright"; 480 + version = "3.0.146"; 481 + hash = "sha256-gvj5vWA8VAy5Ohtkn9vsx7MswgVAcxYOLm+ifKhjLz0="; 482 }; 483 meta = { 484 description = "Visual Studio Code extension for Spellchecker"; ··· 493 mktplcRef = { 494 publisher = "banacorn"; 495 name = "agda-mode"; 496 + version = "0.6.3"; 497 + hash = "sha256-ZyFY3pzNUUpdAB3lqys/z0NOUrQA/qmPquRPNFw/JAI="; 498 }; 499 meta = { 500 changelog = "https://marketplace.visualstudio.com/items/banacorn.agda-mode/changelog"; ··· 788 mktplcRef = { 789 name = "vscode-tailwindcss"; 790 publisher = "bradlc"; 791 + version = "0.14.26"; 792 + hash = "sha256-agntfMsLAYASviH7Wuw/W8JwfHRi6qAfuMkqmFWT0bg="; 793 }; 794 meta = { 795 changelog = "https://marketplace.visualstudio.com/items/bradlc.vscode-tailwindcss/changelog"; ··· 1212 mktplcRef = { 1213 publisher = "DanielSanMedium"; 1214 name = "dscodegpt"; 1215 + version = "3.14.3"; 1216 + hash = "sha256-B0FYMM7usSkQgq7jZfo3uEvERRQ6PrinO36KJGke/Yo="; 1217 }; 1218 meta = { 1219 changelog = "https://marketplace.visualstudio.com/items/DanielSanMedium.dscodegpt/changelog"; ··· 3169 mktplcRef = { 3170 name = "compare-folders"; 3171 publisher = "moshfeu"; 3172 + version = "0.25.3"; 3173 + hash = "sha256-QrSh8/AycC5nKbZ1+E3V/lJu/7Skket8b05yPnZg68s="; 3174 }; 3175 3176 meta = { ··· 5255 mktplcRef = { 5256 name = "volar"; 5257 publisher = "Vue"; 5258 + version = "3.0.5"; 5259 + hash = "sha256-Ja0zWCHHxd1XE2f2ZQvchqzCKv0pbcAU3uEh2f6+X3c="; 5260 }; 5261 meta = { 5262 changelog = "https://github.com/vuejs/language-tools/blob/master/CHANGELOG.md";
+2 -2
pkgs/applications/editors/vscode/extensions/fstarlang.fstar-vscode-assistant/default.nix
··· 4 mktplcRef = { 5 name = "fstar-vscode-assistant"; 6 publisher = "FStarLang"; 7 - version = "0.18.1"; 8 - hash = "sha256-uiw3EJbYoDG5r93NIxloiF7Co3gxcZT9+hlLZFnxkBE="; 9 }; 10 meta = { 11 description = "Interactive editing mode VS Code extension for F*";
··· 4 mktplcRef = { 5 name = "fstar-vscode-assistant"; 6 publisher = "FStarLang"; 7 + version = "0.19.1"; 8 + hash = "sha256-bC9Kzhp4H9wykuitEKQUthYVhmVI/m8H0PloBqoFbvU="; 9 }; 10 meta = { 11 description = "Interactive editing mode VS Code extension for F*";
-1
pkgs/applications/editors/vscode/extensions/ndonfris.fish-lsp/default.nix
··· 16 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ndonfris.fish-lsp"; 17 homepage = "https://github.com/ndonfris/fish-lsp"; 18 license = lib.licenses.mit; 19 - maintainers = with lib.maintainers; [ tuynia ]; 20 }; 21 }
··· 16 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ndonfris.fish-lsp"; 17 homepage = "https://github.com/ndonfris/fish-lsp"; 18 license = lib.licenses.mit; 19 }; 20 }
-1
pkgs/applications/editors/vscode/extensions/oliver-ni.scheme-fmt/default.nix
··· 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=oliver-ni.scheme-fmt"; 25 homepage = "https://github.com/oliver-ni/scheme-fmt"; 26 license = lib.licenses.cc0; 27 - maintainers = with lib.maintainers; [ tuynia ]; 28 }; 29 }
··· 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=oliver-ni.scheme-fmt"; 25 homepage = "https://github.com/oliver-ni/scheme-fmt"; 26 license = lib.licenses.cc0; 27 }; 28 }
-1
pkgs/applications/editors/vscode/extensions/release-candidate.vscode-scheme-repl/default.nix
··· 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=release-candidate.vscode-scheme-repl"; 25 homepage = "https://github.com/Release-Candidate/vscode-scheme-repl"; 26 license = lib.licenses.mit; 27 - maintainers = with lib.maintainers; [ tuynia ]; 28 }; 29 }
··· 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=release-candidate.vscode-scheme-repl"; 25 homepage = "https://github.com/Release-Candidate/vscode-scheme-repl"; 26 license = lib.licenses.mit; 27 }; 28 }
+2 -2
pkgs/applications/editors/vscode/extensions/rooveterinaryinc.roo-cline/default.nix
··· 8 mktplcRef = { 9 publisher = "RooVeterinaryInc"; 10 name = "roo-cline"; 11 - version = "3.25.4"; 12 - hash = "sha256-uyI/VdBpkCxzlm1Ei2v/UjsenhyanDuVXLXk3Pkiw1s="; 13 }; 14 15 passthru.updateScript = vscode-extension-update-script { };
··· 8 mktplcRef = { 9 publisher = "RooVeterinaryInc"; 10 name = "roo-cline"; 11 + version = "3.25.10"; 12 + hash = "sha256-j9ydB6hR+Qx4HvBDMrYGev2K/vsG6ASeOQHhhYheEuw="; 13 }; 14 15 passthru.updateScript = vscode-extension-update-script { };
-1
pkgs/applications/editors/vscode/extensions/tsyesika.guile-scheme-enhanced/default.nix
··· 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=tsyesika.guile-scheme-enhanced"; 25 homepage = "https://codeberg.org/tsyesika/vscode-guile-scheme-enhanced"; 26 license = lib.licenses.asl20; 27 - maintainers = with lib.maintainers; [ tuynia ]; 28 }; 29 }
··· 24 downloadPage = "https://marketplace.visualstudio.com/items?itemName=tsyesika.guile-scheme-enhanced"; 25 homepage = "https://codeberg.org/tsyesika/vscode-guile-scheme-enhanced"; 26 license = lib.licenses.asl20; 27 }; 28 }
-1
pkgs/applications/editors/vscode/extensions/ufo5260987423.magic-scheme/default.nix
··· 26 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ufo5260987423.magic-scheme"; 27 homepage = "https://github.com/ufo5260987423/magic-scheme"; 28 license = lib.licenses.mit; 29 - maintainers = with lib.maintainers; [ tuynia ]; 30 }; 31 }
··· 26 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ufo5260987423.magic-scheme"; 27 homepage = "https://github.com/ufo5260987423/magic-scheme"; 28 license = lib.licenses.mit; 29 }; 30 }
+3 -3
pkgs/applications/emulators/libretro/cores/dolphin.nix
··· 17 }: 18 mkLibretroCore { 19 core = "dolphin"; 20 - version = "0-unstable-2025-05-17"; 21 22 src = fetchFromGitHub { 23 owner = "libretro"; 24 repo = "dolphin"; 25 - rev = "a09f78f735f0d2184f64ba5b134abe98ee99c65f"; 26 - hash = "sha256-NUnWNj47FmH8perfRwFFnaXeU58shUXqKFOzHf4ce5c="; 27 }; 28 29 extraNativeBuildInputs = [
··· 17 }: 18 mkLibretroCore { 19 core = "dolphin"; 20 + version = "0-unstable-2025-08-05"; 21 22 src = fetchFromGitHub { 23 owner = "libretro"; 24 repo = "dolphin"; 25 + rev = "83438f9b1a2c832319876a1fda130a5e33d4ef87"; 26 + hash = "sha256-q4y+3uJ1tQ2OvlEvi/JNyIO/RfuWNIEKfVZ6xEWKFCg="; 27 }; 28 29 extraNativeBuildInputs = [
+3 -3
pkgs/applications/emulators/libretro/cores/nestopia.nix
··· 5 }: 6 mkLibretroCore { 7 core = "nestopia"; 8 - version = "0-unstable-2025-07-20"; 9 10 src = fetchFromGitHub { 11 owner = "libretro"; 12 repo = "nestopia"; 13 - rev = "0e82a1642d4acafab4da9ce937954b85d846952b"; 14 - hash = "sha256-/r1EUb3Z6RaEycGnkU4RtYr0JjohgQmru99DG45OWKo="; 15 }; 16 17 makefile = "Makefile";
··· 5 }: 6 mkLibretroCore { 7 core = "nestopia"; 8 + version = "0-unstable-2025-08-09"; 9 10 src = fetchFromGitHub { 11 owner = "libretro"; 12 repo = "nestopia"; 13 + rev = "d33852f5efe89c87a06f8ce7d12b8b5451e9ae71"; 14 + hash = "sha256-v/jXoXgVEIXpxBgHZ/6oL+YGPDv9jefwdetiqLFBN9I="; 15 }; 16 17 makefile = "Makefile";
+1 -7
pkgs/applications/networking/browsers/chromium/default.nix
··· 79 pulseSupport 80 ungoogled 81 ; 82 - gnChromium = buildPackages.gn.overrideAttrs (oldAttrs: { 83 - version = if (upstream-info.deps.gn ? "version") then upstream-info.deps.gn.version else "0"; 84 - src = fetchgit { 85 - url = "https://gn.googlesource.com/gn"; 86 - inherit (upstream-info.deps.gn) rev hash; 87 - }; 88 - }); 89 }); 90 91 browser = callPackage ./browser.nix {
··· 79 pulseSupport 80 ungoogled 81 ; 82 + gnChromium = buildPackages.gn.override upstream-info.deps.gn; 83 }); 84 85 browser = callPackage ./browser.nix {
+4 -2
pkgs/applications/networking/browsers/chromium/info.json
··· 12 "hash": "sha256-UouvzNFStYScnyfIJcz1Om7cDhC7EyShZQ/Icu73BPo=" 13 }, 14 "gn": { 15 "rev": "97b68a0bb62b7528bc3491c7949d6804223c2b82", 16 - "hash": "sha256-m+z10s40Q/iYcoMw3o/+tmhIdqHMsYJjdGabHrK/aqo=" 17 }, 18 "npmHash": "sha256-R2gOpfPOUAmnsnUTIvzDPHuHNzL/b2fwlyyfTrywEcI=" 19 }, ··· 809 "hash": "sha256-UouvzNFStYScnyfIJcz1Om7cDhC7EyShZQ/Icu73BPo=" 810 }, 811 "gn": { 812 "rev": "97b68a0bb62b7528bc3491c7949d6804223c2b82", 813 - "hash": "sha256-m+z10s40Q/iYcoMw3o/+tmhIdqHMsYJjdGabHrK/aqo=" 814 }, 815 "ungoogled-patches": { 816 "rev": "139.0.7258.66-1",
··· 12 "hash": "sha256-UouvzNFStYScnyfIJcz1Om7cDhC7EyShZQ/Icu73BPo=" 13 }, 14 "gn": { 15 + "version": "0-unstable-2025-06-19", 16 "rev": "97b68a0bb62b7528bc3491c7949d6804223c2b82", 17 + "hash": "sha256-gwptzuirIdPAV9XCaAT09aM/fY7d6xgBU7oSu9C4tmE=" 18 }, 19 "npmHash": "sha256-R2gOpfPOUAmnsnUTIvzDPHuHNzL/b2fwlyyfTrywEcI=" 20 }, ··· 810 "hash": "sha256-UouvzNFStYScnyfIJcz1Om7cDhC7EyShZQ/Icu73BPo=" 811 }, 812 "gn": { 813 + "version": "0-unstable-2025-06-19", 814 "rev": "97b68a0bb62b7528bc3491c7949d6804223c2b82", 815 + "hash": "sha256-gwptzuirIdPAV9XCaAT09aM/fY7d6xgBU7oSu9C4tmE=" 816 }, 817 "ungoogled-patches": { 818 "rev": "139.0.7258.66-1",
+28 -11
pkgs/applications/networking/browsers/chromium/update.mjs
··· 62 chromedriver: !ungoogled ? await fetch_chromedriver_binaries(await get_latest_chromium_release('mac')) : undefined, 63 deps: { 64 depot_tools: {}, 65 - gn: {}, 66 'ungoogled-patches': !ungoogled ? undefined : { 67 rev: ungoogled_patches.rev, 68 hash: ungoogled_patches.hash, ··· 76 lockfile[attr_path].deps.depot_tools = { 77 rev: depot_tools.rev, 78 hash: depot_tools.hash, 79 - } 80 - 81 - const gn = await fetch_gn(chromium_rev, lockfile_initial[attr_path].deps.gn) 82 - lockfile[attr_path].deps.gn = { 83 - rev: gn.rev, 84 - hash: gn.hash, 85 } 86 87 // DEPS update loop ··· 133 134 async function fetch_gn(chromium_rev, gn_previous) { 135 const DEPS_file = await get_gitiles_file('https://chromium.googlesource.com/chromium/src', chromium_rev, 'DEPS') 136 - const gn_rev = /^\s+'gn_version': 'git_revision:(?<rev>.+)',$/m.exec(DEPS_file).groups.rev 137 - const hash = gn_rev === gn_previous.rev ? gn_previous.hash : '' 138 139 - return await prefetch_gitiles('https://gn.googlesource.com/gn', gn_rev, hash) 140 } 141 142 ··· 259 260 return hash 261 } 262 -
··· 62 chromedriver: !ungoogled ? await fetch_chromedriver_binaries(await get_latest_chromium_release('mac')) : undefined, 63 deps: { 64 depot_tools: {}, 65 + gn: await fetch_gn(chromium_rev, lockfile_initial[attr_path].deps.gn), 66 'ungoogled-patches': !ungoogled ? undefined : { 67 rev: ungoogled_patches.rev, 68 hash: ungoogled_patches.hash, ··· 76 lockfile[attr_path].deps.depot_tools = { 77 rev: depot_tools.rev, 78 hash: depot_tools.hash, 79 } 80 81 // DEPS update loop ··· 127 128 async function fetch_gn(chromium_rev, gn_previous) { 129 const DEPS_file = await get_gitiles_file('https://chromium.googlesource.com/chromium/src', chromium_rev, 'DEPS') 130 + const { rev } = /^\s+'gn_version': 'git_revision:(?<rev>.+)',$/m.exec(DEPS_file).groups 131 + 132 + const cache_hit = rev === gn_previous.rev; 133 + if (cache_hit) { 134 + return gn_previous 135 + } 136 + 137 + const commit_date = await get_gitiles_commit_date('https://gn.googlesource.com/gn', rev) 138 + const version = `0-unstable-${commit_date}` 139 + 140 + const expr = [`(import ./. {}).gn.override { version = "${version}"; rev = "${rev}"; hash = ""; }`] 141 + const derivation = await $nixpkgs`nix-instantiate --expr ${expr}` 142 143 + return { 144 + version, 145 + rev, 146 + hash: await prefetch_FOD(derivation), 147 + } 148 + } 149 + 150 + 151 + async function get_gitiles_commit_date(base_url, rev) { 152 + const url = `${base_url}/+/${rev}?format=json` 153 + const response = await (await fetch(url)).text() 154 + const json = JSON.parse(response.replace(`)]}'\n`, '')) 155 + 156 + const date = new Date(json.commiter.time) 157 + return date.toISOString().split("T")[0] 158 } 159 160 ··· 277 278 return hash 279 }
+3 -3
pkgs/applications/networking/cluster/helmfile/default.nix
··· 9 10 buildGoModule rec { 11 pname = "helmfile"; 12 - version = "1.1.3"; 13 14 src = fetchFromGitHub { 15 owner = "helmfile"; 16 repo = "helmfile"; 17 rev = "v${version}"; 18 - hash = "sha256-Nsfqd54QNRkeqUxUA05+0gtcoopz090/wW+zdFsEii8="; 19 }; 20 21 - vendorHash = "sha256-fiwxmF91UCTNi3jgrJnWgPswWXQFLg70d+h3frnu7kU="; 22 23 proxyVendor = true; # darwin/linux hash mismatch 24
··· 9 10 buildGoModule rec { 11 pname = "helmfile"; 12 + version = "1.1.4"; 13 14 src = fetchFromGitHub { 15 owner = "helmfile"; 16 repo = "helmfile"; 17 rev = "v${version}"; 18 + hash = "sha256-q0PIvTsl5wbzSNyrJbN6y8nB7yJB3NO2RAvWKr8hmNU="; 19 }; 20 21 + vendorHash = "sha256-frwwqVmkiWtA6eg4rcd/KbG5CiEoF+rRO66/6WMxawI="; 22 23 proxyVendor = true; # darwin/linux hash mismatch 24
+11 -11
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 335 "vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA=" 336 }, 337 "datadog": { 338 - "hash": "sha256-2BoazJ97yPtp627a5HpAVg9iD2OMIeXSmv5kkdxuTes=", 339 "homepage": "https://registry.terraform.io/providers/DataDog/datadog", 340 "owner": "DataDog", 341 "repo": "terraform-provider-datadog", 342 - "rev": "v3.69.0", 343 "spdx": "MPL-2.0", 344 - "vendorHash": "sha256-AQ+/+NCBBj4ptBGHJmibH6QZo4560dRRbs55SqY9buE=" 345 }, 346 "deno": { 347 "hash": "sha256-7IvJrhXMeAmf8e21QBdYNSJyVMEzLpat4Tm4zHWglW8=", ··· 633 "vendorHash": "sha256-SsEWNIBkgcdTlSrB4hIvRmhMv2eJ2qQaPUmiN09A+NM=" 634 }, 635 "huaweicloud": { 636 - "hash": "sha256-BzWYtn6KVVMq+wjqj3CMPKSzo9DzePIIdnRjJ53nJBI=", 637 "homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud", 638 "owner": "huaweicloud", 639 "repo": "terraform-provider-huaweicloud", 640 - "rev": "v1.77.1", 641 "spdx": "MPL-2.0", 642 "vendorHash": null 643 }, ··· 831 "vendorHash": "sha256-QxbZv6YMa5/I4bTeQBNdmG3EKtLEmstnH7HMiZzFJrI=" 832 }, 833 "migadu": { 834 - "hash": "sha256-3q9vhHt4VDqcIYHEZjJY0whvGPQWMDHkGsAQEES8EkE=", 835 "homepage": "https://registry.terraform.io/providers/metio/migadu", 836 "owner": "metio", 837 "repo": "terraform-provider-migadu", 838 - "rev": "2025.7.17", 839 "spdx": "0BSD", 840 - "vendorHash": "sha256-oipY2hwgRrntCxxHPyH06e8p+0fKfAQwhh2iBI4RGHQ=" 841 }, 842 "minio": { 843 "hash": "sha256-TLWbbWYTjnvxT1LaV3FsL31xHHov8LpDYhA/nchMyMo=", ··· 1210 "vendorHash": "sha256-MIO0VHofPtKPtynbvjvEukMNr5NXHgk7BqwIhbc9+u0=" 1211 }, 1212 "signalfx": { 1213 - "hash": "sha256-EoehHn7j3nnXzpHEjX4FQSO1na9xSmVpnTiPnTqUrpE=", 1214 "homepage": "https://registry.terraform.io/providers/splunk-terraform/signalfx", 1215 "owner": "splunk-terraform", 1216 "repo": "terraform-provider-signalfx", 1217 - "rev": "v9.17.0", 1218 "spdx": "MPL-2.0", 1219 - "vendorHash": "sha256-404/DlCtz0yAaM8zJ3ngJ2/DwoUJImjIqKYwdigHl4U=" 1220 }, 1221 "skytap": { 1222 "hash": "sha256-JII4czazo6Di2sad1uFHMKDO2gWgZlQE8l/+IRYHQHU=",
··· 335 "vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA=" 336 }, 337 "datadog": { 338 + "hash": "sha256-Fi1Ip/Uy89s8XeX5yT55LKjMw/Bk/B/Vwvc0qXTaYbw=", 339 "homepage": "https://registry.terraform.io/providers/DataDog/datadog", 340 "owner": "DataDog", 341 "repo": "terraform-provider-datadog", 342 + "rev": "v3.70.0", 343 "spdx": "MPL-2.0", 344 + "vendorHash": "sha256-IW7v9w3/X+v+AF8eRE4n1KI7MnLWlxkXzTvAJtsQ4Ik=" 345 }, 346 "deno": { 347 "hash": "sha256-7IvJrhXMeAmf8e21QBdYNSJyVMEzLpat4Tm4zHWglW8=", ··· 633 "vendorHash": "sha256-SsEWNIBkgcdTlSrB4hIvRmhMv2eJ2qQaPUmiN09A+NM=" 634 }, 635 "huaweicloud": { 636 + "hash": "sha256-LLQFgUy3Hv3HlcL4gnZPdIEcR95fqroKIH4cLyb21Sk=", 637 "homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud", 638 "owner": "huaweicloud", 639 "repo": "terraform-provider-huaweicloud", 640 + "rev": "v1.77.3", 641 "spdx": "MPL-2.0", 642 "vendorHash": null 643 }, ··· 831 "vendorHash": "sha256-QxbZv6YMa5/I4bTeQBNdmG3EKtLEmstnH7HMiZzFJrI=" 832 }, 833 "migadu": { 834 + "hash": "sha256-k7W/oaZeBY5/Wi1vRCD641DKc0KQbBa834WDmtBp5wY=", 835 "homepage": "https://registry.terraform.io/providers/metio/migadu", 836 "owner": "metio", 837 "repo": "terraform-provider-migadu", 838 + "rev": "2025.8.7", 839 "spdx": "0BSD", 840 + "vendorHash": "sha256-CokSZ4CgWBCb/MnGK410Lt9rwBq3luceoFAPLLrwT5U=" 841 }, 842 "minio": { 843 "hash": "sha256-TLWbbWYTjnvxT1LaV3FsL31xHHov8LpDYhA/nchMyMo=", ··· 1210 "vendorHash": "sha256-MIO0VHofPtKPtynbvjvEukMNr5NXHgk7BqwIhbc9+u0=" 1211 }, 1212 "signalfx": { 1213 + "hash": "sha256-hNMZbrihV+xlfamXRaGszQRqO8Tn2829rd4+pH83lrU=", 1214 "homepage": "https://registry.terraform.io/providers/splunk-terraform/signalfx", 1215 "owner": "splunk-terraform", 1216 "repo": "terraform-provider-signalfx", 1217 + "rev": "v9.19.1", 1218 "spdx": "MPL-2.0", 1219 + "vendorHash": "sha256-wpm7J8kfkm4vDZhZ0koQsgpW5JwWY7DngSYXfaWh3FQ=" 1220 }, 1221 "skytap": { 1222 "hash": "sha256-JII4czazo6Di2sad1uFHMKDO2gWgZlQE8l/+IRYHQHU=",
-1
pkgs/applications/science/math/mathematica/default.nix
··· 76 license = licenses.unfree; 77 sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 78 maintainers = with maintainers; [ 79 - herberteuler 80 rafaelrc 81 ]; 82 platforms = [ "x86_64-linux" ];
··· 76 license = licenses.unfree; 77 sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 78 maintainers = with maintainers; [ 79 rafaelrc 80 ]; 81 platforms = [ "x86_64-linux" ];
+3 -3
pkgs/applications/video/mpv/scripts/skipsilence.nix
··· 7 8 buildLua { 9 pname = "mpv-skipsilence"; 10 - version = "0-unstable-2024-05-06"; 11 12 src = fetchFromGitHub { 13 owner = "ferreum"; 14 repo = "mpv-skipsilence"; 15 - rev = "5ae7c3b6f927e728c22fc13007265682d1ecf98c"; 16 - hash = "sha256-fg8vfeb68nr0bTBIvr0FnRnoB48/kV957pn22tWcz1g="; 17 }; 18 19 passthru.updateScript = unstableGitUpdater { };
··· 7 8 buildLua { 9 pname = "mpv-skipsilence"; 10 + version = "0-unstable-2025-08-03"; 11 12 src = fetchFromGitHub { 13 owner = "ferreum"; 14 repo = "mpv-skipsilence"; 15 + rev = "42e511c52c68c1aa9678e18caea41e43eee9149b"; 16 + hash = "sha256-+sOMWFFumJUk5gFE1iCTvWub3PWzYOkulXJLCGS4fYA="; 17 }; 18 19 passthru.updateScript = unstableGitUpdater { };
+3 -3
pkgs/by-name/al/all-the-package-names/package.nix
··· 7 8 buildNpmPackage rec { 9 pname = "all-the-package-names"; 10 - version = "2.0.2159"; 11 12 src = fetchFromGitHub { 13 owner = "nice-registry"; 14 repo = "all-the-package-names"; 15 tag = "v${version}"; 16 - hash = "sha256-7c4cxGSBc60WTLjRptb8VbTf279BxDgVOiVaP4C7pKk="; 17 }; 18 19 - npmDepsHash = "sha256-fDQnEjPefRBbpCX21vZrJ3Y8y7d3PgM54IfPJbb44ao="; 20 21 passthru.updateScript = nix-update-script { }; 22
··· 7 8 buildNpmPackage rec { 9 pname = "all-the-package-names"; 10 + version = "2.0.2168"; 11 12 src = fetchFromGitHub { 13 owner = "nice-registry"; 14 repo = "all-the-package-names"; 15 tag = "v${version}"; 16 + hash = "sha256-iHwmvrDIiBMoH1LBrAbYvI/qPebTJIlvaOl6KxXJ+O8="; 17 }; 18 19 + npmDepsHash = "sha256-WxgcuQx/raixX4Y2diyDM5cAhsfFCUrNt+z02VC3Ng4="; 20 21 passthru.updateScript = nix-update-script { }; 22
+69 -25
pkgs/by-name/am/amp-cli/package-lock.json
··· 5 "packages": { 6 "": { 7 "dependencies": { 8 - "@sourcegraph/amp": "^0.0.1754036264-ga0aa13" 9 } 10 }, 11 "node_modules/@colors/colors": { ··· 28 "kuler": "^2.0.0" 29 } 30 }, 31 - "node_modules/@luxass/strip-json-comments": { 32 - "version": "1.4.0", 33 - "resolved": "https://registry.npmjs.org/@luxass/strip-json-comments/-/strip-json-comments-1.4.0.tgz", 34 - "integrity": "sha512-Zl343to4u/t8jz1q7R/1UY6hLX+344cwPLEXsIYthVwdU5zyjuVBGcpf2E24+QZkwFfRfmnHTcscreQzWn3hiA==", 35 - "license": "MIT", 36 - "engines": { 37 - "node": ">=18" 38 - } 39 - }, 40 "node_modules/@sourcegraph/amp": { 41 - "version": "0.0.1754036264-ga0aa13", 42 - "resolved": "https://registry.npmjs.org/@sourcegraph/amp/-/amp-0.0.1754036264-ga0aa13.tgz", 43 - "integrity": "sha512-76U1LuEOPUuJcVyMvRkblfvQChJutVZcgCJ4DB/rwke2yxXp2rhdqAOd1bHc2qWrH/nlWX+2BBZY1wTZgAVxRg==", 44 "dependencies": { 45 "ansi-regex": "^6.1.0", 46 "commander": "^11.1.0", 47 "fuse.js": "^7.0.0", 48 - "jsonc-parse": "^1.5.5", 49 "open": "^10.1.2", 50 "open-simplex-noise": "^2.5.0", 51 "runes": "^0.4.3", 52 "string-width": "^6.1.0", 53 "winston": "^3.17.0", 54 "xdg-basedir": "^5.1.0" 55 }, 56 "bin": { ··· 78 "url": "https://github.com/chalk/ansi-regex?sponsor=1" 79 } 80 }, 81 "node_modules/async": { 82 "version": "3.2.6", 83 "resolved": "https://registry.npmjs.org/async/-/async-3.2.6.tgz", ··· 232 "node": ">=10" 233 } 234 }, 235 "node_modules/inherits": { 236 "version": "2.0.4", 237 "resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz", ··· 304 "url": "https://github.com/sponsors/sindresorhus" 305 } 306 }, 307 - "node_modules/jsonc-parse": { 308 - "version": "1.5.5", 309 - "resolved": "https://registry.npmjs.org/jsonc-parse/-/jsonc-parse-1.5.5.tgz", 310 - "integrity": "sha512-6xSVqUb+VBwXSJoyDPzgK1toG+JoOcfjWrmZNBL5ZmKnokV9dLshqyLU8NkcLavKbT5tKEr+3T0d4/7d+wVdVw==", 311 - "license": "MIT", 312 - "dependencies": { 313 - "@luxass/strip-json-comments": "^1.3.2" 314 - }, 315 - "engines": { 316 - "node": ">=18" 317 - } 318 }, 319 "node_modules/kuler": { 320 "version": "2.0.0", ··· 556 }, 557 "engines": { 558 "node": ">= 12.0.0" 559 } 560 }, 561 "node_modules/xdg-basedir": {
··· 5 "packages": { 6 "": { 7 "dependencies": { 8 + "@sourcegraph/amp": "^0.0.1754827277-g1b1a5d" 9 } 10 }, 11 "node_modules/@colors/colors": { ··· 28 "kuler": "^2.0.0" 29 } 30 }, 31 "node_modules/@sourcegraph/amp": { 32 + "version": "0.0.1754827277-g1b1a5d", 33 + "resolved": "https://registry.npmjs.org/@sourcegraph/amp/-/amp-0.0.1754827277-g1b1a5d.tgz", 34 + "integrity": "sha512-P7PAvlEuRFz0dfpgErRe9brm00+1/I0xK2ym8QWt+hY6ITXtAFMbxJKELcsVpJwgSTJeFs3LUyj9glrJHdNMmw==", 35 "dependencies": { 36 "ansi-regex": "^6.1.0", 37 "commander": "^11.1.0", 38 "fuse.js": "^7.0.0", 39 + "jsonc-parser": "^3.3.1", 40 "open": "^10.1.2", 41 "open-simplex-noise": "^2.5.0", 42 "runes": "^0.4.3", 43 "string-width": "^6.1.0", 44 "winston": "^3.17.0", 45 + "wrap-ansi": "^9.0.0", 46 "xdg-basedir": "^5.1.0" 47 }, 48 "bin": { ··· 70 "url": "https://github.com/chalk/ansi-regex?sponsor=1" 71 } 72 }, 73 + "node_modules/ansi-styles": { 74 + "version": "6.2.1", 75 + "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-6.2.1.tgz", 76 + "integrity": "sha512-bN798gFfQX+viw3R7yrGWRqnrN2oRkEkUjjl4JNn4E8GxxbjtG3FbrEIIY3l8/hrwUwIeCZvi4QuOTP4MErVug==", 77 + "license": "MIT", 78 + "engines": { 79 + "node": ">=12" 80 + }, 81 + "funding": { 82 + "url": "https://github.com/chalk/ansi-styles?sponsor=1" 83 + } 84 + }, 85 "node_modules/async": { 86 "version": "3.2.6", 87 "resolved": "https://registry.npmjs.org/async/-/async-3.2.6.tgz", ··· 236 "node": ">=10" 237 } 238 }, 239 + "node_modules/get-east-asian-width": { 240 + "version": "1.3.0", 241 + "resolved": "https://registry.npmjs.org/get-east-asian-width/-/get-east-asian-width-1.3.0.tgz", 242 + "integrity": "sha512-vpeMIQKxczTD/0s2CdEWHcb0eeJe6TFjxb+J5xgX7hScxqrGuyjmv4c1D4A/gelKfyox0gJJwIHF+fLjeaM8kQ==", 243 + "license": "MIT", 244 + "engines": { 245 + "node": ">=18" 246 + }, 247 + "funding": { 248 + "url": "https://github.com/sponsors/sindresorhus" 249 + } 250 + }, 251 "node_modules/inherits": { 252 "version": "2.0.4", 253 "resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz", ··· 320 "url": "https://github.com/sponsors/sindresorhus" 321 } 322 }, 323 + "node_modules/jsonc-parser": { 324 + "version": "3.3.1", 325 + "resolved": "https://registry.npmjs.org/jsonc-parser/-/jsonc-parser-3.3.1.tgz", 326 + "integrity": "sha512-HUgH65KyejrUFPvHFPbqOY0rsFip3Bo5wb4ngvdi1EpCYWUQDC5V+Y7mZws+DLkr4M//zQJoanu1SP+87Dv1oQ==", 327 + "license": "MIT" 328 }, 329 "node_modules/kuler": { 330 "version": "2.0.0", ··· 566 }, 567 "engines": { 568 "node": ">= 12.0.0" 569 + } 570 + }, 571 + "node_modules/wrap-ansi": { 572 + "version": "9.0.0", 573 + "resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-9.0.0.tgz", 574 + "integrity": "sha512-G8ura3S+3Z2G+mkgNRq8dqaFZAuxfsxpBB8OCTGRTCtp+l/v9nbFNmCUP1BZMts3G1142MsZfn6eeUKrr4PD1Q==", 575 + "license": "MIT", 576 + "dependencies": { 577 + "ansi-styles": "^6.2.1", 578 + "string-width": "^7.0.0", 579 + "strip-ansi": "^7.1.0" 580 + }, 581 + "engines": { 582 + "node": ">=18" 583 + }, 584 + "funding": { 585 + "url": "https://github.com/chalk/wrap-ansi?sponsor=1" 586 + } 587 + }, 588 + "node_modules/wrap-ansi/node_modules/string-width": { 589 + "version": "7.2.0", 590 + "resolved": "https://registry.npmjs.org/string-width/-/string-width-7.2.0.tgz", 591 + "integrity": "sha512-tsaTIkKW9b4N+AEj+SVA+WhJzV7/zMhcSu78mLKWSk7cXMOSHsBKFWUs0fWwq8QyK3MgJBQRX6Gbi4kYbdvGkQ==", 592 + "license": "MIT", 593 + "dependencies": { 594 + "emoji-regex": "^10.3.0", 595 + "get-east-asian-width": "^1.0.0", 596 + "strip-ansi": "^7.1.0" 597 + }, 598 + "engines": { 599 + "node": ">=18" 600 + }, 601 + "funding": { 602 + "url": "https://github.com/sponsors/sindresorhus" 603 } 604 }, 605 "node_modules/xdg-basedir": {
+3 -3
pkgs/by-name/am/amp-cli/package.nix
··· 9 10 buildNpmPackage (finalAttrs: { 11 pname = "amp-cli"; 12 - version = "0.0.1754036264-ga0aa13"; 13 14 src = fetchzip { 15 url = "https://registry.npmjs.org/@sourcegraph/amp/-/amp-${finalAttrs.version}.tgz"; 16 - hash = "sha256-+pvxRLoluRk6/XfPr5luW2oIAjWTCYMJo53wHzQh598="; 17 }; 18 19 postPatch = '' ··· 45 chmod +x bin/amp-wrapper.js 46 ''; 47 48 - npmDepsHash = "sha256-Xm/uZAf9bDasHGIhcS2G8JUo3GyTdnErjzU7clkFQW0="; 49 50 propagatedBuildInputs = [ 51 ripgrep
··· 9 10 buildNpmPackage (finalAttrs: { 11 pname = "amp-cli"; 12 + version = "0.0.1754827277-g1b1a5d"; 13 14 src = fetchzip { 15 url = "https://registry.npmjs.org/@sourcegraph/amp/-/amp-${finalAttrs.version}.tgz"; 16 + hash = "sha256-7LOp4/jpdxkeKi++vZGogobNiQpMqd5zMeCQywgc/wg="; 17 }; 18 19 postPatch = '' ··· 45 chmod +x bin/amp-wrapper.js 46 ''; 47 48 + npmDepsHash = "sha256-6n+1fzet/JwLzaL9Z0ALIFY7Z0yaCwRCrv+73DxNkiY="; 49 50 propagatedBuildInputs = [ 51 ripgrep
+3 -3
pkgs/by-name/au/automatic-timezoned/package.nix
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "automatic-timezoned"; 9 - version = "2.0.84"; 10 11 src = fetchFromGitHub { 12 owner = "maxbrunet"; 13 repo = "automatic-timezoned"; 14 rev = "v${version}"; 15 - sha256 = "sha256-Ul9bzMC8MfbfE4PDi3O8mhsImbspOcBDqTZOoVVeP/0="; 16 }; 17 18 - cargoHash = "sha256-GroKztTpPWTw/tyrPWfld1ix0BnkjphwHM3J/17byqM="; 19 20 meta = { 21 description = "Automatically update system timezone based on location";
··· 6 7 rustPlatform.buildRustPackage rec { 8 pname = "automatic-timezoned"; 9 + version = "2.0.85"; 10 11 src = fetchFromGitHub { 12 owner = "maxbrunet"; 13 repo = "automatic-timezoned"; 14 rev = "v${version}"; 15 + sha256 = "sha256-1Fsc33ZIZsXCPe0WuhFEO6HjSqrvzYoR6QD/MMPxVjA="; 16 }; 17 18 + cargoHash = "sha256-Gbb5+4RXZGebqGDcwVSXAipaQ3fA0Tu7jhQXnSyW9O0="; 19 20 meta = { 21 description = "Automatically update system timezone based on location";
+3 -3
pkgs/by-name/ba/balena-cli/package.nix
··· 22 in 23 buildNpmPackage' rec { 24 pname = "balena-cli"; 25 - version = "22.1.5"; 26 27 src = fetchFromGitHub { 28 owner = "balena-io"; 29 repo = "balena-cli"; 30 rev = "v${version}"; 31 - hash = "sha256-5ltVQHye4miXA7W201n4XakP1eVyfFWzzaP+I7iKwOg="; 32 }; 33 34 - npmDepsHash = "sha256-oYwysy/gBJZ3akTjkdZEaX3KfdBmoaXEPbdXZNs8Ds8="; 35 36 postPatch = '' 37 ln -s npm-shrinkwrap.json package-lock.json
··· 22 in 23 buildNpmPackage' rec { 24 pname = "balena-cli"; 25 + version = "22.2.4"; 26 27 src = fetchFromGitHub { 28 owner = "balena-io"; 29 repo = "balena-cli"; 30 rev = "v${version}"; 31 + hash = "sha256-d0buLOiCHBpGhzduOCfJk+hraqS/njz1PTOD8QZSt8k="; 32 }; 33 34 + npmDepsHash = "sha256-7qecvPiJeV1rOLnI76WNwRGmx6PVCPHH5M/+OH+8l3I="; 35 36 postPatch = '' 37 ln -s npm-shrinkwrap.json package-lock.json
+3 -3
pkgs/by-name/ba/bazel-watcher/package.nix
··· 9 10 buildGoModule rec { 11 pname = "bazel-watcher"; 12 - version = "0.26.8"; 13 14 src = fetchFromGitHub { 15 owner = "bazelbuild"; 16 repo = "bazel-watcher"; 17 rev = "v${version}"; 18 - hash = "sha256-lAIIu6DWFQOwY6KFDaNVZg/H1pn2/eFmoqjtSGqBhMk="; 19 }; 20 21 - vendorHash = "sha256-wbQY493O2d/fa46/qvCzBpv9OY1YPQjTEqHtT0A9EV0="; 22 23 # The dependency github.com/fsnotify/fsevents requires CGO 24 env.CGO_ENABLED = if stdenv.hostPlatform.isDarwin then "1" else "0";
··· 9 10 buildGoModule rec { 11 pname = "bazel-watcher"; 12 + version = "0.26.10"; 13 14 src = fetchFromGitHub { 15 owner = "bazelbuild"; 16 repo = "bazel-watcher"; 17 rev = "v${version}"; 18 + hash = "sha256-OrOJ24XdYASOgO8170M0huVGYubH8MJ0tbp0hvqmN/w="; 19 }; 20 21 + vendorHash = "sha256-JkEJyrBY70+XO9qjw/t2qCayhVQzRkTEp/NXFTr+pXY="; 22 23 # The dependency github.com/fsnotify/fsevents requires CGO 24 env.CGO_ENABLED = if stdenv.hostPlatform.isDarwin then "1" else "0";
+3 -3
pkgs/by-name/br/brutespray/package.nix
··· 8 9 buildGoModule (finalAttrs: { 10 pname = "brutespray"; 11 - version = "2.3.1"; 12 13 src = fetchFromGitHub { 14 owner = "x90skysn3k"; 15 repo = "brutespray"; 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-oH7Gun/nKScv2buLwM6faiz9/3sl9l4JzkKbdTnGz0Q="; 18 }; 19 20 - vendorHash = "sha256-TBLjCXb1W5FHBrzxBI0/3NMuM9eCizLiz489jyZsEso="; 21 22 nativeBuildInputs = [ makeBinaryWrapper ]; 23
··· 8 9 buildGoModule (finalAttrs: { 10 pname = "brutespray"; 11 + version = "2.4.0"; 12 13 src = fetchFromGitHub { 14 owner = "x90skysn3k"; 15 repo = "brutespray"; 16 tag = "v${finalAttrs.version}"; 17 + hash = "sha256-tws3BvVQSlGcBgiJ8Ho7V/KJjzoq3TEOiChqTzrMbiU="; 18 }; 19 20 + vendorHash = "sha256-Fe3W5rlKygw4z5bF+6xy5mv86wKcBuCf3nhtdtFWJPM="; 21 22 nativeBuildInputs = [ makeBinaryWrapper ]; 23
+3 -3
pkgs/by-name/ch/cht-sh/package.nix
··· 12 13 stdenv.mkDerivation { 14 pname = "cht.sh"; 15 - version = "0-unstable-2025-07-29"; 16 17 nativeBuildInputs = [ makeWrapper ]; 18 19 src = fetchFromGitHub { 20 owner = "chubin"; 21 repo = "cheat.sh"; 22 - rev = "bae856b96329e205967c74b3803023cb2b655df9"; 23 - sha256 = "7k/9DLSO1D+1BvTlRZBHOvz++LMw1DcpOL5LIb7VUXw="; 24 }; 25 26 # Fix ".cht.sh-wrapped" in the help message
··· 12 13 stdenv.mkDerivation { 14 pname = "cht.sh"; 15 + version = "0-unstable-2025-08-08"; 16 17 nativeBuildInputs = [ makeWrapper ]; 18 19 src = fetchFromGitHub { 20 owner = "chubin"; 21 repo = "cheat.sh"; 22 + rev = "b714a5f0d56427924a7871f083fd05e7ede6b0e4"; 23 + sha256 = "JkqHxHgs7gUk511CSJ/sLEBWCAYig1lqfslhABDNMGI="; 24 }; 25 26 # Fix ".cht.sh-wrapped" in the help message
+3 -3
pkgs/by-name/cl/clickhouse-backup/package.nix
··· 8 9 buildGoModule rec { 10 pname = "clickhouse-backup"; 11 - version = "2.6.30"; 12 13 src = fetchFromGitHub { 14 owner = "Altinity"; 15 repo = "clickhouse-backup"; 16 rev = "v${version}"; 17 - hash = "sha256-9CxmMCtrQlHO9Q7gGMN0mIKVERjdef9IB6YUXXuJxeg="; 18 }; 19 20 - vendorHash = "sha256-tv5UaHoZTEAjo0jgbHRZHN6xiCNaexED+NG7cBDtiWA="; 21 22 ldflags = [ 23 "-X main.version=${version}"
··· 8 9 buildGoModule rec { 10 pname = "clickhouse-backup"; 11 + version = "2.6.33"; 12 13 src = fetchFromGitHub { 14 owner = "Altinity"; 15 repo = "clickhouse-backup"; 16 rev = "v${version}"; 17 + hash = "sha256-H8LwinH9/J2QawzVggt9vA7/oqaTXy02xqqlGPNtZvc="; 18 }; 19 20 + vendorHash = "sha256-LTljOVQI1fRXvo0cfsiT6SU4Q9t5dyaCuHBq/BiVe/w="; 21 22 ldflags = [ 23 "-X main.version=${version}"
+2 -2
pkgs/by-name/co/codex/package.nix
··· 14 }: 15 rustPlatform.buildRustPackage (finalAttrs: { 16 pname = "codex"; 17 - version = "0.19.0"; 18 19 src = fetchFromGitHub { 20 owner = "openai"; 21 repo = "codex"; 22 tag = "rust-v${finalAttrs.version}"; 23 - hash = "sha256-s7gN1fsk/PRiVVzlrtmAUd2Vu8hhKtlCesLOVrzJ/58="; 24 }; 25 26 sourceRoot = "${finalAttrs.src.name}/codex-rs";
··· 14 }: 15 rustPlatform.buildRustPackage (finalAttrs: { 16 pname = "codex"; 17 + version = "0.20.0"; 18 19 src = fetchFromGitHub { 20 owner = "openai"; 21 repo = "codex"; 22 tag = "rust-v${finalAttrs.version}"; 23 + hash = "sha256-v5PEj3T/eirAMpHHMR6LE9X8qDNhvCJP40Nleal3oOw="; 24 }; 25 26 sourceRoot = "${finalAttrs.src.name}/codex-rs";
+2 -2
pkgs/by-name/co/copybara/package.nix
··· 13 }: 14 stdenv.mkDerivation (finalAttrs: { 15 pname = "copybara"; 16 - version = "20250728"; 17 18 src = fetchurl { 19 url = "https://github.com/google/copybara/releases/download/v${finalAttrs.version}/copybara_deploy.jar"; 20 - hash = "sha256-/ulX5Q+P6ViiDcdwRpd9zhJAQiFULzU2fSXvfOk36xo="; 21 }; 22 23 nativeBuildInputs = [
··· 13 }: 14 stdenv.mkDerivation (finalAttrs: { 15 pname = "copybara"; 16 + version = "20250804"; 17 18 src = fetchurl { 19 url = "https://github.com/google/copybara/releases/download/v${finalAttrs.version}/copybara_deploy.jar"; 20 + hash = "sha256-lus3WEwpd9TIGy7IO11d8eZ3S6J/jHzWRFQ76gRiVXg="; 21 }; 22 23 nativeBuildInputs = [
+3 -3
pkgs/by-name/cu/cubeb/package.nix
··· 24 25 stdenv.mkDerivation (finalAttrs: { 26 pname = "cubeb"; 27 - version = "0-unstable-2025-07-10"; 28 29 src = fetchFromGitHub { 30 owner = "mozilla"; 31 repo = "cubeb"; 32 - rev = "fa021607121360af7c171d881dc5bc8af7bb56eb"; 33 - hash = "sha256-6PUHUPybe3g5nexunAHsHLThFdvpnv+avks+C0oYih0="; 34 }; 35 36 outputs = [
··· 24 25 stdenv.mkDerivation (finalAttrs: { 26 pname = "cubeb"; 27 + version = "0-unstable-2025-08-05"; 28 29 src = fetchFromGitHub { 30 owner = "mozilla"; 31 repo = "cubeb"; 32 + rev = "d78a19ba4a892abfdfd7eeeb19fa7ffe3d80938c"; 33 + hash = "sha256-sjv5XKZu9uX2y2HN+BFttOsb6bECEpl0oRneYxNOZgU="; 34 }; 35 36 outputs = [
+2 -2
pkgs/by-name/da/databricks-cli/package.nix
··· 10 11 buildGoModule (finalAttrs: { 12 pname = "databricks-cli"; 13 - version = "0.262.0"; 14 15 src = fetchFromGitHub { 16 owner = "databricks"; 17 repo = "cli"; 18 rev = "v${finalAttrs.version}"; 19 - hash = "sha256-grA7HI9gJFgeqNxmd6SboAn9z2QKLok7BayGj2RMYog="; 20 }; 21 22 # Otherwise these tests fail asserting that the version is 0.0.0-dev
··· 10 11 buildGoModule (finalAttrs: { 12 pname = "databricks-cli"; 13 + version = "0.263.0"; 14 15 src = fetchFromGitHub { 16 owner = "databricks"; 17 repo = "cli"; 18 rev = "v${finalAttrs.version}"; 19 + hash = "sha256-bRHZGoO7+k7HoXcyJMusqDnn3XoAesgZ280j8jNgQYY="; 20 }; 21 22 # Otherwise these tests fail asserting that the version is 0.0.0-dev
+2 -2
pkgs/by-name/eg/eggnog-mapper/package.nix
··· 9 10 python3Packages.buildPythonApplication rec { 11 pname = "eggnog-mapper"; 12 - version = "2.1.12"; 13 format = "setuptools"; 14 15 src = fetchFromGitHub { 16 owner = "eggnogdb"; 17 repo = "eggnog-mapper"; 18 tag = version; 19 - hash = "sha256-+luxXQmtGufYrA/9Ak3yKzbotOj2HM3vhIoOxE+Ty1U="; 20 }; 21 22 postPatch = ''
··· 9 10 python3Packages.buildPythonApplication rec { 11 pname = "eggnog-mapper"; 12 + version = "2.1.13"; 13 format = "setuptools"; 14 15 src = fetchFromGitHub { 16 owner = "eggnogdb"; 17 repo = "eggnog-mapper"; 18 tag = version; 19 + hash = "sha256-Gu4D8DBvgCPlO+2MjeNZy6+lNqsIlksegWmmYvEZmUU="; 20 }; 21 22 postPatch = ''
+2 -2
pkgs/by-name/er/ergo/package.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "ergo"; 12 - version = "6.0.0"; 13 14 src = fetchurl { 15 url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar"; 16 - sha256 = "sha256-gHDXMirYSXMpBISMDW+Wh3o7BZuWnBG8CXV/thMh/Ww="; 17 }; 18 19 nativeBuildInputs = [ makeWrapper ];
··· 9 10 stdenv.mkDerivation rec { 11 pname = "ergo"; 12 + version = "6.0.1"; 13 14 src = fetchurl { 15 url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar"; 16 + sha256 = "sha256-ByvHXgXFdoHbc+lWEK82I/I50Q1aoe3SSI2JeaTjEC4="; 17 }; 18 19 nativeBuildInputs = [ makeWrapper ];
+4 -4
pkgs/by-name/ev/evcc/package.nix
··· 17 }: 18 19 let 20 - version = "0.207.0"; 21 22 src = fetchFromGitHub { 23 owner = "evcc-io"; 24 repo = "evcc"; 25 tag = version; 26 - hash = "sha256-gaTY+9MB3nPRD2bOnWYS+vALRR9eHkFNCrEEMspE5ck="; 27 }; 28 29 - vendorHash = "sha256-cn7zqhBJblDPl7H8BJtWZ2+ckTKVlqBIwwuXNGwrXdk="; 30 31 commonMeta = with lib; { 32 license = licenses.mit; ··· 52 53 npmDeps = fetchNpmDeps { 54 inherit src; 55 - hash = "sha256-yQ+MnXjixNQfWSVnRzmxRtQAvLecdLMDQSXyuIdzGnU="; 56 }; 57 58 nativeBuildInputs = [
··· 17 }: 18 19 let 20 + version = "0.207.2"; 21 22 src = fetchFromGitHub { 23 owner = "evcc-io"; 24 repo = "evcc"; 25 tag = version; 26 + hash = "sha256-bBW2HU2TijUC6pn3gH23JTTGy5BWSm+V6BBsiYqi6U0="; 27 }; 28 29 + vendorHash = "sha256-VITdJ23xrO346EOlNe5uoOKcsQ76x+Yb7Vhl0/H+WTI="; 30 31 commonMeta = with lib; { 32 license = licenses.mit; ··· 52 53 npmDeps = fetchNpmDeps { 54 inherit src; 55 + hash = "sha256-GB57pXfWo1lduVDPPw7TBM8qgCmTxPDxKQyD4ZZJnjE="; 56 }; 57 58 nativeBuildInputs = [
+2 -2
pkgs/by-name/fc/fcitx5-pinyin-moegirl/package.nix
··· 6 }: 7 stdenvNoCC.mkDerivation (finalAttrs: { 8 pname = "fcitx5-pinyin-moegirl"; 9 - version = "20250711"; 10 11 src = fetchurl { 12 url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict"; 13 - hash = "sha256-kjdgsq5n+7rjPBrXOjrb13+JLPLeXNQFv9uhl4NSszM="; 14 }; 15 16 dontUnpack = true;
··· 6 }: 7 stdenvNoCC.mkDerivation (finalAttrs: { 8 pname = "fcitx5-pinyin-moegirl"; 9 + version = "20250810"; 10 11 src = fetchurl { 12 url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict"; 13 + hash = "sha256-PuuW43+uu9Vasy33KW1IKb2uK2mh8M/V9fVCVp1QZl0="; 14 }; 15 16 dontUnpack = true;
+2 -2
pkgs/by-name/fc/fcitx5-pinyin-zhwiki/package.nix
··· 6 stdenvNoCC.mkDerivation (finalAttrs: { 7 pname = "fcitx5-pinyin-zhwiki"; 8 version = "0.2.5"; 9 - date = "20250415"; 10 11 src = fetchurl { 12 url = "https://github.com/felixonmars/fcitx5-pinyin-zhwiki/releases/download/${finalAttrs.version}/zhwiki-${finalAttrs.date}.dict"; 13 - hash = "sha256-8dFBoP3UcYCl6EYojn14Bp7aYe/Z9cf4drSmeheHbLw="; 14 }; 15 16 dontUnpack = true;
··· 6 stdenvNoCC.mkDerivation (finalAttrs: { 7 pname = "fcitx5-pinyin-zhwiki"; 8 version = "0.2.5"; 9 + date = "20250731"; 10 11 src = fetchurl { 12 url = "https://github.com/felixonmars/fcitx5-pinyin-zhwiki/releases/download/${finalAttrs.version}/zhwiki-${finalAttrs.date}.dict"; 13 + hash = "sha256-pS2fVLfihJGgKA1XsW1x0VanfhjHgDGtsqedpmvdUnE="; 14 }; 15 16 dontUnpack = true;
+122 -72
pkgs/by-name/fi/fire/package.nix
··· 1 { 2 stdenv, 3 lib, 4 fetchFromGitHub, 5 unstableGitUpdater, 6 catch2_3, 7 cmake, 8 pkg-config, 9 libX11, 10 libXrandr, ··· 13 libXcursor, 14 freetype, 15 alsa-lib, 16 }: 17 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "fire"; 20 - version = "1.0.1-unstable-2025-03-12"; 21 22 src = fetchFromGitHub { 23 owner = "jerryuhoo"; 24 repo = "Fire"; 25 - rev = "b7ded116ce7ab78a57bb9b6b61796cb2cf3a6e8b"; 26 fetchSubmodules = true; 27 - hash = "sha256-d8w+b4OpU2/kQdcAimR4ihDEgVTM1V7J0hj7saDrQpY="; 28 }; 29 30 - postPatch = '' 31 - # Disable automatic copying of built plugins during buildPhase, it defaults 32 - # into user home and we want to have building & installing separated. 33 - substituteInPlace CMakeLists.txt \ 34 - --replace-fail 'COPY_PLUGIN_AFTER_BUILD TRUE' 'COPY_PLUGIN_AFTER_BUILD FALSE' 35 - '' 36 - + lib.optionalString stdenv.hostPlatform.isLinux '' 37 - # Remove hardcoded LTO flags: needs extra setup on Linux 38 - substituteInPlace CMakeLists.txt \ 39 - --replace-fail 'juce::juce_recommended_lto_flags' '# Not forcing LTO' 40 - '' 41 - + lib.optionalString (!finalAttrs.finalPackage.doCheck) '' 42 - substituteInPlace CMakeLists.txt \ 43 - --replace-fail 'include(Tests)' '# Not building tests' \ 44 - --replace-fail 'include(Benchmarks)' '# Not building benchmark test' 45 - ''; 46 47 strictDeps = true; 48 ··· 51 pkg-config 52 ]; 53 54 - buildInputs = lib.optionals stdenv.hostPlatform.isLinux [ 55 - libX11 56 - libXrandr 57 - libXinerama 58 - libXext 59 - libXcursor 60 - freetype 61 - alsa-lib 62 - ]; 63 64 cmakeFlags = [ 65 - (lib.cmakeBool "FETCHCONTENT_FULLY_DISCONNECTED" true) 66 - (lib.cmakeFeature "FETCHCONTENT_SOURCE_DIR_CATCH2" "${catch2_3.src}") 67 ]; 68 69 - installPhase = 70 - let 71 - pathMappings = [ 72 - { 73 - from = "LV2"; 74 - to = "${placeholder "out"}/${ 75 - if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/LV2" else "lib/lv2" 76 - }"; 77 - } 78 - { 79 - from = "VST3"; 80 - to = "${placeholder "out"}/${ 81 - if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/VST3" else "lib/vst3" 82 - }"; 83 - } 84 - # this one's a guess, don't know where ppl have agreed to put them yet 85 - { 86 - from = "CLAP"; 87 - to = "${placeholder "out"}/${ 88 - if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/CLAP" else "lib/clap" 89 - }"; 90 - } 91 - ] 92 - ++ lib.optionals stdenv.hostPlatform.isDarwin [ 93 - { 94 - from = "AU"; 95 - to = "${placeholder "out"}/Library/Audio/Plug-Ins/Components"; 96 - } 97 - ]; 98 - in 99 - '' 100 - runHook preInstall 101 102 - '' 103 - + lib.strings.concatMapStringsSep "\n" (entry: '' 104 - mkdir -p ${entry.to} 105 - # Exact path of the build artefact depends on used CMAKE_BUILD_TYPE 106 - cp -r Fire_artefacts/*/${entry.from}/* ${entry.to}/ 107 - '') pathMappings 108 - + '' 109 110 - runHook postInstall 111 - ''; 112 113 doCheck = stdenv.buildPlatform.canExecute stdenv.hostPlatform; 114 115 passthru.updateScript = unstableGitUpdater { tagPrefix = "v"; }; 116 117 meta = { 118 description = "Multi-band distortion plugin by Wings"; 119 - homepage = "https://github.com/jerryuhoo/Fire"; 120 license = lib.licenses.agpl3Only; # Not clarified if Only or Plus 121 platforms = lib.platforms.unix; 122 maintainers = with lib.maintainers; [ OPNA2608 ]; 123 }; 124 })
··· 1 { 2 stdenv, 3 lib, 4 + fetchurl, 5 fetchFromGitHub, 6 + runCommand, 7 unstableGitUpdater, 8 catch2_3, 9 cmake, 10 + fontconfig, 11 pkg-config, 12 libX11, 13 libXrandr, ··· 16 libXcursor, 17 freetype, 18 alsa-lib, 19 + 20 + # Only able to test this myself in Linux 21 + withStandalone ? stdenv.hostPlatform.isLinux, 22 }: 23 24 + let 25 + # Required version, base URL and expected location specified in cmake/CPM.cmake 26 + cpmDownloadVersion = "0.40.2"; 27 + cpmSrc = fetchurl { 28 + url = "https://github.com/cpm-cmake/CPM.cmake/releases/download/v${cpmDownloadVersion}/CPM.cmake"; 29 + hash = "sha256-yM3DLAOBZTjOInge1ylk3IZLKjSjENO3EEgSpcotg10="; 30 + }; 31 + cpmSourceCache = runCommand "cpm-source-cache" { } '' 32 + mkdir -p $out/cpm 33 + ln -s ${cpmSrc} $out/cpm/CPM_${cpmDownloadVersion}.cmake 34 + ''; 35 + 36 + pathMappings = [ 37 + { 38 + from = "LV2"; 39 + to = "${placeholder "out"}/${ 40 + if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/LV2" else "lib/lv2" 41 + }"; 42 + } 43 + { 44 + from = "VST3"; 45 + to = "${placeholder "out"}/${ 46 + if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/VST3" else "lib/vst3" 47 + }"; 48 + } 49 + # this one's a guess, don't know where ppl have agreed to put them yet 50 + { 51 + from = "CLAP"; 52 + to = "${placeholder "out"}/${ 53 + if stdenv.hostPlatform.isDarwin then "Library/Audio/Plug-Ins/CLAP" else "lib/clap" 54 + }"; 55 + } 56 + ] 57 + ++ lib.optionals withStandalone [ 58 + { 59 + from = "Standalone"; 60 + to = "${placeholder "out"}/bin"; 61 + } 62 + ] 63 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ 64 + # Audio Unit is a macOS-specific thing 65 + { 66 + from = "AU"; 67 + to = "${placeholder "out"}/Library/Audio/Plug-Ins/Components"; 68 + } 69 + ]; 70 + 71 + x11Libs = [ 72 + libX11 73 + libXrandr 74 + libXinerama 75 + libXext 76 + libXcursor 77 + ]; 78 + in 79 stdenv.mkDerivation (finalAttrs: { 80 pname = "fire"; 81 + version = "1.0.2-unstable-2025-07-05"; 82 83 src = fetchFromGitHub { 84 owner = "jerryuhoo"; 85 repo = "Fire"; 86 + rev = "a0553c6fcced4919871771da3add390e931e29de"; 87 fetchSubmodules = true; 88 + hash = "sha256-bHqWP3EZQg42OBi44Z1RvkIB2Ou0dDxgBLcidgxaMU8="; 89 }; 90 91 + postPatch = 92 + let 93 + formatsListing = lib.strings.concatMapStringsSep " " (entry: entry.from) pathMappings; 94 + in 95 + '' 96 + # Allow all the formats we can handle 97 + # Set LV2URI again for LV2 build 98 + # Disable automatic copying of built plugins during buildPhase, it defaults 99 + # into user home and we want to have building & installing separated. 100 + substituteInPlace CMakeLists.txt \ 101 + --replace-fail 'set(FORMATS' 'set(FORMATS ${formatsListing}) #' \ 102 + --replace-fail 'BUNDLE_ID "''${BUNDLE_ID}"' 'BUNDLE_ID "''${BUNDLE_ID}" LV2URI "https://www.bluewingsmusic.com/Fire/"' \ 103 + --replace-fail 'COPY_PLUGIN_AFTER_BUILD TRUE' 'COPY_PLUGIN_AFTER_BUILD FALSE' 104 + '' 105 + + lib.optionalString stdenv.hostPlatform.isLinux '' 106 + # Remove hardcoded LTO flags: needs extra setup on Linux 107 + substituteInPlace CMakeLists.txt \ 108 + --replace-fail 'juce::juce_recommended_lto_flags' '# Not forcing LTO' 109 + '' 110 + + lib.optionalString (!finalAttrs.finalPackage.doCheck) '' 111 + substituteInPlace CMakeLists.txt \ 112 + --replace-fail 'include(Tests)' '# Not building tests' \ 113 + --replace-fail 'include(Benchmarks)' '# Not building benchmark test' 114 + ''; 115 116 strictDeps = true; 117 ··· 120 pkg-config 121 ]; 122 123 + buildInputs = [ 124 + catch2_3 125 + fontconfig 126 + ] 127 + ++ lib.optionals stdenv.hostPlatform.isLinux ( 128 + x11Libs 129 + ++ [ 130 + freetype 131 + alsa-lib 132 + ] 133 + ); 134 135 cmakeFlags = [ 136 + (lib.cmakeFeature "CPM_SOURCE_CACHE" "${cpmSourceCache}") 137 + (lib.cmakeBool "CPM_LOCAL_PACKAGES_ONLY" true) 138 + (lib.cmakeFeature "Catch2_SOURCE_DIR" "${catch2_3.src}") 139 ]; 140 141 + installPhase = '' 142 + runHook preInstall 143 144 + '' 145 + + lib.strings.concatMapStringsSep "\n" (entry: '' 146 + mkdir -p ${entry.to} 147 + # Exact path of the build artefact depends on used CMAKE_BUILD_TYPE 148 + cp -r -t ${entry.to} Fire_artefacts/${finalAttrs.cmakeBuildType or "Release"}/${entry.from}/* 149 + '') pathMappings 150 + + '' 151 152 + runHook postInstall 153 + ''; 154 155 doCheck = stdenv.buildPlatform.canExecute stdenv.hostPlatform; 156 157 + # Standalone dlopen's X11 libraries 158 + postFixup = lib.strings.optionalString (withStandalone && stdenv.hostPlatform.isLinux) '' 159 + patchelf --add-rpath ${lib.makeLibraryPath x11Libs} $out/bin/Fire 160 + ''; 161 + 162 passthru.updateScript = unstableGitUpdater { tagPrefix = "v"; }; 163 164 meta = { 165 description = "Multi-band distortion plugin by Wings"; 166 + homepage = "https://www.bluewingsmusic.com/Fire"; 167 license = lib.licenses.agpl3Only; # Not clarified if Only or Plus 168 platforms = lib.platforms.unix; 169 maintainers = with lib.maintainers; [ OPNA2608 ]; 170 + } 171 + // lib.optionalAttrs withStandalone { 172 + mainProgram = "Fire"; 173 }; 174 })
+2 -2
pkgs/by-name/fo/foxglove-cli/package.nix
··· 11 }: 12 buildGoModule (finalAttrs: { 13 pname = "foxglove-cli"; 14 - version = "1.0.24"; 15 16 src = fetchFromGitHub { 17 owner = "foxglove"; 18 repo = "foxglove-cli"; 19 tag = "v${finalAttrs.version}"; 20 - hash = "sha256-JYaBVXSKn4zgWHq+s/tMgHCpQ2z5ZYh/+e+ex4MaUmo="; 21 }; 22 23 vendorHash = "sha256-fL/eOGx81pdIPWHt14cf4VoIqmfUmbkKa8/y0QQKYko=";
··· 11 }: 12 buildGoModule (finalAttrs: { 13 pname = "foxglove-cli"; 14 + version = "1.0.25"; 15 16 src = fetchFromGitHub { 17 owner = "foxglove"; 18 repo = "foxglove-cli"; 19 tag = "v${finalAttrs.version}"; 20 + hash = "sha256-zmX3eCh5NYCbYlbx6bIxwF6Qktj+kwV4KpVsTI9ofZ8="; 21 }; 22 23 vendorHash = "sha256-fL/eOGx81pdIPWHt14cf4VoIqmfUmbkKa8/y0QQKYko=";
+3 -3
pkgs/by-name/fx/fx/package.nix
··· 7 8 buildGoModule (finalAttrs: { 9 pname = "fx"; 10 - version = "38.0.0"; 11 12 src = fetchFromGitHub { 13 owner = "antonmedv"; 14 repo = "fx"; 15 tag = finalAttrs.version; 16 - hash = "sha256-9g9xtnmM3ANsvfxqE8pMTxiiUj+uQadhBooRQYKQpTg="; 17 }; 18 19 - vendorHash = "sha256-yVAoswClpf5+1nwLyrLKLYFt9Noh2HRemif1e1nWm7M="; 20 21 ldflags = [ "-s" ]; 22
··· 7 8 buildGoModule (finalAttrs: { 9 pname = "fx"; 10 + version = "39.0.1"; 11 12 src = fetchFromGitHub { 13 owner = "antonmedv"; 14 repo = "fx"; 15 tag = finalAttrs.version; 16 + hash = "sha256-KVnPESE0Fp1liOZtpDgNpAggROnGHYdefAAECkbgZDE="; 17 }; 18 19 + vendorHash = "sha256-7x0nbgMzEJznDH6Wf5iaTYXLh/2IGUSeSVvb0UKKTOQ="; 20 21 ldflags = [ "-s" ]; 22
+2 -2
pkgs/by-name/gi/git-repo/package.nix
··· 13 14 stdenv.mkDerivation rec { 15 pname = "git-repo"; 16 - version = "2.57.2"; 17 18 src = fetchFromGitHub { 19 owner = "android"; 20 repo = "tools_repo"; 21 rev = "v${version}"; 22 - hash = "sha256-B8Z5qkjUrydjWTeAanDHMn7C2qVIIqb90zJ6WrI6fgI="; 23 }; 24 25 # Fix 'NameError: name 'ssl' is not defined'
··· 13 14 stdenv.mkDerivation rec { 15 pname = "git-repo"; 16 + version = "2.57.3"; 17 18 src = fetchFromGitHub { 19 owner = "android"; 20 repo = "tools_repo"; 21 rev = "v${version}"; 22 + hash = "sha256-QJr1srOHcCnIQZNz56+zBlKs5ZA0/yDfhILek7pBx1Q="; 23 }; 24 25 # Fix 'NameError: name 'ssl' is not defined'
+15 -3
pkgs/by-name/gi/git-statuses/package.nix
··· 2 lib, 3 fetchFromGitHub, 4 rustPlatform, 5 pkg-config, 6 openssl, 7 versionCheckHook, 8 nix-update-script, 9 }: 10 11 rustPlatform.buildRustPackage (finalAttrs: { 12 pname = "git-statuses"; 13 - version = "0.4.0"; 14 15 src = fetchFromGitHub { 16 owner = "bircni"; 17 repo = "git-statuses"; 18 tag = finalAttrs.version; 19 - hash = "sha256-e4g4tiewhN5acrkGN9Y5+WO+ihogiJXmT4PlhLtyWcs="; 20 }; 21 22 - cargoHash = "sha256-IqlVwh80yTzVHWi5L+EQzt5SksK7SlBowZy46HnA+FI="; 23 24 # Needed to get openssl-sys to use pkg-config. 25 env.OPENSSL_NO_VENDOR = 1; 26 27 nativeBuildInputs = [ 28 pkg-config 29 ]; 30 buildInputs = [ 31 openssl 32 ]; 33 nativeInstallCheckInputs = [ 34 versionCheckHook 35 ]; 36 doInstallCheck = true; 37 38 passthru.updateScript = nix-update-script { }; 39
··· 2 lib, 3 fetchFromGitHub, 4 rustPlatform, 5 + installShellFiles, 6 pkg-config, 7 openssl, 8 + git, 9 versionCheckHook, 10 + stdenv, 11 nix-update-script, 12 }: 13 14 rustPlatform.buildRustPackage (finalAttrs: { 15 pname = "git-statuses"; 16 + version = "0.5.1"; 17 18 src = fetchFromGitHub { 19 owner = "bircni"; 20 repo = "git-statuses"; 21 tag = finalAttrs.version; 22 + hash = "sha256-nuWtW1NEECBqQ5uZKRqnvbjMUeYBg04j51zrHi/SDm0="; 23 }; 24 25 + cargoHash = "sha256-WAr5AkT4C14HupJHHZi209jtE8a9IUwOCw76cYu8Yjc="; 26 27 # Needed to get openssl-sys to use pkg-config. 28 env.OPENSSL_NO_VENDOR = 1; 29 30 nativeBuildInputs = [ 31 + installShellFiles 32 pkg-config 33 ]; 34 buildInputs = [ 35 openssl 36 ]; 37 nativeInstallCheckInputs = [ 38 + git 39 versionCheckHook 40 ]; 41 doInstallCheck = true; 42 + 43 + postInstall = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 44 + installShellCompletion --cmd git-statuses \ 45 + --bash <($out/bin/git-statuses --completions bash) \ 46 + --fish <($out/bin/git-statuses --completions fish) \ 47 + --zsh <($out/bin/git-statuses --completions zsh) 48 + ''; 49 50 passthru.updateScript = nix-update-script { }; 51
+2 -2
pkgs/by-name/gi/github-backup/package.nix
··· 8 9 python3Packages.buildPythonApplication rec { 10 pname = "github-backup"; 11 - version = "0.50.2"; 12 pyproject = true; 13 14 src = fetchFromGitHub { 15 owner = "josegonzalez"; 16 repo = "python-github-backup"; 17 tag = version; 18 - hash = "sha256-MUPQa1L3HmAMn1pZSzQk8VKpcz2nDGuWZB8pVi7CyYs="; 19 }; 20 21 build-system = with python3Packages; [
··· 8 9 python3Packages.buildPythonApplication rec { 10 pname = "github-backup"; 11 + version = "0.50.3"; 12 pyproject = true; 13 14 src = fetchFromGitHub { 15 owner = "josegonzalez"; 16 repo = "python-github-backup"; 17 tag = version; 18 + hash = "sha256-MBKBY86qIM/rgvGMvE7K9x9n+zDVtoimkVGLBxCWRmI="; 19 }; 20 21 build-system = with python3Packages; [
-79
pkgs/by-name/gn/gn/generic.nix
··· 1 - { 2 - stdenv, 3 - lib, 4 - fetchgit, 5 - fetchpatch, 6 - cctools, 7 - writeText, 8 - ninja, 9 - python3, 10 - ... 11 - }: 12 - 13 - { 14 - rev, 15 - revNum, 16 - version, 17 - sha256, 18 - }: 19 - 20 - let 21 - revShort = builtins.substring 0 7 rev; 22 - lastCommitPosition = writeText "last_commit_position.h" '' 23 - #ifndef OUT_LAST_COMMIT_POSITION_H_ 24 - #define OUT_LAST_COMMIT_POSITION_H_ 25 - 26 - #define LAST_COMMIT_POSITION_NUM ${revNum} 27 - #define LAST_COMMIT_POSITION "${revNum} (${revShort})" 28 - 29 - #endif // OUT_LAST_COMMIT_POSITION_H_ 30 - ''; 31 - 32 - in 33 - stdenv.mkDerivation { 34 - pname = "gn-unstable"; 35 - inherit version; 36 - 37 - src = fetchgit { 38 - # Note: The TAR-Archives (+archive/${rev}.tar.gz) are not deterministic! 39 - url = "https://gn.googlesource.com/gn"; 40 - inherit rev sha256; 41 - }; 42 - 43 - nativeBuildInputs = [ 44 - ninja 45 - python3 46 - ]; 47 - buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 48 - cctools 49 - ]; 50 - 51 - env.NIX_CFLAGS_COMPILE = "-Wno-error"; 52 - # Relax hardening as otherwise gn unstable 2024-06-06 and later fail with: 53 - # cc1plus: error: '-Wformat-security' ignored without '-Wformat' [-Werror=format-security] 54 - hardeningDisable = [ "format" ]; 55 - 56 - buildPhase = '' 57 - python build/gen.py --no-last-commit-position 58 - ln -s ${lastCommitPosition} out/last_commit_position.h 59 - ninja -j $NIX_BUILD_CORES -C out gn 60 - ''; 61 - 62 - installPhase = '' 63 - install -vD out/gn "$out/bin/gn" 64 - ''; 65 - 66 - setupHook = ./setup-hook.sh; 67 - 68 - meta = with lib; { 69 - description = "Meta-build system that generates build files for Ninja"; 70 - mainProgram = "gn"; 71 - homepage = "https://gn.googlesource.com/gn"; 72 - license = licenses.bsd3; 73 - platforms = platforms.unix; 74 - maintainers = with maintainers; [ 75 - stesie 76 - matthewbauer 77 - ]; 78 - }; 79 - }
···
+98 -6
pkgs/by-name/gn/gn/package.nix
··· 1 - { callPackage, ... }@args: 2 3 - callPackage ./generic.nix args { 4 # Note: Please use the recommended version for Chromium stable, i.e. from 5 # <nixpkgs>/pkgs/applications/networking/browsers/chromium/info.json 6 - rev = "85cc21e94af590a267c1c7a47020d9b420f8a033"; 7 - revNum = "2233"; # git describe $rev --match initial-commit | cut -d- -f3 8 - version = "2025-04-28"; 9 - sha256 = "sha256-+nKP2hBUKIqdNfDz1vGggXSdCuttOt0GwyGUQ3Z1ZHI="; 10 }
··· 1 + { 2 + stdenv, 3 + lib, 4 + fetchgit, 5 + cctools, 6 + ninja, 7 + python3, 8 9 # Note: Please use the recommended version for Chromium stable, i.e. from 10 # <nixpkgs>/pkgs/applications/networking/browsers/chromium/info.json 11 + version ? 12 + # This is a workaround for update-source-version to be able to update this 13 + let 14 + _version = "0-unstable-2025-06-19"; 15 + in 16 + _version, 17 + rev ? "97b68a0bb62b7528bc3491c7949d6804223c2b82", 18 + hash ? "sha256-gwptzuirIdPAV9XCaAT09aM/fY7d6xgBU7oSu9C4tmE=", 19 + }: 20 + 21 + stdenv.mkDerivation { 22 + pname = "gn"; 23 + inherit version; 24 + 25 + src = fetchgit { 26 + url = "https://gn.googlesource.com/gn"; 27 + inherit rev hash; 28 + leaveDotGit = true; 29 + deepClone = true; 30 + postFetch = '' 31 + cd "$out" 32 + mkdir .nix-files 33 + git rev-parse --short=12 HEAD > .nix-files/REV_SHORT 34 + git describe --match initial-commit | cut -d- -f3 > .nix-files/REV_NUM 35 + find "$out" -name .git -print0 | xargs -0 rm -rf 36 + ''; 37 + }; 38 + 39 + nativeBuildInputs = [ 40 + ninja 41 + python3 42 + ]; 43 + buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 44 + cctools 45 + ]; 46 + 47 + env.NIX_CFLAGS_COMPILE = "-Wno-error"; 48 + # Relax hardening as otherwise gn unstable 2024-06-06 and later fail with: 49 + # cc1plus: error: '-Wformat-security' ignored without '-Wformat' [-Werror=format-security] 50 + hardeningDisable = [ "format" ]; 51 + 52 + configurePhase = '' 53 + runHook preConfigure 54 + 55 + python build/gen.py --no-last-commit-position 56 + cat > out/last_commit_position.h << EOF 57 + #ifndef OUT_LAST_COMMIT_POSITION_H_ 58 + #define OUT_LAST_COMMIT_POSITION_H_ 59 + 60 + #define LAST_COMMIT_POSITION_NUM $(<.nix-files/REV_NUM) 61 + #define LAST_COMMIT_POSITION "$(<.nix-files/REV_NUM) ($(<.nix-files/REV_SHORT))" 62 + 63 + #endif // OUT_LAST_COMMIT_POSITION_H_ 64 + EOF 65 + 66 + runHook postConfigure 67 + ''; 68 + 69 + buildPhase = '' 70 + runHook preBuild 71 + 72 + ninja -v -j $NIX_BUILD_CORES -C out gn 73 + 74 + runHook postBuild 75 + ''; 76 + 77 + installPhase = '' 78 + runHook preInstall 79 + 80 + install -vD out/gn "$out/bin/gn" 81 + 82 + runHook postInstall 83 + ''; 84 + 85 + setupHook = ./setup-hook.sh; 86 + 87 + passthru.updateScript = ./update.sh; 88 + 89 + meta = { 90 + description = "Meta-build system that generates build files for Ninja"; 91 + mainProgram = "gn"; 92 + homepage = "https://gn.googlesource.com/gn"; 93 + license = lib.licenses.bsd3; 94 + platforms = lib.platforms.unix; 95 + maintainers = with lib.maintainers; [ 96 + stesie 97 + matthewbauer 98 + marcin-serwin 99 + emilylange 100 + ]; 101 + }; 102 }
+21
pkgs/by-name/gn/gn/update.sh
···
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p jq curl common-updater-scripts 3 + 4 + set -ex 5 + 6 + rev=$( 7 + curl --location "https://raw.githubusercontent.com/NixOS/nixpkgs/refs/heads/master/pkgs/applications/networking/browsers/chromium/info.json" \ 8 + | jq -r ".chromium.deps.gn.rev" 9 + ) 10 + 11 + commit_time=$( 12 + curl "https://gn.googlesource.com/gn/+/$rev?format=json" \ 13 + | sed "s/)]}'//" \ 14 + | jq -r ".committer.time" \ 15 + | awk '{print $2, $3, $5, $4 $6}' 16 + ) 17 + 18 + commit_date=$(TZ= date --date "$commit_time" --iso-8601) 19 + version="0-unstable-$commit_date" 20 + 21 + update-source-version --rev="$rev" --version-key="_version" "gn" "$version"
+5 -5
pkgs/by-name/go/google-chrome/package.nix
··· 170 171 linux = stdenvNoCC.mkDerivation (finalAttrs: { 172 inherit pname meta passthru; 173 - version = "138.0.7204.183"; 174 175 src = fetchurl { 176 url = "https://dl.google.com/linux/chrome/deb/pool/main/g/google-chrome-stable/google-chrome-stable_${finalAttrs.version}-1_amd64.deb"; 177 - hash = "sha256-GxdfHU6pskOL0i/rmN7kwGsuLYTotL1mEw6RV7qfl50="; 178 }; 179 180 # With strictDeps on, some shebangs were not being patched correctly ··· 275 276 darwin = stdenvNoCC.mkDerivation (finalAttrs: { 277 inherit pname meta passthru; 278 - version = "138.0.7204.184"; 279 280 src = fetchurl { 281 - url = "http://dl.google.com/release2/chrome/acvbvqaeyyrjo6kygs27pc5y27ea_138.0.7204.184/GoogleChrome-138.0.7204.184.dmg"; 282 - hash = "sha256-KM9fK5zaXNCdVfCRN9b0RxIvH7VxCln4Eo9YgOEd8PY="; 283 }; 284 285 dontPatch = true;
··· 170 171 linux = stdenvNoCC.mkDerivation (finalAttrs: { 172 inherit pname meta passthru; 173 + version = "139.0.7258.66"; 174 175 src = fetchurl { 176 url = "https://dl.google.com/linux/chrome/deb/pool/main/g/google-chrome-stable/google-chrome-stable_${finalAttrs.version}-1_amd64.deb"; 177 + hash = "sha256-DY1hFlYKVSWRYuK1DGaqxr4x+kEmXnr/GsKBC39rCxk="; 178 }; 179 180 # With strictDeps on, some shebangs were not being patched correctly ··· 275 276 darwin = stdenvNoCC.mkDerivation (finalAttrs: { 277 inherit pname meta passthru; 278 + version = "139.0.7258.67"; 279 280 src = fetchurl { 281 + url = "http://dl.google.com/release2/chrome/l4kjdkw5j5zarcsucmoo3n4idi_139.0.7258.67/GoogleChrome-139.0.7258.67.dmg"; 282 + hash = "sha256-IfJlHRpMZy1DFmOC6yZ5dphchdOSvUYf7s3+ngQ7pL4="; 283 }; 284 285 dontPatch = true;
+3 -3
pkgs/by-name/go/gose/package.nix
··· 7 lib, 8 }: 9 let 10 - version = "0.11.1"; 11 12 src = fetchFromGitHub { 13 repo = "gose"; 14 owner = "stv0g"; 15 tag = "v${version}"; 16 - hash = "sha256-Wz3gcx9/wrSfiHkOGnjAoUFfN0tiA1C+31GlnHqL3M0="; 17 }; 18 19 frontend = buildNpmPackage { ··· 37 inherit version; 38 inherit src; 39 40 - vendorHash = "sha256-HsYF4v7RUzGDJvZEoq0qTo9iPGJoqK4YqTsXSv8SwKQ="; 41 42 env.CGO_ENABLED = 0; 43
··· 7 lib, 8 }: 9 let 10 + version = "0.11.2"; 11 12 src = fetchFromGitHub { 13 repo = "gose"; 14 owner = "stv0g"; 15 tag = "v${version}"; 16 + hash = "sha256-AeGrnRnKThv29wFopx91BSep22WFkkKkUsTa7qFQOzs="; 17 }; 18 19 frontend = buildNpmPackage { ··· 37 inherit version; 38 inherit src; 39 40 + vendorHash = "sha256-9qQXk8XyvVsussu5YfoSrjEul0E1301W019vTVSgnkk="; 41 42 env.CGO_ENABLED = 0; 43
+2 -2
pkgs/by-name/ha/halo/package.nix
··· 8 }: 9 stdenv.mkDerivation rec { 10 pname = "halo"; 11 - version = "2.21.4"; 12 src = fetchurl { 13 url = "https://github.com/halo-dev/halo/releases/download/v${version}/halo-${version}.jar"; 14 - hash = "sha256-RoisTthVRq6UGTE5jRdo6tL/3UVaOu1/3XPpwyLQV4g="; 15 }; 16 17 nativeBuildInputs = [
··· 8 }: 9 stdenv.mkDerivation rec { 10 pname = "halo"; 11 + version = "2.21.6"; 12 src = fetchurl { 13 url = "https://github.com/halo-dev/halo/releases/download/v${version}/halo-${version}.jar"; 14 + hash = "sha256-kMz97dsWUbP4taRjxS84I+NWPyefVlP/WaY6pk7K6Q0="; 15 }; 16 17 nativeBuildInputs = [
+3 -3
pkgs/by-name/ho/holo-cli/package.nix
··· 11 12 rustPlatform.buildRustPackage (finalAttrs: { 13 pname = "holo-cli"; 14 - version = "0.5.0-unstable-2025-07-01"; 15 16 src = fetchFromGitHub { 17 owner = "holo-routing"; 18 repo = "holo-cli"; 19 - rev = "f04c1d0dcd6d800e079f33b8431b17fa00afeeb1"; 20 - hash = "sha256-ZJeXGT5oajynk44550W4qz+OZEx7y52Wwy+DYzrHZig="; 21 }; 22 23 cargoHash = "sha256-bsoxWjOMzRRtFGEaaqK0/adhGpDcejCIY0Pzw1HjQ5U=";
··· 11 12 rustPlatform.buildRustPackage (finalAttrs: { 13 pname = "holo-cli"; 14 + version = "0.5.0-unstable-2025-08-07"; 15 16 src = fetchFromGitHub { 17 owner = "holo-routing"; 18 repo = "holo-cli"; 19 + rev = "e786bb16e5e6b78989dc3b4e3299b283432dfa26"; 20 + hash = "sha256-uqRgitI4D2H9igVdnwuNnc3frRiEZ85/DILp6FzGQ+0="; 21 }; 22 23 cargoHash = "sha256-bsoxWjOMzRRtFGEaaqK0/adhGpDcejCIY0Pzw1HjQ5U=";
+3 -3
pkgs/by-name/ho/home-manager/package.nix
··· 19 20 stdenvNoCC.mkDerivation (finalAttrs: { 21 pname = "home-manager"; 22 - version = "0-unstable-2025-07-28"; 23 24 src = fetchFromGitHub { 25 name = "home-manager-source"; 26 owner = "nix-community"; 27 repo = "home-manager"; 28 - rev = "f49e872f55e36e67ebcb906ff65f86c7a1538f7c"; 29 - hash = "sha256-vojVM0SgFP8crFh1LDDXkzaI9/er/1cuRfbNPhfBHyc="; 30 }; 31 32 nativeBuildInputs = [
··· 19 20 stdenvNoCC.mkDerivation (finalAttrs: { 21 pname = "home-manager"; 22 + version = "0-unstable-2025-08-06"; 23 24 src = fetchFromGitHub { 25 name = "home-manager-source"; 26 owner = "nix-community"; 27 repo = "home-manager"; 28 + rev = "13461dec40bf03d9196ff79d1abe48408268cc35"; 29 + hash = "sha256-V0iiDcYvNeMOP2FyfgC4H8Esx+JodXEl80lD4hFD4SI="; 30 }; 31 32 nativeBuildInputs = [
+2 -22
pkgs/by-name/ii/iio-sensor-proxy/package.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "iio-sensor-proxy"; 20 - version = "3.7"; 21 22 src = fetchFromGitLab { 23 domain = "gitlab.freedesktop.org"; 24 owner = "hadess"; 25 repo = "iio-sensor-proxy"; 26 rev = version; 27 - hash = "sha256-MAfh6bgh39J5J3rlyPjyCkk5KcfWHMZLytZcBRPHaJE="; 28 }; 29 - 30 - # Fix devices with cros-ec-accel, like Chromebooks and Framework Laptop 12 31 - # https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/merge_requests/400 32 - patches = [ 33 - (fetchpatch2 { 34 - name = "mr400_1.patch"; 35 - url = "https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/commit/f35d293e65841a3b9c0de778300c7fa58b181fd0.patch"; 36 - hash = "sha256-Gk8Wpy+KFhHAsR3XklcsL3Eo4fHjQuFT6PCN5hz9KHk="; 37 - }) 38 - (fetchpatch2 { 39 - name = "mr400_2.patch"; 40 - url = "https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/commit/7416edf4da98d8e3b75f9eddb7e5c488ac4a4c54.patch"; 41 - hash = "sha256-5UnYam6P+paBHAI0qKXDAvrFM8JYhRVTUFePRTHCp+U="; 42 - }) 43 - (fetchpatch2 { 44 - name = "mr400_3.patch"; 45 - url = "https://gitlab.freedesktop.org/hadess/iio-sensor-proxy/-/commit/d00109194422a4fe3e9a7bc1235ffc492459c61a.patch"; 46 - hash = "sha256-58KrXbdpR1eWbPmsr8b0ke67hX5J0o0gtqzrz3dc+ck="; 47 - }) 48 - ]; 49 50 postPatch = '' 51 # upstream meson.build currently doesn't have an option to change the default polkit dir
··· 17 18 stdenv.mkDerivation rec { 19 pname = "iio-sensor-proxy"; 20 + version = "3.8"; 21 22 src = fetchFromGitLab { 23 domain = "gitlab.freedesktop.org"; 24 owner = "hadess"; 25 repo = "iio-sensor-proxy"; 26 rev = version; 27 + hash = "sha256-ZVaV4Aj4alr5eP3uz6SunpeRsMOo8YcZMqCcB0DUYGY="; 28 }; 29 30 postPatch = '' 31 # upstream meson.build currently doesn't have an option to change the default polkit dir
+2 -2
pkgs/by-name/jd/jd-diff-patch/package.nix
··· 6 7 buildGoModule (finalAttrs: { 8 pname = "jd-diff-patch"; 9 - version = "2.2.3"; 10 11 src = fetchFromGitHub { 12 owner = "josephburnett"; 13 repo = "jd"; 14 rev = "v${finalAttrs.version}"; 15 - hash = "sha256-ucSJfzkcOpLfI2IcsnKvjpR/hwHNne+liE1b/L/H96g="; 16 }; 17 18 sourceRoot = "${finalAttrs.src.name}/v2";
··· 6 7 buildGoModule (finalAttrs: { 8 pname = "jd-diff-patch"; 9 + version = "2.2.5"; 10 11 src = fetchFromGitHub { 12 owner = "josephburnett"; 13 repo = "jd"; 14 rev = "v${finalAttrs.version}"; 15 + hash = "sha256-E11Hd2uvF5LrgrWpR8OzXqEjoUrBkBHDDuuCujznfbE="; 16 }; 17 18 sourceRoot = "${finalAttrs.src.name}/v2";
+3 -3
pkgs/by-name/je/jellyfin-tui/package.nix
··· 13 14 rustPlatform.buildRustPackage rec { 15 pname = "jellyfin-tui"; 16 - version = "1.2.3"; 17 18 src = fetchFromGitHub { 19 owner = "dhonus"; 20 repo = "jellyfin-tui"; 21 tag = "v${version}"; 22 - hash = "sha256-gT6Zs32BhSfwH+JjwJcY9wK7WrqGuaWP+q/2rF8gp4M="; 23 }; 24 25 - cargoHash = "sha256-U298pYDYzaRdU5w3FWHMkgaCT15aUTZITroVcEJ1Q0w="; 26 27 nativeBuildInputs = [ pkg-config ]; 28 buildInputs = [
··· 13 14 rustPlatform.buildRustPackage rec { 15 pname = "jellyfin-tui"; 16 + version = "1.2.4"; 17 18 src = fetchFromGitHub { 19 owner = "dhonus"; 20 repo = "jellyfin-tui"; 21 tag = "v${version}"; 22 + hash = "sha256-fRlnfCHjUZWvp+pYxLUXFxW/nR7Glhhfm4YQKLR2XaY="; 23 }; 24 25 + cargoHash = "sha256-VUg96qyTF7XkZsl4wl70u5S9NqgRCGJ4od8Cj4dSoI8="; 26 27 nativeBuildInputs = [ pkg-config ]; 28 buildInputs = [
+2 -2
pkgs/by-name/kn/knowsmore/package.nix
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "knowsmore"; 9 - version = "0.1.45"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "helviojunior"; 14 repo = "knowsmore"; 15 tag = "v${version}"; 16 - hash = "sha256-Z0N98P1vh9nhqOzlkL/BgqQrybeig5TrHsg1K4jqGxw="; 17 }; 18 19 pythonRelaxDeps = [
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "knowsmore"; 9 + version = "0.1.46"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "helviojunior"; 14 repo = "knowsmore"; 15 tag = "v${version}"; 16 + hash = "sha256-yY3BLouIUvSBeNlq4XcEHKLi00BWeGUXNOP2p5NIFXc="; 17 }; 18 19 pythonRelaxDeps = [
+2 -2
pkgs/by-name/lo/local-content-share/package.nix
··· 6 7 buildGoModule (finalAttrs: { 8 pname = "local-content-share"; 9 - version = "31"; 10 11 src = fetchFromGitHub { 12 owner = "Tanq16"; 13 repo = "local-content-share"; 14 tag = "v${finalAttrs.version}"; 15 - hash = "sha256-BVO804Ndjbg4uEE1bufZcGZxEVdraV29LJ6yBWXTakA="; 16 }; 17 18 vendorHash = null;
··· 6 7 buildGoModule (finalAttrs: { 8 pname = "local-content-share"; 9 + version = "32"; 10 11 src = fetchFromGitHub { 12 owner = "Tanq16"; 13 repo = "local-content-share"; 14 tag = "v${finalAttrs.version}"; 15 + hash = "sha256-2TgamuHDASwSKshPkNLAnwnnCU23SvdXWv6sU++yBII="; 16 }; 17 18 vendorHash = null;
+3 -3
pkgs/by-name/ma/matrix-alertmanager-receiver/package.nix
··· 8 9 buildGoModule (finalAttrs: { 10 pname = "matrix-alertmanager-receiver"; 11 - version = "2025.7.30"; 12 13 src = fetchFromGitHub { 14 owner = "metio"; 15 repo = "matrix-alertmanager-receiver"; 16 tag = finalAttrs.version; 17 - hash = "sha256-2zTkRXXXMMphNyw/OeiIAmc4KP0LqN6M0vtpX/7fhoI="; 18 }; 19 20 - vendorHash = "sha256-zOaAvPCAEQkJMogJ6ly0jkHfj+SAlFqk5m+eQdsaxK4="; 21 22 env.CGO_ENABLED = "0"; 23
··· 8 9 buildGoModule (finalAttrs: { 10 pname = "matrix-alertmanager-receiver"; 11 + version = "2025.8.6"; 12 13 src = fetchFromGitHub { 14 owner = "metio"; 15 repo = "matrix-alertmanager-receiver"; 16 tag = finalAttrs.version; 17 + hash = "sha256-rnGKpJppR7NoOAx/jGt7vxr1EVok3tMzkr9ry/k57L8="; 18 }; 19 20 + vendorHash = "sha256-JMjfrSdaN2zXgACkPddQ9h7SLV6jhpUvFTk56UfPWJg="; 21 22 env.CGO_ENABLED = "0"; 23
+3 -3
pkgs/by-name/me/melange/package.nix
··· 7 8 buildGoModule rec { 9 pname = "melange"; 10 - version = "0.30.1"; 11 12 src = fetchFromGitHub { 13 owner = "chainguard-dev"; 14 repo = "melange"; 15 rev = "v${version}"; 16 - hash = "sha256-BHeWrT0naxHLgd91xLTDHdDCt7piItPJMyjrRWQb2cA="; 17 # populate values that require us to use git. By doing this in postFetch we 18 # can delete .git afterwards and maintain better reproducibility of the src. 19 leaveDotGit = true; ··· 26 ''; 27 }; 28 29 - vendorHash = "sha256-K2i9cQIcRkLbGIcGtEMo/PHO6pV2UXo/JgKdndWI7KM="; 30 31 subPackages = [ "." ]; 32
··· 7 8 buildGoModule rec { 9 pname = "melange"; 10 + version = "0.30.5"; 11 12 src = fetchFromGitHub { 13 owner = "chainguard-dev"; 14 repo = "melange"; 15 rev = "v${version}"; 16 + hash = "sha256-df8CHUVHvSK1nFpJIuVHmwbHsigwZLL5UwA0/V6NkxE="; 17 # populate values that require us to use git. By doing this in postFetch we 18 # can delete .git afterwards and maintain better reproducibility of the src. 19 leaveDotGit = true; ··· 26 ''; 27 }; 28 29 + vendorHash = "sha256-hyE/5P2EabICjueTln2zBmdIK73OqteWwmT5mSf7vXE="; 30 31 subPackages = [ "." ]; 32
+52
pkgs/by-name/ni/nixseparatedebuginfod2/package.nix
···
··· 1 + { 2 + lib, 3 + fetchFromGitHub, 4 + rustPlatform, 5 + libarchive, 6 + openssl, 7 + pkg-config, 8 + bubblewrap, 9 + elfutils, 10 + nix, 11 + nixosTests, 12 + }: 13 + 14 + rustPlatform.buildRustPackage rec { 15 + pname = "nixseparatedebuginfod2"; 16 + version = "0.1.0"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "symphorien"; 20 + repo = "nixseparatedebuginfod2"; 21 + tag = "v${version}"; 22 + hash = "sha256-bk+l/oWAPuWV6mnh9Pr/mru3BZjos08IfzEGUEFSW1E="; 23 + }; 24 + 25 + cargoHash = "sha256-HmtFso6uF2GsjIA0FPVL4S3S+lwQUrg7N576UaekXpU="; 26 + 27 + buildInputs = [ 28 + libarchive 29 + openssl 30 + ]; 31 + 32 + nativeBuildInputs = [ pkg-config ]; 33 + 34 + nativeCheckInputs = [ 35 + bubblewrap 36 + elfutils 37 + nix 38 + ]; 39 + 40 + env.OPENSSL_NO_VENDOR = "1"; 41 + 42 + passthru.tests = { inherit (nixosTests) nixseparatedebuginfod2; }; 43 + 44 + meta = { 45 + description = "Downloads and provides debug symbols and source code for nix derivations to gdb and other debuginfod-capable debuggers as needed"; 46 + homepage = "https://github.com/symphorien/nixseparatedebuginfod2"; 47 + license = lib.licenses.gpl3Only; 48 + maintainers = [ lib.maintainers.symphorien ]; 49 + platforms = lib.platforms.linux; 50 + mainProgram = "nixseparatedebuginfod2"; 51 + }; 52 + }
+3 -3
pkgs/by-name/oh/oh-my-zsh/package.nix
··· 19 }: 20 21 stdenv.mkDerivation rec { 22 - version = "2025-07-28"; 23 pname = "oh-my-zsh"; 24 25 src = fetchFromGitHub { 26 owner = "ohmyzsh"; 27 repo = "ohmyzsh"; 28 - rev = "5c804257ceb5b3062b876afae290adf72c474aad"; 29 - sha256 = "sha256-LSyabJIVuLdocx2fy5mVGFVX45gDxzm4hGDyF8yihZ4="; 30 }; 31 32 strictDeps = true;
··· 19 }: 20 21 stdenv.mkDerivation rec { 22 + version = "2025-08-08"; 23 pname = "oh-my-zsh"; 24 25 src = fetchFromGitHub { 26 owner = "ohmyzsh"; 27 repo = "ohmyzsh"; 28 + rev = "9d8d4cf41482a95127ca41faecc0a7ee0781ca2e"; 29 + sha256 = "sha256-u98vvBhGYfvfYmo/J8hBc6bDui5HVlgM3hY32LwJGio="; 30 }; 31 32 strictDeps = true;
+1 -1
pkgs/by-name/ol/olivetin/package.nix
··· 49 ''; 50 51 outputHashMode = "recursive"; 52 - outputHash = "sha256-4mmpiI2GhjMBp662/+DiM7SjEd1cPhF/A4YpyU04/Fs="; 53 }; 54 55 webui = buildNpmPackage {
··· 49 ''; 50 51 outputHashMode = "recursive"; 52 + outputHash = "sha256-o+Zt3rmTK7NmBQ9hDlbxZySUlCx6Ks7yQTtdm9+pJac="; 53 }; 54 55 webui = buildNpmPackage {
+4 -2
pkgs/by-name/ol/ollama/package.nix
··· 18 cudaPackages, 19 cudaArches ? cudaPackages.flags.realArches or [ ], 20 autoAddDriverRunpath, 21 22 # passthru 23 nixosTests, ··· 152 ]; 153 154 buildInputs = 155 - lib.optionals enableRocm (rocmLibs ++ [ libdrm ]) ++ lib.optionals enableCuda cudaLibs; 156 157 # replace inaccurate version number with actual release version 158 postPatch = '' ··· 251 changelog = "https://github.com/ollama/ollama/releases/tag/v${finalAttrs.version}"; 252 license = licenses.mit; 253 platforms = if (rocmRequested || cudaRequested) then platforms.linux else platforms.unix; 254 - broken = stdenv.hostPlatform.isDarwin; # TODO: Remove after upstream issue is fixed, see issue #431464 and comments. 255 mainProgram = "ollama"; 256 maintainers = with maintainers; [ 257 abysssol
··· 18 cudaPackages, 19 cudaArches ? cudaPackages.flags.realArches or [ ], 20 autoAddDriverRunpath, 21 + apple-sdk_15, 22 23 # passthru 24 nixosTests, ··· 153 ]; 154 155 buildInputs = 156 + lib.optionals enableRocm (rocmLibs ++ [ libdrm ]) 157 + ++ lib.optionals enableCuda cudaLibs 158 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ apple-sdk_15 ]; 159 160 # replace inaccurate version number with actual release version 161 postPatch = '' ··· 254 changelog = "https://github.com/ollama/ollama/releases/tag/v${finalAttrs.version}"; 255 license = licenses.mit; 256 platforms = if (rocmRequested || cudaRequested) then platforms.linux else platforms.unix; 257 mainProgram = "ollama"; 258 maintainers = with maintainers; [ 259 abysssol
+145 -145
pkgs/by-name/om/omnisharp-roslyn/deps.json
··· 31 }, 32 { 33 "pname": "ICSharpCode.Decompiler", 34 - "version": "8.2.0.7535", 35 - "hash": "sha256-4BWs04Va9pc/SLeMA/vKoBydhw+Bu6s9MDtoo/Ucft8=" 36 }, 37 { 38 "pname": "McMaster.Extensions.CommandLineUtils", ··· 58 "pname": "Microsoft.Bcl.AsyncInterfaces", 59 "version": "8.0.0", 60 "hash": "sha256-9aWmiwMJKrKr9ohD1KSuol37y+jdDxPGJct3m2/Bknw=" 61 }, 62 { 63 "pname": "Microsoft.Build", ··· 96 }, 97 { 98 "pname": "Microsoft.CodeAnalysis.Common", 99 - "version": "4.13.0-3.24620.4", 100 - "hash": "sha256-VSPRpTzEXnTNQAxXDOOi6YVS2C6/S2zTKgQR4aNkxME=", 101 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.common/4.13.0-3.24620.4/microsoft.codeanalysis.common.4.13.0-3.24620.4.nupkg" 102 }, 103 { 104 "pname": "Microsoft.CodeAnalysis.CSharp", 105 - "version": "4.13.0-3.24620.4", 106 - "hash": "sha256-YGxCN8J3BjSZ9hXYQF0nCL3Welv3UVASeSTkwwFPchc=", 107 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.4.13.0-3.24620.4.nupkg" 108 }, 109 { 110 "pname": "Microsoft.CodeAnalysis.CSharp.Features", 111 - "version": "4.13.0-3.24620.4", 112 - "hash": "sha256-qpNsw5OtTAQFnN6g6tIh6+nsr+zc+/Na+oETR/GWxeM=", 113 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.features/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.features.4.13.0-3.24620.4.nupkg" 114 }, 115 { 116 "pname": "Microsoft.CodeAnalysis.CSharp.Scripting", 117 - "version": "4.13.0-3.24620.4", 118 - "hash": "sha256-1D+TjiljZQQJEYIzhdLAbLq8DIvW30vgSDYnDlPoGoU=", 119 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.scripting/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.scripting.4.13.0-3.24620.4.nupkg" 120 }, 121 { 122 "pname": "Microsoft.CodeAnalysis.CSharp.Workspaces", 123 - "version": "4.13.0-3.24620.4", 124 - "hash": "sha256-NT7yDEq4fW8c71xHC3YPsP5vl8AZ9PdKASzxROwhccs=", 125 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.workspaces/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.workspaces.4.13.0-3.24620.4.nupkg" 126 }, 127 { 128 "pname": "Microsoft.CodeAnalysis.Elfie", ··· 131 }, 132 { 133 "pname": "Microsoft.CodeAnalysis.ExternalAccess.AspNetCore", 134 - "version": "4.13.0-3.24620.4", 135 - "hash": "sha256-91ZFqiu4MlteCir6p7YrOtbUMuRNIpNr6jX5qLdmZgM=", 136 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.aspnetcore/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.aspnetcore.4.13.0-3.24620.4.nupkg" 137 }, 138 { 139 "pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp", 140 - "version": "4.13.0-3.24620.4", 141 - "hash": "sha256-o2+DeY/p5AxMkMnYIiNMyMtrAnazzgfC6cVY8lImz4E=", 142 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.omnisharp.4.13.0-3.24620.4.nupkg" 143 }, 144 { 145 "pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp.CSharp", 146 - "version": "4.13.0-3.24620.4", 147 - "hash": "sha256-LfIgqc7lDoyxbOsGmF4Ji488iXaT1f2ecjZz1662WlM=", 148 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp.csharp/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.omnisharp.csharp.4.13.0-3.24620.4.nupkg" 149 }, 150 { 151 "pname": "Microsoft.CodeAnalysis.Features", 152 - "version": "4.13.0-3.24620.4", 153 - "hash": "sha256-ITkMz+1b9Q9I5UZk4N5+qKD7FPTBMohLDOqx3e2hShI=", 154 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.features/4.13.0-3.24620.4/microsoft.codeanalysis.features.4.13.0-3.24620.4.nupkg" 155 }, 156 { 157 "pname": "Microsoft.CodeAnalysis.Scripting.Common", 158 - "version": "4.13.0-3.24620.4", 159 - "hash": "sha256-9Pch1BIrhsEwoI3ahgQM4BQBhw1wH9d8X9WB6deM3Sk=", 160 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.scripting.common/4.13.0-3.24620.4/microsoft.codeanalysis.scripting.common.4.13.0-3.24620.4.nupkg" 161 }, 162 { 163 "pname": "Microsoft.CodeAnalysis.Workspaces.Common", 164 - "version": "4.13.0-3.24620.4", 165 - "hash": "sha256-Ex39ayopBTApxMCjevqn1qVFgjEvbst9sf7twW6+osI=", 166 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.workspaces.common/4.13.0-3.24620.4/microsoft.codeanalysis.workspaces.common.4.13.0-3.24620.4.nupkg" 167 }, 168 { 169 "pname": "Microsoft.CSharp", ··· 182 }, 183 { 184 "pname": "Microsoft.Extensions.Caching.Abstractions", 185 - "version": "8.0.0", 186 - "hash": "sha256-xGpKrywQvU1Wm/WolYIxgHYEFfgkNGeJ+GGc5DT3phI=" 187 }, 188 { 189 "pname": "Microsoft.Extensions.Caching.Memory", 190 - "version": "8.0.1", 191 - "hash": "sha256-5Q0vzHo3ZvGs4nPBc/XlBF4wAwYO8pxq6EGdYjjXZps=" 192 }, 193 { 194 "pname": "Microsoft.Extensions.Configuration", 195 - "version": "8.0.0", 196 - "hash": "sha256-9BPsASlxrV8ilmMCjdb3TiUcm5vFZxkBnAI/fNBSEyA=" 197 }, 198 { 199 "pname": "Microsoft.Extensions.Configuration.Abstractions", 200 - "version": "8.0.0", 201 - "hash": "sha256-4eBpDkf7MJozTZnOwQvwcfgRKQGcNXe0K/kF+h5Rl8o=" 202 }, 203 { 204 "pname": "Microsoft.Extensions.Configuration.Binder", 205 - "version": "8.0.0", 206 - "hash": "sha256-GanfInGzzoN2bKeNwON8/Hnamr6l7RTpYLA49CNXD9Q=" 207 }, 208 { 209 "pname": "Microsoft.Extensions.Configuration.CommandLine", 210 - "version": "8.0.0", 211 - "hash": "sha256-fmPC/o8S+weTtQJWykpnGHm6AKVU21xYE/CaHYU7zgg=" 212 }, 213 { 214 "pname": "Microsoft.Extensions.Configuration.EnvironmentVariables", 215 - "version": "8.0.0", 216 - "hash": "sha256-+bjFZvqCsMf2FRM2olqx/fub+QwfM1kBhjGVOT5HC48=" 217 }, 218 { 219 "pname": "Microsoft.Extensions.Configuration.FileExtensions", 220 - "version": "8.0.0", 221 - "hash": "sha256-BCxcjVP+kvrDDB0nzsFCJfU74UK4VBvct2JA4r+jNcs=" 222 }, 223 { 224 "pname": "Microsoft.Extensions.Configuration.Json", 225 - "version": "8.0.0", 226 - "hash": "sha256-Fi/ijcG5l0BOu7i96xHu96aN5/g7zO6SWQbTsI3Qetg=" 227 }, 228 { 229 "pname": "Microsoft.Extensions.DependencyInjection", 230 - "version": "8.0.0", 231 - "hash": "sha256-+qIDR8hRzreCHNEDtUcPfVHQdurzWPo/mqviCH78+EQ=" 232 }, 233 { 234 "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", ··· 237 }, 238 { 239 "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", 240 - "version": "8.0.2", 241 - "hash": "sha256-UfLfEQAkXxDaVPC7foE/J3FVEXd31Pu6uQIhTic3JgY=" 242 }, 243 { 244 "pname": "Microsoft.Extensions.DependencyModel", 245 - "version": "8.0.0", 246 - "hash": "sha256-qkCdwemqdZY/yIW5Xmh7Exv74XuE39T8aHGHCofoVgo=" 247 }, 248 { 249 "pname": "Microsoft.Extensions.FileProviders.Abstractions", 250 - "version": "8.0.0", 251 - "hash": "sha256-uQSXmt47X2HGoVniavjLICbPtD2ReQOYQMgy3l0xuMU=" 252 }, 253 { 254 "pname": "Microsoft.Extensions.FileProviders.Physical", 255 - "version": "8.0.0", 256 - "hash": "sha256-29y5ZRQ1ZgzVOxHktYxyiH40kVgm5un2yTGdvuSWnRc=" 257 }, 258 { 259 "pname": "Microsoft.Extensions.FileSystemGlobbing", 260 - "version": "8.0.0", 261 - "hash": "sha256-+Oz41JR5jdcJlCJOSpQIL5OMBNi+1Hl2d0JUHfES7sU=" 262 }, 263 { 264 "pname": "Microsoft.Extensions.Logging", 265 - "version": "8.0.0", 266 - "hash": "sha256-Meh0Z0X7KyOEG4l0RWBcuHHihcABcvCyfUXgasmQ91o=" 267 }, 268 { 269 "pname": "Microsoft.Extensions.Logging.Abstractions", ··· 272 }, 273 { 274 "pname": "Microsoft.Extensions.Logging.Abstractions", 275 - "version": "8.0.2", 276 - "hash": "sha256-cHpe8X2BgYa5DzulZfq24rg8O2K5Lmq2OiLhoyAVgJc=" 277 }, 278 { 279 "pname": "Microsoft.Extensions.Logging.Configuration", 280 - "version": "8.0.0", 281 - "hash": "sha256-mzmstNsVjKT0EtQcdAukGRifD30T82BMGYlSu8k4K7U=" 282 }, 283 { 284 "pname": "Microsoft.Extensions.Logging.Console", 285 - "version": "8.0.0", 286 - "hash": "sha256-bdb9YWWVn//AeySp7se87/tCN2E7e8Gx2GPMw28cd9c=" 287 }, 288 { 289 "pname": "Microsoft.Extensions.Options", 290 - "version": "8.0.2", 291 - "hash": "sha256-AjcldddddtN/9aH9pg7ClEZycWtFHLi9IPe1GGhNQys=" 292 }, 293 { 294 "pname": "Microsoft.Extensions.Options.ConfigurationExtensions", 295 - "version": "8.0.0", 296 - "hash": "sha256-A5Bbzw1kiNkgirk5x8kyxwg9lLTcSngojeD+ocpG1RI=" 297 }, 298 { 299 "pname": "Microsoft.Extensions.Primitives", 300 - "version": "8.0.0", 301 - "hash": "sha256-FU8qj3DR8bDdc1c+WeGZx/PCZeqqndweZM9epcpXjSo=" 302 }, 303 { 304 "pname": "Microsoft.IO.Redist", ··· 392 }, 393 { 394 "pname": "NuGet.Common", 395 - "version": "6.13.0-rc.95", 396 - "hash": "sha256-SeN5m2Wuwux9kO+S5qX6bvvYUA22BOZDz6rg2Gk0vQc=", 397 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.common/6.13.0-rc.95/nuget.common.6.13.0-rc.95.nupkg" 398 }, 399 { 400 "pname": "NuGet.Configuration", 401 - "version": "6.13.0-rc.95", 402 - "hash": "sha256-vrqUvp0Nse6zITKySrVgnPpkl2+ic8f0d/veYrUeRzM=", 403 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.configuration/6.13.0-rc.95/nuget.configuration.6.13.0-rc.95.nupkg" 404 }, 405 { 406 "pname": "NuGet.DependencyResolver.Core", 407 - "version": "6.13.0-rc.95", 408 - "hash": "sha256-ttllWdeTVn3JJECrqfCy9lVZKX7DQbgxjKMIBZH3GoI=", 409 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.dependencyresolver.core/6.13.0-rc.95/nuget.dependencyresolver.core.6.13.0-rc.95.nupkg" 410 }, 411 { 412 "pname": "NuGet.Frameworks", 413 - "version": "6.13.0-rc.95", 414 - "hash": "sha256-Dq1YxucNDbrO8L2l8uV1SEOKuL4oVhUjlDeRLrg82Wo=", 415 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.frameworks/6.13.0-rc.95/nuget.frameworks.6.13.0-rc.95.nupkg" 416 }, 417 { 418 "pname": "NuGet.LibraryModel", 419 - "version": "6.13.0-rc.95", 420 - "hash": "sha256-zuiuiT6NprcW/UEhndi6vO4J3ONeIGkmRMjkDqdf4QQ=", 421 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.librarymodel/6.13.0-rc.95/nuget.librarymodel.6.13.0-rc.95.nupkg" 422 }, 423 { 424 "pname": "NuGet.Packaging", 425 - "version": "6.13.0-rc.95", 426 - "hash": "sha256-gK0UtXawa2HtdYyug/vTihrj4ZLqCJ8w516kj9Gmq40=", 427 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.packaging/6.13.0-rc.95/nuget.packaging.6.13.0-rc.95.nupkg" 428 }, 429 { 430 "pname": "NuGet.ProjectModel", 431 - "version": "6.13.0-rc.95", 432 - "hash": "sha256-Y+3CNqRfoCTzVYgVpJ8Q2kIQcZIbdfit6uVOuqFaMy0=", 433 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.projectmodel/6.13.0-rc.95/nuget.projectmodel.6.13.0-rc.95.nupkg" 434 }, 435 { 436 "pname": "NuGet.Protocol", 437 - "version": "6.13.0-rc.95", 438 - "hash": "sha256-HyzaY1PmpPGG6J8g+BYdS1ETYZMwahEu7OiyWyjXzu4=", 439 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.protocol/6.13.0-rc.95/nuget.protocol.6.13.0-rc.95.nupkg" 440 }, 441 { 442 "pname": "NuGet.Versioning", 443 - "version": "6.13.0-rc.95", 444 - "hash": "sha256-2em8SYwrFR7wDjBpoSDs3Gfdz7w90IUs8vnGCnxcgF8=", 445 - "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.versioning/6.13.0-rc.95/nuget.versioning.6.13.0-rc.95.nupkg" 446 }, 447 { 448 "pname": "OmniSharp.Extensions.JsonRpc", ··· 506 }, 507 { 508 "pname": "System.Collections.Immutable", 509 - "version": "8.0.0", 510 - "hash": "sha256-F7OVjKNwpqbUh8lTidbqJWYi476nsq9n+6k0+QVRo3w=" 511 }, 512 { 513 "pname": "System.ComponentModel.Annotations", ··· 516 }, 517 { 518 "pname": "System.ComponentModel.Composition", 519 - "version": "8.0.0", 520 - "hash": "sha256-MnKdjE/qIvAmEeRc3gOn5uJhT0TI3UnUJPjj3TLHFQo=" 521 }, 522 { 523 "pname": "System.Composition", 524 - "version": "8.0.0", 525 - "hash": "sha256-rA118MFj6soKN++BvD3y9gXAJf0lZJAtGARuznG5+Xg=" 526 }, 527 { 528 "pname": "System.Composition.AttributedModel", 529 - "version": "8.0.0", 530 - "hash": "sha256-n3aXiBAFIlQicSRLiNtLh++URSUxRBLggsjJ8OMNRpo=" 531 }, 532 { 533 "pname": "System.Composition.Convention", 534 - "version": "8.0.0", 535 - "hash": "sha256-Z9HOAnH1lt1qc38P3Y0qCf5gwBwiLXQD994okcy53IE=" 536 }, 537 { 538 "pname": "System.Composition.Hosting", 539 - "version": "8.0.0", 540 - "hash": "sha256-axKJC71oKiNWKy66TVF/c3yoC81k03XHAWab3mGNbr0=" 541 }, 542 { 543 "pname": "System.Composition.Runtime", 544 - "version": "8.0.0", 545 - "hash": "sha256-AxwZ29+GY0E35Pa255q8AcMnJU52Txr5pBy86t6V1Go=" 546 }, 547 { 548 "pname": "System.Composition.TypedParts", 549 - "version": "8.0.0", 550 - "hash": "sha256-+ZJawThmiYEUNJ+cB9uJK+u/sCAVZarGd5ShZoSifGo=" 551 }, 552 { 553 "pname": "System.Configuration.ConfigurationManager", 554 - "version": "8.0.0", 555 - "hash": "sha256-xhljqSkNQk8DMkEOBSYnn9lzCSEDDq4yO910itptqiE=" 556 }, 557 { 558 "pname": "System.Data.DataSetExtensions", ··· 561 }, 562 { 563 "pname": "System.Diagnostics.DiagnosticSource", 564 - "version": "8.0.0", 565 - "hash": "sha256-+aODaDEQMqla5RYZeq0Lh66j+xkPYxykrVvSCmJQ+Vs=" 566 - }, 567 - { 568 - "pname": "System.Diagnostics.DiagnosticSource", 569 - "version": "8.0.1", 570 - "hash": "sha256-zmwHjcJgKcbkkwepH038QhcnsWMJcHys+PEbFGC0Jgo=" 571 }, 572 { 573 "pname": "System.Diagnostics.EventLog", 574 - "version": "8.0.0", 575 - "hash": "sha256-rt8xc3kddpQY4HEdghlBeOK4gdw5yIj4mcZhAVtk2/Y=" 576 }, 577 { 578 "pname": "System.Drawing.Common", ··· 596 }, 597 { 598 "pname": "System.IO.Pipelines", 599 - "version": "8.0.0", 600 - "hash": "sha256-LdpB1s4vQzsOODaxiKstLks57X9DTD5D6cPx8DE1wwE=" 601 }, 602 { 603 "pname": "System.Memory", ··· 621 }, 622 { 623 "pname": "System.Reflection.Metadata", 624 - "version": "8.0.0", 625 - "hash": "sha256-dQGC30JauIDWNWXMrSNOJncVa1umR1sijazYwUDdSIE=" 626 }, 627 { 628 "pname": "System.Reflection.MetadataLoadContext", ··· 681 }, 682 { 683 "pname": "System.Security.Cryptography.ProtectedData", 684 - "version": "8.0.0", 685 - "hash": "sha256-fb0pa9sQxN+mr0vnXg1Igbx49CaOqS+GDkTfWNboUvs=" 686 }, 687 { 688 "pname": "System.Security.Cryptography.Xml", ··· 711 }, 712 { 713 "pname": "System.Text.Encodings.Web", 714 - "version": "8.0.0", 715 - "hash": "sha256-IUQkQkV9po1LC0QsqrilqwNzPvnc+4eVvq+hCvq8fvE=" 716 }, 717 { 718 "pname": "System.Text.Json", 719 - "version": "8.0.5", 720 - "hash": "sha256-yKxo54w5odWT6nPruUVsaX53oPRe+gKzGvLnnxtwP68=" 721 }, 722 { 723 "pname": "System.Threading.Channels", ··· 731 }, 732 { 733 "pname": "System.Threading.Tasks.Dataflow", 734 - "version": "8.0.0", 735 - "hash": "sha256-Q6fPtMPNW4+SDKCabJzNS+dw4B04Oxd9sHH505bFtQo=" 736 }, 737 { 738 "pname": "System.Threading.Tasks.Extensions",
··· 31 }, 32 { 33 "pname": "ICSharpCode.Decompiler", 34 + "version": "9.1.0.7988", 35 + "hash": "sha256-zPLgLNO4cCrtN9BR9x6X+W0MNkQ71nADIopOC1VBhAQ=" 36 }, 37 { 38 "pname": "McMaster.Extensions.CommandLineUtils", ··· 58 "pname": "Microsoft.Bcl.AsyncInterfaces", 59 "version": "8.0.0", 60 "hash": "sha256-9aWmiwMJKrKr9ohD1KSuol37y+jdDxPGJct3m2/Bknw=" 61 + }, 62 + { 63 + "pname": "Microsoft.Bcl.AsyncInterfaces", 64 + "version": "9.0.0", 65 + "hash": "sha256-BsXNOWEgfFq3Yz7VTtK6m/ov4/erRqyBzieWSIpmc1U=" 66 }, 67 { 68 "pname": "Microsoft.Build", ··· 101 }, 102 { 103 "pname": "Microsoft.CodeAnalysis.Common", 104 + "version": "4.14.0-3.25168.13", 105 + "hash": "sha256-iQUNxmc2oGFqADDfNXj8A1O1nea6nxobBcYwBgqq8oY=", 106 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.common/4.14.0-3.25168.13/microsoft.codeanalysis.common.4.14.0-3.25168.13.nupkg" 107 }, 108 { 109 "pname": "Microsoft.CodeAnalysis.CSharp", 110 + "version": "4.14.0-3.25168.13", 111 + "hash": "sha256-XicPFcDtJis8WS3nkMsxbmE+A20K9x6qE3EWeJEBjh8=", 112 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.4.14.0-3.25168.13.nupkg" 113 }, 114 { 115 "pname": "Microsoft.CodeAnalysis.CSharp.Features", 116 + "version": "4.14.0-3.25168.13", 117 + "hash": "sha256-vI0G7XR92aVD6r5rYIEF+pZ+bpyznnfHVhQvWF3Eu4Q=", 118 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.features/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.features.4.14.0-3.25168.13.nupkg" 119 }, 120 { 121 "pname": "Microsoft.CodeAnalysis.CSharp.Scripting", 122 + "version": "4.14.0-3.25168.13", 123 + "hash": "sha256-zy8otm38p285W08GGy0M//1ZTOxiCxrC3tBcWKIg4Ps=", 124 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.scripting/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.scripting.4.14.0-3.25168.13.nupkg" 125 }, 126 { 127 "pname": "Microsoft.CodeAnalysis.CSharp.Workspaces", 128 + "version": "4.14.0-3.25168.13", 129 + "hash": "sha256-wuttOafOufLuc1DFlp2r8zdfkOrD5eFRRN2/pt/MWtE=", 130 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.workspaces/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.workspaces.4.14.0-3.25168.13.nupkg" 131 }, 132 { 133 "pname": "Microsoft.CodeAnalysis.Elfie", ··· 136 }, 137 { 138 "pname": "Microsoft.CodeAnalysis.ExternalAccess.AspNetCore", 139 + "version": "4.14.0-3.25168.13", 140 + "hash": "sha256-zhvnYOrXZvm0+YoVu1mG/X6IK9eIv+Fik9Y4cSBStdc=", 141 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.aspnetcore/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.aspnetcore.4.14.0-3.25168.13.nupkg" 142 }, 143 { 144 "pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp", 145 + "version": "4.14.0-3.25168.13", 146 + "hash": "sha256-MbPehGBs4q3zJ0gZf6Ab85IUBSyjRPO3nXfXxHus4v4=", 147 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.omnisharp.4.14.0-3.25168.13.nupkg" 148 }, 149 { 150 "pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp.CSharp", 151 + "version": "4.14.0-3.25168.13", 152 + "hash": "sha256-Hpomx3SEqAFilwaA7yJV60iLXGpWSJAC+7XANxjIpng=", 153 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp.csharp/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.omnisharp.csharp.4.14.0-3.25168.13.nupkg" 154 }, 155 { 156 "pname": "Microsoft.CodeAnalysis.Features", 157 + "version": "4.14.0-3.25168.13", 158 + "hash": "sha256-GDrT8bMIzWy6O1MSTXcBIooKNnKDrR4Q5RJnyikRGRI=", 159 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.features/4.14.0-3.25168.13/microsoft.codeanalysis.features.4.14.0-3.25168.13.nupkg" 160 }, 161 { 162 "pname": "Microsoft.CodeAnalysis.Scripting.Common", 163 + "version": "4.14.0-3.25168.13", 164 + "hash": "sha256-k2M3MfdbTG30PtcNHLHzVimaU8nKsv80XYt0DE6jZAI=", 165 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.scripting.common/4.14.0-3.25168.13/microsoft.codeanalysis.scripting.common.4.14.0-3.25168.13.nupkg" 166 }, 167 { 168 "pname": "Microsoft.CodeAnalysis.Workspaces.Common", 169 + "version": "4.14.0-3.25168.13", 170 + "hash": "sha256-eKk8/Ezlnm+d2XFyfgY8HkyVxASvGisJoppswwqtew8=", 171 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.workspaces.common/4.14.0-3.25168.13/microsoft.codeanalysis.workspaces.common.4.14.0-3.25168.13.nupkg" 172 }, 173 { 174 "pname": "Microsoft.CSharp", ··· 187 }, 188 { 189 "pname": "Microsoft.Extensions.Caching.Abstractions", 190 + "version": "9.0.0", 191 + "hash": "sha256-hDau5OMVGIg4sc5+ofe14ROqwt63T0NSbzm/Cv0pDrY=" 192 }, 193 { 194 "pname": "Microsoft.Extensions.Caching.Memory", 195 + "version": "9.0.0", 196 + "hash": "sha256-OZVOVGZOyv9uk5XGJrz6irBkPNjxnBxjfSyW30MnU0s=" 197 }, 198 { 199 "pname": "Microsoft.Extensions.Configuration", 200 + "version": "9.0.0", 201 + "hash": "sha256-uBLeb4z60y8z7NelHs9uT3cLD6wODkdwyfJm6/YZLDM=" 202 }, 203 { 204 "pname": "Microsoft.Extensions.Configuration.Abstractions", 205 + "version": "9.0.0", 206 + "hash": "sha256-xtG2USC9Qm0f2Nn6jkcklpyEDT3hcEZOxOwTc0ep7uc=" 207 }, 208 { 209 "pname": "Microsoft.Extensions.Configuration.Binder", 210 + "version": "9.0.0", 211 + "hash": "sha256-6ajYWcNOQX2WqftgnoUmVtyvC1kkPOtTCif4AiKEffU=" 212 }, 213 { 214 "pname": "Microsoft.Extensions.Configuration.CommandLine", 215 + "version": "9.0.0", 216 + "hash": "sha256-RE6DotU1FM1sy5p3hukT+WOFsDYJRsKX6jx5vhlPceM=" 217 }, 218 { 219 "pname": "Microsoft.Extensions.Configuration.EnvironmentVariables", 220 + "version": "9.0.0", 221 + "hash": "sha256-tDJx2prYZpr0RKSwmJfsK9FlUGwaDmyuSz2kqQxsWoI=" 222 }, 223 { 224 "pname": "Microsoft.Extensions.Configuration.FileExtensions", 225 + "version": "9.0.0", 226 + "hash": "sha256-PsLo6mrLGYfbi96rfCG8YS1APXkUXBG4hLstpT60I4s=" 227 }, 228 { 229 "pname": "Microsoft.Extensions.Configuration.Json", 230 + "version": "9.0.0", 231 + "hash": "sha256-qQn7Ol0CvPYuyecYWYBkPpTMdocO7I6n+jXQI2udzLI=" 232 }, 233 { 234 "pname": "Microsoft.Extensions.DependencyInjection", 235 + "version": "9.0.0", 236 + "hash": "sha256-dAH52PPlTLn7X+1aI/7npdrDzMEFPMXRv4isV1a+14k=" 237 }, 238 { 239 "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", ··· 242 }, 243 { 244 "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", 245 + "version": "9.0.0", 246 + "hash": "sha256-CncVwkKZ5CsIG2O0+OM9qXuYXh3p6UGyueTHSLDVL+c=" 247 }, 248 { 249 "pname": "Microsoft.Extensions.DependencyModel", 250 + "version": "9.0.0", 251 + "hash": "sha256-xirwlMWM0hBqgTneQOGkZ8l45mHT08XuSSRIbprgq94=" 252 }, 253 { 254 "pname": "Microsoft.Extensions.FileProviders.Abstractions", 255 + "version": "9.0.0", 256 + "hash": "sha256-mVfLjZ8VrnOQR/uQjv74P2uEG+rgW72jfiGdSZhIfDc=" 257 }, 258 { 259 "pname": "Microsoft.Extensions.FileProviders.Physical", 260 + "version": "9.0.0", 261 + "hash": "sha256-IzFpjKHmF1L3eVbFLUZa2N5aH3oJkJ7KE1duGIS7DP8=" 262 }, 263 { 264 "pname": "Microsoft.Extensions.FileSystemGlobbing", 265 + "version": "9.0.0", 266 + "hash": "sha256-eBLa8pW/y/hRj+JbEr340zbHRABIeFlcdqE0jf5/Uhc=" 267 }, 268 { 269 "pname": "Microsoft.Extensions.Logging", 270 + "version": "9.0.0", 271 + "hash": "sha256-kR16c+N8nQrWeYLajqnXPg7RiXjZMSFLnKLEs4VfjcM=" 272 }, 273 { 274 "pname": "Microsoft.Extensions.Logging.Abstractions", ··· 277 }, 278 { 279 "pname": "Microsoft.Extensions.Logging.Abstractions", 280 + "version": "9.0.0", 281 + "hash": "sha256-iBTs9twjWXFeERt4CErkIIcoJZU1jrd1RWCI8V5j7KU=" 282 }, 283 { 284 "pname": "Microsoft.Extensions.Logging.Configuration", 285 + "version": "9.0.0", 286 + "hash": "sha256-ysPjBq64p6JM4EmeVndryXnhLWHYYszzlVpPxRWkUkw=" 287 }, 288 { 289 "pname": "Microsoft.Extensions.Logging.Console", 290 + "version": "9.0.0", 291 + "hash": "sha256-N2t9EUdlS6ippD4Z04qUUyBuQ4tKSR/8TpmKScb5zRw=" 292 }, 293 { 294 "pname": "Microsoft.Extensions.Options", 295 + "version": "9.0.0", 296 + "hash": "sha256-DT5euAQY/ItB5LPI8WIp6Dnd0lSvBRP35vFkOXC68ck=" 297 }, 298 { 299 "pname": "Microsoft.Extensions.Options.ConfigurationExtensions", 300 + "version": "9.0.0", 301 + "hash": "sha256-r1Z3sEVSIjeH2UKj+KMj86har68g/zybSqoSjESBcoA=" 302 }, 303 { 304 "pname": "Microsoft.Extensions.Primitives", 305 + "version": "9.0.0", 306 + "hash": "sha256-ZNLusK1CRuq5BZYZMDqaz04PIKScE2Z7sS2tehU7EJs=" 307 }, 308 { 309 "pname": "Microsoft.IO.Redist", ··· 397 }, 398 { 399 "pname": "NuGet.Common", 400 + "version": "6.14.0-rc.116", 401 + "hash": "sha256-9iueLk2eBzA1Qph0zz2eM9hSfKtwdlApcEXkcImYHow=", 402 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.common/6.14.0-rc.116/nuget.common.6.14.0-rc.116.nupkg" 403 }, 404 { 405 "pname": "NuGet.Configuration", 406 + "version": "6.14.0-rc.116", 407 + "hash": "sha256-aZcINPKC6x773h/JW007YDPkj/jXZIBs/Y2gVp2jHKI=", 408 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.configuration/6.14.0-rc.116/nuget.configuration.6.14.0-rc.116.nupkg" 409 }, 410 { 411 "pname": "NuGet.DependencyResolver.Core", 412 + "version": "6.14.0-rc.116", 413 + "hash": "sha256-xn3ftpNI3xMblSwqQcgYzhZ1fDj/urbnnCLZrTLuNNk=", 414 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.dependencyresolver.core/6.14.0-rc.116/nuget.dependencyresolver.core.6.14.0-rc.116.nupkg" 415 }, 416 { 417 "pname": "NuGet.Frameworks", 418 + "version": "6.14.0-rc.116", 419 + "hash": "sha256-d9pZxwUrPcl/pizjC6j+Tns30muXUk2OVOAvkQ40TWk=", 420 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.frameworks/6.14.0-rc.116/nuget.frameworks.6.14.0-rc.116.nupkg" 421 }, 422 { 423 "pname": "NuGet.LibraryModel", 424 + "version": "6.14.0-rc.116", 425 + "hash": "sha256-8MzoYPA6p9pd0NkVW3oImhy1t3szqjk/dqHbRb2UM9I=", 426 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.librarymodel/6.14.0-rc.116/nuget.librarymodel.6.14.0-rc.116.nupkg" 427 }, 428 { 429 "pname": "NuGet.Packaging", 430 + "version": "6.14.0-rc.116", 431 + "hash": "sha256-0ck3KroeV+MSYBESHrqtZ7I4h10Wx5qfEYgikVk9lLE=", 432 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.packaging/6.14.0-rc.116/nuget.packaging.6.14.0-rc.116.nupkg" 433 }, 434 { 435 "pname": "NuGet.ProjectModel", 436 + "version": "6.14.0-rc.116", 437 + "hash": "sha256-w8xv1eWnCgTEMd7UoZkoxcQ2fiOhPTf6AgkcY6XFiXs=", 438 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.projectmodel/6.14.0-rc.116/nuget.projectmodel.6.14.0-rc.116.nupkg" 439 }, 440 { 441 "pname": "NuGet.Protocol", 442 + "version": "6.14.0-rc.116", 443 + "hash": "sha256-vJH2Lp7eBq44+w6iDkgUItcy81qYG52E7NE5q10TJqc=", 444 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.protocol/6.14.0-rc.116/nuget.protocol.6.14.0-rc.116.nupkg" 445 }, 446 { 447 "pname": "NuGet.Versioning", 448 + "version": "6.14.0-rc.116", 449 + "hash": "sha256-qSpNg8NdQDTxS+xXkz5j/LJNqhF8jUn/bAQyJWFP9vA=", 450 + "url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.versioning/6.14.0-rc.116/nuget.versioning.6.14.0-rc.116.nupkg" 451 }, 452 { 453 "pname": "OmniSharp.Extensions.JsonRpc", ··· 511 }, 512 { 513 "pname": "System.Collections.Immutable", 514 + "version": "9.0.0", 515 + "hash": "sha256-+6q5VMeoc5bm4WFsoV6nBXA9dV5pa/O4yW+gOdi8yac=" 516 }, 517 { 518 "pname": "System.ComponentModel.Annotations", ··· 521 }, 522 { 523 "pname": "System.ComponentModel.Composition", 524 + "version": "9.0.0", 525 + "hash": "sha256-CsWwo/NLEAt36kE52cT4wud8uUjJ31vpHlAY6RkUbog=" 526 }, 527 { 528 "pname": "System.Composition", 529 + "version": "9.0.0", 530 + "hash": "sha256-FehOkQ2u1p8mQ0/wn3cZ+24HjhTLdck8VZYWA1CcgbM=" 531 }, 532 { 533 "pname": "System.Composition.AttributedModel", 534 + "version": "9.0.0", 535 + "hash": "sha256-a7y7H6zj+kmYkllNHA402DoVfY9IaqC3Ooys8Vzl24M=" 536 }, 537 { 538 "pname": "System.Composition.Convention", 539 + "version": "9.0.0", 540 + "hash": "sha256-tw4vE5JRQ60ubTZBbxoMPhtjOQCC3XoDFUH7NHO7o8U=" 541 }, 542 { 543 "pname": "System.Composition.Hosting", 544 + "version": "9.0.0", 545 + "hash": "sha256-oOxU+DPEEfMCuNLgW6wSkZp0JY5gYt44FJNnWt+967s=" 546 }, 547 { 548 "pname": "System.Composition.Runtime", 549 + "version": "9.0.0", 550 + "hash": "sha256-AyIe+di1TqwUBbSJ/sJ8Q8tzsnTN+VBdJw4K8xZz43s=" 551 }, 552 { 553 "pname": "System.Composition.TypedParts", 554 + "version": "9.0.0", 555 + "hash": "sha256-F5fpTUs3Rr7yP/NyIzr+Xn5NdTXXp8rrjBnF9UBBUog=" 556 }, 557 { 558 "pname": "System.Configuration.ConfigurationManager", 559 + "version": "9.0.0", 560 + "hash": "sha256-+pLnTC0YDP6Kjw5DVBiFrV/Q3x5is/+6N6vAtjvhVWk=" 561 }, 562 { 563 "pname": "System.Data.DataSetExtensions", ··· 566 }, 567 { 568 "pname": "System.Diagnostics.DiagnosticSource", 569 + "version": "9.0.0", 570 + "hash": "sha256-1VzO9i8Uq2KlTw1wnCCrEdABPZuB2JBD5gBsMTFTSvE=" 571 }, 572 { 573 "pname": "System.Diagnostics.EventLog", 574 + "version": "9.0.0", 575 + "hash": "sha256-tPvt6yoAp56sK/fe+/ei8M65eavY2UUhRnbrREj/Ems=" 576 }, 577 { 578 "pname": "System.Drawing.Common", ··· 596 }, 597 { 598 "pname": "System.IO.Pipelines", 599 + "version": "9.0.0", 600 + "hash": "sha256-vb0NrPjfEao3kfZ0tavp2J/29XnsQTJgXv3/qaAwwz0=" 601 }, 602 { 603 "pname": "System.Memory", ··· 621 }, 622 { 623 "pname": "System.Reflection.Metadata", 624 + "version": "9.0.0", 625 + "hash": "sha256-avEWbcCh7XgpsSesnR3/SgxWi/6C5OxjR89Jf/SfRjQ=" 626 }, 627 { 628 "pname": "System.Reflection.MetadataLoadContext", ··· 681 }, 682 { 683 "pname": "System.Security.Cryptography.ProtectedData", 684 + "version": "9.0.0", 685 + "hash": "sha256-gPgPU7k/InTqmXoRzQfUMEKL3QuTnOKowFqmXTnWaBQ=" 686 }, 687 { 688 "pname": "System.Security.Cryptography.Xml", ··· 711 }, 712 { 713 "pname": "System.Text.Encodings.Web", 714 + "version": "9.0.0", 715 + "hash": "sha256-WGaUklQEJywoGR2jtCEs5bxdvYu5SHaQchd6s4RE5x0=" 716 }, 717 { 718 "pname": "System.Text.Json", 719 + "version": "9.0.0", 720 + "hash": "sha256-aM5Dh4okLnDv940zmoFAzRmqZre83uQBtGOImJpoIqk=" 721 }, 722 { 723 "pname": "System.Threading.Channels", ··· 731 }, 732 { 733 "pname": "System.Threading.Tasks.Dataflow", 734 + "version": "9.0.0", 735 + "hash": "sha256-nRzcFvLBpcOfyIJdCCZq5vDKZN0xHVuB8yCXoMrwZJA=" 736 }, 737 { 738 "pname": "System.Threading.Tasks.Extensions",
+2 -2
pkgs/by-name/om/omnisharp-roslyn/package.nix
··· 13 let 14 finalPackage = buildDotnetModule rec { 15 pname = "omnisharp-roslyn"; 16 - version = "1.39.13"; 17 18 src = fetchFromGitHub { 19 owner = "OmniSharp"; 20 repo = "omnisharp-roslyn"; 21 tag = "v${version}"; 22 - hash = "sha256-/U7zpx0jAnvZl7tshGV7wORD/wQUKYgX1kADpyCXHM4="; 23 }; 24 25 projectFile = "src/OmniSharp.Stdio.Driver/OmniSharp.Stdio.Driver.csproj";
··· 13 let 14 finalPackage = buildDotnetModule rec { 15 pname = "omnisharp-roslyn"; 16 + version = "1.39.14"; 17 18 src = fetchFromGitHub { 19 owner = "OmniSharp"; 20 repo = "omnisharp-roslyn"; 21 tag = "v${version}"; 22 + hash = "sha256-yWrb+Ov1syKjeer7CxmGzkf9qUJxQ0IoIRfyIiO8eI8="; 23 }; 24 25 projectFile = "src/OmniSharp.Stdio.Driver/OmniSharp.Stdio.Driver.csproj";
+3 -3
pkgs/by-name/op/openhue-cli/package.nix
··· 8 9 buildGoModule (finalAttrs: { 10 pname = "openhue-cli"; 11 - version = "0.18"; 12 13 src = fetchFromGitHub { 14 owner = "openhue"; 15 repo = "openhue-cli"; 16 tag = finalAttrs.version; 17 - hash = "sha256-LSaHE3gdjpNea6o+D/JGvHtwvG13LbHv2pDcZhlIoEE="; 18 leaveDotGit = true; 19 postFetch = '' 20 cd "$out" ··· 23 ''; 24 }; 25 26 - vendorHash = "sha256-lqIzmtFtkfrJSrpic79Is0yGpnLUysPQLn2lp/Mh+u4="; 27 28 env.CGO_ENABLED = 0; 29
··· 8 9 buildGoModule (finalAttrs: { 10 pname = "openhue-cli"; 11 + version = "0.20"; 12 13 src = fetchFromGitHub { 14 owner = "openhue"; 15 repo = "openhue-cli"; 16 tag = finalAttrs.version; 17 + hash = "sha256-vUmJjuBcOjIhhtWrzq+y0fDlh+wQhgBwxnfuod27CBA="; 18 leaveDotGit = true; 19 postFetch = '' 20 cd "$out" ··· 23 ''; 24 }; 25 26 + vendorHash = "sha256-DhTe0fSWoAwzoGr8rZMsbSE92jJFr4T7aVx/ULMfVFo="; 27 28 env.CGO_ENABLED = 0; 29
+2 -2
pkgs/by-name/op/openxr-loader/package.nix
··· 16 17 stdenv.mkDerivation rec { 18 pname = "openxr-loader"; 19 - version = "1.1.49"; 20 21 src = fetchFromGitHub { 22 owner = "KhronosGroup"; 23 repo = "OpenXR-SDK-Source"; 24 tag = "release-${version}"; 25 - hash = "sha256-fQmS8oJZ7Oy/miKCtOQGSvZFDIEMFOcUyz2D6P8hNZY="; 26 }; 27 28 nativeBuildInputs = [
··· 16 17 stdenv.mkDerivation rec { 18 pname = "openxr-loader"; 19 + version = "1.1.50"; 20 21 src = fetchFromGitHub { 22 owner = "KhronosGroup"; 23 repo = "OpenXR-SDK-Source"; 24 tag = "release-${version}"; 25 + hash = "sha256-/5zw9tj7F0cxhzyIRf8njoYB9moJFYLEjDeqe0OBr34="; 26 }; 27 28 nativeBuildInputs = [
+3 -3
pkgs/by-name/pa/particle-cli/package.nix
··· 8 9 buildNpmPackage (finalAttrs: { 10 pname = "particle-cli"; 11 - version = "3.40.0"; 12 13 src = fetchFromGitHub { 14 owner = "particle-iot"; 15 repo = "particle-cli"; 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-qfwj0hs+4p00pALrIMAjHCM7Cdoj6+sxV/nMyI2rYNg="; 18 }; 19 20 - npmDepsHash = "sha256-o8G6+xYOg80vgjJ6Skm7ydysuH71uN9erj7Nd4QOB2I="; 21 22 buildInputs = [ 23 udev
··· 8 9 buildNpmPackage (finalAttrs: { 10 pname = "particle-cli"; 11 + version = "3.40.1"; 12 13 src = fetchFromGitHub { 14 owner = "particle-iot"; 15 repo = "particle-cli"; 16 tag = "v${finalAttrs.version}"; 17 + hash = "sha256-rbCk54bTDwvbpRMUR9bUNLTuIHw3HnKoJE7euXMujxg="; 18 }; 19 20 + npmDepsHash = "sha256-gvnjrFTx1N/dIYSWHjj+PGxiVyiP3pdcDjPIix48cAI="; 21 22 buildInputs = [ 23 udev
+2 -2
pkgs/by-name/pa/payme/package.nix
··· 6 7 buildGoModule rec { 8 pname = "payme"; 9 - version = "1.2.3"; 10 11 src = fetchFromGitHub { 12 owner = "jovandeginste"; 13 repo = "payme"; 14 rev = "v${version}"; 15 - hash = "sha256-jkJGR6i68kNzA60T5ZOu2u+fPvZht4ssEtr8aYocGUk="; 16 leaveDotGit = true; 17 postFetch = '' 18 cd "$out"
··· 6 7 buildGoModule rec { 8 pname = "payme"; 9 + version = "1.2.4"; 10 11 src = fetchFromGitHub { 12 owner = "jovandeginste"; 13 repo = "payme"; 14 rev = "v${version}"; 15 + hash = "sha256-GXJjjCruDjL5+ag3aUJAHPLOvbwux9FBnyqXJ52WifE="; 16 leaveDotGit = true; 17 postFetch = '' 18 cd "$out"
+2 -2
pkgs/by-name/pe/petsc/package.nix
··· 111 in 112 stdenv.mkDerivation (finalAttrs: { 113 pname = "petsc"; 114 - version = "3.23.4"; 115 116 src = fetchzip { 117 url = "https://web.cels.anl.gov/projects/petsc/download/release-snapshots/petsc-${finalAttrs.version}.tar.gz"; 118 - hash = "sha256-7UugWo3SzRap3Ed6NySRZOJgD+Wkb9J+QEGRUfLbOPI="; 119 }; 120 121 strictDeps = true;
··· 111 in 112 stdenv.mkDerivation (finalAttrs: { 113 pname = "petsc"; 114 + version = "3.23.5"; 115 116 src = fetchzip { 117 url = "https://web.cels.anl.gov/projects/petsc/download/release-snapshots/petsc-${finalAttrs.version}.tar.gz"; 118 + hash = "sha256-pfGb/9GlKsZJpdEU6lOr61a8AE5NR9MlZ0mHJ/j+eDs="; 119 }; 120 121 strictDeps = true;
+3 -3
pkgs/by-name/pi/pistol/package.nix
··· 9 10 buildGoModule rec { 11 pname = "pistol"; 12 - version = "0.5.2"; 13 14 src = fetchFromGitHub { 15 owner = "doronbehar"; 16 repo = "pistol"; 17 rev = "v${version}"; 18 - sha256 = "sha256-/w2BenBIzhD0KHtELlFy7YGv0lykHrjrROZeW75gHis="; 19 }; 20 21 - vendorHash = "sha256-+Q72DUKLqahgbLCaXOTAYZaMvNfv3XF+SpyqHyB065g="; 22 23 doCheck = false; 24
··· 9 10 buildGoModule rec { 11 pname = "pistol"; 12 + version = "0.5.3"; 13 14 src = fetchFromGitHub { 15 owner = "doronbehar"; 16 repo = "pistol"; 17 rev = "v${version}"; 18 + sha256 = "sha256-cL9hHehajqMIpdD10KYIbNkBt2fiRQkx81m9H3Yd1UY="; 19 }; 20 21 + vendorHash = "sha256-+moQ3qZnWmmGpOXUxyBS3hIETK/ZtRwmvD2tXFf0A3o="; 22 23 doCheck = false; 24
+3 -3
pkgs/by-name/po/pocketbase/package.nix
··· 7 8 buildGoModule rec { 9 pname = "pocketbase"; 10 - version = "0.29.0"; 11 12 src = fetchFromGitHub { 13 owner = "pocketbase"; 14 repo = "pocketbase"; 15 rev = "v${version}"; 16 - hash = "sha256-yNz/bwjOPcj4N4yXi1pckz/rGNSJeCs8xeZHj+W/+2E="; 17 }; 18 19 - vendorHash = "sha256-XfHU2E2VEcQEQtcGmZqEPjdy7wxvOEdcysSYYD5oLNM="; 20 21 # This is the released subpackage from upstream repo 22 subPackages = [ "examples/base" ];
··· 7 8 buildGoModule rec { 9 pname = "pocketbase"; 10 + version = "0.29.2"; 11 12 src = fetchFromGitHub { 13 owner = "pocketbase"; 14 repo = "pocketbase"; 15 rev = "v${version}"; 16 + hash = "sha256-TWizSLWsQEK2BGaYVkqc/rrjiv/MZF0kKZAYGQAItJ4="; 17 }; 18 19 + vendorHash = "sha256-MWCx8v1/A0xjm8M9zgPXkMYsQlpAqDaASoqFTr7FG18="; 20 21 # This is the released subpackage from upstream repo 22 subPackages = [ "examples/base" ];
+3 -3
pkgs/by-name/po/powerstation/package.nix
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "powerstation"; 13 - version = "0.6.1"; 14 15 src = fetchFromGitHub { 16 owner = "ShadowBlip"; 17 repo = "PowerStation"; 18 tag = "v${version}"; 19 - hash = "sha256-UB0NmP2UaQEYGrFR0f0nBLuGTjjTIhvz0bwx3eC2JE4="; 20 }; 21 22 - cargoHash = "sha256-32tz1cJ2G3GXB9j0lFyjsAOn/iQGxzrdfcqkA/Yh4UY="; 23 24 nativeBuildInputs = [ 25 cmake
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "powerstation"; 13 + version = "0.7.0"; 14 15 src = fetchFromGitHub { 16 owner = "ShadowBlip"; 17 repo = "PowerStation"; 18 tag = "v${version}"; 19 + hash = "sha256-wm/O36AdBxfLVCM3NtzSVVHBM+GfH4ARZ/2ekJX5qsE="; 20 }; 21 22 + cargoHash = "sha256-P4NTzKKY/yB8ODPlsGWfihXTQD8MiOnp+tKCWFKtKxI="; 23 24 nativeBuildInputs = [ 25 cmake
+55
pkgs/by-name/qw/qwen-code/package.nix
···
··· 1 + { 2 + lib, 3 + buildNpmPackage, 4 + fetchFromGitHub, 5 + fetchNpmDeps, 6 + nix-update-script, 7 + }: 8 + 9 + buildNpmPackage (finalAttrs: { 10 + pname = "qwen-code"; 11 + version = "0.0.5"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "QwenLM"; 15 + repo = "qwen-code"; 16 + tag = "v${finalAttrs.version}"; 17 + hash = "sha256-/PuykGiXpjk2Fp1Sif59hvOIepZ7KcJRvL/9RMatQJA="; 18 + }; 19 + 20 + npmDeps = fetchNpmDeps { 21 + inherit (finalAttrs) src; 22 + hash = "sha256-HzrN549MfI+TN7BKssisIsga7udGKvextruzuoLq8M4="; 23 + }; 24 + 25 + buildPhase = '' 26 + runHook preBuild 27 + 28 + npm run generate 29 + npm run bundle 30 + 31 + runHook postBuild 32 + ''; 33 + 34 + installPhase = '' 35 + runHook preInstall 36 + 37 + mkdir -p $out/bin 38 + cp -r bundle/* $out/ 39 + patchShebangs $out 40 + ln -s $out/gemini.js $out/bin/qwen 41 + 42 + runHook postInstall 43 + ''; 44 + 45 + passthru.updateScript = nix-update-script { }; 46 + 47 + meta = { 48 + description = "Coding agent that lives in digital world"; 49 + homepage = "https://github.com/QwenLM/qwen-code"; 50 + mainProgram = "qwen"; 51 + license = lib.licenses.asl20; 52 + platforms = lib.platforms.all; 53 + maintainers = with lib.maintainers; [ lonerOrz ]; 54 + }; 55 + })
+2 -2
pkgs/by-name/ri/rime-moegirl/package.nix
··· 5 }: 6 stdenvNoCC.mkDerivation (finalAttrs: { 7 pname = "rime-moegirl"; 8 - version = "20250711"; 9 src = fetchurl { 10 url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict.yaml"; 11 - hash = "sha256-gs/JhdSeLFkBKvBdVRxk3RhqlkOhly18w4Pz63GG814="; 12 }; 13 14 dontUnpack = true;
··· 5 }: 6 stdenvNoCC.mkDerivation (finalAttrs: { 7 pname = "rime-moegirl"; 8 + version = "20250810"; 9 src = fetchurl { 10 url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict.yaml"; 11 + hash = "sha256-/Yv/2kigtpNvnWlHYTJBMUlMV5i5toteaLiDJ0kDoZg="; 12 }; 13 14 dontUnpack = true;
+3 -3
pkgs/by-name/ru/rustical/package.nix
··· 8 9 rustPlatform.buildRustPackage (finalAttrs: { 10 pname = "rustical"; 11 - version = "0.8.1"; 12 13 src = fetchFromGitHub { 14 owner = "lennart-k"; 15 repo = "rustical"; 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-TkgkgPQEj0SA9MjfWtOUu6rHKYCIs5jVieYL1N+XLk8="; 18 }; 19 20 - cargoHash = "sha256-X+8G2H3wszKJmn7p8n0b6z3xZ/ylGzwc99oUnIGKpTA="; 21 22 nativeBuildInputs = [ pkg-config ]; 23 buildInputs = [ openssl ];
··· 8 9 rustPlatform.buildRustPackage (finalAttrs: { 10 pname = "rustical"; 11 + version = "0.8.4"; 12 13 src = fetchFromGitHub { 14 owner = "lennart-k"; 15 repo = "rustical"; 16 tag = "v${finalAttrs.version}"; 17 + hash = "sha256-y4t63lb14WdUjzhjv/mx90ThaTfE7KFyRkg+CG+66TE="; 18 }; 19 20 + cargoHash = "sha256-DK3es0GjKurCwGmr/6gAk+ccJc1dUP64kK+UzvS+Mi0="; 21 22 nativeBuildInputs = [ pkg-config ]; 23 buildInputs = [ openssl ];
+3 -3
pkgs/by-name/sd/sdl_gamecontrollerdb/package.nix
··· 7 8 stdenvNoCC.mkDerivation (finalAttrs: { 9 pname = "sdl_gamecontrollerdb"; 10 - version = "0-unstable-2025-07-28"; 11 12 src = fetchFromGitHub { 13 owner = "mdqinc"; 14 repo = "SDL_GameControllerDB"; 15 - rev = "34765aa1de21323a873ab107a2a25e269e86b2e8"; 16 - hash = "sha256-K3XeSs6psR8RnDiYAKrVbx3KWQuJcD3RyZpOl+dn5Qw="; 17 }; 18 19 dontBuild = true;
··· 7 8 stdenvNoCC.mkDerivation (finalAttrs: { 9 pname = "sdl_gamecontrollerdb"; 10 + version = "0-unstable-2025-08-05"; 11 12 src = fetchFromGitHub { 13 owner = "mdqinc"; 14 repo = "SDL_GameControllerDB"; 15 + rev = "7543fc8af09232396f7d57e19c2342965c53e94f"; 16 + hash = "sha256-y5QyrgT/ipal36jTJurvXMac6uRMt3XOg3Sm6SLe0sk="; 17 }; 18 19 dontBuild = true;
+3 -3
pkgs/by-name/sh/shadowenv/package.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "shadowenv"; 10 - version = "3.3.1"; 11 12 src = fetchFromGitHub { 13 owner = "Shopify"; 14 repo = "shadowenv"; 15 rev = version; 16 - hash = "sha256-s70tNeF0FnWYZ0xLGIL1lTM0LwJdhPPIHrNgrY1YNBs="; 17 }; 18 19 - cargoHash = "sha256-Cg01yM3FbrYpZrv2dhGJnezugNhcuwDcXIU47/AWrC4="; 20 21 nativeBuildInputs = [ installShellFiles ]; 22
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "shadowenv"; 10 + version = "3.4.0"; 11 12 src = fetchFromGitHub { 13 owner = "Shopify"; 14 repo = "shadowenv"; 15 rev = version; 16 + hash = "sha256-WsUeqkuT4NhoaCJG1hqz+uWyvWQBfxtDheEkWkYmSWU="; 17 }; 18 19 + cargoHash = "sha256-vAMap35rpmEKSHJ9yW/PzPbEWtLw30DawDmI+QfcOsw="; 20 21 nativeBuildInputs = [ installShellFiles ]; 22
+2 -2
pkgs/by-name/sn/snyk/package.nix
··· 8 }: 9 10 let 11 - version = "1.1298.1"; 12 in 13 buildNpmPackage { 14 pname = "snyk"; ··· 18 owner = "snyk"; 19 repo = "cli"; 20 tag = "v${version}"; 21 - hash = "sha256-oLkzEm7OMBNqT+EDrwujqQek4LWwKgYFUoMRWhpqY4o="; 22 }; 23 24 npmDepsHash = "sha256-7fHehEKjNNRdRk9+kARzn75G0r1pse7ULn/Oz6mQRKM=";
··· 8 }: 9 10 let 11 + version = "1.1298.2"; 12 in 13 buildNpmPackage { 14 pname = "snyk"; ··· 18 owner = "snyk"; 19 repo = "cli"; 20 tag = "v${version}"; 21 + hash = "sha256-8VnbXxvz5mWWMq6sjffshMbHBf2H6s/xmPbQZsZC/4A="; 22 }; 23 24 npmDepsHash = "sha256-7fHehEKjNNRdRk9+kARzn75G0r1pse7ULn/Oz6mQRKM=";
+2 -2
pkgs/by-name/st/st/package.nix
··· 20 21 stdenv.mkDerivation (finalAttrs: { 22 pname = "st"; 23 - version = "0.9.2"; 24 25 src = fetchzip { 26 url = "https://dl.suckless.org/st/st-${finalAttrs.version}.tar.gz"; 27 - hash = "sha256-pFyK4XvV5Z4gBja8J996zF6wkdgQCNVccqUJ5+ejB/w="; 28 }; 29 30 outputs = [
··· 20 21 stdenv.mkDerivation (finalAttrs: { 22 pname = "st"; 23 + version = "0.9.3"; 24 25 src = fetchzip { 26 url = "https://dl.suckless.org/st/st-${finalAttrs.version}.tar.gz"; 27 + hash = "sha256-Xr1JtaOMVgn+zsD39LFjP/0dkYkvaAXbEcYb3ptgYLA="; 28 }; 29 30 outputs = [
+3 -3
pkgs/by-name/st/stackit-cli/package.nix
··· 12 13 buildGoModule rec { 14 pname = "stackit-cli"; 15 - version = "0.37.3"; 16 17 src = fetchFromGitHub { 18 owner = "stackitcloud"; 19 repo = "stackit-cli"; 20 rev = "v${version}"; 21 - hash = "sha256-nyNASYpZvao194rlKSyxNa74Ezo5CwiESNj54uBgUL4="; 22 }; 23 24 - vendorHash = "sha256-iWGRFjCvXm03GRnmQlscP5Y5di9W4lW3jotyhDcE/x4="; 25 26 subPackages = [ "." ]; 27
··· 12 13 buildGoModule rec { 14 pname = "stackit-cli"; 15 + version = "0.38.0"; 16 17 src = fetchFromGitHub { 18 owner = "stackitcloud"; 19 repo = "stackit-cli"; 20 rev = "v${version}"; 21 + hash = "sha256-i6UOgD3C0nq6Z3Gdki8YOZotU1CbC14Jx8d9B1LV7Hk="; 22 }; 23 24 + vendorHash = "sha256-qzNd1wn3N+EPjXO1gFYKtVNdGwd2D/jf6oJFvloR7HY="; 25 26 subPackages = [ "." ]; 27
+3 -3
pkgs/by-name/st/step-kms-plugin/package.nix
··· 12 13 buildGoModule rec { 14 pname = "step-kms-plugin"; 15 - version = "0.14.0"; 16 17 src = fetchFromGitHub { 18 owner = "smallstep"; 19 repo = "step-kms-plugin"; 20 rev = "v${version}"; 21 - hash = "sha256-GP4ztKTkHIxBCK9Wx9oT8jehIFYCj3lnAt+RGgTMpHo="; 22 }; 23 24 - vendorHash = "sha256-beRLkYLAe3wx0CmCXcn5flWeg+qOK1JPYjAD/bhPkTc="; 25 26 proxyVendor = true; 27
··· 12 13 buildGoModule rec { 14 pname = "step-kms-plugin"; 15 + version = "0.14.2"; 16 17 src = fetchFromGitHub { 18 owner = "smallstep"; 19 repo = "step-kms-plugin"; 20 rev = "v${version}"; 21 + hash = "sha256-0RIAwZbk6DNlJHTmxUd/td94OlrjwcQ86ao7wt7PSdg="; 22 }; 23 24 + vendorHash = "sha256-YvK3icanE8FoTeACfReVXmV143lcRTyXv8L6+hoFIaM="; 25 26 proxyVendor = true; 27
+3 -3
pkgs/by-name/sy/syft/package.nix
··· 7 8 buildGoModule rec { 9 pname = "syft"; 10 - version = "1.29.1"; 11 12 src = fetchFromGitHub { 13 owner = "anchore"; 14 repo = "syft"; 15 tag = "v${version}"; 16 - hash = "sha256-X+7X71M7nJKEAvAm0L9hh/zamJTGb+OyYNFWfiYlyew="; 17 # populate values that require us to use git. By doing this in postFetch we 18 # can delete .git afterwards and maintain better reproducibility of the src. 19 leaveDotGit = true; ··· 28 # hash mismatch with darwin 29 proxyVendor = true; 30 31 - vendorHash = "sha256-xgjnPTeSB+AWFLfXYLW3bveJowVje81lVvO30ZiCLxI="; 32 33 nativeBuildInputs = [ installShellFiles ]; 34
··· 7 8 buildGoModule rec { 9 pname = "syft"; 10 + version = "1.30.0"; 11 12 src = fetchFromGitHub { 13 owner = "anchore"; 14 repo = "syft"; 15 tag = "v${version}"; 16 + hash = "sha256-7YnjkevF4Nmu8YDhpd/WqXzLM8cdVPDt5ss9bg8udow="; 17 # populate values that require us to use git. By doing this in postFetch we 18 # can delete .git afterwards and maintain better reproducibility of the src. 19 leaveDotGit = true; ··· 28 # hash mismatch with darwin 29 proxyVendor = true; 30 31 + vendorHash = "sha256-ydXEquE12om67jouEHN5/MPI9+i69OALIQcPHRBD/YA="; 32 33 nativeBuildInputs = [ installShellFiles ]; 34
+2 -2
pkgs/by-name/ta/tauno-monitor/package.nix
··· 13 }: 14 python3Packages.buildPythonApplication rec { 15 pname = "tauno-monitor"; 16 - version = "0.2.11"; 17 pyproject = false; 18 19 src = fetchFromGitHub { 20 owner = "taunoe"; 21 repo = "tauno-monitor"; 22 tag = "v${version}"; 23 - hash = "sha256-FoNn+A0zqFf/Nl0MrK9/X5mwaq8mJBRH0uGnemDC0is="; 24 }; 25 26 nativeBuildInputs = [
··· 13 }: 14 python3Packages.buildPythonApplication rec { 15 pname = "tauno-monitor"; 16 + version = "0.2.14"; 17 pyproject = false; 18 19 src = fetchFromGitHub { 20 owner = "taunoe"; 21 repo = "tauno-monitor"; 22 tag = "v${version}"; 23 + hash = "sha256-1jXQZc2+Yufjo75KwHbAFPsGxdpxkdUP8LXyY2fj3Kw="; 24 }; 25 26 nativeBuildInputs = [
+19 -10
pkgs/by-name/ta/tayga/package.nix
··· 1 { 2 lib, 3 stdenv, 4 - fetchurl, 5 nixosTests, 6 }: 7 8 stdenv.mkDerivation (finalAttrs: { 9 - version = "0.9.2"; 10 pname = "tayga"; 11 12 - src = fetchurl { 13 - url = "http://www.litech.org/tayga/tayga-${finalAttrs.version}.tar.bz2"; 14 - hash = "sha256-Kx95J6nS3P+Qla/zwnGSSwUsz9L6ypWIsndDGkTwAJw="; 15 }; 16 17 - env.NIX_CFLAGS_COMPILE = toString [ 18 - "-Wno-address-of-packed-member" 19 - "-Wno-implicit-function-declaration" 20 - ]; 21 22 passthru.tests.tayga = nixosTests.tayga; 23 ··· 30 It is intended to provide production-quality NAT64 service 31 for networks where dedicated NAT64 hardware would be overkill. 32 ''; 33 - homepage = "http://www.litech.org/tayga"; 34 license = licenses.gpl2Plus; 35 maintainers = with maintainers; [ _0x4A6F ]; 36 platforms = platforms.linux;
··· 1 { 2 lib, 3 stdenv, 4 + fetchFromGitHub, 5 nixosTests, 6 }: 7 8 stdenv.mkDerivation (finalAttrs: { 9 + version = "0.9.5"; 10 pname = "tayga"; 11 12 + src = fetchFromGitHub { 13 + owner = "apalrd"; 14 + repo = "tayga"; 15 + tag = finalAttrs.version; 16 + hash = "sha256-xOm4fetFq2UGuhOojrT8WOcX78c6MLTMVbDv+O62x2E="; 17 }; 18 19 + preBuild = '' 20 + echo "#define TAYGA_VERSION \"${finalAttrs.version}\"" > version.h 21 + ''; 22 + 23 + installPhase = '' 24 + install -Dm755 tayga $out/bin/tayga 25 + install -D tayga.conf.5 $out/share/man/man5/tayga.conf.5 26 + install -D tayga.8 $out/share/man/man8/tayga.8 27 + cp -R docs $out/share/ 28 + cp tayga.conf.example $out/share/docs/ 29 + ''; 30 31 passthru.tests.tayga = nixosTests.tayga; 32 ··· 39 It is intended to provide production-quality NAT64 service 40 for networks where dedicated NAT64 hardware would be overkill. 41 ''; 42 + homepage = "https://github.com/apalrd/tayga"; 43 license = licenses.gpl2Plus; 44 maintainers = with maintainers; [ _0x4A6F ]; 45 platforms = platforms.linux;
+3 -3
pkgs/by-name/tf/tfupdate/package.nix
··· 6 7 buildGoModule rec { 8 pname = "tfupdate"; 9 - version = "0.9.1"; 10 11 src = fetchFromGitHub { 12 owner = "minamijoyo"; 13 repo = "tfupdate"; 14 rev = "v${version}"; 15 - sha256 = "sha256-hxg/hAfUjygBgkfql2ZpiskKPqwVmo2MZ4n9eod5Kn4="; 16 }; 17 18 - vendorHash = "sha256-dWp9onewCiemk3AUTgiaVwnLuVVMMTk/6hCWDS5NS88="; 19 20 # Tests start http servers which need to bind to local addresses: 21 # panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted
··· 6 7 buildGoModule rec { 8 pname = "tfupdate"; 9 + version = "0.9.2"; 10 11 src = fetchFromGitHub { 12 owner = "minamijoyo"; 13 repo = "tfupdate"; 14 rev = "v${version}"; 15 + sha256 = "sha256-izxvvR/wVNQlDWxJhUSAq2q0U0Y7fcFflEZRS2sfEIY="; 16 }; 17 18 + vendorHash = "sha256-gmIh1xlOXLASzY9E5phS48Bdj1agH5LdUUW0p/g4I5w="; 19 20 # Tests start http servers which need to bind to local addresses: 21 # panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted
+3 -3
pkgs/by-name/va/vacuum-go/package.nix
··· 7 8 buildGoModule (finalAttrs: { 9 pname = "vacuum-go"; 10 - version = "0.17.7"; 11 12 src = fetchFromGitHub { 13 owner = "daveshanley"; 14 repo = "vacuum"; 15 # using refs/tags because simple version gives: 'the given path has multiple possibilities' error 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-RkJOBiannG98bqc3GdBzRGvDATjX0gtgn8PCdIIBdBc="; 18 }; 19 20 - vendorHash = "sha256-6tBKlJa7fec0jc7/s1A6h86SwlZR7HzGes7hPEuwNmo="; 21 22 env.CGO_ENABLED = 0; 23 ldflags = [
··· 7 8 buildGoModule (finalAttrs: { 9 pname = "vacuum-go"; 10 + version = "0.17.8"; 11 12 src = fetchFromGitHub { 13 owner = "daveshanley"; 14 repo = "vacuum"; 15 # using refs/tags because simple version gives: 'the given path has multiple possibilities' error 16 tag = "v${finalAttrs.version}"; 17 + hash = "sha256-Vrvb4xLY7vxTaAlaPScBKmLfOgOzxGHpt4GJu8DnwUg="; 18 }; 19 20 + vendorHash = "sha256-IOlJHVzmBR4Re3VxAwLjpws3DTJSzG8JBya6L3WTeoQ="; 21 22 env.CGO_ENABLED = 0; 23 ldflags = [
+6 -1
pkgs/by-name/va/valkey/package.nix
··· 97 sed -i '/^proc wait_load_handlers_disconnected/{n ; s/wait_for_condition 50 100/wait_for_condition 50 500/; }' \ 98 tests/support/util.tcl 99 100 # Skip some more flaky tests. 101 # Skip test requiring custom jemalloc (unit/memefficiency). 102 ./runtest \ 103 --no-latency \ 104 --timeout 2000 \ 105 - --clients $NIX_BUILD_CORES \ 106 --tags -leaks \ 107 --skipunit unit/memefficiency \ 108 --skipunit integration/failover \
··· 97 sed -i '/^proc wait_load_handlers_disconnected/{n ; s/wait_for_condition 50 100/wait_for_condition 50 500/; }' \ 98 tests/support/util.tcl 99 100 + CLIENTS="$NIX_BUILD_CORES" 101 + if (( $CLIENTS > 4)); then 102 + CLIENTS=4 103 + fi 104 + 105 # Skip some more flaky tests. 106 # Skip test requiring custom jemalloc (unit/memefficiency). 107 ./runtest \ 108 --no-latency \ 109 --timeout 2000 \ 110 + --clients "$CLIENTS" \ 111 --tags -leaks \ 112 --skipunit unit/memefficiency \ 113 --skipunit integration/failover \
+308 -232
pkgs/by-name/ve/velocity/deps.json
··· 75 "module": "sha256-eYp7cGdyE27iijLt2GOx6fgWE6NJhAXXS+ilyb6/9U8=", 76 "pom": "sha256-20U7urXn2opDE5sNzTuuZykzIfKcTZH1p5XZ/2xS3d8=" 77 }, 78 "org/apache#apache/29": { 79 "pom": "sha256-PkkDcXSCC70N9jQgqXclWIY5iVTCoGKR+mH3J6w1s3c=" 80 }, ··· 317 "com/fasterxml#oss-parent/50": { 318 "pom": "sha256-9dpV3XuI+xcMRoAdF3dKZS+y9FgftbHQpfyGqhgrhXc=" 319 }, 320 - "com/fasterxml#oss-parent/56": { 321 - "pom": "sha256-/UkfeIV0JBBtLj1gW815m1PTGlZc3IaEY8p+h120WlA=" 322 - }, 323 "com/fasterxml#oss-parent/58": { 324 "pom": "sha256-VnDmrBxN3MnUE8+HmXpdou+qTSq+Q5Njr57xAqCgnkA=" 325 }, 326 - "com/fasterxml/jackson#jackson-bom/2.16.0": { 327 - "pom": "sha256-Wqooh0QFvwT7qOLFcVkieCRGG6b31VKr246NOgum+L8=" 328 }, 329 "com/fasterxml/jackson#jackson-bom/2.17.2": { 330 "pom": "sha256-H0crC8IATVz0IaxIhxQX+EGJ5481wElxg4f9i0T7nzI=" 331 }, 332 - "com/fasterxml/jackson#jackson-parent/2.16": { 333 - "pom": "sha256-i/YUKBIUiiq/aFCycvCvTD2P8RIe1gTEAvPzjJ5lRqs=" 334 }, 335 "com/fasterxml/jackson#jackson-parent/2.17": { 336 "pom": "sha256-rubeSpcoOwQOQ/Ta1XXnt0eWzZhNiSdvfsdWc4DIop0=" 337 }, 338 "com/fasterxml/woodstox#woodstox-core/6.5.1": { 339 "jar": "sha256-ySjWBmXGQV+xw5d1z5XPxE9/RYDPWrAbHDgOv/12iH8=", 340 "pom": "sha256-SDllThaxcU509Rq8s3jYNWgUq49NUnPR3S8c6KOQrdw=" ··· 408 "jar": "sha256-0fPGaqkaxSVJ4Arjsgi6S5r31y1o8jBkNVO+s45hGKw=", 409 "pom": "sha256-9ZiID+766p1nTcQdsTqzcAS/A3drW7IcBN7ejpIMHxI=" 410 }, 411 "com/google/errorprone#error_prone_annotations/2.6.0": { 412 "pom": "sha256-d1CXiHMcDoMurQIJFPYFi5MxYBb8ZdfLKscDspNKmvY=" 413 }, ··· 427 "com/google/errorprone#error_prone_parent/2.21.1": { 428 "pom": "sha256-MrsLX/JB/Wuh/upEiuu5zt7xaZvnPLbzGTZTh7gr+Sw=" 429 }, 430 "com/google/errorprone#error_prone_parent/2.6.0": { 431 "pom": "sha256-+7tgNV14gZvGGYK0y1sBbGVyjMMNJb/qQckKYcZETzQ=" 432 }, ··· 437 "jar": "sha256-oXHuTHNN0tqDfksWvp30Zhr6typBra8x64Tf2vk2yiY=", 438 "pom": "sha256-6WBCznj+y6DaK+lkUilHyHtAopG1/TzWcqQ0kkEDxLk=" 439 }, 440 "com/google/guava#guava-parent/21.0": { 441 "pom": "sha256-rNxtbwezRsrrF0kyeIvMxjwDXMXCsQCVjCH/4PbhmYg=" 442 }, ··· 455 "com/google/guava#guava-parent/31.1-jre": { 456 "pom": "sha256-RDliZ4O0StJe8F/wdiHdS7eWzE608pZqSkYf6kEw4Pw=" 457 }, 458 "com/google/guava#guava/21.0": { 459 "jar": "sha256-lyE5cYq8ikiT+njLqM97LJA/Ncl6r0T6MDGwZplItIA=", 460 "pom": "sha256-wLAWqFx4TgHKUenWS/j+gM5AKyBv6ol7AyWNXm0P+A0=" ··· 475 "jar": "sha256-pC7cnKt5Ljn+ObuU8/ymVe0Vf/h6iveOHWulsHxKAKs=", 476 "pom": "sha256-kZPQe/T2YBCNc1jliyfSG0TjToDWc06Y4hkWN28nDeI=" 477 }, 478 "com/google/guava#listenablefuture/9999.0-empty-to-avoid-conflict-with-guava": { 479 "jar": "sha256-s3KgN9QjCqV/vv/e8w/WEj+cDC24XQrO0AyRuXTzP5k=", 480 "pom": "sha256-GNSx2yYVPU5VB5zh92ux/gXNuGLvmVSojLzE/zi4Z5s=" ··· 501 "jar": "sha256-Ia8wySJnvWEiwOC00gzMtmQaN+r5VsZUDsRx1YTmSns=", 502 "pom": "sha256-X6yoJLoRW+5FhzAzff2y/OpGui/XdNQwTtvzD6aj8FU=" 503 }, 504 "com/googlecode/concurrent-trees#concurrent-trees/2.6.1": { 505 "jar": "sha256-BONySYTipcv1VgbPo3KlvT08XSohUzpwBOPN5Tl2H6U=", 506 "pom": "sha256-Q8K5sULnBV0fKlgn8QlEkl0idH2XVrMlDAeqtHU4qXE=" 507 }, 508 "com/googlecode/javaewah#JavaEWAH/1.2.3": { 509 "jar": "sha256-1lImlJcTxMYaeE9BxRFn57Axb5N2Q5jrup5DNrPZVMI=", 510 "pom": "sha256-5O1sZpYgNm+ZOSBln+CsfLyD11PbwNwOseUplzr5byM=" 511 }, 512 "com/lmax#disruptor/4.0.0": { 513 "jar": "sha256-wrqAhBVBJyvIFbytq5ENLXFqpWPsoVdiRQq0yIlEBQU=", 514 "module": "sha256-/ccJZrzS41x5Tc4sF7mZwuZpUOFYUx6Z3BUfsOvCllM=", ··· 567 "jar": "sha256-7urpF5FxRKaKdB1MDf9mqlxcX9hVk/8he87T/Iyng7g=", 568 "pom": "sha256-1dgfzCiMDYxxHDAgB8raSqmiJu0aES1LqmTLHWMiFws=" 569 }, 570 - "commons-io#commons-io/2.15.1": { 571 - "jar": "sha256-pYrxLuG2jP0uuwwnyu8WTwhDgaAOyBpIzCdf1+pU4VQ=", 572 - "pom": "sha256-Fxoa+CtnWetXQLO4gJrKgBE96vEVMDby9ERZAd/T+R0=" 573 }, 574 "dev/equo/ide#solstice/1.7.5": { 575 "jar": "sha256-BuFLxDrMMx2ra16iAfxnNk7RI/mCyF+lEx8IF+1lrk8=", ··· 580 "jar": "sha256-DnGR++Mk+5340tIHwHtma43CW7vib1OkxS4v7OYkqXY=", 581 "pom": "sha256-+pvmlFd2A+LUy1X0UjctP2wPk+XzjuXNf7Yos3k8qbw=" 582 }, 583 - "io/fabric8#kubernetes-client-bom/5.12.4": { 584 - "pom": "sha256-0jI5KonD79yFqymcWpToud01vALzQM6ERv9lmqFZE6A=" 585 - }, 586 - "io/github/goooler/shadow#io.github.goooler.shadow.gradle.plugin/8.1.5": { 587 - "pom": "sha256-jzpPZuyZj2+w/T3lacYy607vycDvmIh0/pq2sF6OZAI=" 588 - }, 589 - "io/github/goooler/shadow#shadow-gradle-plugin/8.1.5": { 590 - "jar": "sha256-p7085GPChFndkIaPyJjNX+wyDD3/U0fw9oiFp72eQtU=", 591 - "module": "sha256-d07ZeQXwUHxpfxeKhAFy/bQ+pJz8L55Je4DAlfN6rtU=", 592 - "pom": "sha256-7Z4JpOOV2pTl7BNx1XynWglhZtS65b9W85cKD+3ttQc=" 593 - }, 594 "io/leangen/geantyref#geantyref/1.3.11": { 595 "jar": "sha256-wmJ0R0s4RLzbfYPPc6eFNm+EtFO8F6GRz6T4/D4CIjQ=", 596 "pom": "sha256-3Etrgt7DQXBSvBc7lC+5asogUIpLmkfp8b2yQAXkPuc=" 597 }, 598 - "io/netty#netty-bom/4.1.104.Final": { 599 - "pom": "sha256-WmXgahWdINO0gAYkpXDGRtvucQsrU5s0SaJoVYwonpw=" 600 }, 601 - "io/netty#netty-buffer/4.2.0.Final": { 602 - "jar": "sha256-wBkmAXvg2WcRhFhSomRt5L8AqSVCsC7ZFfW+5Ugi/g0=", 603 - "pom": "sha256-bBjzQVX17TipgvzKvnFjpPtKyIJT+mXMUO2UW5wqihA=" 604 }, 605 - "io/netty#netty-codec-base/4.2.0.Final": { 606 - "jar": "sha256-RrVqvXE66yfG9H1zo+SF6iHZbFUFQWJq0PYsoMrhGPQ=", 607 - "pom": "sha256-NiGpDs4IdW0xajveLg3IBxhIc/j/CC92+klZeguCNbU=" 608 - }, 609 - "io/netty#netty-codec-compression/4.2.0.Final": { 610 - "jar": "sha256-tl3evCEZwECx5W+bZkfs3vjc29zSAOkdY63atOsauRw=", 611 - "pom": "sha256-cuWm+0uQbKqiQxZebFNiyuAU4OAIE+11Hb5Y0B3p+eA=" 612 }, 613 - "io/netty#netty-codec-haproxy/4.2.0.Final": { 614 - "jar": "sha256-Cyah1KJ7DmzZGp6w21n71bBBmukrZdaSBGbIynWzSFo=", 615 - "pom": "sha256-xlckSFjKcaOrz5xXjNN5eIl23x82aemjlo3U+TCggOg=" 616 }, 617 - "io/netty#netty-codec-http/4.2.0.Final": { 618 - "jar": "sha256-iG0GBiC164CipVNL5wpH/FFsYKvQVVcPDvNMr28dYeI=", 619 - "pom": "sha256-rI0zA731xoXJfFQQEzLGEqbrIc2KYI3mhtjfz1TFoJs=" 620 }, 621 - "io/netty#netty-codec-marshalling/4.2.0.Final": { 622 - "jar": "sha256-vdBfpYoNkN4YJfHLFtUYuYNXGS3TA/f2u1QUFdCSi60=", 623 - "pom": "sha256-7q2vroWVahx6stgVkzy22BudMpyo6O9u1ANne3Dt7hY=" 624 }, 625 - "io/netty#netty-codec-protobuf/4.2.0.Final": { 626 - "jar": "sha256-1hkWVKT52MRAv4VqAQxb1RhuwQAMEB03dUNSAESHjmU=", 627 - "pom": "sha256-KUWxLJErMIvF3X7Sdeaol/hsaMuDoi9adJ2HN04NKlo=" 628 }, 629 - "io/netty#netty-codec/4.2.0.Final": { 630 - "jar": "sha256-fbLwyPRKH7ZoZPPvqG0DqZigfNOB1s0Oh0YR9GSKkM0=", 631 - "pom": "sha256-WhGKGtrJLpPpS63SMdxvMS0k2RkWEOo5O3X+1FDaYd8=" 632 }, 633 - "io/netty#netty-common/4.2.0.Final": { 634 - "jar": "sha256-UjcLbBMfU2tgybHmQ+mptuf/7PeH1dNFOxaJr72JSIY=", 635 - "pom": "sha256-PPsQLAvAFyLCB/prp3iMnGkxbssK7NpZneT/rEw1nnM=" 636 }, 637 - "io/netty#netty-handler/4.2.0.Final": { 638 - "jar": "sha256-ZBJAh4MnA68MxjSeCj442TkkrQj9X6RzB+r5qug5YdA=", 639 - "pom": "sha256-VX4ITPkgVg6ZtVUKb8Vcy74jpTmtCURFdhVsAHmtSa8=" 640 }, 641 - "io/netty#netty-parent/4.2.0.Final": { 642 - "pom": "sha256-r7Or46M80QKlWTbO40FwE4txcozZWEY78FDKE375qxw=" 643 }, 644 - "io/netty#netty-resolver/4.2.0.Final": { 645 - "jar": "sha256-ySpDpbHanOEWv3PvuyNkT+acHNM9037ZDcxXnvWt0Sg=", 646 - "pom": "sha256-cGaHuj0B5olAF0hwSJ1Nt6R0Rj6UAv7p6QqySgnccK0=" 647 }, 648 - "io/netty#netty-transport-classes-epoll/4.2.0.Final": { 649 - "jar": "sha256-tyKjARA3ByL1AljVtKIZcMKvHO+zgQCAwe+zFhJ8ZCg=", 650 - "pom": "sha256-TiF2aSsdI1maf2xsSAf7tBpHbGClxldxccW9WLxvftk=" 651 }, 652 - "io/netty#netty-transport-classes-io_uring/4.2.0.Final": { 653 - "jar": "sha256-Y1RIRQCPj9/wW4JcUOoiCWJQNMLPZfiFl/dvPKvH2O0=", 654 - "pom": "sha256-tjAC7xoEeJ9zHMIF7voNJM5z4bZ9kX34wxvbSj4xkkM=" 655 }, 656 - "io/netty#netty-transport-classes-kqueue/4.2.0.Final": { 657 - "jar": "sha256-4PX/BxGBO+ynWQ9ST9J3oe8WXy7pxRlrq41y10LdbCE=", 658 - "pom": "sha256-KpL37GnxRY82aAnD1M99dRR23CxIuAZxdH0JWPk4sG0=" 659 }, 660 - "io/netty#netty-transport-native-epoll/4.2.0.Final": { 661 - "jar": "sha256-VHWlUTe9NaqZ8iA6nzjqX2N08BS4jfcp7bmZ9KgYo80=", 662 - "pom": "sha256-I0HScHWe5FI3f+gvtxRoHet1Wta4XdPnTrPSMi+HfB0=" 663 }, 664 - "io/netty#netty-transport-native-epoll/4.2.0.Final/linux-aarch_64": { 665 - "jar": "sha256-o9xKVsE5jbEifUQcr0Ii2xaKXT9449X7tGu6lkmkOLU=" 666 }, 667 - "io/netty#netty-transport-native-epoll/4.2.0.Final/linux-x86_64": { 668 - "jar": "sha256-EQc20zqQ7V3p/HSEpDuopaJ+YRz57Bzl83f6Fu3wk6I=" 669 }, 670 - "io/netty#netty-transport-native-io_uring/4.2.0.Final": { 671 - "jar": "sha256-oTzFZIYRhC4iEavTzG7QwHNqlF2OxgHE3Pa9kkPboGw=", 672 - "pom": "sha256-f45+F28dIA4O6ojEIu8fOPIbh1kmSsTNLsY2oLVCHDk=" 673 }, 674 - "io/netty#netty-transport-native-io_uring/4.2.0.Final/linux-aarch_64": { 675 - "jar": "sha256-YavxiRa4SKO7bAO0UnUyRxVeVb4YNWtdcTtaE0TInvs=" 676 }, 677 - "io/netty#netty-transport-native-io_uring/4.2.0.Final/linux-x86_64": { 678 - "jar": "sha256-VjWAqkvFfpxORqWG90gz8LNKLL9M8z6CCIMgqodqtxY=" 679 }, 680 - "io/netty#netty-transport-native-kqueue/4.2.0.Final": { 681 - "jar": "sha256-izT+uqOG2dFXVzP28oJDgaJcslyFhpUY98VvriN1AJg=", 682 - "pom": "sha256-sVEZGtkMTI/ScxJcB/2Z2nkYxIsW1TJ4EbeXhYd9Fr4=" 683 }, 684 - "io/netty#netty-transport-native-kqueue/4.2.0.Final/osx-aarch_64": { 685 - "jar": "sha256-B7vau9N0Ngx7tGDqF4iaNlvC9q+yKUO6u6/fdv+nSA8=" 686 }, 687 - "io/netty#netty-transport-native-kqueue/4.2.0.Final/osx-x86_64": { 688 - "jar": "sha256-sCYa4U6hX5dz4ayf8uu3oNlyF9HauW0HWVnFYEVMQw4=" 689 }, 690 - "io/netty#netty-transport-native-unix-common/4.2.0.Final": { 691 - "jar": "sha256-7qfwGHxAlNWTQbFQ1K0fxEyWOuZHcn1fM6hkR00g9VI=", 692 - "pom": "sha256-kT7odeA5R97x91lJLS+ZNgKWAfE+6EET/zlCSd4NiSk=" 693 }, 694 - "io/netty#netty-transport/4.2.0.Final": { 695 - "jar": "sha256-LAurKGrjmt+MKikn2C5v2WTcGbPtH729TG9OIg8FKP8=", 696 - "pom": "sha256-YNXY8UcYoSxfjYkUPjo2/7tWE72VAJLHyaol4sy+Urc=" 697 }, 698 "it/unimi/dsi#fastutil/8.5.15": { 699 "jar": "sha256-z/62ZzvfHm5Dd9aE3y9VrDWc9c9t9hPgXmLe7qUAk2o=", ··· 724 "jar": "sha256-Yq4oGH7SsGKBPaap1We/7nM8NBWCaZti3ZgCMHKaAxM=", 725 "pom": "sha256-NYRJ1sc1OFhFCN2K5s/eVrr0o0t2e3HZzEZE8PH0IRo=" 726 }, 727 - "net/kyori#adventure-api/4.21.0": { 728 - "jar": "sha256-ZKdldgQB541DOofb1M2lcBazA4U8b9Hclwh7WjqmgTM=", 729 - "module": "sha256-+lKIKqUdj68bqml6drFHBnQUmNTKOkGg2MSrkTr6mV8=", 730 - "pom": "sha256-dRFiV0Q3x90YtMgLxL5lBOtRCVVTL6YGhO8xU5LhQCc=" 731 }, 732 - "net/kyori#adventure-bom/4.21.0": { 733 - "module": "sha256-6oUg3iIrlad0iW1bqJtFbKHQs7+RZbPsyOwvLXZhKPM=", 734 - "pom": "sha256-fpuPxF10yGMnby42w0azTt+R2UJGxGgjRxv4w1hlenQ=" 735 }, 736 - "net/kyori#adventure-key/4.21.0": { 737 - "jar": "sha256-apOYydQCCJ+doGCla0XK59WMvxmTcabY7Bom2PlMxrs=", 738 - "module": "sha256-aepciDIN/bFf/lUqRKf0G8gBQqu6Kuds6nG3g4uF4Ho=", 739 - "pom": "sha256-BERAvYv/A9TmYDNK3F5V8/bPlLf/ddBzS4DEHjqCgJc=" 740 }, 741 - "net/kyori#adventure-nbt/4.21.0": { 742 - "jar": "sha256-r27AXxaClKLmiLs8UhGxI70NTXh5HiS7fxE5rZi16zU=", 743 - "module": "sha256-AGs77o7gGbcDYQ2MfBgzRW5OQ7nhEJO5yFF6Ck0M+B0=", 744 - "pom": "sha256-0DAw5LnLm+QZSU42YB/opYAbt0nfH4pY8Xhn4SBwRzE=" 745 }, 746 "net/kyori#adventure-platform-api/4.3.4": { 747 "jar": "sha256-7GBGKMK3wWXqdMH8s6LQ8DNZwsd6FJYOOgvC43lnCsI=", ··· 753 "module": "sha256-VYXzbUzK6MaYbW4tmAjZs5ywl28CLK8sANPP5v1HTQQ=", 754 "pom": "sha256-wP6w6syf5B8iL5iXsS4lrDw0Ub3VYWwUhclppgBO2eE=" 755 }, 756 - "net/kyori#adventure-text-logger-slf4j/4.21.0": { 757 - "jar": "sha256-RyStz+/740AsjoMhhGkGArN0uxZuvRfm7ACMRFxTeTU=", 758 - "module": "sha256-5WCx5qig2rD9wE+mseKirWZ3EkMJiyolz7A76DFNxtU=", 759 - "pom": "sha256-7V/qFBbC6VjJcntV4fEaRoDmyM52WLE8FVt7UrEKPso=" 760 }, 761 - "net/kyori#adventure-text-minimessage/4.21.0": { 762 - "jar": "sha256-UctIeIUbcmM76h0bWyTo3jRhS8koroodupa2OOmk6MQ=", 763 - "module": "sha256-c/i/PZOmL76h8kLHmSq0qLNhuml92HWZCku22tY3qCs=", 764 - "pom": "sha256-zwtZrXXi99pqoHZ0wlrwAKD4UNXmceXSs8aKgtTeVxA=" 765 }, 766 - "net/kyori#adventure-text-serializer-ansi/4.21.0": { 767 - "jar": "sha256-LwrIh56+RgbvZhviUgAzqVEo6TDK0wr1vAxpy1kSmcU=", 768 - "module": "sha256-V+Qm8xoIWTqA1aZvxnr/Y1y9Cqh8x8RWicmTpqoGwU0=", 769 - "pom": "sha256-+cXbfm4x6DLrME+ZtgqP8AbTZ39XZOSqH1muT0KgDUU=" 770 }, 771 - "net/kyori#adventure-text-serializer-commons/4.21.0": { 772 - "jar": "sha256-LusmYFxyOlfltj0kwt1kGCFToUhsqOnzC8ukLSB/LCo=", 773 - "module": "sha256-2SyvdO7dl496C1Q9dH4bNGD2+incUK9KAJEXKyyYJqM=", 774 - "pom": "sha256-iSySW39EOPgDnk93KciCbI84LICMDDTIhoOtNqEN3PI=" 775 }, 776 - "net/kyori#adventure-text-serializer-gson/4.21.0": { 777 - "jar": "sha256-ObUc+poE324dL0MdJqaX7WGWI2ls3rHAChr9NHxc4IQ=", 778 - "module": "sha256-xSvs+73VcbpmWXy7iHfbGxeBYfCNA44zYIv9P54aD28=", 779 - "pom": "sha256-aEx9Da6SK8h5u+4lweWm/L6vCdnbDhijb9IuUZlqWsM=" 780 }, 781 - "net/kyori#adventure-text-serializer-json-legacy-impl/4.21.0": { 782 - "jar": "sha256-zMCsXIBSo1C/yrpnyk03xyFL5aH42Syq44wcrWz4v1U=", 783 - "module": "sha256-b4OuzShhdN3x79WpDiGuHB2uI3dxU71gx5C0BM8mgAQ=", 784 - "pom": "sha256-ix6svUQKhS+N0V5SekEvDIU+uAaJc72krT+6K+Eq/QQ=" 785 }, 786 - "net/kyori#adventure-text-serializer-json/4.21.0": { 787 - "jar": "sha256-kocXstx2RathZhfAvVXoCpwDWHYrWQoNPAu+MCsuVIE=", 788 - "module": "sha256-wTimiDaAyLv+TCvGCGU/AKxhu/QGqbXYHSityPXo3Q0=", 789 - "pom": "sha256-XAMhaDcf2h9er2XKH0YsCV/ci8qGlyxL15T9CsaVLtg=" 790 }, 791 - "net/kyori#adventure-text-serializer-legacy/4.21.0": { 792 - "jar": "sha256-msG5n4KEWOGQCPZ1eBoOjIUXzfoiofxbuHp79pVUw1w=", 793 - "module": "sha256-mJvCjUI2jqtsZERpc3oocvgf+BTCp+wWGwUqHRgkQQg=", 794 - "pom": "sha256-KpOkDYdQEqmRPf4z6W5LXIUlRwDqVDSndkjHNLDFAhk=" 795 }, 796 - "net/kyori#adventure-text-serializer-plain/4.21.0": { 797 - "jar": "sha256-Ep1piIu5P+lvUS8eWBodNvAog2G4Xo7IBP1u7LzvMS4=", 798 - "module": "sha256-qtwvfOI85wiFn3c/Bti6y6r1fWsGfG1vtSwx40gCrt4=", 799 - "pom": "sha256-kqv+DaajY+E0gwjXNMuwTfyZkzjKq5zqVV4/JN9WLD0=" 800 }, 801 "net/kyori#ansi/1.1.1": { 802 "jar": "sha256-tsVp4aCSW57rNJ4S2zXiI3VWEH4zNmV+Cy694mHYr9c=", ··· 812 "jar": "sha256-fQH8JaS7OvDhZiaFRV9FQfv0YmIW6lhG5FXBSR4Va4w=", 813 "module": "sha256-qfpHivwqQ0b4pb4JH14UZmhgGS3YZbHj2FkilmRsdP4=", 814 "pom": "sha256-XuAEEIIvNukBnZR2LOAbzWA5VpdlNRvvBmCUXNT5pW4=" 815 }, 816 "net/kyori#option/1.1.0": { 817 "jar": "sha256-l7abSxff4CIXyRMa00JWTLya69BMdetoljm194/UsRw=", ··· 856 "org/apache#apache/33": { 857 "pom": "sha256-14vYUkxfg4ChkKZSVoZimpXf5RLfIRETg6bYwJI6RBU=" 858 }, 859 - "org/apache/ant#ant-launcher/1.10.14": { 860 - "jar": "sha256-8JCXJaeiTjk4iPP7tVg0er9QbOL368WB/yYzG5TZUaU=", 861 - "pom": "sha256-nJ2qQSPp63BzVnk2UsOIo1UQqqWm0UW0T4VdCN1LK7w=" 862 }, 863 - "org/apache/ant#ant-parent/1.10.14": { 864 - "pom": "sha256-CBYQamBniMJw767yFWLPy9j0uvfafBG85RSetWYbMx8=" 865 }, 866 - "org/apache/ant#ant/1.10.14": { 867 - "jar": "sha256-TLvZJD3kwQQtYdmhXbTEPJD/k7FteLOUgdoclWyOlnE=", 868 - "pom": "sha256-L6QmnmscRXI6iojmnZhKdm27IEzQ/pgUlMzfP+469lw=" 869 }, 870 "org/apache/commons#commons-parent/39": { 871 "pom": "sha256-h80n4aAqXD622FBZzphpa7G0TCuLZQ8FZ8ht9g+mHac=" ··· 879 "org/apache/commons#commons-parent/58": { 880 "pom": "sha256-LUsS4YiZBjq9fHUni1+pejcp2Ah4zuy2pA2UbpwNVZA=" 881 }, 882 - "org/apache/commons#commons-parent/65": { 883 - "pom": "sha256-bPNJX8LmrJE6K38uA/tZCPs/Ip+wbTNY3EVnjVrz424=" 884 }, 885 "org/apache/groovy#groovy-bom/4.0.22": { 886 "module": "sha256-Ul0/SGvArfFvN+YAL9RlqygCpb2l9MZWf778copo5mY=", ··· 907 "jar": "sha256-8r8vLHdyFpyeMGmXGWZ60w+bRsTp14QZB96y0S2ZI/4=", 908 "pom": "sha256-f8K4BFgJ8/J6ydTZ6ZudNGIbY3HPk8cxPs2Epa8Om64=" 909 }, 910 - "org/apache/logging#logging-parent/10.5.0": { 911 - "pom": "sha256-ngk5zAKXfp/1KOdmBj4PMiTTbok7pMkh8JINtI86xqk=" 912 - }, 913 "org/apache/logging#logging-parent/11.3.0": { 914 "pom": "sha256-pcmFtW/hxYQzOTtQkabznlufeFGN2PySE0aQWZtk19A=" 915 }, 916 - "org/apache/logging/log4j#log4j-api/2.22.1": { 917 - "jar": "sha256-XXvq5/8V2FFtZRcSHX8Sp5pqwYDfZLX87FXVviEFblM=", 918 - "pom": "sha256-bVdUd3E5Sz7hj57T7/ohWXGeLzY0Ynhj0FAjup/Y4Ys=" 919 - }, 920 "org/apache/logging/log4j#log4j-api/2.24.1": { 921 "jar": "sha256-bne7Ip/I3K8JA4vutekDCyLp4BtRtFiwGDzmaevMku8=", 922 "pom": "sha256-IzAaISnUEAiZJfSvQa7LUlhKPcxFJoI+EyNOyst+c+M=" 923 }, 924 - "org/apache/logging/log4j#log4j-bom/2.22.1": { 925 - "pom": "sha256-nxUjceNriy6m6yyb0YgnYAafNhgKbygXfmpIwoFMDyM=" 926 }, 927 "org/apache/logging/log4j#log4j-bom/2.24.1": { 928 "pom": "sha256-vGPPsrS5bbS9cwyWLoJPtpKMuEkCwUFuR3q1y3KwsNM=" 929 }, 930 - "org/apache/logging/log4j#log4j-core/2.22.1": { 931 - "jar": "sha256-RtzOysVWYj2OLOhkhJaCSoKVHROQYqTmEUiv8aJe0Y0=", 932 - "pom": "sha256-HPf2SP7UPwv6wzKNk/yCPHSZB4/XkE4YtlSbsQeKnFI=" 933 }, 934 "org/apache/logging/log4j#log4j-core/2.24.1": { 935 "jar": "sha256-ALzziEcsqApocBQYF2O2bXdxd/Isu/F5/WDhsaybybA=", 936 "pom": "sha256-JyQstBek3xl47t/GlYtFyJgg+WzH9NFtH0gr/CN24M0=" 937 }, 938 - "org/apache/logging/log4j#log4j-iostreams/2.24.1": { 939 - "jar": "sha256-oPXv2zMWaqrvEs1U+bXKlA1/oXV113BVD4KPMnAu+H4=", 940 - "pom": "sha256-trWodrJTUpAmlQNSQxFnfefgkum9GfwgKWsKOYHD918=" 941 }, 942 - "org/apache/logging/log4j#log4j-jul/2.24.1": { 943 - "jar": "sha256-7Rj4dHi+aaLXYKKJVmdkX/LAvry2xJQGeaSfRYi44FE=", 944 - "pom": "sha256-mwbQSbyXT+bSXCcutp94QhoQeW6A6PnDl8lxtjFXjRw=" 945 }, 946 - "org/apache/logging/log4j#log4j-slf4j2-impl/2.24.1": { 947 - "jar": "sha256-ZEtuPwxA5WmeoMoBOESxOK9EBWHSciZnLoC3qh/fwVY=", 948 - "pom": "sha256-dip5v73nPP9Pmc6Gy2ar3w4S9c+K/5eefTe2XVVzb8Q=" 949 }, 950 - "org/apache/logging/log4j#log4j/2.22.1": { 951 - "pom": "sha256-7Zibb7CaJW69TP3MIZaIuhw9beS087UUVC0WVj3CkJc=" 952 }, 953 "org/apache/logging/log4j#log4j/2.24.1": { 954 "pom": "sha256-+NcAm1Rl2KhT0QuEG8Bve3JnXwza71OoDprNFDMkfto=" 955 }, 956 "org/apache/maven#maven-api-meta/4.0.0-alpha-9": { 957 "jar": "sha256-MsT1yturaAw0lS+ctXBFehODzOxMmlewOSYH1xkcaUk=", ··· 1013 "org/codehaus#codehaus-parent/4": { 1014 "pom": "sha256-a4cjfejC4XQM+AYnx/POPhXeGTC7JQxVoeypT6PgFN8=" 1015 }, 1016 - "org/codehaus/groovy#groovy-bom/3.0.19": { 1017 - "pom": "sha256-E+POc+1L+fxu4rVA2FVWh/astwf4SSOUFMgnfUMd7KE=" 1018 - }, 1019 "org/codehaus/mojo#animal-sniffer-annotations/1.14": { 1020 "jar": "sha256-IGgyC9a610TDZzqwSPZ+ML749RiZb6OAAzVWYAZpkF0=", 1021 "pom": "sha256-GHnxmgWZHj7ZWRC5ZokzM5awxGeiFdxNH5ABhAS3KiY=" ··· 1036 "org/codehaus/mojo#mojo-parent/40": { 1037 "pom": "sha256-/GSNzcQE+L9m4Fg5FOz5gBdmGCASJ76hFProUEPLdV4=" 1038 }, 1039 - "org/codehaus/plexus#plexus-utils/4.0.0": { 1040 - "jar": "sha256-JwzXA7SMblyMaR8YdfItYtIs/gcsc64vWBTYPWjB2gs=", 1041 - "pom": "sha256-pExUeUJt6g57//0uw630nGhRUBl4iWXE0jH8PwTaQSk=" 1042 }, 1043 - "org/codehaus/plexus#plexus-xml/4.0.3": { 1044 - "jar": "sha256-eqWeb9aTuGF8hydq7KnnoUmhC9qWB4iJO5TYpUcDc/c=", 1045 - "pom": "sha256-JzxQW2WJJwZxENYbbo/hL8tzcPVZgMk7r+lc4Lgt0FY=" 1046 - }, 1047 - "org/codehaus/plexus#plexus/13": { 1048 - "pom": "sha256-V1lF3AiWbGbrA9W66RNb0iyjkgoYZbuZ0+zZO+9Vq9M=" 1049 }, 1050 - "org/codehaus/plexus#plexus/16": { 1051 - "pom": "sha256-aNTu1lo9u8NC7YDdE4++nGfLf7TCq8T1IBzbW59kWGg=" 1052 }, 1053 "org/codehaus/woodstox#stax2-api/4.2.1": { 1054 "jar": "sha256-Z4Vn5ItRpCxlxpnyZlOa09Z21LGlsK19iezoudV3JXk=", ··· 1060 "org/eclipse/ee4j#project/1.0.7": { 1061 "pom": "sha256-IFwDmkLLrjVW776wSkg+s6PPlVC9db+EJg3I8oIY8QU=" 1062 }, 1063 - "org/eclipse/jetty#jetty-bom/9.4.53.v20231009": { 1064 - "pom": "sha256-+vlzoZh0JmzQhlsCmeup8WfLsHB13U/tvj1hVjV+ndU=" 1065 }, 1066 "org/eclipse/jgit#org.eclipse.jgit-parent/6.7.0.202309050840-r": { 1067 "pom": "sha256-u56FQW2Y0HMfx2f41w6EaAQWAdZnKuItsqx5n3qjkR8=" 1068 }, 1069 "org/eclipse/jgit#org.eclipse.jgit/6.7.0.202309050840-r": { 1070 "jar": "sha256-tWRHfQkiQaqrUMhKxd0aw3XAGCBE1+VlnTpgqQ4ugBo=", 1071 "pom": "sha256-BNB83b8ZjfpuRIuan7lA94HAEq2T2eqCBv4KTTplwZI=" ··· 1077 "org/fusesource#fusesource-pom/1.12": { 1078 "pom": "sha256-xA2WDarc73sBwbHGZXr7rE//teUxaPj8sLKLhOb9zKE=" 1079 }, 1080 - "org/fusesource/jansi#jansi/2.4.1": { 1081 - "jar": "sha256-Ll53Wp3Fj/prvWqm8JnWL4ti3N60w8O7vlzyMBvC3ME=", 1082 - "pom": "sha256-P5jZeaTTVZ+HefuwBLNK51Fq+t9RDhHffMPNBz6xuzs=" 1083 }, 1084 "org/javassist#javassist/3.28.0-GA": { 1085 "jar": "sha256-V9Cp6ShvgvTqqFESUYaZf4Eb784OIGD/ChWnf1qd2ac=", ··· 1212 "module": "sha256-DZTIpBSD58Jwfr1pPhsTV6hBUpmM6FVQ67xUykMho6c=", 1213 "pom": "sha256-Cdlg+FkikDwuUuEmsX6fpQILQlxGnsYZRLPAGDVUciQ=" 1214 }, 1215 - "org/jline#jline-native/3.27.1": { 1216 - "jar": "sha256-Y2ZG2kBBPnSWOz9LQMnF3PtC89Ds8bk9bd9ciV7/5CI=", 1217 - "pom": "sha256-n/4orsyfVG7JaV8tUh9nRZtLNpFxSMCNFvRVazg9Mo8=" 1218 }, 1219 "org/jline#jline-parent/3.20.0": { 1220 "pom": "sha256-cXjGACAsS8Jux6S2IlXu829wVsrSpeYjnFdL7qXCEMo=" 1221 }, 1222 - "org/jline#jline-parent/3.27.1": { 1223 - "pom": "sha256-6WT9B2wgziTdtI3XN6CNYFA0cAXj5u7IL/XrBD1WFYE=" 1224 - }, 1225 "org/jline#jline-reader/3.20.0": { 1226 "jar": "sha256-rNHJTR4iiqe3li9psh7Tqf2CjrOmPkuvkIaVTmJq8fA=", 1227 "pom": "sha256-2fF+3XIcAqExcgN21sB4eHgutrb6/rX/QkBKtXFD4TY=" 1228 }, 1229 - "org/jline#jline-terminal-jansi/3.27.1": { 1230 - "jar": "sha256-mWvM6OpUHXH3Du3/+dEHpIJ39lVzReIdHzDGDmZIRnQ=", 1231 - "pom": "sha256-XWrgbTzxQG2C+kk2K8yZxImpu4l3c9baUiJnTT+K/+g=" 1232 }, 1233 "org/jline#jline-terminal/3.20.0": { 1234 "jar": "sha256-EhJRcOeVUZum3IAQwHC1PHaq6StIXB43Uw5Uq13QjUM=", 1235 "pom": "sha256-EMo7z1F48YUH8hCmOtljeJaFM0OtHBKRoBmhFvIWpUg=" 1236 }, 1237 - "org/jline#jline-terminal/3.27.1": { 1238 - "jar": "sha256-Qre3VlBrypi1BZOEJqNcmQgveBnDM+0lvUEUv7DjtfI=", 1239 - "pom": "sha256-hHjnmqIupq95eWRD+O0w//pdxkfrPS0YYLrC4j800pc=" 1240 }, 1241 "org/jspecify#jspecify/0.3.0": { 1242 "module": "sha256-M7jCLyQkwpAyQaf+olj8QasMTWiJd2V2xRkEdWLuQ6U=", ··· 1259 "module": "sha256-qnlAydaDEuOdiaZShaqa9F8U2PQ02FDujZPbalbRZ7s=", 1260 "pom": "sha256-EJN9RMQlmEy4c5Il00cS4aMUVkHKk6w/fvGG+iX2urw=" 1261 }, 1262 "org/junit#junit-bom/5.9.1": { 1263 "module": "sha256-kCbBZWaQ+hRa117Og2dCEaoSrYkwqRsQfC9c3s4vGxw=", 1264 "pom": "sha256-sWPBz8j8H9WLRXoA1YbATEbphtdZBOnKVMA6l9ZbSWw=" ··· 1297 "module": "sha256-4dG63P7cJyRFQeC+XV6EtyoicNevYWhrJvEc/Edw2kI=", 1298 "pom": "sha256-EqqGyhwNZIoiXU58aWBUwfx26IeCxcOft983muI7728=" 1299 }, 1300 "org/lanternpowered#lmbda/2.0.0": { 1301 "jar": "sha256-v7mL90YQgkvVbhDYJSM6Zg66M7qRXPlHJGJX9QPadfM=", 1302 "pom": "sha256-KRybm3znFPdLpG0zsmSEpYS+NPXHXGyTDsIF8iGbVfg=" ··· 1326 "org/ow2#ow2/1.5.1": { 1327 "pom": "sha256-Mh3bt+5v5PU96mtM1tt0FU1r+kI5HB92OzYbn0hazwU=" 1328 }, 1329 - "org/ow2/asm#asm-commons/9.6": { 1330 - "jar": "sha256-eu/Q1cCQFwHGn3UT/tp2X7a+M68s56oXxXgfyHZXxRE=", 1331 - "pom": "sha256-qYrkiVM0uvj/hr1mUWIQ29mgPxpuFeR92oKvz2tT13w=" 1332 }, 1333 - "org/ow2/asm#asm-tree/9.6": { 1334 - "jar": "sha256-xD7PF7U5x3fhXae1uGVTs3fi05poPeYoVWfVKDiI5+8=", 1335 - "pom": "sha256-G8tIHX/Ba5VbtgygfIz6JCS87ni9xAW7oxx9b13C0RM=" 1336 - }, 1337 - "org/ow2/asm#asm/9.6": { 1338 - "jar": "sha256-PG+sJCTbPUqFO2afTj0dnDxVIjXhmjGWc/iHCDwjA6E=", 1339 - "pom": "sha256-ku7iS8PIQ+SIHUbB3WUFRx7jFC+s+0ZrQoz+paVsa2A=" 1340 }, 1341 "org/ow2/asm#asm/9.7.1": { 1342 "jar": "sha256-jK3UOsXrbQneBfrsyji5F6BAu5E5x+3rTMgcdAtxMoE=", 1343 "pom": "sha256-cimwOzCnPukQCActnkVppR2FR/roxQ9SeEGu9MGwuqg=" 1344 }, 1345 "org/reflections#reflections/0.10.2": { 1346 "jar": "sha256-k4otCP5UBQ12ELlE2N3DoJNVcQ2ea+CqyDjbwE6aKCU=", 1347 "pom": "sha256-tsqj6301vXVu1usKKoGGi408D29CJE/q5BdgrGYwbYc=" 1348 }, 1349 "org/slf4j#slf4j-api/1.7.36": { 1350 "jar": "sha256-0+9XXj5JeWeNwBvx3M5RAhSTtNEft/G+itmCh3wWocA=", 1351 "pom": "sha256-+wRqnCKUN5KLsRwtJ8i113PriiXmDL0lPZhSEN7cJoQ=" 1352 }, 1353 - "org/slf4j#slf4j-api/2.0.12": { 1354 - "jar": "sha256-p5UCuKvfvXIoRqJ2kSJqQIhoLW01ZU+bgOKpzKz37Uc=", 1355 - "pom": "sha256-Udh5pZmPWCJ0Dc9VIsDtaXGtXEpeowtw9bVGCT5rQmM=" 1356 - }, 1357 "org/slf4j#slf4j-api/2.0.16": { 1358 "jar": "sha256-oSV43eG6AL2bgW04iguHmSjQC6s8g8JA9wE79BlsV5o=", 1359 "pom": "sha256-saAPWxxNvmK4BdZdI5Eab3cGOInXyx6G/oOJ1hkEc/c=" 1360 }, 1361 - "org/slf4j#slf4j-bom/2.0.12": { 1362 - "pom": "sha256-SH70mE1wFY9Yw3zodmkxukx+VzdYZYhLdWORv9bQDDk=" 1363 }, 1364 "org/slf4j#slf4j-bom/2.0.16": { 1365 "pom": "sha256-BWYEjsglzfKHWGIK9k2eFK44qc2HSN1vr6bfSkGUwnk=" 1366 }, 1367 "org/slf4j#slf4j-parent/1.7.36": { 1368 "pom": "sha256-uziNN/vN083mTDzt4hg4aTIY3EUfBAQMXfNgp47X6BI=" 1369 }, 1370 - "org/slf4j#slf4j-parent/2.0.12": { 1371 - "pom": "sha256-fGvEdX5NSZJN3w/sX1zkAvg6bGzz4QUtGVsSgqeFVd4=" 1372 - }, 1373 "org/slf4j#slf4j-parent/2.0.16": { 1374 "pom": "sha256-CaC0zIFNcnRhbJsW1MD9mq8ezIEzNN5RMeVHJxsZguU=" 1375 }, 1376 "org/sonatype/oss#oss-parent/5": { 1377 "pom": "sha256-FnjUEgpYXYpjATGu7ExSTZKDmFg7fqthbufVqH9SDT0=" ··· 1430 "jar": "sha256-IRswbPxE+Plt86Cj3a91uoxSie7XfWDXL4ibuFX1NeU=", 1431 "pom": "sha256-CTvhsDMxvOKTLWglw36YJy12Ieap6fuTKJoAJRi43Vo=" 1432 }, 1433 - "org/vafer#jdependency/2.10": { 1434 - "jar": "sha256-Hc2DVauevO1odxW/ElLrKu5dDnRJeiAU/TOHz86N+F8=", 1435 - "pom": "sha256-q1PyWatfZIPT27AjVGngeNSiLP2JB3GrBPh9s6W0YGc=" 1436 }, 1437 "org/xmlresolver#xmlresolver/5.1.1": { 1438 "jar": "sha256-MSL4rkDERq27MDzVUldoA/2/bq77hL985D0TNlsnymg=",
··· 75 "module": "sha256-eYp7cGdyE27iijLt2GOx6fgWE6NJhAXXS+ilyb6/9U8=", 76 "pom": "sha256-20U7urXn2opDE5sNzTuuZykzIfKcTZH1p5XZ/2xS3d8=" 77 }, 78 + "io/papermc#fill-gradle/1.0.3": { 79 + "jar": "sha256-i0s+vAeA1bKfvpdqqwSx7RfW8nUt+91hgOLaTAkPHok=", 80 + "module": "sha256-RyHV6clYb0y/g1pDAdYF8p+v1ycn6pPhcHueG2vEjJ4=", 81 + "pom": "sha256-iQridlDWW/I2j8S0pp2rQKSqLsX6mtRKh+8enBJd5JA=" 82 + }, 83 + "io/papermc/fill/gradle#io.papermc.fill.gradle.gradle.plugin/1.0.3": { 84 + "pom": "sha256-mY28yKdtdiKCQgolhRc+El30dd3ROKN1PSNk70wA/BM=" 85 + }, 86 + "net/kyori#indra-git/3.1.3": { 87 + "jar": "sha256-Yj3GYLWoSQJgP1Ww4EnCX9w8Z3SckQWKEGOWPcYFae0=", 88 + "module": "sha256-V9JC+gioSOG2JGEvV/+6qY9p9d8DA9LBj3vbGpAyikU=", 89 + "pom": "sha256-Zp9TPudkCyfovE9RPkohPaBBz1wcJhVTx/GD1Qu21Jc=" 90 + }, 91 "org/apache#apache/29": { 92 "pom": "sha256-PkkDcXSCC70N9jQgqXclWIY5iVTCoGKR+mH3J6w1s3c=" 93 }, ··· 330 "com/fasterxml#oss-parent/50": { 331 "pom": "sha256-9dpV3XuI+xcMRoAdF3dKZS+y9FgftbHQpfyGqhgrhXc=" 332 }, 333 "com/fasterxml#oss-parent/58": { 334 "pom": "sha256-VnDmrBxN3MnUE8+HmXpdou+qTSq+Q5Njr57xAqCgnkA=" 335 }, 336 + "com/fasterxml#oss-parent/61": { 337 + "pom": "sha256-NklRPPWX6RhtoIVZhqjFQ+Er29gF7e75wSTbVt0DZUQ=" 338 + }, 339 + "com/fasterxml/jackson#jackson-base/2.18.1": { 340 + "pom": "sha256-m612py37mq3jx6MzQ3dUk4bbqlTCFeRYOiUEyIp81K8=" 341 }, 342 "com/fasterxml/jackson#jackson-bom/2.17.2": { 343 "pom": "sha256-H0crC8IATVz0IaxIhxQX+EGJ5481wElxg4f9i0T7nzI=" 344 }, 345 + "com/fasterxml/jackson#jackson-bom/2.18.1": { 346 + "pom": "sha256-84SrzK8Mb712GDdi9yVv1nkBLtgdt/KiZofouWWgFKc=" 347 }, 348 "com/fasterxml/jackson#jackson-parent/2.17": { 349 "pom": "sha256-rubeSpcoOwQOQ/Ta1XXnt0eWzZhNiSdvfsdWc4DIop0=" 350 }, 351 + "com/fasterxml/jackson#jackson-parent/2.18.1": { 352 + "pom": "sha256-0IIvrBoCJoRLitRFySDEmk9hkWnQmxAQp9/u0ZkQmYw=" 353 + }, 354 + "com/fasterxml/jackson/core#jackson-annotations/2.18.1": { 355 + "jar": "sha256-t/nfXayahfR/2ydpRV7oupzy/pt8TPY24K7INHnXiC8=", 356 + "module": "sha256-DFBMd03V5mzpWoFiUnsAvNGR0e6S2kKPFhL5n3NMqYw=", 357 + "pom": "sha256-dRNr4/Jizrf75rkHuPJujGKMM+G1SSINS36CvdHQ5EY=" 358 + }, 359 + "com/fasterxml/jackson/core#jackson-core/2.18.1": { 360 + "jar": "sha256-6+GVlq0Z96BRTIu497Cs+FI5pO/1rgMinpdg0mjSnCI=", 361 + "module": "sha256-VHp3eJ1Ej1IoV37sUTwj2+eAhg98E4mecnrOCXDz3jE=", 362 + "pom": "sha256-36WWVD+Z1b7cE4aq4rr73v9mpnK7IXF4/CSMjT1Xf+0=" 363 + }, 364 + "com/fasterxml/jackson/core#jackson-databind/2.18.1": { 365 + "jar": "sha256-cRvDv4bTHQKWi5J577B6atYK38C6oOn+ZtcaCsJVYjQ=", 366 + "module": "sha256-xlQvXTA+kaQo5pElXhDIGcSyGvnsQ+a+Vnq8MSRNIWc=", 367 + "pom": "sha256-09m5HHTeS7LD9bNRhqq1FHFtqh1yEny2DQ0+Uk8xHyI=" 368 + }, 369 + "com/fasterxml/jackson/datatype#jackson-datatype-jsr310/2.18.1": { 370 + "jar": "sha256-b3nIdhO9ALH/3rx40jXLnz3Ndhl3+/h8G3cBeCiuiV8=", 371 + "module": "sha256-kOszPmMBRzhd8WMcq4L+YtkqVQB4b4Mskl6jbOgv2SM=", 372 + "pom": "sha256-m9eWNx4di6787izrlhPIF8k8t/xw3DVSIzmRcBvn46c=" 373 + }, 374 + "com/fasterxml/jackson/module#jackson-modules-java8/2.18.1": { 375 + "pom": "sha256-Pt9S8cWuqdNlMYMp6SUVLFJppU88C+7Enn0bBT+JA/4=" 376 + }, 377 "com/fasterxml/woodstox#woodstox-core/6.5.1": { 378 "jar": "sha256-ySjWBmXGQV+xw5d1z5XPxE9/RYDPWrAbHDgOv/12iH8=", 379 "pom": "sha256-SDllThaxcU509Rq8s3jYNWgUq49NUnPR3S8c6KOQrdw=" ··· 447 "jar": "sha256-0fPGaqkaxSVJ4Arjsgi6S5r31y1o8jBkNVO+s45hGKw=", 448 "pom": "sha256-9ZiID+766p1nTcQdsTqzcAS/A3drW7IcBN7ejpIMHxI=" 449 }, 450 + "com/google/errorprone#error_prone_annotations/2.36.0": { 451 + "jar": "sha256-d0QOJwsLyaJJkDxaB2w2pyLEiGyk9CZ18pA6HFPtYaU=", 452 + "pom": "sha256-15z9N8hfdta3VMdQHuHchEe3smQsI4LXeCUhZr0zHpw=" 453 + }, 454 "com/google/errorprone#error_prone_annotations/2.6.0": { 455 "pom": "sha256-d1CXiHMcDoMurQIJFPYFi5MxYBb8ZdfLKscDspNKmvY=" 456 }, ··· 470 "com/google/errorprone#error_prone_parent/2.21.1": { 471 "pom": "sha256-MrsLX/JB/Wuh/upEiuu5zt7xaZvnPLbzGTZTh7gr+Sw=" 472 }, 473 + "com/google/errorprone#error_prone_parent/2.36.0": { 474 + "pom": "sha256-Okz8imvtYetI6Wl5b8MeoNJwtj5nBZmUamGIOttwlNw=" 475 + }, 476 "com/google/errorprone#error_prone_parent/2.6.0": { 477 "pom": "sha256-+7tgNV14gZvGGYK0y1sBbGVyjMMNJb/qQckKYcZETzQ=" 478 }, ··· 483 "jar": "sha256-oXHuTHNN0tqDfksWvp30Zhr6typBra8x64Tf2vk2yiY=", 484 "pom": "sha256-6WBCznj+y6DaK+lkUilHyHtAopG1/TzWcqQ0kkEDxLk=" 485 }, 486 + "com/google/guava#failureaccess/1.0.3": { 487 + "jar": "sha256-y/w5BrGbj1XdfP1t/gqkUy6DQlDX8IC9jSEaPiRrWcs=", 488 + "pom": "sha256-xUvv839tQtQ+FHItVKUiya1R75f8W3knfmKj6/iC87s=" 489 + }, 490 "com/google/guava#guava-parent/21.0": { 491 "pom": "sha256-rNxtbwezRsrrF0kyeIvMxjwDXMXCsQCVjCH/4PbhmYg=" 492 }, ··· 505 "com/google/guava#guava-parent/31.1-jre": { 506 "pom": "sha256-RDliZ4O0StJe8F/wdiHdS7eWzE608pZqSkYf6kEw4Pw=" 507 }, 508 + "com/google/guava#guava-parent/33.4.0-android": { 509 + "pom": "sha256-ciDt5hAmWW+8cg7kuTJG+i0U8ygFhTK1nvBT3jl8fYM=" 510 + }, 511 + "com/google/guava#guava-parent/33.4.6-jre": { 512 + "pom": "sha256-Co0mEQgdOkd8L5S9lVY/6BDMdaZzUmqeSv2xGJEly0Q=" 513 + }, 514 "com/google/guava#guava/21.0": { 515 "jar": "sha256-lyE5cYq8ikiT+njLqM97LJA/Ncl6r0T6MDGwZplItIA=", 516 "pom": "sha256-wLAWqFx4TgHKUenWS/j+gM5AKyBv6ol7AyWNXm0P+A0=" ··· 531 "jar": "sha256-pC7cnKt5Ljn+ObuU8/ymVe0Vf/h6iveOHWulsHxKAKs=", 532 "pom": "sha256-kZPQe/T2YBCNc1jliyfSG0TjToDWc06Y4hkWN28nDeI=" 533 }, 534 + "com/google/guava#guava/33.4.6-jre": { 535 + "jar": "sha256-lYoDW3T/bH0M3/nDhFJLZF62GPcRe2Dh7pFfnP/Q5xY=", 536 + "module": "sha256-7+mDiJ/pKGiR0+ego5RsG2+l7AvG7qirnp4FOCYd1qc=", 537 + "pom": "sha256-nokisU/7NNGuKxzTOQZFWkPoc6Tum8sx+jYD529uQfI=" 538 + }, 539 "com/google/guava#listenablefuture/9999.0-empty-to-avoid-conflict-with-guava": { 540 "jar": "sha256-s3KgN9QjCqV/vv/e8w/WEj+cDC24XQrO0AyRuXTzP5k=", 541 "pom": "sha256-GNSx2yYVPU5VB5zh92ux/gXNuGLvmVSojLzE/zi4Z5s=" ··· 562 "jar": "sha256-Ia8wySJnvWEiwOC00gzMtmQaN+r5VsZUDsRx1YTmSns=", 563 "pom": "sha256-X6yoJLoRW+5FhzAzff2y/OpGui/XdNQwTtvzD6aj8FU=" 564 }, 565 + "com/google/j2objc#j2objc-annotations/3.0.0": { 566 + "jar": "sha256-iCQVc0Z93KRP/U10qgTCu/0Rv3wX4MNCyUyd56cKfGQ=", 567 + "pom": "sha256-I7PQOeForYndEUaY5t1744P0osV3uId9gsc6ZRXnShc=" 568 + }, 569 "com/googlecode/concurrent-trees#concurrent-trees/2.6.1": { 570 "jar": "sha256-BONySYTipcv1VgbPo3KlvT08XSohUzpwBOPN5Tl2H6U=", 571 "pom": "sha256-Q8K5sULnBV0fKlgn8QlEkl0idH2XVrMlDAeqtHU4qXE=" 572 }, 573 + "com/googlecode/javaewah#JavaEWAH/1.1.12": { 574 + "jar": "sha256-sZIEMxrG4gS++vUIpo9S7GtGONnZus3b69Q1+cTVAPI=", 575 + "pom": "sha256-BhhOmwWeCAkRgnE2r17Hj1fuTDvBn2MutWGw34+HiM4=" 576 + }, 577 "com/googlecode/javaewah#JavaEWAH/1.2.3": { 578 "jar": "sha256-1lImlJcTxMYaeE9BxRFn57Axb5N2Q5jrup5DNrPZVMI=", 579 "pom": "sha256-5O1sZpYgNm+ZOSBln+CsfLyD11PbwNwOseUplzr5byM=" 580 }, 581 + "com/gradleup/shadow#com.gradleup.shadow.gradle.plugin/8.3.6": { 582 + "pom": "sha256-NidtUGriR/nwGsf4gtmR/Om7klqlTGD8Cwt5QDINnFw=" 583 + }, 584 + "com/gradleup/shadow#shadow-gradle-plugin/8.3.6": { 585 + "jar": "sha256-fOIOvwHuKe7FJFY70UK6wpHXUTXtedDZUamP0skmXDs=", 586 + "module": "sha256-+8pm1Bwrz9HiUE9uzIIf4BqbAIx27qnJQM+Ay1aaI/8=", 587 + "pom": "sha256-lRJfSJrSuJ5gJXMmnK9h9tSF26gvHcuNCYDODfK2stA=" 588 + }, 589 "com/lmax#disruptor/4.0.0": { 590 "jar": "sha256-wrqAhBVBJyvIFbytq5ENLXFqpWPsoVdiRQq0yIlEBQU=", 591 "module": "sha256-/ccJZrzS41x5Tc4sF7mZwuZpUOFYUx6Z3BUfsOvCllM=", ··· 644 "jar": "sha256-7urpF5FxRKaKdB1MDf9mqlxcX9hVk/8he87T/Iyng7g=", 645 "pom": "sha256-1dgfzCiMDYxxHDAgB8raSqmiJu0aES1LqmTLHWMiFws=" 646 }, 647 + "commons-io#commons-io/2.17.0": { 648 + "jar": "sha256-SqTKSPPf0wt4Igt4gdjLk+rECT7JQ2G2vvqUh5mKVQs=", 649 + "pom": "sha256-SEqTn/9TELjLXGuQKcLc8VXT+TuLjWKF8/VrsroJ/Ek=" 650 }, 651 "dev/equo/ide#solstice/1.7.5": { 652 "jar": "sha256-BuFLxDrMMx2ra16iAfxnNk7RI/mCyF+lEx8IF+1lrk8=", ··· 657 "jar": "sha256-DnGR++Mk+5340tIHwHtma43CW7vib1OkxS4v7OYkqXY=", 658 "pom": "sha256-+pvmlFd2A+LUy1X0UjctP2wPk+XzjuXNf7Yos3k8qbw=" 659 }, 660 "io/leangen/geantyref#geantyref/1.3.11": { 661 "jar": "sha256-wmJ0R0s4RLzbfYPPc6eFNm+EtFO8F6GRz6T4/D4CIjQ=", 662 "pom": "sha256-3Etrgt7DQXBSvBc7lC+5asogUIpLmkfp8b2yQAXkPuc=" 663 }, 664 + "io/netty#netty-buffer/4.2.1.Final": { 665 + "jar": "sha256-Ls6NhBPVqjWh0eD+lPafnp7dj3q7U/bFV6Rzyf0L/I4=", 666 + "pom": "sha256-kI8SXPGXUNqRcRIhTOuon6Rt0iZU3tvAQbmaGN516gg=" 667 }, 668 + "io/netty#netty-codec-base/4.2.1.Final": { 669 + "jar": "sha256-wqGnr5kWlCcvdLt9qwEFkEl5DBS0U3YACYJ+EFUw07c=", 670 + "pom": "sha256-HhZaZI/68L/DUEepXastE8xH9MhaO60bpeX/GR9RTfw=" 671 }, 672 + "io/netty#netty-codec-compression/4.2.1.Final": { 673 + "jar": "sha256-x9UaT2nEv78EP5LRlvYabfQq0pxb0NBT0QcRciClykY=", 674 + "pom": "sha256-PUu9bTVQI2qrQ9FQxrKPBvV0QFpg0K7k7Z43G2nPF8U=" 675 }, 676 + "io/netty#netty-codec-haproxy/4.2.1.Final": { 677 + "jar": "sha256-9tKNDNRcyZhLpihrVZdg9/q9Xc8K0XhwHvDq5SmfRlc=", 678 + "pom": "sha256-1/zgS3ordcAx0e/Fg7kZ7WT8OATQ+fe/cNtN83TIyrQ=" 679 }, 680 + "io/netty#netty-codec-http/4.2.1.Final": { 681 + "jar": "sha256-EOgxhiv32rzsz0/YKYnDHdo5qJ7Wac9+lt7glykHdUE=", 682 + "pom": "sha256-IgFVyOpvA50KfkncC8wJEDVCK63RJqtdTHJCcQKlzFo=" 683 }, 684 + "io/netty#netty-codec-marshalling/4.2.1.Final": { 685 + "jar": "sha256-SFSZicclpwJXkTKathKhpMvksQ5T9KaxPkTJwMVCh2o=", 686 + "pom": "sha256-Jbo/nNzuOZQJYUr0NYs1SQKnVXqxLSgFTCE2WRom088=" 687 }, 688 + "io/netty#netty-codec-protobuf/4.2.1.Final": { 689 + "jar": "sha256-yQ/7MaBKMoAonacuY6r3oj+XwWmOLMm5a/pkad+C9Zg=", 690 + "pom": "sha256-1THFYFdSdgq6pFwwbPwyv9DdhrUjeVyYCv7qASifEDg=" 691 }, 692 + "io/netty#netty-codec/4.2.1.Final": { 693 + "jar": "sha256-7vbxj3GsXjLcJ6jVJUeRRsWf7DAJnUMaQGYq/329RvE=", 694 + "pom": "sha256-50zpmZRDPP4uWb0c5YR5fpCK1ddv47TZfp5xpzChvGQ=" 695 }, 696 + "io/netty#netty-common/4.2.1.Final": { 697 + "jar": "sha256-fupKlvYazgYzeQY3QVDLc8lPJIiX/aPahltcOKcQvf0=", 698 + "pom": "sha256-LuOladJw8oHrQ6uo6Mb9sgQXtV3D+wffbVPEwM39/Cs=" 699 }, 700 + "io/netty#netty-handler/4.2.1.Final": { 701 + "jar": "sha256-uX0Fet//+4JM5rXZh2v+Hwv86yRQS2ONP2xik8//XcU=", 702 + "pom": "sha256-2eLP4nuNM9r9fSmHXLIaYV17+TD29tRfRP2wVQNn11Q=" 703 }, 704 + "io/netty#netty-parent/4.2.1.Final": { 705 + "pom": "sha256-w5aMzUh1X2OcSI0V9sFBOc76FWGZbEdiBcK+IdZngLQ=" 706 }, 707 + "io/netty#netty-resolver/4.2.1.Final": { 708 + "jar": "sha256-+xxanxIwzFWJRKxjPltk0+TsmB2ODVcn1fWBIgCLIY4=", 709 + "pom": "sha256-yHpisHkPKXcurI6z3uY9Dm4ZQY2H57sbTZhK+E7LdQ4=" 710 }, 711 + "io/netty#netty-transport-classes-epoll/4.2.1.Final": { 712 + "jar": "sha256-zC+Xr6VoTxmVpfEAazbJuksjPB5oA4xQ5bd7FKuk7qQ=", 713 + "pom": "sha256-xDnVSdFm5hjdHluGEj62ZJmzf9Mo+UleCJh8TsduvS0=" 714 }, 715 + "io/netty#netty-transport-classes-io_uring/4.2.1.Final": { 716 + "jar": "sha256-xt64sgz3ajfiz26QX9Pu5Ph+7WR41O11x3CfQOABkVY=", 717 + "pom": "sha256-pW283sTP9EwK3z21jILuXXTjtwxw+bgvstQljd1+mkk=" 718 }, 719 + "io/netty#netty-transport-classes-kqueue/4.2.1.Final": { 720 + "jar": "sha256-jx1LTHuS7dMdGcF2q2DF4+ceeESBzJXH/FDHRRHTLVY=", 721 + "pom": "sha256-FZfud6TwQxu61IMSkFPYCpJxI9QEZKiMbK8mFfSJ0X0=" 722 }, 723 + "io/netty#netty-transport-native-epoll/4.2.1.Final": { 724 + "jar": "sha256-r7pS5ooybM9V+fDL5DKL3HdfTQfkmp/bBU7e4zKk1iY=", 725 + "pom": "sha256-jU8ZMnkjUd2dh18wKBgtGO380ot2HRmh/v28vTA53ho=" 726 }, 727 + "io/netty#netty-transport-native-epoll/4.2.1.Final/linux-aarch_64": { 728 + "jar": "sha256-qKVqGCRta5N39nhh3ZnVRJd7eCKPvueD/pK291kebwo=" 729 }, 730 + "io/netty#netty-transport-native-epoll/4.2.1.Final/linux-x86_64": { 731 + "jar": "sha256-06vTRm3/oo01EC+Ig0a6TO9ZvBVm0AhLX6xf6yrasf0=" 732 }, 733 + "io/netty#netty-transport-native-io_uring/4.2.1.Final": { 734 + "jar": "sha256-cA85zEIqvjT0pypNb4vXrIN+IPkKaw19bqBioJPaRfQ=", 735 + "pom": "sha256-sIrz9A+m3YDNS7IHuKbDC056QnyqJQXplvELqKmsOcY=" 736 }, 737 + "io/netty#netty-transport-native-io_uring/4.2.1.Final/linux-aarch_64": { 738 + "jar": "sha256-Sz4XmKmexoj1p0KO0XdT7mi1ODY3RYVQ7KVycgFa27U=" 739 }, 740 + "io/netty#netty-transport-native-io_uring/4.2.1.Final/linux-x86_64": { 741 + "jar": "sha256-iWlfPXfnC3GSwonzezLC077qlQRhh0/mrZZTP8m5jXE=" 742 }, 743 + "io/netty#netty-transport-native-kqueue/4.2.1.Final": { 744 + "jar": "sha256-yBOQD8hQKKmxDapY57E/gAdIByXWj5LSmIk6IX4TASo=", 745 + "pom": "sha256-2sqgyfd13F0mqip8Paewi5nMw++c/it0XEMJtJZRj00=" 746 }, 747 + "io/netty#netty-transport-native-kqueue/4.2.1.Final/osx-aarch_64": { 748 + "jar": "sha256-M1afocec8CjdrrAwZ2PiyUJx1shUTFkX0Pmc3pLjxKE=" 749 }, 750 + "io/netty#netty-transport-native-kqueue/4.2.1.Final/osx-x86_64": { 751 + "jar": "sha256-2Kh+nBDNnLxRsiJXq43HmfCywb87V4/gH4phdaxf2g4=" 752 }, 753 + "io/netty#netty-transport-native-unix-common/4.2.1.Final": { 754 + "jar": "sha256-fyp3RpUMyyJ5CK/j7iG5vPaczFhDe7F8FXmo1XL7OKk=", 755 + "pom": "sha256-XZQGqeIfeIg7nliBQp3VOFQ0bxEEXbs4H49By/LbdYE=" 756 }, 757 + "io/netty#netty-transport/4.2.1.Final": { 758 + "jar": "sha256-up/UVZj6BWBdKlAU1vRxEuQ5K6K5Es0eN4bkhRs5fPc=", 759 + "pom": "sha256-g8ryhVEg1V430/dDgX23gUOezAxMfra7Zv80sEDNjO8=" 760 }, 761 "it/unimi/dsi#fastutil/8.5.15": { 762 "jar": "sha256-z/62ZzvfHm5Dd9aE3y9VrDWc9c9t9hPgXmLe7qUAk2o=", ··· 787 "jar": "sha256-Yq4oGH7SsGKBPaap1We/7nM8NBWCaZti3ZgCMHKaAxM=", 788 "pom": "sha256-NYRJ1sc1OFhFCN2K5s/eVrr0o0t2e3HZzEZE8PH0IRo=" 789 }, 790 + "net/kyori#adventure-api/4.23.0": { 791 + "jar": "sha256-Ubn89img4yWTTyoyHpdL1tqCMzMmb/CZtK2GJC7cXvQ=", 792 + "module": "sha256-ssVpI4V4Sh8OZm+ETRp3aMFkoIqFDC+SjNxBW/lSLJ0=", 793 + "pom": "sha256-rXHK/j8ZankUdWLS1zFs2Xy4IEzWT1u7tDbaxsd69sk=" 794 }, 795 + "net/kyori#adventure-bom/4.23.0": { 796 + "module": "sha256-c9ge6qJeY3eAOKKVCMQKFLwJ6bZWEjaIoUJHc5HDOeo=", 797 + "pom": "sha256-FGu/m1sl8kwUwlpmW76XgKXsCUmgPGttk7c/PfaQ9fM=" 798 }, 799 + "net/kyori#adventure-key/4.23.0": { 800 + "jar": "sha256-gDd4WEpb+PpfF7q5s7YkUO4TEP2SjyAPFoOSmkMMJmQ=", 801 + "module": "sha256-o4U17pVdUtrTEco9rneVLJRybh55ytyr98WMYusqn0U=", 802 + "pom": "sha256-iaYmnO5F3YJsKqD5mSQebjvq79mtSfkyxSZNvNcxewk=" 803 }, 804 + "net/kyori#adventure-nbt/4.23.0": { 805 + "jar": "sha256-2HqbMvVCeqeGOjG7+8q6t36WIExdKKYvf4DWalJtcEY=", 806 + "module": "sha256-cdaqmcJYMWM5RELtBF4FrGyY3KvHEtMi5KBpBbdKOTY=", 807 + "pom": "sha256-lKa0XCvcLlfTGwOL2sLeaV8qRp4TlpDLskiFuG4vOM4=" 808 }, 809 "net/kyori#adventure-platform-api/4.3.4": { 810 "jar": "sha256-7GBGKMK3wWXqdMH8s6LQ8DNZwsd6FJYOOgvC43lnCsI=", ··· 816 "module": "sha256-VYXzbUzK6MaYbW4tmAjZs5ywl28CLK8sANPP5v1HTQQ=", 817 "pom": "sha256-wP6w6syf5B8iL5iXsS4lrDw0Ub3VYWwUhclppgBO2eE=" 818 }, 819 + "net/kyori#adventure-text-logger-slf4j/4.23.0": { 820 + "jar": "sha256-e41RpiLFfZgt64llKz4tbukSj2V82lSRKtkmaL2r42Q=", 821 + "module": "sha256-/xZGn2LzFSLEpmN50bXR0/vJfGKBNd1fpVG3Nkck8Eo=", 822 + "pom": "sha256-zSk39q2IjiVO5SB9RWW2jmd2XErDNHAezauWoWQjC2s=" 823 }, 824 + "net/kyori#adventure-text-minimessage/4.23.0": { 825 + "jar": "sha256-Vu0nZroiOLQBuuqWDTquRftY/aFhTalo/iuR/bnDgTw=", 826 + "module": "sha256-H19hklBkEB3mY1LP0Qq43fWu/2RyVZt7KL1wERxaf2c=", 827 + "pom": "sha256-fxTmmBxHbcYjPE5oGCZWIP4vV0uxfdj3UzKd8J8Cd2Q=" 828 }, 829 + "net/kyori#adventure-text-serializer-ansi/4.23.0": { 830 + "jar": "sha256-rF6iq0xE0wLnlkag9NRfSsmESi6sBpDoCnPc/SOy5Vw=", 831 + "module": "sha256-/65qUt91zjFf3gi4HVKZ9JfEyfxcbGw3cCcfOMR2NQA=", 832 + "pom": "sha256-9zq7B/otQpS9CaSm9Gpbu/WzbcUNpx/zPOPFuBlesKU=" 833 }, 834 + "net/kyori#adventure-text-serializer-commons/4.23.0": { 835 + "jar": "sha256-7ol3hRw6RFAN4rCOuqvVOX7Anzs2foblMInROHty+p0=", 836 + "module": "sha256-YjLHYBQobnByp5HHWVWahxFizy18z81tDqGE3juXwgY=", 837 + "pom": "sha256-ZyydJyIj/+Q6qskmSMNidr3yFBPKIG1Z0dOfAAjGEg0=" 838 }, 839 + "net/kyori#adventure-text-serializer-gson/4.23.0": { 840 + "jar": "sha256-PiaD2i0UAwMjzJZFu6TNhtfLq/zkK9Fi7C2lDF59Yig=", 841 + "module": "sha256-bX0ip7YdYnZqtPATdojSzM3ensdkP6OTzOlswwyX9vw=", 842 + "pom": "sha256-bD3I0ry/SXG30bxzV8i+Xg5w4EqKhEt8RPQdada4XWo=" 843 }, 844 + "net/kyori#adventure-text-serializer-json-legacy-impl/4.23.0": { 845 + "jar": "sha256-ovBQ7uMdiedww3bnPZoxt/b8QaORU0QTyUvksIF4vuQ=", 846 + "module": "sha256-5Zqpg2TubngVdr3o0r6KLAd9quhvOqXKmUjAbW8s+XM=", 847 + "pom": "sha256-iPCayPZoGa4ib7nDqSt2ZzrG4m9VMH+adhOVhraDO40=" 848 }, 849 + "net/kyori#adventure-text-serializer-json/4.23.0": { 850 + "jar": "sha256-/CvHvwb8Cv5wbWJ493GDcqRoTSGhblLk1iJldxUomE8=", 851 + "module": "sha256-KNC8Tk4rwY5zi1eBI+hXFug0GOlabO+KMeCPiVvw1MQ=", 852 + "pom": "sha256-9b8uVtQSdYvaYyQEpwh2LILTQDI8zz1AEkHGdz1oeqw=" 853 }, 854 + "net/kyori#adventure-text-serializer-legacy/4.23.0": { 855 + "jar": "sha256-1SgOt1vypertB5eXGmzJAtxrjLtv6sJwEcyGJGEIIJ0=", 856 + "module": "sha256-ci7v3AmzXyiOb6kKZ/CviLiS+ySDGUNqbg0QAxo4ADU=", 857 + "pom": "sha256-9jjCmc72C3tNLOpg7vXYMntHW5d2HxxNq5VOHUWXUik=" 858 }, 859 + "net/kyori#adventure-text-serializer-plain/4.23.0": { 860 + "jar": "sha256-wuHYBMob54Q09K1r29U8yXoROtkpXLTJNs87nZAsWR4=", 861 + "module": "sha256-OwEWAKJgf8zpq1+u7fWcvNQkgUmlMlXXfHZJJmO+IxM=", 862 + "pom": "sha256-qVKWXEA9cuZKvM5m+BgxxE7dgimWU/sqlhbwzWfgAQI=" 863 }, 864 "net/kyori#ansi/1.1.1": { 865 "jar": "sha256-tsVp4aCSW57rNJ4S2zXiI3VWEH4zNmV+Cy694mHYr9c=", ··· 875 "jar": "sha256-fQH8JaS7OvDhZiaFRV9FQfv0YmIW6lhG5FXBSR4Va4w=", 876 "module": "sha256-qfpHivwqQ0b4pb4JH14UZmhgGS3YZbHj2FkilmRsdP4=", 877 "pom": "sha256-XuAEEIIvNukBnZR2LOAbzWA5VpdlNRvvBmCUXNT5pW4=" 878 + }, 879 + "net/kyori#mammoth/1.4.0": { 880 + "jar": "sha256-sEq7lrZm92PS10Z7AwjyP+jYt1P4rYkUOBTLXqmQHrM=", 881 + "module": "sha256-wgR2ao8Uzk4aEkpTAqmDkQH82hGN4qumt2zGKGUmSq4=", 882 + "pom": "sha256-uKJc0TFMWmsbn7lUg/132CUjKF/vpwW9dL+Ta65yRCE=" 883 }, 884 "net/kyori#option/1.1.0": { 885 "jar": "sha256-l7abSxff4CIXyRMa00JWTLya69BMdetoljm194/UsRw=", ··· 924 "org/apache#apache/33": { 925 "pom": "sha256-14vYUkxfg4ChkKZSVoZimpXf5RLfIRETg6bYwJI6RBU=" 926 }, 927 + "org/apache/ant#ant-launcher/1.10.15": { 928 + "jar": "sha256-XIVRmQMHoDIzbZjdrtVJo5ponwfU1Ma5UGAb8is9ahs=", 929 + "pom": "sha256-ea+EKil53F/gAivAc8SYgQ7q2DvGKD7t803E3+MNrJU=" 930 }, 931 + "org/apache/ant#ant-parent/1.10.15": { 932 + "pom": "sha256-SYhPGHPFEHzCN/QoXER3R5uwgEvwc3OUgBsI114rvrA=" 933 }, 934 + "org/apache/ant#ant/1.10.15": { 935 + "jar": "sha256-djrNpKaViMnqiBepUoUf8ML8S/+h0IHCVl3EB/KdV5Q=", 936 + "pom": "sha256-R4DmHoeBbu4fIdGE7Jl7Zfk9tfS5BCwXitsp4j50JdY=" 937 }, 938 "org/apache/commons#commons-parent/39": { 939 "pom": "sha256-h80n4aAqXD622FBZzphpa7G0TCuLZQ8FZ8ht9g+mHac=" ··· 947 "org/apache/commons#commons-parent/58": { 948 "pom": "sha256-LUsS4YiZBjq9fHUni1+pejcp2Ah4zuy2pA2UbpwNVZA=" 949 }, 950 + "org/apache/commons#commons-parent/74": { 951 + "pom": "sha256-gOthsMh/3YJqBpMTsotnLaPxiFgy2kR7Uebophl+fss=" 952 }, 953 "org/apache/groovy#groovy-bom/4.0.22": { 954 "module": "sha256-Ul0/SGvArfFvN+YAL9RlqygCpb2l9MZWf778copo5mY=", ··· 975 "jar": "sha256-8r8vLHdyFpyeMGmXGWZ60w+bRsTp14QZB96y0S2ZI/4=", 976 "pom": "sha256-f8K4BFgJ8/J6ydTZ6ZudNGIbY3HPk8cxPs2Epa8Om64=" 977 }, 978 "org/apache/logging#logging-parent/11.3.0": { 979 "pom": "sha256-pcmFtW/hxYQzOTtQkabznlufeFGN2PySE0aQWZtk19A=" 980 }, 981 "org/apache/logging/log4j#log4j-api/2.24.1": { 982 "jar": "sha256-bne7Ip/I3K8JA4vutekDCyLp4BtRtFiwGDzmaevMku8=", 983 "pom": "sha256-IzAaISnUEAiZJfSvQa7LUlhKPcxFJoI+EyNOyst+c+M=" 984 }, 985 + "org/apache/logging/log4j#log4j-api/2.24.3": { 986 + "jar": "sha256-W0oKDNDnUd7UMcFiRCvb3VMyjR+Lsrrl/Bu+7g9m2A8=", 987 + "pom": "sha256-vAXeM1M6Elmtusv8yCbNZjdqLZxO5T+4NgCfRKRbgjk=" 988 }, 989 "org/apache/logging/log4j#log4j-bom/2.24.1": { 990 "pom": "sha256-vGPPsrS5bbS9cwyWLoJPtpKMuEkCwUFuR3q1y3KwsNM=" 991 }, 992 + "org/apache/logging/log4j#log4j-bom/2.24.3": { 993 + "pom": "sha256-sXq38yj0WGt+cfjJT8NaXaK86AcFpdYwBAIsGSiDNVg=" 994 }, 995 "org/apache/logging/log4j#log4j-core/2.24.1": { 996 "jar": "sha256-ALzziEcsqApocBQYF2O2bXdxd/Isu/F5/WDhsaybybA=", 997 "pom": "sha256-JyQstBek3xl47t/GlYtFyJgg+WzH9NFtH0gr/CN24M0=" 998 }, 999 + "org/apache/logging/log4j#log4j-core/2.24.3": { 1000 + "jar": "sha256-frQIRZauJb08YWmOSOjQq2WpJgdYiE7Vy7nG5VxEpWo=", 1001 + "pom": "sha256-v9XAxKrGECQsy2H/ABCK1zeA2iCi9ym+Bjg2qXZXf1c=" 1002 }, 1003 + "org/apache/logging/log4j#log4j-iostreams/2.24.3": { 1004 + "jar": "sha256-Vv6AD/RhVeY2DfFxUOhpud49NUltsu/2QRWp0NvDGG8=", 1005 + "pom": "sha256-EcMCVtRz/apOYTuUqYoeVsLGAhYY2TK/Iqujeb4w4Co=" 1006 }, 1007 + "org/apache/logging/log4j#log4j-jul/2.24.3": { 1008 + "jar": "sha256-52uSXNbnCoI2SoBZ4G2zAxK3Ron/RlAQSnVbr/k3ENU=", 1009 + "pom": "sha256-c2tbLEv0UUuqrO+h27sGUF+gigliEHMv7roDMvY8sic=" 1010 }, 1011 + "org/apache/logging/log4j#log4j-slf4j2-impl/2.24.3": { 1012 + "jar": "sha256-zarCLkDsMMQJbh6+jEVMiCbA0cN419tdezrRZjVLC9M=", 1013 + "pom": "sha256-fMloVddd24RWLjUHM0kF0NNTDECttyCAGTmIHgk3OKM=" 1014 }, 1015 "org/apache/logging/log4j#log4j/2.24.1": { 1016 "pom": "sha256-+NcAm1Rl2KhT0QuEG8Bve3JnXwza71OoDprNFDMkfto=" 1017 + }, 1018 + "org/apache/logging/log4j#log4j/2.24.3": { 1019 + "pom": "sha256-wUG0hj/AzqtYOJShPh+eUsAfwtdYcn1nR/a5nVBA87E=" 1020 }, 1021 "org/apache/maven#maven-api-meta/4.0.0-alpha-9": { 1022 "jar": "sha256-MsT1yturaAw0lS+ctXBFehODzOxMmlewOSYH1xkcaUk=", ··· 1078 "org/codehaus#codehaus-parent/4": { 1079 "pom": "sha256-a4cjfejC4XQM+AYnx/POPhXeGTC7JQxVoeypT6PgFN8=" 1080 }, 1081 "org/codehaus/mojo#animal-sniffer-annotations/1.14": { 1082 "jar": "sha256-IGgyC9a610TDZzqwSPZ+ML749RiZb6OAAzVWYAZpkF0=", 1083 "pom": "sha256-GHnxmgWZHj7ZWRC5ZokzM5awxGeiFdxNH5ABhAS3KiY=" ··· 1098 "org/codehaus/mojo#mojo-parent/40": { 1099 "pom": "sha256-/GSNzcQE+L9m4Fg5FOz5gBdmGCASJ76hFProUEPLdV4=" 1100 }, 1101 + "org/codehaus/plexus#plexus-utils/4.0.2": { 1102 + "jar": "sha256-iVcnTnX+LCeLFCjdFqDa7uHdOBUstu/4Fhd6wo/Mtpc=", 1103 + "pom": "sha256-UVHBO918w6VWlYOn9CZzkvAT/9MRXquNtfht5CCjZq8=" 1104 }, 1105 + "org/codehaus/plexus#plexus-xml/4.0.4": { 1106 + "jar": "sha256-Bp54tTcQjcYSSmcHP8mYJkeR9rZJnpVaOOcrs+T+Gt8=", 1107 + "pom": "sha256-Ohb3yn7CRzFFtGHgpylREI1H4SThjIRMCFsaY3jGEVE=" 1108 }, 1109 + "org/codehaus/plexus#plexus/18": { 1110 + "pom": "sha256-tD7onIiQueW8SNB5/LTETwgrUTklM1bcRVgGozw92P0=" 1111 }, 1112 "org/codehaus/woodstox#stax2-api/4.2.1": { 1113 "jar": "sha256-Z4Vn5ItRpCxlxpnyZlOa09Z21LGlsK19iezoudV3JXk=", ··· 1119 "org/eclipse/ee4j#project/1.0.7": { 1120 "pom": "sha256-IFwDmkLLrjVW776wSkg+s6PPlVC9db+EJg3I8oIY8QU=" 1121 }, 1122 + "org/eclipse/jgit#org.eclipse.jgit-parent/5.13.0.202109080827-r": { 1123 + "pom": "sha256-oY/X0MQf2o2PHEoktQAKhmRWFHokdG7mzEcx54ihje4=" 1124 }, 1125 "org/eclipse/jgit#org.eclipse.jgit-parent/6.7.0.202309050840-r": { 1126 "pom": "sha256-u56FQW2Y0HMfx2f41w6EaAQWAdZnKuItsqx5n3qjkR8=" 1127 }, 1128 + "org/eclipse/jgit#org.eclipse.jgit/5.13.0.202109080827-r": { 1129 + "jar": "sha256-2r+DafDN+M8Xt/faS9qTIMVwu3VMiOC+t7hSgSz1zSU=", 1130 + "pom": "sha256-qEF3Rc+i2V1qlxHpQT/KmE/FZmt2J7rRVAzyfUYq6BM=" 1131 + }, 1132 "org/eclipse/jgit#org.eclipse.jgit/6.7.0.202309050840-r": { 1133 "jar": "sha256-tWRHfQkiQaqrUMhKxd0aw3XAGCBE1+VlnTpgqQ4ugBo=", 1134 "pom": "sha256-BNB83b8ZjfpuRIuan7lA94HAEq2T2eqCBv4KTTplwZI=" ··· 1140 "org/fusesource#fusesource-pom/1.12": { 1141 "pom": "sha256-xA2WDarc73sBwbHGZXr7rE//teUxaPj8sLKLhOb9zKE=" 1142 }, 1143 + "org/fusesource/jansi#jansi/2.4.2": { 1144 + "jar": "sha256-C3uLADqQ6kkVebYvURiCjkURKRTGVYmwD6pJ1ux4WDk=", 1145 + "pom": "sha256-Lory+B0MmVUIvWfJid4ewhbrakdgk/WY9CFOz2ESjfA=" 1146 }, 1147 "org/javassist#javassist/3.28.0-GA": { 1148 "jar": "sha256-V9Cp6ShvgvTqqFESUYaZf4Eb784OIGD/ChWnf1qd2ac=", ··· 1275 "module": "sha256-DZTIpBSD58Jwfr1pPhsTV6hBUpmM6FVQ67xUykMho6c=", 1276 "pom": "sha256-Cdlg+FkikDwuUuEmsX6fpQILQlxGnsYZRLPAGDVUciQ=" 1277 }, 1278 + "org/jline#jline-native/3.30.2": { 1279 + "jar": "sha256-b6b1DhFWEJNMs/1CO0Mab9+QAGUunHg0+0gTMSnkUTM=", 1280 + "pom": "sha256-Nf+jS0HVcYVpXIW6KxEjx/+tOCf4HVNSlq2oolecl0E=" 1281 }, 1282 "org/jline#jline-parent/3.20.0": { 1283 "pom": "sha256-cXjGACAsS8Jux6S2IlXu829wVsrSpeYjnFdL7qXCEMo=" 1284 }, 1285 "org/jline#jline-reader/3.20.0": { 1286 "jar": "sha256-rNHJTR4iiqe3li9psh7Tqf2CjrOmPkuvkIaVTmJq8fA=", 1287 "pom": "sha256-2fF+3XIcAqExcgN21sB4eHgutrb6/rX/QkBKtXFD4TY=" 1288 }, 1289 + "org/jline#jline-terminal-jansi/3.30.2": { 1290 + "jar": "sha256-AXOC7/q4HAn4O0Ecic4gPzLQWR2t4KjYygUTmqThtDI=", 1291 + "pom": "sha256-cb0W3CMPlL82lQ4md+JKSF0kv59UoWCyfx/SkqqeaB4=" 1292 }, 1293 "org/jline#jline-terminal/3.20.0": { 1294 "jar": "sha256-EhJRcOeVUZum3IAQwHC1PHaq6StIXB43Uw5Uq13QjUM=", 1295 "pom": "sha256-EMo7z1F48YUH8hCmOtljeJaFM0OtHBKRoBmhFvIWpUg=" 1296 }, 1297 + "org/jline#jline-terminal/3.30.2": { 1298 + "jar": "sha256-HqoUwqI6kVMxzNTqp11iTCN/sMoNI6UHgQt/kYFhCgw=", 1299 + "pom": "sha256-RGzvv38zbLWZGzML8w9v5NP6g0OGLGp8MjCl33sePvc=" 1300 }, 1301 "org/jspecify#jspecify/0.3.0": { 1302 "module": "sha256-M7jCLyQkwpAyQaf+olj8QasMTWiJd2V2xRkEdWLuQ6U=", ··· 1319 "module": "sha256-qnlAydaDEuOdiaZShaqa9F8U2PQ02FDujZPbalbRZ7s=", 1320 "pom": "sha256-EJN9RMQlmEy4c5Il00cS4aMUVkHKk6w/fvGG+iX2urw=" 1321 }, 1322 + "org/junit#junit-bom/5.11.0": { 1323 + "module": "sha256-9+2+Z/IgQnCMQQq8VHQI5cR29An1ViNqEXkiEnSi7S0=", 1324 + "pom": "sha256-5nRZ1IgkJKxjdPQNscj0ouiJRrNAugcsgL6TKivkZE0=" 1325 + }, 1326 "org/junit#junit-bom/5.9.1": { 1327 "module": "sha256-kCbBZWaQ+hRa117Og2dCEaoSrYkwqRsQfC9c3s4vGxw=", 1328 "pom": "sha256-sWPBz8j8H9WLRXoA1YbATEbphtdZBOnKVMA6l9ZbSWw=" ··· 1361 "module": "sha256-4dG63P7cJyRFQeC+XV6EtyoicNevYWhrJvEc/Edw2kI=", 1362 "pom": "sha256-EqqGyhwNZIoiXU58aWBUwfx26IeCxcOft983muI7728=" 1363 }, 1364 + "org/junit/platform#junit-platform-launcher/1.10.2": { 1365 + "jar": "sha256-rtT0L7kK2ps0fCMfE2VvwJEhuiDattxkamvZ1Nox5Ko=", 1366 + "module": "sha256-/1YhIQJQJSv9rbYiu+LqZuzsMahnc2zqSz1K3yGcp/8=", 1367 + "pom": "sha256-WjEXCOeQa7l0YpwayHC8EWV0ZbmJ2koHfkVBa9mHJeQ=" 1368 + }, 1369 "org/lanternpowered#lmbda/2.0.0": { 1370 "jar": "sha256-v7mL90YQgkvVbhDYJSM6Zg66M7qRXPlHJGJX9QPadfM=", 1371 "pom": "sha256-KRybm3znFPdLpG0zsmSEpYS+NPXHXGyTDsIF8iGbVfg=" ··· 1395 "org/ow2#ow2/1.5.1": { 1396 "pom": "sha256-Mh3bt+5v5PU96mtM1tt0FU1r+kI5HB92OzYbn0hazwU=" 1397 }, 1398 + "org/ow2/asm#asm-commons/9.7.1": { 1399 + "jar": "sha256-mlebVNKSrZvhcdQxP9RznGNVksK1rDpFm70QSc3exqA=", 1400 + "pom": "sha256-C/HTHaDJ+djtwvJ9u/279z8acVtyzS+ijz8ZWZTXStE=" 1401 }, 1402 + "org/ow2/asm#asm-tree/9.7.1": { 1403 + "jar": "sha256-mSmIH1nra4QOhtVFcMd7Wc5yHRBObf16QJeJkcLTtB8=", 1404 + "pom": "sha256-E7kF9l5/1DynZ09Azao3Z5ukhYxsnZ+48Xp6/ZuqvJ4=" 1405 }, 1406 "org/ow2/asm#asm/9.7.1": { 1407 "jar": "sha256-jK3UOsXrbQneBfrsyji5F6BAu5E5x+3rTMgcdAtxMoE=", 1408 "pom": "sha256-cimwOzCnPukQCActnkVppR2FR/roxQ9SeEGu9MGwuqg=" 1409 }, 1410 + "org/ow2/asm#asm/9.8": { 1411 + "jar": "sha256-h26raoPa7K1cpn65/KuwY8l7WuuM8fynqYns3hdSIFE=", 1412 + "pom": "sha256-wTZ8O7OD12Gef3l+ON91E4hfLu8ErntZCPaCImV7W6o=" 1413 + }, 1414 "org/reflections#reflections/0.10.2": { 1415 "jar": "sha256-k4otCP5UBQ12ELlE2N3DoJNVcQ2ea+CqyDjbwE6aKCU=", 1416 "pom": "sha256-tsqj6301vXVu1usKKoGGi408D29CJE/q5BdgrGYwbYc=" 1417 }, 1418 + "org/slf4j#slf4j-api/1.7.30": { 1419 + "jar": "sha256-zboHlk0btAoHYUhcax6ML4/Z6x0ZxTkorA1/lRAQXFc=", 1420 + "pom": "sha256-fgdHdR6bZ+Gdy1IG8E6iLMA9JQxCJCZALq3QNRPywxQ=" 1421 + }, 1422 "org/slf4j#slf4j-api/1.7.36": { 1423 "jar": "sha256-0+9XXj5JeWeNwBvx3M5RAhSTtNEft/G+itmCh3wWocA=", 1424 "pom": "sha256-+wRqnCKUN5KLsRwtJ8i113PriiXmDL0lPZhSEN7cJoQ=" 1425 }, 1426 "org/slf4j#slf4j-api/2.0.16": { 1427 "jar": "sha256-oSV43eG6AL2bgW04iguHmSjQC6s8g8JA9wE79BlsV5o=", 1428 "pom": "sha256-saAPWxxNvmK4BdZdI5Eab3cGOInXyx6G/oOJ1hkEc/c=" 1429 }, 1430 + "org/slf4j#slf4j-api/2.0.17": { 1431 + "jar": "sha256-e3UdlSBhlU1av+1xgcH2RdM2CRtnmJFZHWMynGIuuDI=", 1432 + "pom": "sha256-FQxAKH987NwhuTgMqsmOkoxPM8Aj22s0jfHFrJdwJr8=" 1433 }, 1434 "org/slf4j#slf4j-bom/2.0.16": { 1435 "pom": "sha256-BWYEjsglzfKHWGIK9k2eFK44qc2HSN1vr6bfSkGUwnk=" 1436 + }, 1437 + "org/slf4j#slf4j-bom/2.0.17": { 1438 + "pom": "sha256-940ntkK0uIbrg5/BArXNn+fzDzdZn/5oGFvk4WCQMek=" 1439 + }, 1440 + "org/slf4j#slf4j-parent/1.7.30": { 1441 + "pom": "sha256-EWR5VuSKDFv7OsM/bafoPzQQAraFfv0zWlBbaHvjS3U=" 1442 }, 1443 "org/slf4j#slf4j-parent/1.7.36": { 1444 "pom": "sha256-uziNN/vN083mTDzt4hg4aTIY3EUfBAQMXfNgp47X6BI=" 1445 }, 1446 "org/slf4j#slf4j-parent/2.0.16": { 1447 "pom": "sha256-CaC0zIFNcnRhbJsW1MD9mq8ezIEzNN5RMeVHJxsZguU=" 1448 + }, 1449 + "org/slf4j#slf4j-parent/2.0.17": { 1450 + "pom": "sha256-lc1x6FLf2ykSbli3uTnVfsKy5gJDkYUuC1Rd7ggrvzs=" 1451 }, 1452 "org/sonatype/oss#oss-parent/5": { 1453 "pom": "sha256-FnjUEgpYXYpjATGu7ExSTZKDmFg7fqthbufVqH9SDT0=" ··· 1506 "jar": "sha256-IRswbPxE+Plt86Cj3a91uoxSie7XfWDXL4ibuFX1NeU=", 1507 "pom": "sha256-CTvhsDMxvOKTLWglw36YJy12Ieap6fuTKJoAJRi43Vo=" 1508 }, 1509 + "org/vafer#jdependency/2.12": { 1510 + "jar": "sha256-xuxNA/nwT7ZEjTavQ6HMBpoh7LXocBM90Y/tT02x3mg=", 1511 + "pom": "sha256-LY6Zq9RS9eZCxtK74xACuSh5naw6CeA+PknyE3ozt+s=" 1512 }, 1513 "org/xmlresolver#xmlresolver/5.1.1": { 1514 "jar": "sha256-MSL4rkDERq27MDzVUldoA/2/bq77hL985D0TNlsnymg=",
+7 -6
pkgs/by-name/ve/velocity/fix-version.patch
··· 1 --- a/build-logic/src/main/kotlin/velocity-init-manifest.gradle.kts 2 +++ b/build-logic/src/main/kotlin/velocity-init-manifest.gradle.kts 3 - @@ -2,28 +2,9 @@ import org.gradle.jvm.tasks.Jar 4 - import org.gradle.kotlin.dsl.withType 5 - import java.io.ByteArrayOutputStream 6 7 -val currentShortRevision = ByteArrayOutputStream().use { 8 - - exec { 9 - executable = "git" 10 - args = listOf("rev-parse", "HEAD") 11 - standardOutput = it ··· 15 - 16 tasks.withType<Jar> { 17 manifest { 18 - - val buildNumber = System.getenv("BUILD_NUMBER") 19 - val velocityHumanVersion: String = 20 - if (project.version.toString().endsWith("-SNAPSHOT")) { 21 - if (buildNumber == null) { ··· 26 - } else { 27 - archiveVersion.get() 28 - } 29 - + val velocityHumanVersion = System.getenv("BUILD_VERSION") 30 attributes["Implementation-Version"] = velocityHumanVersion 31 } 32 }
··· 1 --- a/build-logic/src/main/kotlin/velocity-init-manifest.gradle.kts 2 +++ b/build-logic/src/main/kotlin/velocity-init-manifest.gradle.kts 3 + @@ -8,29 +8,10 @@ interface Injected { 4 + val execOps: ExecOperations 5 + } 6 7 -val currentShortRevision = ByteArrayOutputStream().use { 8 + - val execOps = objects.newInstance<Injected>().execOps 9 + - execOps.exec { 10 - executable = "git" 11 - args = listOf("rev-parse", "HEAD") 12 - standardOutput = it ··· 16 - 17 tasks.withType<Jar> { 18 manifest { 19 + val buildNumber = System.getenv("BUILD_NUMBER") 20 - val velocityHumanVersion: String = 21 - if (project.version.toString().endsWith("-SNAPSHOT")) { 22 - if (buildNumber == null) { ··· 27 - } else { 28 - archiveVersion.get() 29 - } 30 + + val velocityHumanVersion = System.getenv("BUILD_VERSION"); 31 attributes["Implementation-Version"] = velocityHumanVersion 32 } 33 }
+3 -3
pkgs/by-name/ve/velocity/package.nix
··· 35 in 36 stdenv.mkDerivation (finalAttrs: { 37 pname = "velocity"; 38 - version = "3.4.0-unstable-2025-06-11"; 39 40 src = fetchFromGitHub { 41 owner = "PaperMC"; 42 repo = "Velocity"; 43 - rev = "669fda298c670c55686f34d868383052b192518d"; 44 - hash = "sha256-UI6SqVAaM4NANf9cGvsIgYO1jSkWDOk5ysyufrPWTgg="; 45 }; 46 47 nativeBuildInputs = [
··· 35 in 36 stdenv.mkDerivation (finalAttrs: { 37 pname = "velocity"; 38 + version = "3.4.0-unstable-2025-08-02"; 39 40 src = fetchFromGitHub { 41 owner = "PaperMC"; 42 repo = "Velocity"; 43 + rev = "d47848cb93a5f94a95059c2794c0197df6360f29"; 44 + hash = "sha256-bCvUXWv4rdoZEU1GpVSlXROC9kBtSGisvmCgRPKVZ4o="; 45 }; 46 47 nativeBuildInputs = [
+2 -2
pkgs/by-name/vi/virtnbdbackup/package.nix
··· 7 8 python3Packages.buildPythonApplication rec { 9 pname = "virtnbdbackup"; 10 - version = "2.32"; 11 pyproject = true; 12 13 src = fetchFromGitHub { 14 owner = "abbbi"; 15 repo = "virtnbdbackup"; 16 tag = "v${version}"; 17 - hash = "sha256-SCt+RvtY17wTGeCcMbmK7q7cLz17upTEgoKZM4pDh7s="; 18 }; 19 20 build-system = with python3Packages; [
··· 7 8 python3Packages.buildPythonApplication rec { 9 pname = "virtnbdbackup"; 10 + version = "2.34"; 11 pyproject = true; 12 13 src = fetchFromGitHub { 14 owner = "abbbi"; 15 repo = "virtnbdbackup"; 16 tag = "v${version}"; 17 + hash = "sha256-3qB1y9iFt8GKDRzc6mvq8d4M6BczlmlAaColH4MssdI="; 18 }; 19 20 build-system = with python3Packages; [
+2 -2
pkgs/by-name/wi/wiliwili/package.nix
··· 18 19 stdenv.mkDerivation (finalAttrs: { 20 pname = "wiliwili"; 21 - version = "1.5.1"; 22 23 src = fetchFromGitHub { 24 owner = "xfangfang"; 25 repo = "wiliwili"; 26 tag = "v${finalAttrs.version}"; 27 fetchSubmodules = true; 28 - hash = "sha256-37DQafP+PFjrfNXJt88oK0ghqQEVQjDdVbYsf1tHAN4="; 29 }; 30 31 nativeBuildInputs = [
··· 18 19 stdenv.mkDerivation (finalAttrs: { 20 pname = "wiliwili"; 21 + version = "1.5.2"; 22 23 src = fetchFromGitHub { 24 owner = "xfangfang"; 25 repo = "wiliwili"; 26 tag = "v${finalAttrs.version}"; 27 fetchSubmodules = true; 28 + hash = "sha256-lcHKbEYlOznu9WhWX7ZoOCnxr6h/AJCLbjLmc2ZZTbg="; 29 }; 30 31 nativeBuildInputs = [
+2 -2
pkgs/by-name/wo/workout-tracker/package.nix
··· 9 }: 10 let 11 pname = "workout-tracker"; 12 - version = "2.4.0"; 13 14 src = fetchFromGitHub { 15 owner = "jovandeginste"; 16 repo = "workout-tracker"; 17 tag = "v${version}"; 18 - hash = "sha256-CJiUSN0QmZD5B/KPlHY2SySQC3D/+aVdydS4mYTabz0="; 19 }; 20 21 assets = buildNpmPackage {
··· 9 }: 10 let 11 pname = "workout-tracker"; 12 + version = "2.4.1"; 13 14 src = fetchFromGitHub { 15 owner = "jovandeginste"; 16 repo = "workout-tracker"; 17 tag = "v${version}"; 18 + hash = "sha256-MS4+dbJUh+oHWcQKe84VWW2e3hbZM4dgDWl6ZkFQkDo="; 19 }; 20 21 assets = buildNpmPackage {
+2 -2
pkgs/by-name/zo/zoom-us/package.nix
··· 62 versions.x86_64-darwin = "6.5.7.60598"; 63 64 # This is the fallback version so that evaluation can produce a meaningful result. 65 - versions.x86_64-linux = "6.5.7.3298"; 66 67 srcs = { 68 aarch64-darwin = fetchurl { ··· 76 }; 77 x86_64-linux = fetchurl { 78 url = "https://zoom.us/client/${versions.x86_64-linux}/zoom_x86_64.pkg.tar.xz"; 79 - hash = "sha256-6gzgJmB+/cwcEToQpniVVZyQZcqzblQG/num0X+xUIE="; 80 }; 81 }; 82
··· 62 versions.x86_64-darwin = "6.5.7.60598"; 63 64 # This is the fallback version so that evaluation can produce a meaningful result. 65 + versions.x86_64-linux = "6.5.8.3527"; 66 67 srcs = { 68 aarch64-darwin = fetchurl { ··· 76 }; 77 x86_64-linux = fetchurl { 78 url = "https://zoom.us/client/${versions.x86_64-linux}/zoom_x86_64.pkg.tar.xz"; 79 + hash = "sha256-qTehkDMyc28XHtta7taNYn8gPCYS/Qdr2VMUIDDC/68="; 80 }; 81 }; 82
+52
pkgs/development/python-modules/airos/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + pythonOlder, 6 + setuptools, 7 + aiohttp, 8 + mashumaro, 9 + aiofiles, 10 + aioresponses, 11 + pytest-asyncio, 12 + pytestCheckHook, 13 + }: 14 + 15 + buildPythonPackage rec { 16 + pname = "airos"; 17 + version = "0.2.4"; 18 + pyproject = true; 19 + 20 + disabled = pythonOlder "3.13"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "CoMPaTech"; 24 + repo = "python-airos"; 25 + tag = "v${version}"; 26 + hash = "sha256-zY0XPucCXiJDo9C4GiDqs/lxQDTphs/mBXBqSYPvkoI="; 27 + }; 28 + 29 + build-system = [ setuptools ]; 30 + 31 + dependencies = [ 32 + aiohttp 33 + mashumaro 34 + ]; 35 + 36 + nativeCheckInputs = [ 37 + aiofiles 38 + aioresponses 39 + pytest-asyncio 40 + pytestCheckHook 41 + ]; 42 + 43 + pythonImportsCheck = [ "airos" ]; 44 + 45 + meta = { 46 + description = "Ubiquity airOS module(s) for Python 3"; 47 + homepage = "https://github.com/CoMPaTech/python-airos"; 48 + changelog = "https://github.com/CoMPaTech/python-airos/releases/tag/v${version}"; 49 + license = lib.licenses.mit; 50 + maintainers = [ lib.maintainers.jamiemagee ]; 51 + }; 52 + }
+2
pkgs/development/python-modules/django-stubs-ext/default.nix
··· 52 "tests/typecheck" 53 ]; 54 55 pythonImportsCheck = [ "django_stubs_ext" ]; 56 57 meta = with lib; {
··· 52 "tests/typecheck" 53 ]; 54 55 + # Tests are not shipped with PyPI 56 + 57 pythonImportsCheck = [ "django_stubs_ext" ]; 58 59 meta = with lib; {
+12 -3
pkgs/development/python-modules/django-stubs/default.nix
··· 1 { 2 lib, 3 buildPythonPackage, 4 - django, 5 django-stubs-ext, 6 fetchFromGitHub, 7 mypy, 8 pytest-mypy-plugins, 9 pytestCheckHook, 10 pythonOlder, 11 - hatchling, 12 tomli, 13 types-pytz, 14 types-pyyaml, 15 typing-extensions, 16 }: 17 ··· 40 41 optional-dependencies = { 42 compatible-mypy = [ mypy ]; 43 }; 44 45 nativeCheckInputs = [ ··· 54 ]; 55 56 disabledTestPaths = [ 57 - "tests/typecheck" 58 ]; 59 60 pythonImportsCheck = [ "django-stubs" ];
··· 1 { 2 lib, 3 buildPythonPackage, 4 django-stubs-ext, 5 + django, 6 fetchFromGitHub, 7 + hatchling, 8 + redis, 9 mypy, 10 pytest-mypy-plugins, 11 + oracledb, 12 pytestCheckHook, 13 pythonOlder, 14 tomli, 15 types-pytz, 16 types-pyyaml, 17 + types-redis, 18 typing-extensions, 19 }: 20 ··· 43 44 optional-dependencies = { 45 compatible-mypy = [ mypy ]; 46 + oracle = [ oracledb ]; 47 + redis = [ 48 + redis 49 + types-redis 50 + ]; 51 }; 52 53 nativeCheckInputs = [ ··· 62 ]; 63 64 disabledTestPaths = [ 65 + # Skip type checking 66 + "tests/typecheck/" 67 ]; 68 69 pythonImportsCheck = [ "django-stubs" ];
+9 -4
pkgs/development/python-modules/djangorestframework-stubs/default.nix
··· 22 version = "3.16.1"; 23 pyproject = true; 24 25 - disabled = pythonOlder "3.9"; 26 27 src = fetchFromGitHub { 28 owner = "typeddjango"; ··· 31 hash = "sha256-TTv6v7G3LODrUDSYSNNa4+dujih7QElmvK3mMQg9EuQ="; 32 }; 33 34 - nativeBuildInputs = [ setuptools ]; 35 36 - propagatedBuildInputs = [ 37 django-stubs 38 requests 39 types-pyyaml ··· 54 ] 55 ++ lib.flatten (builtins.attrValues optional-dependencies); 56 57 - # Upstream recommends mypy > 1.7 which we don't have yet, thus all testsare failing with 3.14.5 and below 58 doCheck = false; 59 60 pythonImportsCheck = [ "rest_framework-stubs" ];
··· 22 version = "3.16.1"; 23 pyproject = true; 24 25 + disabled = pythonOlder "3.10"; 26 27 src = fetchFromGitHub { 28 owner = "typeddjango"; ··· 31 hash = "sha256-TTv6v7G3LODrUDSYSNNa4+dujih7QElmvK3mMQg9EuQ="; 32 }; 33 34 + postPatch = '' 35 + substituteInPlace pyproject.toml \ 36 + --replace-fail "<79.0.0" "" 37 + ''; 38 + 39 + build-system = [ setuptools ]; 40 41 + dependencies = [ 42 django-stubs 43 requests 44 types-pyyaml ··· 59 ] 60 ++ lib.flatten (builtins.attrValues optional-dependencies); 61 62 + # Upstream recommends mypy > 1.7 which we don't have yet, thus all tests are failing with 3.14.5 and below 63 doCheck = false; 64 65 pythonImportsCheck = [ "rest_framework-stubs" ];
+2 -2
pkgs/development/python-modules/fastai/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "fastai"; 21 - version = "2.8.2"; 22 format = "setuptools"; 23 24 disabled = pythonOlder "3.7"; 25 26 src = fetchPypi { 27 inherit pname version; 28 - hash = "sha256-ix3Sp/IKj7BLmuuGd/763LB0llSUYAbMWJD8fvWe/u8="; 29 }; 30 31 propagatedBuildInputs = [
··· 18 19 buildPythonPackage rec { 20 pname = "fastai"; 21 + version = "2.8.3"; 22 format = "setuptools"; 23 24 disabled = pythonOlder "3.7"; 25 26 src = fetchPypi { 27 inherit pname version; 28 + hash = "sha256-lgUBxf8vef9HnAWh2eNxtFRMeHxDjucJrZEcONq9DK8="; 29 }; 30 31 propagatedBuildInputs = [
+3 -1
pkgs/development/python-modules/ldap3/default.nix
··· 24 prePatch = '' 25 # patch fails to apply because of line endings 26 dos2unix ldap3/utils/asn1.py 27 ''; 28 29 patches = [ ··· 52 meta = with lib; { 53 homepage = "https://github.com/cannatag/ldap3"; 54 description = "Strictly RFC 4510 conforming LDAP V3 pure Python client library"; 55 - license = licenses.lgpl3; 56 maintainers = [ ]; 57 }; 58 }
··· 24 prePatch = '' 25 # patch fails to apply because of line endings 26 dos2unix ldap3/utils/asn1.py 27 + substituteInPlace _version.json \ 28 + --replace-fail '"version": "2.9",' '"version": "${version}",' 29 ''; 30 31 patches = [ ··· 54 meta = with lib; { 55 homepage = "https://github.com/cannatag/ldap3"; 56 description = "Strictly RFC 4510 conforming LDAP V3 pure Python client library"; 57 + license = licenses.lgpl3Plus; 58 maintainers = [ ]; 59 }; 60 }
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "publicsuffixlist"; 14 - version = "1.0.2.20250802"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; 18 19 src = fetchPypi { 20 inherit pname version; 21 - hash = "sha256-/Liz65F7Rk/TJr5xICfRsK10Flzgojw2m4otnh4+y5A="; 22 }; 23 24 build-system = [ setuptools ];
··· 11 12 buildPythonPackage rec { 13 pname = "publicsuffixlist"; 14 + version = "1.0.2.20250809"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; 18 19 src = fetchPypi { 20 inherit pname version; 21 + hash = "sha256-eTvYGTwuSjT7ban7B9xS+8HzJfiMHnEIZSXimjMykJE="; 22 }; 23 24 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/pybind11-stubgen/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "pybind11-stubgen"; 10 - version = "2.5.4"; 11 pyproject = true; 12 13 build-system = [ setuptools ]; ··· 16 owner = "sizmailov"; 17 repo = "pybind11-stubgen"; 18 tag = "v${version}"; 19 - hash = "sha256-xOvh5H2n7KOOvsRecwWlaWgFIHUPYxTEOTvM9RIpTTQ="; 20 }; 21 22 # For testing purposes, the upstream source uses a shell script to build the pybind11
··· 7 8 buildPythonPackage rec { 9 pname = "pybind11-stubgen"; 10 + version = "2.5.5"; 11 pyproject = true; 12 13 build-system = [ setuptools ]; ··· 16 owner = "sizmailov"; 17 repo = "pybind11-stubgen"; 18 tag = "v${version}"; 19 + hash = "sha256-J2LydgkiNQp+2/agwBCSTtr+Ci4zONLkHmnMLFBww24="; 20 }; 21 22 # For testing purposes, the upstream source uses a shell script to build the pybind11
+31
pkgs/development/python-modules/pyitachip2ir/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchPypi, 5 + setuptools, 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "pyitachip2ir"; 10 + version = "0.0.7"; 11 + pyproject = true; 12 + 13 + src = fetchPypi { 14 + inherit pname version; 15 + hash = "sha256-T/Q3tZTTwqlaHDR2l2nRLISC4LLrOPZZv14sRxYyqDQ="; 16 + }; 17 + 18 + build-system = [ setuptools ]; 19 + 20 + # Package has no tests 21 + doCheck = false; 22 + 23 + pythonImportsCheck = [ "pyitachip2ir" ]; 24 + 25 + meta = { 26 + description = "Library for sending IR commands to an ITach IP2IR gateway"; 27 + homepage = "https://github.com/alanfischer/itachip2ir"; 28 + license = lib.licenses.mit; 29 + maintainers = [ lib.maintainers.jamiemagee ]; 30 + }; 31 + }
+12 -4
pkgs/development/python-modules/pymavlink/default.nix
··· 1 { 2 lib, 3 buildPythonPackage, 4 fetchPypi, 5 - future, 6 lxml, 7 }: 8 9 buildPythonPackage rec { 10 pname = "pymavlink"; 11 version = "2.4.49"; 12 - format = "setuptools"; 13 14 src = fetchPypi { 15 inherit pname version; 16 hash = "sha256-188Q1VktA4oYqpcnERd+u4i+IUPvzCWN9jCwUT6dosI="; 17 }; 18 19 - propagatedBuildInputs = [ 20 - future 21 lxml 22 ]; 23 ··· 32 meta = with lib; { 33 description = "Python MAVLink interface and utilities"; 34 homepage = "https://github.com/ArduPilot/pymavlink"; 35 license = with licenses; [ 36 lgpl3Plus 37 mit
··· 1 { 2 lib, 3 buildPythonPackage, 4 + cython, 5 + fastcrc, 6 fetchPypi, 7 lxml, 8 + setuptools, 9 }: 10 11 buildPythonPackage rec { 12 pname = "pymavlink"; 13 version = "2.4.49"; 14 + pyproject = true; 15 16 src = fetchPypi { 17 inherit pname version; 18 hash = "sha256-188Q1VktA4oYqpcnERd+u4i+IUPvzCWN9jCwUT6dosI="; 19 }; 20 21 + build-system = [ 22 + cython 23 + setuptools 24 + ]; 25 + 26 + dependencies = [ 27 + fastcrc 28 lxml 29 ]; 30 ··· 39 meta = with lib; { 40 description = "Python MAVLink interface and utilities"; 41 homepage = "https://github.com/ArduPilot/pymavlink"; 42 + changelog = "https://github.com/ArduPilot/pymavlink/releases/tag/${version}"; 43 license = with licenses; [ 44 lgpl3Plus 45 mit
+2 -2
pkgs/development/python-modules/pymiele/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "pymiele"; 12 - version = "0.5.2"; 13 pyproject = true; 14 15 disabled = pythonOlder "3.13"; 16 17 src = fetchPypi { 18 inherit pname version; 19 - hash = "sha256-pU1PC1DXoXjZVkml3OFPhKgLVqhB9LbPPE1NzphyOSk="; 20 }; 21 22 build-system = [ setuptools ];
··· 9 10 buildPythonPackage rec { 11 pname = "pymiele"; 12 + version = "0.5.3"; 13 pyproject = true; 14 15 disabled = pythonOlder "3.13"; 16 17 src = fetchPypi { 18 inherit pname version; 19 + hash = "sha256-sz8yNyh8cmgmnElEhjw7yUUUiG6bpdB4LXze6ZWFjMo="; 20 }; 21 22 build-system = [ setuptools ];
+59
pkgs/development/python-modules/pypasser/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + setuptools, 6 + pythonRelaxDepsHook, 7 + pydub, 8 + pysocks, 9 + requests, 10 + selenium, 11 + speechrecognition, 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "pypasser"; 16 + version = "0.0.5"; 17 + pyproject = true; 18 + 19 + src = fetchFromGitHub { 20 + owner = "xHossein"; 21 + repo = "PyPasser"; 22 + tag = version; 23 + hash = "sha256-vqa+Xap9dYvjJMiGNGNmegh7rmAqwf3//MH47xwr/T0="; 24 + }; 25 + 26 + build-system = [ setuptools ]; 27 + 28 + nativeBuildInputs = [ 29 + pythonRelaxDepsHook 30 + ]; 31 + 32 + pythonRelaxDeps = [ 33 + "speechrecognition" 34 + ]; 35 + 36 + dependencies = [ 37 + pydub 38 + pysocks 39 + requests 40 + selenium 41 + speechrecognition 42 + ]; 43 + 44 + pythonImportsCheck = [ 45 + "pypasser" 46 + "pypasser.reCaptchaV2" 47 + "pypasser.reCaptchaV3" 48 + ]; 49 + 50 + # Package has no tests 51 + doCheck = false; 52 + 53 + meta = { 54 + description = "Bypassing reCaptcha V3 by sending HTTP requests & solving reCaptcha V2 using speech to text"; 55 + homepage = "https://github.com/xHossein/PyPasser"; 56 + license = lib.licenses.mit; 57 + maintainers = [ lib.maintainers.jamiemagee ]; 58 + }; 59 + }
+45
pkgs/development/python-modules/pypjlink2/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + appdirs, 6 + pytestCheckHook, 7 + setuptools, 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "pypjlink2"; 12 + version = "1.2.1"; 13 + pyproject = true; 14 + 15 + src = fetchFromGitHub { 16 + owner = "benoitlouy"; 17 + repo = "pypjlink"; 18 + tag = "v${version}"; 19 + hash = "sha256-0RVI9DX5JaVWntSu5du5SU45NC70TZJyVrvMuVR7grA="; 20 + }; 21 + 22 + build-system = [ 23 + setuptools 24 + ]; 25 + 26 + dependencies = [ 27 + appdirs 28 + ]; 29 + 30 + nativeCheckInputs = [ 31 + pytestCheckHook 32 + ]; 33 + 34 + pythonImportsCheck = [ 35 + "pypjlink" 36 + ]; 37 + 38 + meta = { 39 + description = "Python implementation of the PJLink protocol for controlling digital projectors"; 40 + homepage = "https://github.com/benoitlouy/pypjlink"; 41 + changelog = "https://github.com/benoitlouy/pypjlink/releases/tag/v${version}"; 42 + license = lib.licenses.asl20; 43 + maintainers = [ lib.maintainers.jamiemagee ]; 44 + }; 45 + }
+2 -2
pkgs/development/python-modules/pytenable/default.nix
··· 28 29 buildPythonPackage rec { 30 pname = "pytenable"; 31 - version = "1.8.2"; 32 pyproject = true; 33 34 disabled = pythonOlder "3.10"; ··· 37 owner = "tenable"; 38 repo = "pyTenable"; 39 tag = version; 40 - hash = "sha256-21vKR9W2Bpi+9YfmMQ+vgQIGchb7cYA2Sx493/XuYU0="; 41 }; 42 43 pythonRelaxDeps = [
··· 28 29 buildPythonPackage rec { 30 pname = "pytenable"; 31 + version = "1.8.3"; 32 pyproject = true; 33 34 disabled = pythonOlder "3.10"; ··· 37 owner = "tenable"; 38 repo = "pyTenable"; 39 tag = version; 40 + hash = "sha256-91V2R29M/+kiosfkl5t6Y8qT/E041Wl1jhXCw3eQ7us="; 41 }; 42 43 pythonRelaxDeps = [
+2 -2
pkgs/development/python-modules/python-roborock/default.nix
··· 25 26 buildPythonPackage rec { 27 pname = "python-roborock"; 28 - version = "2.27.0"; 29 pyproject = true; 30 31 disabled = pythonOlder "3.11"; ··· 34 owner = "humbertogontijo"; 35 repo = "python-roborock"; 36 tag = "v${version}"; 37 - hash = "sha256-3iNqeRCdkkL77hYlh+LRo8ZKExcpk075eBbnp8oJQ8w="; 38 }; 39 40 postPatch = ''
··· 25 26 buildPythonPackage rec { 27 pname = "python-roborock"; 28 + version = "2.29.1"; 29 pyproject = true; 30 31 disabled = pythonOlder "3.11"; ··· 34 owner = "humbertogontijo"; 35 repo = "python-roborock"; 36 tag = "v${version}"; 37 + hash = "sha256-6Y/nqgGZQgmgaMjdAcYEidhr2h913deWtBoWnQz966o="; 38 }; 39 40 postPatch = ''
+40
pkgs/development/python-modules/pywmspro/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + hatchling, 6 + hatch-vcs, 7 + aiohttp, 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "pywmspro"; 12 + version = "0.3.2"; 13 + pyproject = true; 14 + 15 + src = fetchFromGitHub { 16 + owner = "mback2k"; 17 + repo = "pywmspro"; 18 + tag = version; 19 + hash = "sha256-o/+WjdU9+Vh1CnZYF2IsNpK5cubAFvsqANZ4GxrKFHI="; 20 + }; 21 + 22 + build-system = [ 23 + hatchling 24 + hatch-vcs 25 + ]; 26 + 27 + dependencies = [ aiohttp ]; 28 + 29 + # Package has no tests 30 + doCheck = false; 31 + 32 + pythonImportsCheck = [ "wmspro" ]; 33 + 34 + meta = { 35 + description = "Python library for WMS WebControl pro API"; 36 + homepage = "https://github.com/mback2k/pywmspro"; 37 + license = lib.licenses.asl20; 38 + maintainers = [ lib.maintainers.jamiemagee ]; 39 + }; 40 + }
+2 -2
pkgs/development/python-modules/sagemaker-core/default.nix
··· 28 29 buildPythonPackage rec { 30 pname = "sagemaker-core"; 31 - version = "1.0.47"; 32 pyproject = true; 33 34 src = fetchFromGitHub { 35 owner = "aws"; 36 repo = "sagemaker-core"; 37 tag = "v${version}"; 38 - hash = "sha256-PfAv4w+egB0fIkL6nexjtoqcXyvnx52RTQu6QwKjpNU="; 39 }; 40 41 build-system = [
··· 28 29 buildPythonPackage rec { 30 pname = "sagemaker-core"; 31 + version = "1.0.49"; 32 pyproject = true; 33 34 src = fetchFromGitHub { 35 owner = "aws"; 36 repo = "sagemaker-core"; 37 tag = "v${version}"; 38 + hash = "sha256-xDtBtsrromqfciVOxGTTWhTZG08qUjk9EJ9yMvYS7+Y="; 39 }; 40 41 build-system = [
+3 -3
pkgs/development/python-modules/storage3/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "storage3"; 14 - version = "0.12.0"; 15 pyproject = true; 16 17 src = fetchFromGitHub { 18 owner = "supabase"; 19 repo = "storage-py"; 20 - rev = "v${version}"; 21 - hash = "sha256-3Z+j9n/seL1ZuB1djOVpA6Qci/Ygi9g8g2lLQGKRUHM="; 22 }; 23 24 dependencies = [
··· 11 12 buildPythonPackage rec { 13 pname = "storage3"; 14 + version = "0.12.1"; 15 pyproject = true; 16 17 src = fetchFromGitHub { 18 owner = "supabase"; 19 repo = "storage-py"; 20 + tag = "v${version}"; 21 + hash = "sha256-Ef309CTnzbaqKAVMdvroUYAy9RImWZZqhsnwRdpGVkk="; 22 }; 23 24 dependencies = [
+46
pkgs/development/python-modules/tami4edgeapi/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + setuptools, 6 + pyjwt, 7 + pypasser, 8 + requests, 9 + pythonOlder, 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "tami4edgeapi"; 14 + version = "3.0"; 15 + pyproject = true; 16 + 17 + disabled = pythonOlder "3.7"; 18 + 19 + src = fetchFromGitHub { 20 + owner = "Guy293"; 21 + repo = "Tami4EdgeAPI"; 22 + tag = "v${version}"; 23 + hash = "sha256-rhJ8L6qLDnO50Xp2eqquRinDTQjMxWVSjNL5GQI1gvM="; 24 + }; 25 + 26 + build-system = [ setuptools ]; 27 + 28 + dependencies = [ 29 + pyjwt 30 + pypasser 31 + requests 32 + ]; 33 + 34 + # Package has no tests 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ "Tami4EdgeAPI" ]; 38 + 39 + meta = { 40 + description = "Python API client for Tami4 Edge / Edge+ devices"; 41 + homepage = "https://github.com/Guy293/Tami4EdgeAPI"; 42 + changelog = "https://github.com/Guy293/Tami4EdgeAPI/releases/tag/v${version}"; 43 + license = lib.licenses.mit; 44 + maintainers = [ lib.maintainers.jamiemagee ]; 45 + }; 46 + }
+64
pkgs/development/python-modules/thingspeak/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + docopt, 5 + fetchFromGitHub, 6 + poetry-core, 7 + pytest-vcr, 8 + pytestCheckHook, 9 + requests, 10 + setuptools, 11 + vcrpy, 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "thingspeak"; 16 + version = "1.0.0"; 17 + pyproject = true; 18 + 19 + src = fetchFromGitHub { 20 + owner = "mchwalisz"; 21 + repo = "thingspeak"; 22 + tag = "v${version}"; 23 + hash = "sha256-9YvudzksWp130hkG8WxiX9WHegAVH2TT1vwMbLJ13qE="; 24 + }; 25 + 26 + postPatch = '' 27 + substituteInPlace pyproject.toml \ 28 + --replace-fail "poetry.masonry.api" "poetry.core.masonry.api" \ 29 + --replace-fail 'requires = ["poetry>=0.12"]' 'requires = ["poetry-core"]' 30 + ''; 31 + 32 + build-system = [ 33 + poetry-core 34 + ]; 35 + 36 + dependencies = [ 37 + docopt 38 + requests 39 + setuptools 40 + ]; 41 + 42 + nativeCheckInputs = [ 43 + pytest-vcr 44 + pytestCheckHook 45 + vcrpy 46 + ]; 47 + 48 + disabledTests = [ 49 + # VCR cassette conflicts with different API keys 50 + "test_get_with_key" 51 + ]; 52 + 53 + pythonImportsCheck = [ 54 + "thingspeak" 55 + ]; 56 + 57 + meta = { 58 + description = "Client library for the thingspeak.com API"; 59 + homepage = "https://github.com/mchwalisz/thingspeak"; 60 + changelog = "https://github.com/mchwalisz/thingspeak/releases/tag/v${version}"; 61 + license = lib.licenses.lgpl3Only; 62 + maintainers = [ lib.maintainers.jamiemagee ]; 63 + }; 64 + }
+48
pkgs/development/python-modules/volvocarsapi/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + pythonOlder, 6 + aiohttp, 7 + yarl, 8 + hatchling, 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "volvocarsapi"; 13 + version = "0.4.1"; 14 + pyproject = true; 15 + 16 + disabled = pythonOlder "3.12"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "thomasddn"; 20 + repo = "volvo-cars-api"; 21 + tag = "v${version}"; 22 + hash = "sha256-YMrhVxDm8Cp8vbMVtdq6yoaAu8nUB7L2YG+LSkvMdZs="; 23 + }; 24 + 25 + build-system = [ 26 + hatchling 27 + ]; 28 + 29 + dependencies = [ 30 + aiohttp 31 + yarl 32 + ]; 33 + 34 + # Package has no tests 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ 38 + "volvocarsapi" 39 + ]; 40 + 41 + meta = { 42 + description = "Python client for the Volvo Cars API"; 43 + homepage = "https://github.com/thomasddn/volvo-cars-api"; 44 + changelog = "https://github.com/thomasddn/volvo-cars-api/releases/tag/v${version}"; 45 + license = lib.licenses.gpl3Only; 46 + maintainers = [ lib.maintainers.jamiemagee ]; 47 + }; 48 + }
+6 -9
pkgs/development/tools/electron/info.json
··· 4 "chromium": { 5 "deps": { 6 "gn": { 7 - "hash": "sha256-EqbwCLkseND1v3UqM+49N7GuoXJ3PlJjWOes4OijQ3U=", 8 "rev": "ed1abc107815210dc66ec439542bee2f6cbabc00", 9 - "url": "https://gn.googlesource.com/gn", 10 - "version": "2025-01-13" 11 } 12 }, 13 "version": "134.0.6998.205" ··· 1313 "chromium": { 1314 "deps": { 1315 "gn": { 1316 - "hash": "sha256-vDKMt23RMDI+KX6CmjfeOhRv2haf/mDOuHpWKnlODcg=", 1317 "rev": "6e8e0d6d4a151ab2ed9b4a35366e630c55888444", 1318 - "url": "https://gn.googlesource.com/gn", 1319 - "version": "2025-03-24" 1320 } 1321 }, 1322 "version": "136.0.7103.177" ··· 2638 "chromium": { 2639 "deps": { 2640 "gn": { 2641 - "hash": "sha256-UB9a7Fr1W0yYld6WbXyRR8dFqWsj/zx4KumDZ5JQKSM=", 2642 "rev": "ebc8f16ca7b0d36a3e532ee90896f9eb48e5423b", 2643 - "url": "https://gn.googlesource.com/gn", 2644 - "version": "2025-05-21" 2645 } 2646 }, 2647 "version": "138.0.7204.185"
··· 4 "chromium": { 5 "deps": { 6 "gn": { 7 + "hash": "sha256-U0f/Q134UJrSke+/o9Hs4+mQa/vSM2hdkRXhLfhnqME=", 8 "rev": "ed1abc107815210dc66ec439542bee2f6cbabc00", 9 + "version": "0-unstable-2025-01-13" 10 } 11 }, 12 "version": "134.0.6998.205" ··· 1312 "chromium": { 1313 "deps": { 1314 "gn": { 1315 + "hash": "sha256-MnGl+D9ahQibUHCtyOUf1snvmeupUn4D2yrDj55JTe4=", 1316 "rev": "6e8e0d6d4a151ab2ed9b4a35366e630c55888444", 1317 + "version": "0-unstable-2025-03-24" 1318 } 1319 }, 1320 "version": "136.0.7103.177" ··· 2636 "chromium": { 2637 "deps": { 2638 "gn": { 2639 + "hash": "sha256-BplU8qNKObVrKMLKTyqivPF1L6bbJulFC+Zop9UpmZY=", 2640 "rev": "ebc8f16ca7b0d36a3e532ee90896f9eb48e5423b", 2641 + "version": "0-unstable-2025-05-21" 2642 } 2643 }, 2644 "version": "138.0.7204.185"
+26 -15
pkgs/development/tools/electron/update.py
··· 1 #! /usr/bin/env nix-shell 2 - #! nix-shell -i python -p python3.pkgs.joblib python3.pkgs.click python3.pkgs.click-log nix nix-prefetch-git prefetch-yarn-deps prefetch-npm-deps gclient2nix 3 """ 4 electron updater 5 ··· 32 import click 33 import click_log 34 35 - from datetime import datetime 36 from typing import Iterable, Tuple 37 from urllib.request import urlopen 38 from joblib import Parallel, delayed, Memory ··· 44 45 os.chdir(os.path.dirname(__file__)) 46 47 memory: Memory = Memory("cache", verbose=0) 48 49 logger = logging.getLogger(__name__) ··· 79 80 81 @memory.cache 82 def get_chromium_gn_source(chromium_tag: str) -> dict: 83 gn_pattern = r"'gn_version': 'git_revision:([0-9a-f]{40})'" 84 gn_commit = re.search(gn_pattern, get_chromium_file(chromium_tag, "DEPS")).group(1) 85 - gn_prefetch: bytes = subprocess.check_output( 86 - [ 87 - "nix-prefetch-git", 88 - "--quiet", 89 - "https://gn.googlesource.com/gn", 90 - "--rev", 91 - gn_commit, 92 - ] 93 ) 94 - gn: dict = json.loads(gn_prefetch) 95 return { 96 "gn": { 97 - "version": datetime.fromisoformat(gn["date"]).date().isoformat(), 98 - "url": gn["url"], 99 - "rev": gn["rev"], 100 - "hash": gn["hash"], 101 } 102 } 103
··· 1 #! /usr/bin/env nix-shell 2 + #! nix-shell -i python -p python3.pkgs.joblib python3.pkgs.click python3.pkgs.click-log nix nurl prefetch-yarn-deps prefetch-npm-deps gclient2nix 3 """ 4 electron updater 5 ··· 32 import click 33 import click_log 34 35 + from datetime import datetime, UTC 36 from typing import Iterable, Tuple 37 from urllib.request import urlopen 38 from joblib import Parallel, delayed, Memory ··· 44 45 os.chdir(os.path.dirname(__file__)) 46 47 + # Absolute path of nixpkgs top-level directory 48 + NIXPKGS_PATH = subprocess.check_output(["git", "rev-parse", "--show-toplevel"]).decode("utf-8").strip() 49 + 50 memory: Memory = Memory("cache", verbose=0) 51 52 logger = logging.getLogger(__name__) ··· 82 83 84 @memory.cache 85 + def get_gn_hash(gn_version, gn_commit): 86 + print("gn.override", file=sys.stderr) 87 + expr = f'(import {NIXPKGS_PATH} {{}}).gn.override {{ version = "{gn_version}"; rev = "{gn_commit}"; hash = ""; }}' 88 + out = subprocess.check_output(["nurl", "--hash", "--expr", expr]) 89 + return out.decode("utf-8").strip() 90 + 91 + @memory.cache 92 def get_chromium_gn_source(chromium_tag: str) -> dict: 93 gn_pattern = r"'gn_version': 'git_revision:([0-9a-f]{40})'" 94 gn_commit = re.search(gn_pattern, get_chromium_file(chromium_tag, "DEPS")).group(1) 95 + 96 + gn_commit_info = json.loads( 97 + urlopen(f"https://gn.googlesource.com/gn/+/{gn_commit}?format=json") 98 + .read() 99 + .decode("utf-8") 100 + .split(")]}'\n")[1] 101 ) 102 + 103 + gn_commit_date = datetime.strptime(gn_commit_info["commiter"]["time"], "%a %b %d %H:%M:%S %Y %z") 104 + gn_date = gn_commit_date.astimezone(UTC).date().isoformat() 105 + gn_version = f"0-unstable-{gn_date}" 106 + 107 return { 108 "gn": { 109 + "version": gn_version, 110 + "rev": gn_commit, 111 + "hash": get_gn_hash(gn_version, gn_commit), 112 } 113 } 114
+11 -4
pkgs/os-specific/linux/kernel/generic.nix
··· 141 { 142 structuredExtraConfig ? { }, 143 ... 144 - }: 145 - { 146 - settings = structuredExtraConfig; 147 - } 148 ) kernelPatches; 149 150 # appends kernel patches extraConfig
··· 141 { 142 structuredExtraConfig ? { }, 143 ... 144 + }@args: 145 + if args ? extraStructuredConfig then 146 + throw '' 147 + Passing `extraStructuredConfig` to the Linux kernel (e.g. 148 + via `boot.kernelPatches` in NixOS) is not supported anymore. Use 149 + `structuredExtraConfig` instead. 150 + '' 151 + else 152 + { 153 + settings = structuredExtraConfig; 154 + } 155 ) kernelPatches; 156 157 # appends kernel patches extraConfig
+2 -2
pkgs/os-specific/linux/kernel/zen-kernels.nix
··· 16 variants = { 17 # ./update-zen.py zen 18 zen = { 19 - version = "6.15.8"; # zen 20 suffix = "zen1"; # zen 21 - sha256 = "010k50c9anjbcrwh9cgc6wn91hh3xa1x3mpxbaa2x1v8f5773vd4"; # zen 22 isLqx = false; 23 }; 24 # ./update-zen.py lqx
··· 16 variants = { 17 # ./update-zen.py zen 18 zen = { 19 + version = "6.16"; # zen 20 suffix = "zen1"; # zen 21 + sha256 = "1ckysnshlrhfycz0yppna6jrnvgc9k49wr5srvl15wj1hck84p7d"; # zen 22 isLqx = false; 23 }; 24 # ./update-zen.py lqx
+4 -16
pkgs/os-specific/linux/systemd/default.nix
··· 256 ./0019-meson-Don-t-link-ssh-dropins.patch 257 258 ./0020-install-unit_file_exists_full-follow-symlinks.patch 259 - 260 - # add nspawn build option flag 261 - # required to disable nspawn for systemdLibs to avoid dependency on getent 262 - # https://github.com/systemd/systemd/pull/36876, remove for systemd 258 263 - (fetchpatch { 264 - # required for the actual patch to apply 265 - url = "https://github.com/systemd/systemd/commit/b1fb2d971c810e0bdf9ff0ae567a1c6c230e4e5d.patch"; 266 - hash = "sha256-JBheazg1OFkx8vUl2l8+34BoEPVURBQJHxqntOBYB60="; 267 - includes = [ "src/nspawn/meson.build" ]; 268 - }) 269 - (fetchpatch { 270 - url = "https://github.com/systemd/systemd/commit/d95818f5221d9b9b19648cffa0cb2407f023b27e.patch"; 271 - hash = "sha256-FTpWGec5ivlkyEEDMCPaLE+BH91e7JI0kH8pS88bBDY="; 272 - excludes = [ "test/fuzz/meson.build" ]; 273 - }) 274 ] 275 ++ lib.optionals (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 276 ./0021-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch ··· 600 (lib.mesonEnable "gnutls" false) 601 (lib.mesonEnable "xkbcommon" false) 602 (lib.mesonEnable "man" true) 603 - (lib.mesonEnable "nspawn" withNspawn) 604 605 (lib.mesonBool "analyze" withAnalyze) 606 (lib.mesonBool "logind" withLogind) ··· 697 ] 698 ++ lib.optionals withNspawn [ 699 { 700 search = "/usr/bin/getent"; 701 replacement = "${getent}/bin/getent"; 702 where = [ "src/nspawn/nspawn-setuid.c" ];
··· 256 ./0019-meson-Don-t-link-ssh-dropins.patch 257 258 ./0020-install-unit_file_exists_full-follow-symlinks.patch 259 ] 260 ++ lib.optionals (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 261 ./0021-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch ··· 585 (lib.mesonEnable "gnutls" false) 586 (lib.mesonEnable "xkbcommon" false) 587 (lib.mesonEnable "man" true) 588 + # (lib.mesonEnable "nspawn" withNspawn) # nspawn build can be turned off on systemd 258, on 257.x it will just not be installed in systemdLibs but the build is unconditional 589 590 (lib.mesonBool "analyze" withAnalyze) 591 (lib.mesonBool "logind" withLogind) ··· 682 ] 683 ++ lib.optionals withNspawn [ 684 { 685 + # we only need to patch getent when nspawn will actually be built/installed 686 + # as of systemd 257.x, nspawn will not be installed on systemdLibs, so we don't need to patch it 687 + # patching getent unconditionally here introduces infinite recursion on musl 688 search = "/usr/bin/getent"; 689 replacement = "${getent}/bin/getent"; 690 where = [ "src/nspawn/nspawn-setuid.c" ];
+19 -7
pkgs/servers/home-assistant/component-packages.nix
··· 114 ]; 115 "airos" = 116 ps: with ps; [ 117 - ]; # missing inputs: airos 118 "airq" = 119 ps: with ps; [ 120 aioairq ··· 2835 ]; 2836 "itach" = 2837 ps: with ps; [ 2838 - ]; # missing inputs: pyitachip2ir 2839 "itunes" = 2840 ps: with ps; [ 2841 ]; ··· 4464 ]; 4465 "pjlink" = 4466 ps: with ps; [ 4467 - ]; # missing inputs: pypjlink2 4468 "plaato" = 4469 ps: with ps; [ 4470 aiohasupervisor ··· 5817 ]; 5818 "tami4" = 5819 ps: with ps; [ 5820 - ]; # missing inputs: Tami4EdgeAPI 5821 "tank_utility" = 5822 ps: with ps; [ 5823 tank-utility ··· 5979 ]; 5980 "thingspeak" = 5981 ps: with ps; [ 5982 - ]; # missing inputs: thingspeak 5983 "thinkingcleaner" = 5984 ps: with ps; [ 5985 ]; # missing inputs: pythinkingcleaner ··· 6430 ]; 6431 "volvo" = 6432 ps: with ps; [ 6433 - ]; # missing inputs: volvocarsapi 6434 "volvooncall" = 6435 ps: with ps; [ 6436 volvooncall ··· 6574 ]; 6575 "wmspro" = 6576 ps: with ps; [ 6577 - ]; # missing inputs: pywmspro 6578 "wolflink" = 6579 ps: with ps; [ 6580 wolf-comm ··· 6867 "airgradient" 6868 "airly" 6869 "airnow" 6870 "airq" 6871 "airthings" 6872 "airthings_ble" ··· 7479 "pi_hole" 7480 "picnic" 7481 "ping" 7482 "plaato" 7483 "plant" 7484 "playstation_network" ··· 7671 "tag" 7672 "tailscale" 7673 "tailwind" 7674 "tankerkoenig" 7675 "tasmota" 7676 "tautulli" ··· 7765 "voicerss" 7766 "voip" 7767 "volumio" 7768 "volvooncall" 7769 "vulcan" 7770 "vultr" ··· 7794 "withings" 7795 "wiz" 7796 "wled" 7797 "wolflink" 7798 "workday" 7799 "worldclock"
··· 114 ]; 115 "airos" = 116 ps: with ps; [ 117 + airos 118 + ]; 119 "airq" = 120 ps: with ps; [ 121 aioairq ··· 2836 ]; 2837 "itach" = 2838 ps: with ps; [ 2839 + pyitachip2ir 2840 + ]; 2841 "itunes" = 2842 ps: with ps; [ 2843 ]; ··· 4466 ]; 4467 "pjlink" = 4468 ps: with ps; [ 4469 + pypjlink2 4470 + ]; 4471 "plaato" = 4472 ps: with ps; [ 4473 aiohasupervisor ··· 5820 ]; 5821 "tami4" = 5822 ps: with ps; [ 5823 + tami4edgeapi 5824 + ]; 5825 "tank_utility" = 5826 ps: with ps; [ 5827 tank-utility ··· 5983 ]; 5984 "thingspeak" = 5985 ps: with ps; [ 5986 + thingspeak 5987 + ]; 5988 "thinkingcleaner" = 5989 ps: with ps; [ 5990 ]; # missing inputs: pythinkingcleaner ··· 6435 ]; 6436 "volvo" = 6437 ps: with ps; [ 6438 + volvocarsapi 6439 + ]; 6440 "volvooncall" = 6441 ps: with ps; [ 6442 volvooncall ··· 6580 ]; 6581 "wmspro" = 6582 ps: with ps; [ 6583 + pywmspro 6584 + ]; 6585 "wolflink" = 6586 ps: with ps; [ 6587 wolf-comm ··· 6874 "airgradient" 6875 "airly" 6876 "airnow" 6877 + "airos" 6878 "airq" 6879 "airthings" 6880 "airthings_ble" ··· 7487 "pi_hole" 7488 "picnic" 7489 "ping" 7490 + "pjlink" 7491 "plaato" 7492 "plant" 7493 "playstation_network" ··· 7680 "tag" 7681 "tailscale" 7682 "tailwind" 7683 + "tami4" 7684 "tankerkoenig" 7685 "tasmota" 7686 "tautulli" ··· 7775 "voicerss" 7776 "voip" 7777 "volumio" 7778 + "volvo" 7779 "volvooncall" 7780 "vulcan" 7781 "vultr" ··· 7805 "withings" 7806 "wiz" 7807 "wled" 7808 + "wmspro" 7809 "wolflink" 7810 "workday" 7811 "worldclock"
+3 -3
pkgs/servers/home-assistant/custom-components/fellow/package.nix
··· 10 buildHomeAssistantComponent { 11 owner = "NewsGuyTor"; 12 domain = "fellow"; 13 - version = "0.3.2"; 14 15 src = fetchFromGitHub { 16 owner = "NewsGuyTor"; 17 repo = "FellowAiden-HomeAssistant"; 18 - rev = "2268880c7727b1d2e488dcebbdc5b2675d664ddf"; 19 - hash = "sha256-Wg6EFUQNhlK2GQjC90c5lA3b/y40LhXdInba/iTtUWc="; 20 }; 21 22 passthru.updateScript = unstableGitUpdater { };
··· 10 buildHomeAssistantComponent { 11 owner = "NewsGuyTor"; 12 domain = "fellow"; 13 + version = "0-unstable-2025-08-06"; 14 15 src = fetchFromGitHub { 16 owner = "NewsGuyTor"; 17 repo = "FellowAiden-HomeAssistant"; 18 + rev = "bb0f3042e974a149a3597d06312e6be9b8d265ff"; 19 + hash = "sha256-cplIiFt0CkeOXjypvG0MR/t7PWzeaa2G6uScWSLbEpo="; 20 }; 21 22 passthru.updateScript = unstableGitUpdater { };
+3 -3
pkgs/servers/monitoring/prometheus/redis-exporter.nix
··· 10 11 buildGoModule rec { 12 pname = "redis_exporter"; 13 - version = "1.74.0"; 14 15 src = fetchFromGitHub { 16 owner = "oliver006"; 17 repo = "redis_exporter"; 18 rev = "v${version}"; 19 - sha256 = "sha256-TPMbRyz476ylo6OEYYtLQCNL01dLShnJu0ncVgzL5kY="; 20 }; 21 22 - vendorHash = "sha256-q/RMdGFwZuFnjE0txb7ShhHlxLpLNF5S6KmmAKKYnaE="; 23 24 ldflags = [ 25 "-X main.BuildVersion=${version}"
··· 10 11 buildGoModule rec { 12 pname = "redis_exporter"; 13 + version = "1.75.0"; 14 15 src = fetchFromGitHub { 16 owner = "oliver006"; 17 repo = "redis_exporter"; 18 rev = "v${version}"; 19 + sha256 = "sha256-Z74AB3loT6KJgJBXGh3q1v49ro0gXPvIwd3URRikUa0="; 20 }; 21 22 + vendorHash = "sha256-y1j7s8R8pd3sp9yOlG2aopQ+GNO2Z7OCO1a9i9L6KM4="; 23 24 ldflags = [ 25 "-X main.BuildVersion=${version}"
+2 -2
pkgs/servers/sql/postgresql/ext/pg_net.nix
··· 8 9 postgresqlBuildExtension (finalAttrs: { 10 pname = "pg_net"; 11 - version = "0.19.4"; 12 13 src = fetchFromGitHub { 14 owner = "supabase"; 15 repo = "pg_net"; 16 tag = "v${finalAttrs.version}"; 17 - hash = "sha256-uHsfRQ5RKhTvqokF94s/RzTQ23BRTBV+yyIW41Djjgo="; 18 }; 19 20 buildInputs = [ curl ];
··· 8 9 postgresqlBuildExtension (finalAttrs: { 10 pname = "pg_net"; 11 + version = "0.19.5"; 12 13 src = fetchFromGitHub { 14 owner = "supabase"; 15 repo = "pg_net"; 16 tag = "v${finalAttrs.version}"; 17 + hash = "sha256-Cpi2iASi1QJoED0Qs1dANqg/BNZTsz5S+pw8iYyW03Y="; 18 }; 19 20 buildInputs = [ curl ];
+3 -3
pkgs/servers/sql/postgresql/ext/timescaledb.nix
··· 13 14 postgresqlBuildExtension (finalAttrs: { 15 pname = "timescaledb${lib.optionalString (!enableUnfree) "-apache"}"; 16 - version = "2.21.1"; 17 18 src = fetchFromGitHub { 19 owner = "timescale"; 20 repo = "timescaledb"; 21 tag = finalAttrs.version; 22 - hash = "sha256-oZaEUz6g/8oVdVyPCkAE0quzYBxO911MZcgd8rFFA3c="; 23 }; 24 25 nativeBuildInputs = [ cmake ]; ··· 106 || 107 # PostgreSQL 18 support issue upstream: https://github.com/timescale/timescaledb/issues/8233 108 # Check after next package update. 109 - lib.warnIf (finalAttrs.version != "2.21.1") "Is postgresql18Packages.timescaledb still broken?" ( 110 lib.versionAtLeast postgresql.version "18" 111 ); 112 };
··· 13 14 postgresqlBuildExtension (finalAttrs: { 15 pname = "timescaledb${lib.optionalString (!enableUnfree) "-apache"}"; 16 + version = "2.21.2"; 17 18 src = fetchFromGitHub { 19 owner = "timescale"; 20 repo = "timescaledb"; 21 tag = finalAttrs.version; 22 + hash = "sha256-pNF75Wh8WMXqxjU19KBiH/jYzT/4uBYuUMH1vRilU94="; 23 }; 24 25 nativeBuildInputs = [ cmake ]; ··· 106 || 107 # PostgreSQL 18 support issue upstream: https://github.com/timescale/timescaledb/issues/8233 108 # Check after next package update. 109 + lib.warnIf (finalAttrs.version != "2.21.2") "Is postgresql18Packages.timescaledb still broken?" ( 110 lib.versionAtLeast postgresql.version "18" 111 ); 112 };
+2 -2
pkgs/tools/security/pinentry/default.nix
··· 67 in 68 stdenv.mkDerivation rec { 69 pname = "pinentry-${pinentryExtraPname}"; 70 - version = "1.3.1"; 71 72 src = fetchurl { 73 url = "mirror://gnupg/pinentry/pinentry-${version}.tar.bz2"; 74 - hash = "sha256-vHLuJ8cjkAerGJbDwvrlOwduLJvSSD3CdpoWkCvOjAQ="; 75 }; 76 77 nativeBuildInputs = [
··· 67 in 68 stdenv.mkDerivation rec { 69 pname = "pinentry-${pinentryExtraPname}"; 70 + version = "1.3.2"; 71 72 src = fetchurl { 73 url = "mirror://gnupg/pinentry/pinentry-${version}.tar.bz2"; 74 + hash = "sha256-jphu2IVhtNpunv4MVPpMqJIwNcmSZN8LBGRJfF+5Tp4="; 75 }; 76 77 nativeBuildInputs = [
+16
pkgs/top-level/python-packages.nix
··· 554 555 airly = callPackage ../development/python-modules/airly { }; 556 557 airportsdata = callPackage ../development/python-modules/airportsdata { }; 558 559 airthings-ble = callPackage ../development/python-modules/airthings-ble { }; ··· 13032 13033 pyisy = callPackage ../development/python-modules/pyisy { }; 13034 13035 pyituran = callPackage ../development/python-modules/pyituran { }; 13036 13037 pyixapi = callPackage ../development/python-modules/pyixapi { }; ··· 13507 13508 pypass = callPackage ../development/python-modules/pypass { }; 13509 13510 pypblib = callPackage ../development/python-modules/pypblib { }; 13511 13512 pypca = callPackage ../development/python-modules/pypca { }; ··· 13548 pypiserver = callPackage ../development/python-modules/pypiserver { }; 13549 13550 pypitoken = callPackage ../development/python-modules/pypitoken { }; 13551 13552 pyplaato = callPackage ../development/python-modules/pyplaato { }; 13553 ··· 15150 15151 pywlroots = callPackage ../development/python-modules/pywlroots { wlroots = pkgs.wlroots_0_17; }; 15152 15153 pyworld = callPackage ../development/python-modules/pyworld { }; 15154 15155 pyws66i = callPackage ../development/python-modules/pyws66i { }; ··· 17668 17669 takethetime = callPackage ../development/python-modules/takethetime { }; 17670 17671 tank-utility = callPackage ../development/python-modules/tank-utility { }; 17672 17673 tappy = callPackage ../development/python-modules/tappy { }; ··· 17980 thespian = callPackage ../development/python-modules/thespian { }; 17981 17982 thinc = callPackage ../development/python-modules/thinc { }; 17983 17984 thinqconnect = callPackage ../development/python-modules/thinqconnect { }; 17985 ··· 19443 voluptuous-serialize = callPackage ../development/python-modules/voluptuous-serialize { }; 19444 19445 voluptuous-stubs = callPackage ../development/python-modules/voluptuous-stubs { }; 19446 19447 volvooncall = callPackage ../development/python-modules/volvooncall { }; 19448
··· 554 555 airly = callPackage ../development/python-modules/airly { }; 556 557 + airos = callPackage ../development/python-modules/airos { }; 558 + 559 airportsdata = callPackage ../development/python-modules/airportsdata { }; 560 561 airthings-ble = callPackage ../development/python-modules/airthings-ble { }; ··· 13034 13035 pyisy = callPackage ../development/python-modules/pyisy { }; 13036 13037 + pyitachip2ir = callPackage ../development/python-modules/pyitachip2ir { }; 13038 + 13039 pyituran = callPackage ../development/python-modules/pyituran { }; 13040 13041 pyixapi = callPackage ../development/python-modules/pyixapi { }; ··· 13511 13512 pypass = callPackage ../development/python-modules/pypass { }; 13513 13514 + pypasser = callPackage ../development/python-modules/pypasser { }; 13515 + 13516 pypblib = callPackage ../development/python-modules/pypblib { }; 13517 13518 pypca = callPackage ../development/python-modules/pypca { }; ··· 13554 pypiserver = callPackage ../development/python-modules/pypiserver { }; 13555 13556 pypitoken = callPackage ../development/python-modules/pypitoken { }; 13557 + 13558 + pypjlink2 = callPackage ../development/python-modules/pypjlink2 { }; 13559 13560 pyplaato = callPackage ../development/python-modules/pyplaato { }; 13561 ··· 15158 15159 pywlroots = callPackage ../development/python-modules/pywlroots { wlroots = pkgs.wlroots_0_17; }; 15160 15161 + pywmspro = callPackage ../development/python-modules/pywmspro { }; 15162 + 15163 pyworld = callPackage ../development/python-modules/pyworld { }; 15164 15165 pyws66i = callPackage ../development/python-modules/pyws66i { }; ··· 17678 17679 takethetime = callPackage ../development/python-modules/takethetime { }; 17680 17681 + tami4edgeapi = callPackage ../development/python-modules/tami4edgeapi { }; 17682 + 17683 tank-utility = callPackage ../development/python-modules/tank-utility { }; 17684 17685 tappy = callPackage ../development/python-modules/tappy { }; ··· 17992 thespian = callPackage ../development/python-modules/thespian { }; 17993 17994 thinc = callPackage ../development/python-modules/thinc { }; 17995 + 17996 + thingspeak = callPackage ../development/python-modules/thingspeak { }; 17997 17998 thinqconnect = callPackage ../development/python-modules/thinqconnect { }; 17999 ··· 19457 voluptuous-serialize = callPackage ../development/python-modules/voluptuous-serialize { }; 19458 19459 voluptuous-stubs = callPackage ../development/python-modules/voluptuous-stubs { }; 19460 + 19461 + volvocarsapi = callPackage ../development/python-modules/volvocarsapi { }; 19462 19463 volvooncall = callPackage ../development/python-modules/volvooncall { }; 19464