lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
85731cde 19cb4d51

+391 -311
+2 -2
nixos/modules/image/amend-repart-definitions.py
··· 53 53 54 54 source = Path(line.strip()) 55 55 target = str(source.relative_to("/nix/store/")) 56 - target = f":{target}" if strip_nix_store_prefix else "" 56 + target = f":/{target}" if strip_nix_store_prefix else "" 57 57 58 58 copy_files_lines.append(f"CopyFiles={source}{target}\n") 59 59 ··· 102 102 add_contents_to_definition(definition, contents) 103 103 104 104 closure = config.get("closure") 105 - strip_nix_store_prefix = config.get("stripStorePaths") 105 + strip_nix_store_prefix = config.get("stripNixStorePrefix") 106 106 add_closure_to_definition(definition, closure, strip_nix_store_prefix) 107 107 108 108 print(target_dir.absolute())
+32
pkgs/applications/editors/vscode/extensions/default.nix
··· 2412 2412 }; 2413 2413 }; 2414 2414 2415 + ms-python.black-formatter = buildVscodeMarketplaceExtension { 2416 + mktplcRef = { 2417 + name = "black-formatter"; 2418 + publisher = "ms-python"; 2419 + version = "2023.4.1"; 2420 + sha256 = "sha256-IJaLke0WF1rlKTiuwJHAXDQB1SS39AoQhc4iyqqlTyY="; 2421 + }; 2422 + meta = with lib; { 2423 + description = "Formatter extension for Visual Studio Code using black"; 2424 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=ms-python.black-formatter"; 2425 + homepage = "https://github.com/microsoft/vscode-black-formatter"; 2426 + license = licenses.mit; 2427 + maintainers = with maintainers; [ sikmir ]; 2428 + }; 2429 + }; 2430 + 2431 + ms-python.isort = buildVscodeMarketplaceExtension { 2432 + mktplcRef = { 2433 + name = "isort"; 2434 + publisher = "ms-python"; 2435 + version = "2023.10.1"; 2436 + sha256 = "sha256-NRsS+mp0pIhGZiqxAMXNZ7SwLno9Q8pj+RS1WB92HzU="; 2437 + }; 2438 + meta = with lib; { 2439 + description = "Import sorting extension for Visual Studio Code using isort"; 2440 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=ms-python.isort"; 2441 + homepage = "https://github.com/microsoft/vscode-isort"; 2442 + license = licenses.mit; 2443 + maintainers = with maintainers; [ sikmir ]; 2444 + }; 2445 + }; 2446 + 2415 2447 ms-python.python = callPackage ./ms-python.python { }; 2416 2448 2417 2449 ms-python.vscode-pylance = buildVscodeMarketplaceExtension {
+1 -1
pkgs/applications/emulators/yuzu/generic.nix
··· 110 110 # This changes `ir/opt` to `ir/var/empty` in `externals/dynarmic/src/dynarmic/CMakeLists.txt` 111 111 # making the build fail, as that path does not exist 112 112 dontFixCmake = true; 113 - patches = [./vulkan_version.patch]; 113 + 114 114 cmakeFlags = [ 115 115 # actually has a noticeable performance impact 116 116 "-DYUZU_ENABLE_LTO=ON"
-13
pkgs/applications/emulators/yuzu/vulkan_version.patch
··· 1 - Yuzu requires a version of Vulkan that has not yet been released as a stable Vulkan SDK. In case this patch fails, check which version Yuzu is currently using and verify that it still works with the version shipped in Nixpkgs. 2 - 3 - --- a/CMakeLists.txt 4 - +++ b/CMakeLists.txt 5 - @@ -314,7 +314,7 @@ 6 - find_package(zstd 1.5 REQUIRED) 7 - 8 - if (NOT YUZU_USE_EXTERNAL_VULKAN_HEADERS) 9 - - find_package(Vulkan 1.3.256 REQUIRED) 10 - + find_package(Vulkan 1.3.250 REQUIRED) 11 - endif() 12 - 13 - if (ENABLE_LIBUSB)
+3 -3
pkgs/applications/networking/browsers/vivaldi/default.nix
··· 23 23 vivaldiName = if isSnapshot then "vivaldi-snapshot" else "vivaldi"; 24 24 in stdenv.mkDerivation rec { 25 25 pname = "vivaldi"; 26 - version = "6.1.3035.204"; 26 + version = "6.1.3035.302"; 27 27 28 28 suffix = { 29 29 aarch64-linux = "arm64"; ··· 33 33 src = fetchurl { 34 34 url = "https://downloads.vivaldi.com/${branch}/vivaldi-${branch}_${version}-1_${suffix}.deb"; 35 35 hash = { 36 - aarch64-linux = "sha256-i2eIm4AF7avjy3KSUvoOOKWw7Q+BatozGpy/yyX4Esg="; 37 - x86_64-linux = "sha256-TLuTYXp6EdQDBWPM1TEXwhdxWWMSPKIi5fW+SGUVdRo="; 36 + aarch64-linux = "sha256-HWnHuLcJrV4yYt/l0iLl0N2p9v7r5RwQod1s0op52Z4="; 37 + x86_64-linux = "sha256-NPmiatlGK+8GJHwDXyOZ+J1PSN7Oj8sAKfm6r1usI1E="; 38 38 }.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 39 39 }; 40 40
-33
pkgs/applications/networking/cluster/kfctl/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, installShellFiles }: 2 - 3 - buildGoModule rec { 4 - pname = "kfctl"; 5 - version = "1.2.0"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "kubeflow"; 9 - repo = pname; 10 - rev = "v${version}"; 11 - sha256 = "sha256-FY7o4QULobLY1djfcc2l6awE/v2stN7cc2lffMkjoPc="; 12 - }; 13 - 14 - vendorSha256 = null; #vendorSha256 = ""; 15 - 16 - subPackages = [ "cmd/kfctl" ]; 17 - 18 - nativeBuildInputs = [ installShellFiles ]; 19 - 20 - postInstall = '' 21 - installShellCompletion --cmd eksctl \ 22 - --bash <($out/bin/kfctl completion bash) \ 23 - --zsh <($out/bin/kfctl completion zsh) 24 - ''; 25 - 26 - meta = with lib; { 27 - description = "A CLI for deploying and managing Kubeflow"; 28 - homepage = "https://github.com/kubeflow/kfctl"; 29 - license = licenses.asl20; 30 - maintainers = with maintainers; [ mvnetbiz ]; 31 - broken = true; # vendor isn't reproducible with go > 1.17: nix-build -A $name.goModules --check 32 - }; 33 - }
+3 -3
pkgs/applications/networking/dnscontrol/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dnscontrol"; 5 - version = "4.1.1"; 5 + version = "4.2.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "StackExchange"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-gdR9Dfzvf/OR+SDFLzN5GMNyrkuqm6z7cF8QR/L+Bh8="; 11 + sha256 = "sha256-woiFCirM2psmwcKGgQngOJuYZDI2t81xkSzVi4svtXs="; 12 12 }; 13 13 14 - vendorHash = "sha256-DURAWzJDkI2Q/3d6FFx+EbMFkUr6evcbtXZzkh1HG1Y="; 14 + vendorHash = "sha256-3xT5WPBcEclXad8zBA+T7/M6fDmfMWljV8NuxvtvTsA="; 15 15 16 16 subPackages = [ "." ]; 17 17
+2 -2
pkgs/applications/networking/instant-messengers/signal-cli/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "signal-cli"; 5 - version = "0.11.11"; 5 + version = "0.12.0"; 6 6 7 7 # Building from source would be preferred, but is much more involved. 8 8 src = fetchurl { 9 9 url = "https://github.com/AsamK/signal-cli/releases/download/v${version}/signal-cli-${version}-Linux.tar.gz"; 10 - hash = "sha256-IKKWJBe6A3TVWIRTDyWbfRYMwgRNhSqSJK0ZRZNCVkA="; 10 + hash = "sha256-PMLc0o+zwtdtY2p5z5xwdcawNKddenr64vmC+dxrw+Y="; 11 11 }; 12 12 13 13 buildInputs = lib.optionals stdenv.isLinux [ libmatthew_java dbus dbus_java ];
+3 -3
pkgs/applications/networking/instant-messengers/twitch-tui/default.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "twitch-tui"; 12 - version = "2.4.1"; 12 + version = "2.5.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "Xithrius"; 16 16 repo = pname; 17 17 rev = "refs/tags/v${version}"; 18 - hash = "sha256-+dKS9lp5M8vh0V4VGyWAozozdsyCPpCZR4CQK5s51Ds="; 18 + hash = "sha256-oqsLqmyLrvb8u9cj68OemUfunbP98/BZjmoGl1Mctrk="; 19 19 }; 20 20 21 - cargoHash = "sha256-CzrOsLUTfZ2uEIj/AHFmdfZniwlQ6fIkL2pbBHF8YkU="; 21 + cargoHash = "sha256-DEHMF6sTH3BF8lqOV5G4F3+Tsafrhzr0YLqSgV3gq9I="; 22 22 23 23 nativeBuildInputs = [ 24 24 pkg-config
+2 -2
pkgs/applications/networking/nextcloud-client/default.nix
··· 25 25 26 26 mkDerivation rec { 27 27 pname = "nextcloud-client"; 28 - version = "3.9.2"; 28 + version = "3.9.3"; 29 29 30 30 outputs = [ "out" "dev" ]; 31 31 ··· 33 33 owner = "nextcloud"; 34 34 repo = "desktop"; 35 35 rev = "v${version}"; 36 - sha256 = "sha256-QtZy5ccr55u8bQVBCFRNu/HJiYtNJX9BgtSV700QX0g="; 36 + sha256 = "sha256-9DfQZ3AFyiUKwt8IqAgjQlQ2XJtwkLEtPM5+VH+x/6c="; 37 37 }; 38 38 39 39 patches = [
+11
pkgs/applications/networking/sniffers/sngrep/default.nix
··· 3 3 , autoconf 4 4 , automake 5 5 , fetchFromGitHub 6 + , fetchpatch 6 7 , libpcap 7 8 , ncurses 8 9 , openssl ··· 20 21 sha256 = "sha256-gFba2wOU4GwpOZTo5A2QpBgnC6OgDJEeyaPGHbA+7tA="; 21 22 }; 22 23 24 + patches = [ 25 + (fetchpatch { 26 + name = "CVE-2023-36192.patch"; 27 + url = "https://github.com/irontec/sngrep/commit/ad1daf15c8387bfbb48097c25197bf330d2d98fc.patch"; 28 + hash = "sha256-g8fxvxi3d7jmZEKTbxqw29hJbm/ShsKKxstsOUGxTug="; 29 + }) 30 + ]; 31 + 23 32 nativeBuildInputs = [ 24 33 autoconf 25 34 automake ··· 43 52 preConfigure = '' 44 53 ./bootstrap.sh 45 54 ''; 55 + 56 + doCheck = true; 46 57 47 58 meta = with lib; { 48 59 description = "A tool for displaying SIP calls message flows from terminal";
+2 -2
pkgs/applications/radio/qradiolink/default.nix
··· 23 23 24 24 gnuradio3_8.pkgs.mkDerivation rec { 25 25 pname = "qradiolink"; 26 - version = "0.8.9-1"; 26 + version = "0.8.10-1"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "qradiolink"; 30 30 repo = "qradiolink"; 31 31 rev = version; 32 - sha256 = "sha256-yY9sdLFaG0fX/4obImxVAyJk13RklYjX99Ch9hgzTe8="; 32 + sha256 = "sha256-DOf5Ct8a9EGpO3YLef+Hw87m5tCVqD30weVOeis9agI="; 33 33 }; 34 34 35 35 preBuild = ''
+2 -2
pkgs/applications/version-management/git-privacy/default.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication rec { 8 8 pname = "git-privacy"; 9 - version = "2.1.0"; 9 + version = "2.3.0"; 10 10 format = "setuptools"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "EMPRI-DEVOPS"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "0hfy43fip1l81672xfwqrz1jryzkjy7h9f2lyikxgibibil0p444"; 16 + hash = "sha256-b2RkRL8/mZwqc3xCs+oltzualhQtp/7F9POlLlT3UUU="; 17 17 }; 18 18 19 19 propagatedBuildInputs = with python3.pkgs; [
+2 -2
pkgs/applications/virtualization/crun/default.nix
··· 39 39 in 40 40 stdenv.mkDerivation rec { 41 41 pname = "crun"; 42 - version = "1.8.6"; 42 + version = "1.8.7"; 43 43 44 44 src = fetchFromGitHub { 45 45 owner = "containers"; 46 46 repo = pname; 47 47 rev = version; 48 - hash = "sha256-qPbJ8h/s4E7EmNlgBdrNZ0AW0D/N7PkK57C1cXjuM9U="; 48 + hash = "sha256-+EHkbAltoYzlDIgMbH3ofhpBLJhv5lq72u7Hh7cpU/M="; 49 49 fetchSubmodules = true; 50 50 }; 51 51
+6 -13
pkgs/development/compilers/glslang/default.nix
··· 1 1 { lib, stdenv 2 2 , fetchFromGitHub 3 - , fetchpatch 4 3 , bison 5 4 , cmake 6 5 , jq ··· 10 9 }: 11 10 stdenv.mkDerivation rec { 12 11 pname = "glslang"; 13 - version = "12.2.0"; 12 + version = "12.3.1"; 14 13 15 14 src = fetchFromGitHub { 16 15 owner = "KhronosGroup"; 17 16 repo = "glslang"; 18 17 rev = version; 19 - hash = "sha256-2i6DZA42b0s1ul6VDhjPi9lpSYvsRD8r9yiRoRfVoW0="; 18 + hash = "sha256-NP5ph598YSPbpzJJUR2r+EkqFmuItxgvOSDgDaN+Swg="; 20 19 }; 21 20 22 - patches = [ 23 - # Fix build on Darwin 24 - # FIXME: remove for next release 25 - (fetchpatch { 26 - url = "https://github.com/KhronosGroup/glslang/commit/6a7ec4be7b8a22ab16cea0f294b5973dbcdd637a.diff"; 27 - hash = "sha256-O1N62X6LZNRNHHz90TLJDbt6pDr28EI6IKMbMXcKBj8="; 28 - }) 29 - ]; 30 - 31 21 # These get set at all-packages, keep onto them for child drvs 32 22 passthru = { 33 23 spirv-tools = spirv-tools; ··· 48 38 49 39 # Fix the paths in .pc, even though it's unclear if these .pc are really useful. 50 40 postFixup = '' 51 - substituteInPlace "$out"/lib/pkgconfig/SPIRV-Tools{,-shared}.pc \ 41 + substituteInPlace $out/lib/pkgconfig/*.pc \ 52 42 --replace '=''${prefix}//' '=/' 43 + 44 + # add a symlink for backwards compatibility 45 + ln -s $out/bin/glslang $out/bin/glslangValidator 53 46 ''; 54 47 55 48 meta = with lib; {
+16 -4
pkgs/development/compilers/llvm/15/libcxx/default.nix
··· 2 2 , monorepoSrc, runCommand 3 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 - , libcxxabi, libcxxrt 5 + , libcxxabi, libcxxrt, libunwind 6 6 , enableShared ? !stdenv.hostPlatform.isStatic 7 7 8 8 # If headersOnly is true, the resulting package would only include the headers. ··· 62 62 nativeBuildInputs = [ cmake ninja python3 ] 63 63 ++ lib.optional stdenv.isDarwin fixDarwinDylibNames; 64 64 65 - buildInputs = lib.optionals (!headersOnly) [ cxxabi ]; 65 + buildInputs = 66 + lib.optionals (!headersOnly) [ cxxabi ] 67 + ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ libunwind ]; 66 68 67 69 cmakeFlags = let 68 70 # See: https://libcxx.llvm.org/BuildingLibcxx.html#cmdoption-arg-libcxx-cxx-abi-string ··· 75 77 "-DLIBCXX_CXX_ABI=${if headersOnly then "none" else libcxx_cxx_abi_opt}" 76 78 ] ++ lib.optional (!headersOnly && cxxabi.libName == "c++abi") "-DLIBCXX_CXX_ABI_INCLUDE_PATHS=${cxxabi.dev}/include/c++/v1" 77 79 ++ lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) "-DLIBCXX_HAS_MUSL_LIBC=1" 78 - ++ lib.optional (stdenv.hostPlatform.useLLVM or false) "-DLIBCXX_USE_COMPILER_RT=ON" 79 - ++ lib.optionals stdenv.hostPlatform.isWasm [ 80 + ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ 81 + "-DLIBCXX_USE_COMPILER_RT=ON" 82 + # (Backport fix from 16, which has LIBCXX_ADDITIONAL_LIBRARIES, but 15 83 + # does not appear to) 84 + # There's precedent for this in llvm-project/libcxx/cmake/caches. 85 + # In a monorepo build you might do the following in the libcxxabi build: 86 + # -DLLVM_ENABLE_PROJECTS=libcxxabi;libunwind 87 + # -DLIBCXXABI_STATICALLY_LINK_UNWINDER_IN_STATIC_LIBRARY=On 88 + # libcxx appears to require unwind and doesn't pull it in via other means. 89 + # "-DLIBCXX_ADDITIONAL_LIBRARIES=unwind" 90 + "-DCMAKE_SHARED_LINKER_FLAGS=-lunwind" 91 + ] ++ lib.optionals stdenv.hostPlatform.isWasm [ 80 92 "-DLIBCXX_ENABLE_THREADS=OFF" 81 93 "-DLIBCXX_ENABLE_FILESYSTEM=OFF" 82 94 "-DLIBCXX_ENABLE_EXCEPTIONS=OFF"
+7
pkgs/development/compilers/llvm/15/libcxxabi/default.nix
··· 68 68 ] ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ 69 69 "-DLLVM_ENABLE_LIBCXX=ON" 70 70 "-DLIBCXXABI_USE_LLVM_UNWINDER=ON" 71 + ] ++ lib.optionals ((stdenv.hostPlatform.useLLVM or false) || 72 + (stdenv.hostPlatform.isDarwin && enableShared)) [ 73 + # libcxxabi's CMake looks as though it treats -nostdlib++ as implying -nostdlib, 74 + # but that does not appear to be the case for example when building 75 + # pkgsLLVM.libcxxabi (which uses clangNoCompilerRtWithLibc). 76 + "-DCMAKE_EXE_LINKER_FLAGS=-nostdlib" 77 + "-DCMAKE_SHARED_LINKER_FLAGS=-nostdlib" 71 78 ] ++ lib.optionals stdenv.hostPlatform.isWasm [ 72 79 "-DLIBCXXABI_ENABLE_THREADS=OFF" 73 80 "-DLIBCXXABI_ENABLE_EXCEPTIONS=OFF"
+5
pkgs/development/compilers/llvm/15/libunwind/default.nix
··· 40 40 cd ../runtimes 41 41 ''; 42 42 43 + postInstall = lib.optionalString (enableShared && !stdenv.hostPlatform.isDarwin) '' 44 + # libcxxabi wants to link to libunwind_shared.so (?). 45 + ln -s $out/lib/libunwind.so $out/lib/libunwind_shared.so 46 + ''; 47 + 43 48 outputs = [ "out" "dev" ]; 44 49 45 50 nativeBuildInputs = [ cmake ninja python3 ];
+16 -3
pkgs/development/compilers/llvm/16/compiler-rt/default.nix
··· 32 32 ++ lib.optional stdenv.isDarwin xcbuild.xcrun; 33 33 buildInputs = lib.optional stdenv.hostPlatform.isDarwin libcxxabi; 34 34 35 - env.NIX_CFLAGS_COMPILE = toString [ 35 + env.NIX_CFLAGS_COMPILE = toString ([ 36 36 "-DSCUDO_DEFAULT_OPTIONS=DeleteSizeMismatch=0:DeallocationTypeMismatch=0" 37 - ]; 37 + ] ++ lib.optionals (!haveLibc) [ 38 + # The compiler got stricter about this, and there is a usellvm patch below 39 + # which patches out the assert include causing an implicit definition of 40 + # assert. It would be nicer to understand why compiler-rt thinks it should 41 + # be able to #include <assert.h> in the first place; perhaps it's in the 42 + # wrong, or perhaps there is a way to provide an assert.h. 43 + "-Wno-error=implicit-function-declaration" 44 + ]); 38 45 39 46 cmakeFlags = [ 40 47 "-DCOMPILER_RT_DEFAULT_TARGET_ONLY=ON" ··· 102 109 '' + lib.optionalString stdenv.isDarwin '' 103 110 substituteInPlace cmake/config-ix.cmake \ 104 111 --replace 'set(COMPILER_RT_HAS_TSAN TRUE)' 'set(COMPILER_RT_HAS_TSAN FALSE)' 105 - '' + lib.optionalString (useLLVM) '' 112 + '' + lib.optionalString (useLLVM && !haveLibc) '' 106 113 substituteInPlace lib/builtins/int_util.c \ 107 114 --replace "#include <stdlib.h>" "" 108 115 substituteInPlace lib/builtins/clear_cache.c \ ··· 117 124 '' + lib.optionalString (useLLVM) '' 118 125 ln -s $out/lib/*/clang_rt.crtbegin-*.o $out/lib/crtbegin.o 119 126 ln -s $out/lib/*/clang_rt.crtend-*.o $out/lib/crtend.o 127 + # Note the history of crt{begin,end}S in previous versions of llvm in nixpkg: 128 + # The presence of crtbegin_shared has been added and removed; it's possible 129 + # people have added/removed it to get it working on their platforms. 130 + # Try each in turn for now. 131 + ln -s $out/lib/*/clang_rt.crtbegin-*.o $out/lib/crtbeginS.o 132 + ln -s $out/lib/*/clang_rt.crtend-*.o $out/lib/crtendS.o 120 133 ln -s $out/lib/*/clang_rt.crtbegin_shared-*.o $out/lib/crtbeginS.o 121 134 ln -s $out/lib/*/clang_rt.crtend_shared-*.o $out/lib/crtendS.o 122 135 '' + lib.optionalString doFakeLibgcc ''
+8
pkgs/development/compilers/llvm/16/default.nix
··· 254 254 [ "-rtlib=compiler-rt" 255 255 "-Wno-unused-command-line-argument" 256 256 "-B${targetLlvmLibraries.compiler-rt}/lib" 257 + 258 + # Combat "__cxxabi_config.h not found". Maybe this could be fixed by 259 + # copying these headers into libcxx? Note that building libcxx 260 + # outside of monorepo isn't supported anymore, might be related to 261 + # https://github.com/llvm/llvm-project/issues/55632 262 + # ("16.0.3 libcxx, libcxxabi: circular build dependencies") 263 + # Looks like the machinery changed in https://reviews.llvm.org/D120727. 264 + "-I${lib.getDev targetLlvmLibraries.libcxx.cxxabi}/include/c++/v1" 257 265 ] 258 266 ++ lib.optional (!stdenv.targetPlatform.isWasm) "--unwindlib=libunwind" 259 267 ++ lib.optional
+13 -6
pkgs/development/compilers/llvm/16/libcxx/default.nix
··· 2 2 , monorepoSrc, runCommand 3 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 - , libcxxabi, libcxxrt 5 + , libcxxabi, libcxxrt, libunwind 6 6 , enableShared ? !stdenv.hostPlatform.isStatic 7 7 8 8 # If headersOnly is true, the resulting package would only include the headers. ··· 47 47 48 48 patches = [ 49 49 ./gnu-install-dirs.patch 50 - ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 51 - ../../libcxx-0001-musl-hacks.patch 52 50 ]; 53 51 54 52 postPatch = '' ··· 62 60 nativeBuildInputs = [ cmake ninja python3 ] 63 61 ++ lib.optional stdenv.isDarwin fixDarwinDylibNames; 64 62 65 - buildInputs = lib.optionals (!headersOnly) [ cxxabi ]; 63 + buildInputs = 64 + lib.optionals (!headersOnly) [ cxxabi ] 65 + ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ libunwind ]; 66 66 67 67 cmakeFlags = let 68 68 # See: https://libcxx.llvm.org/BuildingLibcxx.html#cmdoption-arg-libcxx-cxx-abi-string ··· 75 75 "-DLIBCXX_CXX_ABI=${if headersOnly then "none" else libcxx_cxx_abi_opt}" 76 76 ] ++ lib.optional (!headersOnly && cxxabi.libName == "c++abi") "-DLIBCXX_CXX_ABI_INCLUDE_PATHS=${cxxabi.dev}/include/c++/v1" 77 77 ++ lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) "-DLIBCXX_HAS_MUSL_LIBC=1" 78 - ++ lib.optional (stdenv.hostPlatform.useLLVM or false) "-DLIBCXX_USE_COMPILER_RT=ON" 79 - ++ lib.optionals stdenv.hostPlatform.isWasm [ 78 + ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ 79 + "-DLIBCXX_USE_COMPILER_RT=ON" 80 + # There's precedent for this in llvm-project/libcxx/cmake/caches. 81 + # In a monorepo build you might do the following in the libcxxabi build: 82 + # -DLLVM_ENABLE_PROJECTS=libcxxabi;libunwinder 83 + # -DLIBCXXABI_STATICALLY_LINK_UNWINDER_IN_STATIC_LIBRARY=On 84 + # libcxx appears to require unwind and doesn't pull it in via other means. 85 + "-DLIBCXX_ADDITIONAL_LIBRARIES=unwind" 86 + ] ++ lib.optionals stdenv.hostPlatform.isWasm [ 80 87 "-DLIBCXX_ENABLE_THREADS=OFF" 81 88 "-DLIBCXX_ENABLE_FILESYSTEM=OFF" 82 89 "-DLIBCXX_ENABLE_EXCEPTIONS=OFF"
+7
pkgs/development/compilers/llvm/16/libcxxabi/default.nix
··· 68 68 ] ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ 69 69 "-DLLVM_ENABLE_LIBCXX=ON" 70 70 "-DLIBCXXABI_USE_LLVM_UNWINDER=ON" 71 + ] ++ lib.optionals ((stdenv.hostPlatform.useLLVM or false) || 72 + (stdenv.hostPlatform.isDarwin && enableShared)) [ 73 + # libcxxabi's CMake looks as though it treats -nostdlib++ as implying -nostdlib, 74 + # but that does not appear to be the case for example when building 75 + # pkgsLLVM.libcxxabi (which uses clangNoCompilerRtWithLibc). 76 + "-DCMAKE_EXE_LINKER_FLAGS=-nostdlib" 77 + "-DCMAKE_SHARED_LINKER_FLAGS=-nostdlib" 71 78 ] ++ lib.optionals stdenv.hostPlatform.isWasm [ 72 79 "-DLIBCXXABI_ENABLE_THREADS=OFF" 73 80 "-DLIBCXXABI_ENABLE_EXCEPTIONS=OFF"
+5
pkgs/development/compilers/llvm/16/libunwind/default.nix
··· 40 40 cd ../runtimes 41 41 ''; 42 42 43 + postInstall = lib.optionalString (enableShared && !stdenv.hostPlatform.isDarwin) '' 44 + # libcxxabi wants to link to libunwind_shared.so (?). 45 + ln -s $out/lib/libunwind.so $out/lib/libunwind_shared.so 46 + ''; 47 + 43 48 outputs = [ "out" "dev" ]; 44 49 45 50 nativeBuildInputs = [ cmake ninja python3 ];
+13
pkgs/development/compilers/llvm/git/default.nix
··· 313 313 # what stdenv we use here, as long as CMake is happy. 314 314 cxx-headers = callPackage ./libcxx { 315 315 inherit llvm_meta; 316 + # Note that if we use the regular stdenv here we'll get cycle errors 317 + # when attempting to use this compiler in the stdenv. 318 + # 319 + # The final stdenv pulls `cxx-headers` from the package set where 320 + # hostPlatform *is* the target platform which means that `stdenv` at 321 + # that point attempts to use this toolchain. 322 + # 323 + # So, we use `stdenv_` (the stdenv containing `clang` from this package 324 + # set, defined below) to sidestep this issue. 325 + # 326 + # Because we only use `cxx-headers` in `libcxxabi` (which depends on the 327 + # clang stdenv _anyways_), this is okay. 328 + stdenv = stdenv_; 316 329 headersOnly = true; 317 330 }; 318 331
+17 -4
pkgs/development/compilers/llvm/git/libcxx/default.nix
··· 2 2 , monorepoSrc, runCommand 3 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 - , libcxxabi, libcxxrt 5 + , libcxxabi, libcxxrt, libunwind 6 6 , enableShared ? !stdenv.hostPlatform.isStatic 7 7 8 8 # If headersOnly is true, the resulting package would only include the headers. ··· 62 62 nativeBuildInputs = [ cmake ninja python3 ] 63 63 ++ lib.optional stdenv.isDarwin fixDarwinDylibNames; 64 64 65 - buildInputs = lib.optionals (!headersOnly) [ cxxabi ]; 65 + buildInputs = 66 + lib.optionals (!headersOnly) [ cxxabi ] 67 + ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ libunwind ]; 68 + 66 69 67 70 cmakeFlags = let 68 71 # See: https://libcxx.llvm.org/BuildingLibcxx.html#cmdoption-arg-libcxx-cxx-abi-string ··· 75 78 "-DLIBCXX_CXX_ABI=${if headersOnly then "none" else libcxx_cxx_abi_opt}" 76 79 ] ++ lib.optional (!headersOnly && cxxabi.libName == "c++abi") "-DLIBCXX_CXX_ABI_INCLUDE_PATHS=${cxxabi.dev}/include/c++/v1" 77 80 ++ lib.optional (stdenv.hostPlatform.isMusl || stdenv.hostPlatform.isWasi) "-DLIBCXX_HAS_MUSL_LIBC=1" 78 - ++ lib.optional (stdenv.hostPlatform.useLLVM or false) "-DLIBCXX_USE_COMPILER_RT=ON" 79 - ++ lib.optionals stdenv.hostPlatform.isWasm [ 81 + ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ 82 + "-DLIBCXX_USE_COMPILER_RT=ON" 83 + # (Backport fix from 16, which has LIBCXX_ADDITIONAL_LIBRARIES, but 15 84 + # does not appear to) 85 + # There's precedent for this in llvm-project/libcxx/cmake/caches. 86 + # In a monorepo build you might do the following in the libcxxabi build: 87 + # -DLLVM_ENABLE_PROJECTS=libcxxabi;libunwinder 88 + # -DLIBCXXABI_STATICALLY_LINK_UNWINDER_IN_STATIC_LIBRARY=On 89 + # libcxx appears to require unwind and doesn't pull it in via other means. 90 + # "-DLIBCXX_ADDITIONAL_LIBRARIES=unwind" 91 + "-DCMAKE_SHARED_LINKER_FLAGS=-lunwind" 92 + ] ++ lib.optionals stdenv.hostPlatform.isWasm [ 80 93 "-DLIBCXX_ENABLE_THREADS=OFF" 81 94 "-DLIBCXX_ENABLE_FILESYSTEM=OFF" 82 95 "-DLIBCXX_ENABLE_EXCEPTIONS=OFF"
+7
pkgs/development/compilers/llvm/git/libcxxabi/default.nix
··· 68 68 ] ++ lib.optionals (stdenv.hostPlatform.useLLVM or false) [ 69 69 "-DLLVM_ENABLE_LIBCXX=ON" 70 70 "-DLIBCXXABI_USE_LLVM_UNWINDER=ON" 71 + ] ++ lib.optionals ((stdenv.hostPlatform.useLLVM or false) || 72 + (stdenv.hostPlatform.isDarwin && enableShared)) [ 73 + # libcxxabi's CMake looks as though it treats -nostdlib++ as implying -nostdlib, 74 + # but that does not appear to be the case for example when building 75 + # pkgsLLVM.libcxxabi (which uses clangNoCompilerRtWithLibc). 76 + "-DCMAKE_EXE_LINKER_FLAGS=-nostdlib" 77 + "-DCMAKE_SHARED_LINKER_FLAGS=-nostdlib" 71 78 ] ++ lib.optionals stdenv.hostPlatform.isWasm [ 72 79 "-DLIBCXXABI_ENABLE_THREADS=OFF" 73 80 "-DLIBCXXABI_ENABLE_EXCEPTIONS=OFF"
+5
pkgs/development/compilers/llvm/git/libunwind/default.nix
··· 40 40 cd ../runtimes 41 41 ''; 42 42 43 + postInstall = lib.optionalString (enableShared && !stdenv.hostPlatform.isDarwin) '' 44 + # libcxxabi wants to link to libunwind_shared.so (?). 45 + ln -s $out/lib/libunwind.so $out/lib/libunwind_shared.so 46 + ''; 47 + 43 48 outputs = [ "out" "dev" ]; 44 49 45 50 nativeBuildInputs = [ cmake ninja python3 ];
+2 -2
pkgs/development/compilers/swi-prolog/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, jdk, gmp, readline, openssl, unixODBC, zlib 2 - , libarchive, db, pcre, libedit, libossp_uuid, libxcrypt,libXpm 2 + , libarchive, db, pcre2, libedit, libossp_uuid, libxcrypt,libXpm 3 3 , libSM, libXt, freetype, pkg-config, fontconfig 4 4 , cmake, libyaml, Security 5 5 , libjpeg, libX11, libXext, libXft, libXinerama ··· 59 59 nativeBuildInputs = [ cmake pkg-config ]; 60 60 61 61 buildInputs = [ gmp readline openssl 62 - libarchive libyaml db pcre libedit libossp_uuid libxcrypt 62 + libarchive libyaml db pcre2 libedit libossp_uuid libxcrypt 63 63 zlib ] 64 64 ++ lib.optionals (withGui && !stdenv.isDarwin) [ libXpm libX11 libXext libXft libXinerama libjpeg ] 65 65 ++ extraLibraries
+2 -2
pkgs/development/libraries/grantlee/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "grantlee"; 5 - version = "5.2.0"; 5 + version = "5.3.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "steveire"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-mAbgzdBdIW1wOTQNBePQuyTgkKdpn1c+zR3H7mXHvgk="; 11 + hash = "sha256-enP7b6A7Ndew2LJH569fN3IgPu2/KL5rCmU/jmKb9sY="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake wrapQtAppsHook ];
+3 -3
pkgs/development/libraries/pipewire/default.nix
··· 75 75 76 76 self = stdenv.mkDerivation rec { 77 77 pname = "pipewire"; 78 - version = "0.3.77"; 78 + version = "0.3.78"; 79 79 80 80 outputs = [ 81 81 "out" ··· 93 93 owner = "pipewire"; 94 94 repo = "pipewire"; 95 95 rev = version; 96 - sha256 = "sha256-dRAo/GzWvXKVCGLM12YyTQmgXHEYn3QbOyaZKmlqTYY="; 96 + sha256 = "sha256-tiVuab8kugp9ZOKL/m8uZQps/pcrVihwB3rRf6SGuzc="; 97 97 }; 98 98 99 99 patches = [ ··· 221 221 moveToOutput "bin/pw-jack" "$jack" 222 222 ''; 223 223 224 - passthru.tests = nixosTests.installed-tests.pipewire; 224 + passthru.tests.installed-tests = nixosTests.installed-tests.pipewire; 225 225 226 226 meta = with lib; { 227 227 description = "Server and user space API to deal with multimedia pipelines";
+19 -21
pkgs/development/libraries/science/math/nccl/default.nix
··· 2 2 , backendStdenv 3 3 , fetchFromGitHub 4 4 , which 5 - , cudaPackages ? { } 6 - , addOpenGLRunpath 5 + , autoAddOpenGLRunpathHook 6 + , cuda_cccl 7 + , cuda_cudart 8 + , cuda_nvcc 9 + , cudaFlags 10 + , cudaVersion 7 11 }: 8 - 9 - with cudaPackages; 10 - 11 12 let 12 13 # Output looks like "-gencode=arch=compute_86,code=sm_86 -gencode=arch=compute_86,code=compute_86" 13 14 gencode = lib.concatStringsSep " " cudaFlags.gencode; 14 15 in 15 - backendStdenv.mkDerivation rec { 16 - name = "nccl-${version}-cuda-${cudaPackages.cudaMajorVersion}"; 16 + backendStdenv.mkDerivation (finalAttrs: { 17 + name = "nccl-${finalAttrs.version}-cuda-${cudaVersion}"; 17 18 version = "2.16.5-1"; 18 19 19 20 src = fetchFromGitHub { 20 21 owner = "NVIDIA"; 21 22 repo = "nccl"; 22 - rev = "v${version}"; 23 + rev = "v${finalAttrs.version}"; 23 24 hash = "sha256-JyhhYKSVIqUKIbC1rCJozPT1IrIyRLGrTjdPjJqsYaU="; 24 25 }; 25 26 ··· 27 28 28 29 nativeBuildInputs = [ 29 30 which 30 - addOpenGLRunpath 31 + autoAddOpenGLRunpathHook 31 32 cuda_nvcc 32 33 ]; 33 34 34 35 buildInputs = [ 35 36 cuda_cudart 36 - ] ++ lib.optionals (lib.versionAtLeast cudaVersion "12.0.0") [ 37 + ] 38 + # NOTE: CUDA versions in Nixpkgs only use a major and minor version. When we do comparisons 39 + # against other version, like below, it's important that we use the same format. Otherwise, 40 + # we'll get incorrect results. 41 + # For example, lib.versionAtLeast "12.0" "12.0.0" == false. 42 + ++ lib.optionals (lib.versionAtLeast cudaVersion "12.0") [ 37 43 cuda_cccl 38 44 ]; 39 45 ··· 46 52 47 53 makeFlags = [ 48 54 "CUDA_HOME=${cuda_nvcc}" 49 - "CUDA_LIB=${cuda_cudart}/lib64" 50 - "CUDA_INC=${cuda_cudart}/include" 55 + "CUDA_LIB=${lib.getLib cuda_cudart}/lib" 56 + "CUDA_INC=${lib.getDev cuda_cudart}/include" 51 57 "PREFIX=$(out)" 52 58 ]; 53 59 54 60 postFixup = '' 55 61 moveToOutput lib/libnccl_static.a $dev 56 - 57 - # Set RUNPATH so that libnvidia-ml in /run/opengl-driver(-32)/lib can be found. 58 - # See the explanation in addOpenGLRunpath. 59 - addOpenGLRunpath $out/lib/lib*.so 60 62 ''; 61 63 62 64 env.NIX_CFLAGS_COMPILE = toString [ "-Wno-unused-function" ]; 63 65 64 66 enableParallelBuilding = true; 65 67 66 - passthru = { 67 - inherit cudaPackages; 68 - }; 69 - 70 68 meta = with lib; { 71 69 description = "Multi-GPU and multi-node collective communication primitives for NVIDIA GPUs"; 72 70 homepage = "https://developer.nvidia.com/nccl"; ··· 74 72 platforms = [ "x86_64-linux" ]; 75 73 maintainers = with maintainers; [ mdaiter orivej ]; 76 74 }; 77 - } 75 + })
+2 -2
pkgs/development/libraries/spirv-headers/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "spirv-headers"; 5 - version = "1.3.250.0"; 5 + version = "1.3.261.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Headers"; 10 10 rev = "sdk-${version}"; 11 - hash = "sha256-5mVcbOAuzux/Yuo0NMwZRTsdQr46UxjrtMhT5mPHyCQ="; 11 + hash = "sha256-P/ZD53Xa4Fk9+N/bW5HhsfA+LjUnCbBsQDHvXesKu5M="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/vulkan-headers/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "vulkan-headers"; 4 - version = "1.3.254"; 4 + version = "1.3.261"; 5 5 6 6 nativeBuildInputs = [ cmake ]; 7 7 ··· 9 9 owner = "KhronosGroup"; 10 10 repo = "Vulkan-Headers"; 11 11 rev = "v${version}"; 12 - hash = "sha256-4erHZKx4jksAtyG8ZHtlVoEY3EqE4p2pEtcGHqv7G7A="; 12 + hash = "sha256-zKHew7SGUq1C3XGp/HrCle6KyqB4cziPcTYVqAr814s="; 13 13 }; 14 14 15 15 passthru.updateScript = ./update.sh;
+2 -1
pkgs/development/libraries/vulkan-headers/update.sh
··· 6 6 V_PACKAGES=( 7 7 "vulkan-headers" 8 8 "vulkan-loader" 9 - "spirv-tools" 10 9 "vulkan-validation-layers" 11 10 "vulkan-tools" 12 11 "vulkan-tools-lunarg" 13 12 "vulkan-extension-layer" 13 + "vulkan-utility-libraries" 14 14 ) 15 15 16 16 SDK_PACKAGES=( 17 17 "spirv-headers" 18 18 "spirv-cross" 19 + "spirv-tools" 19 20 ) 20 21 21 22 nix-update glslang --version-regex '(\d+\.\d+\.\d+)' --commit
+2 -2
pkgs/development/libraries/vulkan-loader/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "vulkan-loader"; 6 - version = "1.3.254"; 6 + version = "1.3.261"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "KhronosGroup"; 10 10 repo = "Vulkan-Loader"; 11 11 rev = "v${version}"; 12 - hash = "sha256-bxmDhKDM+OOTsSJEoGXlWPZciBcwevv0e4gHweH46JU="; 12 + hash = "sha256-5QCVHfvjE98EnL2Dr7g9fdrJAg+np1Q6hgqcuZCWReQ="; 13 13 }; 14 14 15 15 patches = [ ./fix-pkgconfig.patch ];
+24
pkgs/development/libraries/vulkan-utility-libraries/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, python3, vulkan-headers }: 2 + 3 + stdenv.mkDerivation (finalAttrs: { 4 + pname = "vulkan-utility-libraries"; 5 + version = "1.3.261"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "KhronosGroup"; 9 + repo = "Vulkan-Utility-Libraries"; 10 + rev = "v${finalAttrs.version}"; 11 + hash = "sha256-szkBKNcxTHMYhhHFWr5WjD91Vf/AyZaGymvlDU9ff7s="; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake python3 ]; 15 + buildInputs = [ vulkan-headers ]; 16 + 17 + meta = with lib; { 18 + description = "A set of utility libraries for Vulkan"; 19 + homepage = "https://github.com/KhronosGroup/Vulkan-Utility-Libraries"; 20 + platforms = platforms.all; 21 + license = licenses.asl20; 22 + maintainers = []; 23 + }; 24 + })
+2 -2
pkgs/development/python-modules/androidtvremote2/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "androidtvremote2"; 13 - version = "0.0.13"; 13 + version = "0.0.14"; 14 14 format = "pyproject"; 15 15 16 16 disabled = pythonOlder "3.7"; ··· 19 19 owner = "tronikos"; 20 20 repo = "androidtvremote2"; 21 21 rev = "refs/tags/v${version}"; 22 - hash = "sha256-+9VVUIvM//Fxv1a/+PAKWSQE8/TgBZzeTisgMqj6KPU="; 22 + hash = "sha256-m53TlNrrCjA4CqvR02Yph7Gr5Dt17VJFBX6MC3arWOI="; 23 23 }; 24 24 25 25 nativeBuildInputs = [
+3 -4
pkgs/development/python-modules/azure-mgmt-storage/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "azure-mgmt-storage"; 11 - version = "21.0.0"; 11 + version = "21.1.0"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.7"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - extension = "zip"; 19 - hash = "sha256-brE+7s+JGVsrX0e+Bnnj8niI79e9ITLux+vLznXLE3c="; 18 + hash = "sha256-1tPA6RfJiLye0Eckd9PvP5CIYAnrHZenEZRPg3VjAWI="; 20 19 }; 21 20 22 21 propagatedBuildInputs = [ ··· 32 31 "azure.mgmt.storage" 33 32 ]; 34 33 35 - # has no tests 34 + # Module has no tests 36 35 doCheck = false; 37 36 38 37 meta = with lib; {
+2 -2
pkgs/development/python-modules/boschshcpy/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "boschshcpy"; 13 - version = "0.2.66"; 13 + version = "0.2.67"; 14 14 format = "setuptools"; 15 15 16 16 disabled = pythonOlder "3.7"; ··· 19 19 owner = "tschamm"; 20 20 repo = pname; 21 21 rev = version; 22 - hash = "sha256-0mj1+sbNOE7PBFj99qfqgeYipaRxkQTUIPTPpXueczo="; 22 + hash = "sha256-M0LyEKJUcamv0PcflVI97zrXAoe1iV5sJ/oh60bMo6c="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/bthome-ble/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "bthome-ble"; 16 - version = "3.1.0"; 16 + version = "3.1.1"; 17 17 format = "pyproject"; 18 18 19 19 disabled = pythonOlder "3.9"; ··· 22 22 owner = "Bluetooth-Devices"; 23 23 repo = "bthome-ble"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-CcLb+2UOLKwfBw3E51LJUZmLqpBw85nLXl1J/oFfEVs="; 25 + hash = "sha256-fQIvOa9/Bqo4BN6LJz8COHo6n2m4XogVYCMdAUvDZUQ="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+15 -3
pkgs/development/python-modules/fritzconnection/default.nix
··· 4 4 , fetchFromGitHub 5 5 , pytestCheckHook 6 6 , requests 7 + , segno 7 8 }: 8 9 9 10 buildPythonPackage rec { 10 11 pname = "fritzconnection"; 11 - version = "1.12.2"; 12 + version = "1.13.1"; 12 13 format = "setuptools"; 13 14 14 - disabled = pythonOlder "3.6"; 15 + disabled = pythonOlder "3.7"; 15 16 16 17 src = fetchFromGitHub { 17 18 owner = "kbr"; 18 19 repo = pname; 19 20 rev = "refs/tags/${version}"; 20 - hash = "sha256-e+w3ce6KdvbYzH48XPEQTiBgtjbKWNdQj8ie4yw0rzE="; 21 + hash = "sha256-FTg5LHjti6Srmz1LcPU0bepNzn2tpmdSBM3Y2BzZEms="; 21 22 }; 22 23 23 24 propagatedBuildInputs = [ 24 25 requests 25 26 ]; 26 27 28 + passthru.optional-dependencies = { 29 + qr = [ 30 + segno 31 + ]; 32 + }; 33 + 27 34 nativeCheckInputs = [ 28 35 pytestCheckHook 29 36 ]; ··· 34 41 35 42 pythonImportsCheck = [ 36 43 "fritzconnection" 44 + ]; 45 + 46 + disabledTestPaths = [ 47 + # Functional tests require network access 48 + "fritzconnection/tests/test_functional.py" 37 49 ]; 38 50 39 51 meta = with lib; {
+5 -5
pkgs/development/python-modules/marshmallow/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "marshmallow"; 13 - version = "3.19.0"; 13 + version = "3.20.1"; 14 14 format = "setuptools"; 15 15 16 - disabled = pythonOlder "3.6"; 16 + disabled = pythonOlder "3.8"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "marshmallow-code"; 20 20 repo = pname; 21 - rev = version; 22 - hash = "sha256-b1brLHM48t45bwUXk7QreLLmvTzU0sX7Uoc1ZAgGkrE="; 21 + rev = "refs/tags/${version}"; 22 + hash = "sha256-sPYiup7ontnubtBxv+rIT0up4IHPJNCUlH9J4FlHsss="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [ ··· 37 37 ]; 38 38 39 39 meta = with lib; { 40 - changelog = "https://github.com/marshmallow-code/marshmallow/blob/${src.rev}/CHANGELOG.rst"; 41 40 description = "Library for converting complex objects to and from simple Python datatypes"; 42 41 homepage = "https://github.com/marshmallow-code/marshmallow"; 42 + changelog = "https://github.com/marshmallow-code/marshmallow/blob/${version}/CHANGELOG.rst"; 43 43 license = licenses.mit; 44 44 maintainers = with maintainers; [ cript0nauta ]; 45 45 };
+4 -2
pkgs/development/python-modules/pyfibaro/default.nix
··· 6 6 , requests 7 7 , requests-mock 8 8 , setuptools 9 + , wheel 9 10 }: 10 11 11 12 buildPythonPackage rec { 12 13 pname = "pyfibaro"; 13 - version = "0.7.2"; 14 + version = "0.7.3"; 14 15 format = "pyproject"; 15 16 16 17 disabled = pythonOlder "3.9"; ··· 19 20 owner = "rappenze"; 20 21 repo = pname; 21 22 rev = "refs/tags/${version}"; 22 - hash = "sha256-dAC+jW+Ky+uPsgBXpp81+bxytWYeZbd+zWzEXkmM198="; 23 + hash = "sha256-pCj69lLcoNTyZRe6SVkFpPK2Ex8927WzAJ5OCot9xP4="; 23 24 }; 24 25 25 26 nativeBuildInputs = [ 26 27 setuptools 28 + wheel 27 29 ]; 28 30 29 31 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pyipp/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "pyipp"; 18 - version = "0.14.3"; 18 + version = "0.14.4"; 19 19 format = "pyproject"; 20 20 21 21 disabled = pythonOlder "3.9"; ··· 24 24 owner = "ctalkington"; 25 25 repo = "python-ipp"; 26 26 rev = version; 27 - hash = "sha256-WbrAvIdFUPzSxGjIPzNny0V1W8S774vyREgylenJp24="; 27 + hash = "sha256-xE0fdT+Ffdf4iOHWZzRa7YWtHt92lFdA/sbwjblMR40="; 28 28 }; 29 29 30 30 postPatch = ''
+3 -3
pkgs/development/tools/dprint/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "dprint"; 5 - version = "0.40.0"; 5 + version = "0.40.2"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - sha256 = "sha256-leneOdV65aAUGRdVFpPuVnCmu3VmVzZXxOLJ5vspVB8="; 9 + sha256 = "sha256-kkGBSyLirHlJOzNh8GtY6k8kxpgouqHRQQEM/eDU7TA="; 10 10 }; 11 11 12 - cargoHash = "sha256-C0cgN7G+zQZr+V/iPHh6HXV8DnPaE0bWkbJmbfIMwgk="; 12 + cargoHash = "sha256-jImnU9ksYYmQOoaLBH+lMdoAsgo9ZFlu0tng61wrXXw="; 13 13 14 14 buildInputs = lib.optionals stdenv.isDarwin [ Security ]; 15 15
+3 -3
pkgs/development/tools/rust/cargo-bisect-rustc/default.nix
··· 12 12 13 13 rustPlatform.buildRustPackage rec { 14 14 pname = "cargo-bisect-rustc"; 15 - version = "0.6.6"; 15 + version = "0.6.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "rust-lang"; 19 19 repo = pname; 20 20 rev = "v${version}"; 21 - hash = "sha256-i/MZslGbv72MZmd31SQFc2QdDRigs8edyN2/T5V5r4k="; 21 + hash = "sha256-1edBGjnVsMNoP06HAEERQJ6HCkk0dRKlnt1b8GnJWsY="; 22 22 }; 23 23 24 24 patches = ··· 47 47 Security 48 48 ]; 49 49 50 - cargoHash = "sha256-dnR0V2MvW4Z3jtsjXSboCRFNb22fDGu01fC40N2Deho="; 50 + cargoHash = "sha256-HzqGSuobGuIuLwoAPQJ1d6xUO2VJ0rcjfOYz2wdIbCk="; 51 51 52 52 checkFlags = [ 53 53 "--skip test_github" # requires internet
+3 -3
pkgs/development/tools/rust/cargo-chef/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-chef"; 5 - version = "0.1.61"; 5 + version = "0.1.62"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - sha256 = "sha256-O3q0gfVnFMgcwWGfRgdGOwU6fauRN2qPkyTe72p3zS4="; 9 + sha256 = "sha256-ZewsR6MgBf8wdqBIrYAuprmqthhbEA/WDShp9H3jfDs="; 10 10 }; 11 11 12 - cargoHash = "sha256-A22x2s5tHf9M6UbFHwmVNgO2qe65io/GysF1+ZE8NXM="; 12 + cargoHash = "sha256-UHUNoI9QqHzgYIuKlj0giWfFgS+F3eUC/wuAXgwH2xQ="; 13 13 14 14 meta = with lib; { 15 15 description = "A cargo-subcommand to speed up Rust Docker builds using Docker layer caching";
+3 -3
pkgs/development/tools/rust/cargo-llvm-lines/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-llvm-lines"; 5 - version = "0.4.32"; 5 + version = "0.4.33"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "dtolnay"; 9 9 repo = pname; 10 10 rev = version; 11 - hash = "sha256-uoIfB+jkLamrsDRMaxExQC1syN6VeTJhfei8FgikTCE="; 11 + hash = "sha256-EgUnVnSELdiRU63saQ0o2IE4vs6tcQ/AfE4aMyegJBk="; 12 12 }; 13 13 14 - cargoHash = "sha256-SXiFkPm/2C5dABKPZBq3XXdElZemZN5E2vQTceATyE0="; 14 + cargoHash = "sha256-zq95Dzcbz08/8lumAyTfSzCEHCWWlp8Fw7R6fnfTOrk="; 15 15 16 16 meta = with lib; { 17 17 description = "Count the number of lines of LLVM IR across all instantiations of a generic function";
+5 -8
pkgs/development/tools/rust/cargo-rr/default.nix
··· 1 1 { lib 2 2 , rustPlatform 3 3 , fetchFromGitHub 4 - , gitUpdater 5 - , common-updater-scripts 4 + , nix-update-script 6 5 , makeWrapper 7 6 , rr 8 7 }: 9 8 10 9 rustPlatform.buildRustPackage rec { 11 10 pname = "cargo-rr"; 12 - version = "0.2.0"; 11 + version = "0.3.0"; 13 12 14 13 src = fetchFromGitHub { 15 14 owner = "danielzfranklin"; 16 15 repo = pname; 17 16 rev = "v${version}"; 18 - sha256 = "sha256-lQS+bp1u79iO8WGrkZSFEuonr1eYjxIQYhUvM/kBao4"; 17 + sha256 = "sha256-t8pRqeOdaRVG0titQhxezT2aDjljSs//MnRTTsJ73Yo="; 19 18 }; 20 19 21 - cargoSha256 = "sha256-PdKqWMxTtBJbNqITs3IjNcpijXy6MHitEY4jDp4jZro="; 20 + cargoSha256 = "sha256-P4r4XRolORdSGAsNg5RutZ2VVRR8rAfiBZNm+vIH3aM="; 22 21 23 22 passthru = { 24 - updateScript = gitUpdater { 25 - rev-prefix = "v"; 26 - }; 23 + updateScript = nix-update-script { }; 27 24 }; 28 25 29 26 nativeBuildInputs = [ makeWrapper ];
+3 -3
pkgs/development/tools/spirv-tools/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "spirv-tools"; 5 - version = "2023.3.rc1"; 5 + version = "1.3.261.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Tools"; 10 - rev = "v${version}"; 11 - hash = "sha256-HV7jNvgTRRGnhurtT5pf5f5gzUOmr3iWNcDc8TE4ICQ="; 10 + rev = "sdk-${version}"; 11 + hash = "sha256-K7cv0mMNrXYOlJsxAPwz3rVX5FnsnBNvaU33k9hYnQc="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake python3 ];
+5 -21
pkgs/development/tools/vulkan-validation-layers/default.nix
··· 14 14 , libXrandr 15 15 , spirv-headers 16 16 , vulkan-headers 17 + , vulkan-utility-libraries 17 18 , wayland 18 19 }: 19 20 20 21 let 21 22 robin-hood-hashing = callPackage ./robin-hood-hashing.nix {}; 22 - 23 - # Current VVL version requires a newer spirv-headers than the latest release tag. 24 - # This should hopefully not be too common and the override should be removed after 25 - # the next SPIRV headers release. 26 - # FIXME: if this ever becomes common, figure out a way to pull revisions directly 27 - # from upstream known-good.json 28 - spirv-headers' = spirv-headers.overrideAttrs(_: { 29 - version = "unstable-2023-04-27"; 30 - 31 - src = fetchFromGitHub { 32 - owner = "KhronosGroup"; 33 - repo = "SPIRV-Headers"; 34 - rev = "7f1d2f4158704337aff1f739c8e494afc5716e7e"; 35 - hash = "sha256-DHOYIZQqP5uWDYdb+vePpMBaQDOCB5Pcg8wPBMF8itk="; 36 - }; 37 - 38 - postPatch = ""; 39 - }); 40 23 in 41 24 stdenv.mkDerivation rec { 42 25 pname = "vulkan-validation-layers"; 43 - version = "1.3.254"; 26 + version = "1.3.261"; 44 27 45 28 # If we were to use "dev" here instead of headers, the setupHook would be 46 29 # placed in that output instead of "out". ··· 51 34 owner = "KhronosGroup"; 52 35 repo = "Vulkan-ValidationLayers"; 53 36 rev = "v${version}"; 54 - hash = "sha256-hh/lCXSKq8xmygVsFFOGu79DvBvBPcc1l1e5wQskK7M="; 37 + hash = "sha256-4kE3pkyYu6hnbv19fHhON+hI2HU4vLm31tNlp5fhndM="; 55 38 }; 56 39 57 40 nativeBuildInputs = [ ··· 68 51 libffi 69 52 libxcb 70 53 vulkan-headers 54 + vulkan-utility-libraries 71 55 wayland 72 56 ]; 73 57 74 58 cmakeFlags = [ 75 59 "-DGLSLANG_INSTALL_DIR=${glslang}" 76 - "-DSPIRV_HEADERS_INSTALL_DIR=${spirv-headers'}" 60 + "-DSPIRV_HEADERS_INSTALL_DIR=${spirv-headers}" 77 61 "-DROBIN_HOOD_HASHING_INSTALL_DIR=${robin-hood-hashing}" 78 62 "-DBUILD_LAYER_SUPPORT_FILES=ON" 79 63 "-DPKG_CONFIG_EXECUTABLE=${pkg-config}/bin/pkg-config"
+2 -2
pkgs/os-specific/linux/rdma-core/default.nix
··· 15 15 16 16 stdenv.mkDerivation (finalAttrs: { 17 17 pname = "rdma-core"; 18 - version = "46.1"; 18 + version = "47.0"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "linux-rdma"; 22 22 repo = "rdma-core"; 23 23 rev = "v${finalAttrs.version}"; 24 - hash = "sha256-pVPWoLnWCGP+CZtG5bnOKUtjiuOa6Qic9wlGeY68w/8="; 24 + hash = "sha256-R+qgHDu9GRwT5ic1DCDlYe1Xb4hqi8pgitKq9iBBQNQ="; 25 25 }; 26 26 27 27 strictDeps = true;
+2 -2
pkgs/servers/computing/slurm/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "slurm"; 17 - version = "23.02.3.1"; 17 + version = "23.02.4.1"; 18 18 19 19 # N.B. We use github release tags instead of https://www.schedmd.com/downloads.php 20 20 # because the latter does not keep older releases. ··· 23 23 repo = "slurm"; 24 24 # The release tags use - instead of . 25 25 rev = "${pname}-${builtins.replaceStrings ["."] ["-"] version}"; 26 - sha256 = "sha256-YMm8a7uyZpPEuWQcgddX+0Me+ndgbYoDnC+sbmN/Hh8="; 26 + sha256 = "sha256-sNZqC6F7Q05AqkKVVUG4mCO3JXRjVZBppt3VgRHf5+o="; 27 27 }; 28 28 29 29 outputs = [ "out" "dev" ];
+2 -2
pkgs/servers/dns/knot-resolver/default.nix
··· 17 17 18 18 unwrapped = stdenv.mkDerivation rec { 19 19 pname = "knot-resolver"; 20 - version = "5.6.0"; 20 + version = "5.7.0"; 21 21 22 22 src = fetchurl { 23 23 url = "https://secure.nic.cz/files/knot-resolver/${pname}-${version}.tar.xz"; 24 - sha256 = "0c82ae937b685dc477fb3176098e3dc106c898b7cd83553e5bc54dccb83c80d7"; 24 + sha256 = "383ef6db1cccabd2dd788ea9385f05e98a2bafdfeb7f0eda57ff9d572f4fad71"; 25 25 }; 26 26 27 27 outputs = [ "out" "dev" ];
+6 -2
pkgs/servers/home-assistant/component-packages.nix
··· 1346 1346 psutil-home-assistant 1347 1347 sqlalchemy 1348 1348 xmltodict 1349 - ]; # missing inputs: fritzconnection.optional-dependencies.qr 1349 + ] 1350 + ++ fritzconnection.optional-dependencies.qr; 1350 1351 "fritzbox" = ps: with ps; [ 1351 1352 pyfritzhome 1352 1353 ]; 1353 1354 "fritzbox_callmonitor" = ps: with ps; [ 1354 1355 fritzconnection 1355 - ]; # missing inputs: fritzconnection.optional-dependencies.qr 1356 + ] 1357 + ++ fritzconnection.optional-dependencies.qr; 1356 1358 "fronius" = ps: with ps; [ 1357 1359 pyfronius 1358 1360 ]; ··· 5032 5034 "freebox" 5033 5035 "freedns" 5034 5036 "freedompro" 5037 + "fritz" 5035 5038 "fritzbox" 5039 + "fritzbox_callmonitor" 5036 5040 "fronius" 5037 5041 "frontend" 5038 5042 "frontier_silicon"
+2 -2
pkgs/servers/home-assistant/stubs.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "homeassistant-stubs"; 11 - version = "2023.8.2"; 11 + version = "2023.8.3"; 12 12 format = "pyproject"; 13 13 14 14 disabled = python.version != home-assistant.python.version; ··· 17 17 owner = "KapJI"; 18 18 repo = "homeassistant-stubs"; 19 19 rev = "refs/tags/${version}"; 20 - hash = "sha256-uoDpwXJfZC26oesMTv1mjO7Ib0dKamTQdIYyLJnrERk="; 20 + hash = "sha256-odZ0rKydFtj2bwNrP3KsE5xxFLAssYMoaEe+sBMIeYI="; 21 21 }; 22 22 23 23 nativeBuildInputs = [
-2
pkgs/servers/klipper/klipper-genconf.nix
··· 2 2 , klipper 3 3 , python3 4 4 , gnumake 5 - , pkgsCross 6 5 }: writeShellApplication { 7 6 name = "klipper-genconf"; 8 7 runtimeInputs = [ 9 8 python3 10 - pkgsCross.avr.stdenv.cc 11 9 gnumake 12 10 ]; 13 11 text = ''
+3 -3
pkgs/servers/nitter/default.nix
··· 21 21 22 22 buildNimPackage rec { 23 23 pname = "nitter"; 24 - version = "unstable-2023-07-21"; 24 + version = "unstable-2023-08-08"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = "zedeus"; 28 28 repo = "nitter"; 29 - rev = "cc5841df308506356d329662d0f0c2ec4713a35c"; 30 - hash = "sha256-QuWLoKy7suUCTYK79ghdf3o/FGFIDNyN1Iu69DFp6wg="; 29 + rev = "d7ca353a55ea3440a2ec1f09155951210a374cc7"; 30 + hash = "sha256-nlpUzbMkDzDk1n4X+9Wk7+qQk+KOfs5ID6euIfHBoa8="; 31 31 }; 32 32 33 33 patches = [
+3 -3
pkgs/tools/admin/drawterm/default.nix
··· 18 18 19 19 stdenv.mkDerivation { 20 20 pname = "drawterm"; 21 - version = "unstable-2023-06-27"; 21 + version = "unstable-2023-08-22"; 22 22 23 23 src = fetchFrom9Front { 24 24 owner = "plan9front"; 25 25 repo = "drawterm"; 26 - rev = "36debf46ac184a22c6936345d22e4cfad995948c"; 27 - hash = "sha256-ebqw1jqeRC0FWeUIO/HaEovuwzU6+B48TjZbVJXByvA="; 26 + rev = "c91c6fac9d725716ca6ecc3002053f941137f24f"; 27 + hash = "sha256-oGcKRx1tP2jeshHhaCHPRKmwKQ3WPYK1tHGGt1/3oDU="; 28 28 }; 29 29 30 30 enableParallelBuilding = true;
+2 -2
pkgs/tools/backup/gyb/default.nix
··· 6 6 7 7 python3Packages.buildPythonApplication rec { 8 8 pname = "gyb"; 9 - version = "1.72"; 9 + version = "1.74"; 10 10 format = "other"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "GAM-team"; 14 14 repo = "got-your-back"; 15 15 rev = "refs/tags/v${version}"; 16 - sha256 = "sha256-75ZU1qNFdiX9Uhb+tKN0438iHKvY4fuFVGvcgyFFgJo="; 16 + sha256 = "sha256-JUI9BIDg7Z6z5ZtwBMsgTbYXp9w0jd1DKFAa1XjeEtQ="; 17 17 }; 18 18 19 19 propagatedBuildInputs = with python3Packages; [
+7 -2
pkgs/tools/graphics/spirv-cross/default.nix
··· 2 2 3 3 stdenv.mkDerivation (finalAttrs: { 4 4 pname = "spirv-cross"; 5 - version = "1.3.250.0"; 5 + version = "1.3.261.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Cross"; 10 10 rev = "sdk-${finalAttrs.version}"; 11 - hash = "sha256-H4UkR/EiBWpdhdPHNBrdRkl4eN8kD9gEOzpnwfFSdpI="; 11 + hash = "sha256-abVqLovvcKBJhGhSCbyD5mc1DSfvh4TWssGxi52ukQ8="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake python3 ]; 15 + 16 + postFixup = '' 17 + substituteInPlace $out/lib/pkgconfig/*.pc \ 18 + --replace '=''${prefix}//' '=/' 19 + ''; 15 20 16 21 meta = with lib; { 17 22 description = "A tool designed for parsing and converting SPIR-V to other shader languages";
+5 -5
pkgs/tools/graphics/vulkan-extension-layer/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, writeText, vulkan-headers, jq }: 1 + { lib, stdenv, fetchFromGitHub, cmake, pkg-config, writeText, vulkan-headers, jq, libX11, libXrandr, libxcb, wayland }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "vulkan-extension-layer"; 5 - version = "1.3.254"; 5 + version = "1.3.261"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "Vulkan-ExtensionLayer"; 10 10 rev = "v${version}"; 11 - hash = "sha256-YWJk0sAvhmfVbJ6Nv24kzFL4SltQnggNjZ+NjaUO1Io="; 11 + hash = "sha256-MeW7mmbjgqEvXEnAYzTNu4omC4fqq1fplIVjDpV2LcA="; 12 12 }; 13 13 14 - nativeBuildInputs = [ cmake jq ]; 14 + nativeBuildInputs = [ cmake pkg-config jq ]; 15 15 16 - buildInputs = [ vulkan-headers ]; 16 + buildInputs = [ vulkan-headers libX11 libXrandr libxcb wayland ]; 17 17 18 18 # Help vulkan-loader find the validation layers 19 19 setupHook = writeText "setup-hook" ''
-26
pkgs/tools/graphics/vulkan-tools-lunarg/add-missing-macro-definition.patch
··· 1 - diff --git a/layersvt/api_dump.h b/layersvt/api_dump.h 2 - index 6e13b6de3..33bee96e7 100644 3 - --- a/layersvt/api_dump.h 4 - +++ b/layersvt/api_dump.h 5 - @@ -60,6 +60,8 @@ 6 - #include <unordered_set> 7 - #include <utility> 8 - 9 - +#define ARRAY_SIZE(a) (sizeof(a) / sizeof(a[0])) 10 - + 11 - #ifdef ANDROID 12 - 13 - #include <android/log.h> 14 - diff --git a/layersvt/screenshot.cpp b/layersvt/screenshot.cpp 15 - index b9743371c..6ee65c576 100755 16 - --- a/layersvt/screenshot.cpp 17 - +++ b/layersvt/screenshot.cpp 18 - @@ -44,6 +44,8 @@ using namespace std; 19 - 20 - #include "screenshot_parsing.h" 21 - 22 - +#define ARRAY_SIZE(a) (sizeof(a) / sizeof(a[0])) 23 - + 24 - #ifdef ANDROID 25 - 26 - #include <android/log.h>
+6 -10
pkgs/tools/graphics/vulkan-tools-lunarg/default.nix
··· 5 5 , python3 6 6 , jq 7 7 , expat 8 + , jsoncpp 8 9 , libX11 9 10 , libXdmcp 10 11 , libXrandr ··· 24 25 25 26 stdenv.mkDerivation rec { 26 27 pname = "vulkan-tools-lunarg"; 27 - version = "1.3.250"; 28 + version = "1.3.261"; 28 29 29 30 src = fetchFromGitHub { 30 31 owner = "LunarG"; 31 32 repo = "VulkanTools"; 32 33 rev = "v${version}"; 33 - hash = "sha256-oI2ITvciuE/f8ojFpIwcH+HnYCasz43nKkER3wJxX+c="; 34 + hash = "sha256-Kem3nWVaMeDEsidKYMsWr9Bu0yBgjjennDB0sKBDogA="; 34 35 fetchSubmodules = true; 35 36 }; 36 37 ··· 38 39 39 40 buildInputs = [ 40 41 expat 42 + jsoncpp 41 43 libX11 42 44 libXdmcp 43 45 libXrandr ··· 70 72 patchShebangs scripts/* 71 73 sed -i '/^git /d' $update 72 74 ./$update 75 + 76 + substituteInPlace via/CMakeLists.txt --replace "jsoncpp_static" "jsoncpp" 73 77 ''; 74 78 75 79 # Include absolute paths to layer libraries in their associated ··· 82 86 ''; 83 87 84 88 patches = [ 85 - # Redefine an internal macro removed in vulkan-validation-layers 86 - # FIXME: remove when fixed upstream 87 - ./add-missing-macro-definition.patch 88 - 89 - # Skip QNX-specific extension causing build failures 90 - # FIXME: remove when fixed upstream 91 - ./skip-qnx-extension.patch 92 - 93 89 ./gtest.patch 94 90 ]; 95 91
-13
pkgs/tools/graphics/vulkan-tools-lunarg/skip-qnx-extension.patch
··· 1 - diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index 209f3ec39..c711af38b 100644 3 - --- a/CMakeLists.txt 4 - +++ b/CMakeLists.txt 5 - @@ -190,7 +190,7 @@ endif() 6 - # Define macro used for building vk.xml generated files 7 - function(run_vulkantools_vk_xml_generate dependency output) 8 - add_custom_command(OUTPUT ${output} 9 - - COMMAND ${PYTHON_CMD} -B ${VULKANTOOLS_SCRIPTS_DIR}/vt_genvk.py -registry ${VULKAN_HEADERS_REGISTRY_DIRECTORY}/vk.xml -scripts ${VULKAN_HEADERS_REGISTRY_DIRECTORY} ${output} 10 - + COMMAND ${PYTHON_CMD} -B ${VULKANTOOLS_SCRIPTS_DIR}/vt_genvk.py -registry ${VULKAN_HEADERS_REGISTRY_DIRECTORY}/vk.xml -scripts ${VULKAN_HEADERS_REGISTRY_DIRECTORY} ${output} -removeExtensions VK_QNX_external_memory_screen_buffer 11 - DEPENDS ${VULKAN_HEADERS_REGISTRY_DIRECTORY}/vk.xml ${VULKAN_HEADERS_REGISTRY_DIRECTORY}/generator.py ${VULKANTOOLS_SCRIPTS_DIR}/${dependency} ${VULKANTOOLS_SCRIPTS_DIR}/vt_genvk.py ${VULKAN_HEADERS_REGISTRY_DIRECTORY}/reg.py 12 - ) 13 - endfunction()
+3 -2
pkgs/tools/graphics/vulkan-tools/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "vulkan-tools"; 25 - version = "1.3.254"; 25 + version = "1.3.261"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "KhronosGroup"; 29 29 repo = "Vulkan-Tools"; 30 30 rev = "v${version}"; 31 - hash = "sha256-MyYngyoIGpGu1jFN1GDm9BcFye1JRz1cN6SaZue1ZGQ="; 31 + hash = "sha256-C5FVkI9F/dgIS8qp7VaOn9J2zoNLb1PnmgAemsVO6zM="; 32 32 }; 33 33 34 34 nativeBuildInputs = [ ··· 86 86 # vulkaninfo loads libvulkan using dlopen, so we have to add it manually to RPATH 87 87 "-DCMAKE_INSTALL_RPATH=${libraryPath}" 88 88 "-DPKG_CONFIG_EXECUTABLE=${pkg-config}/bin/pkg-config" 89 + "-DGLSLANG_INSTALL_DIR=${glslang}" 89 90 # Hide dev warnings that are useless for packaging 90 91 "-Wno-dev" 91 92 ] ++ lib.optionals stdenv.isDarwin [
+3 -3
pkgs/tools/misc/cloud-sql-proxy/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "cloud-sql-proxy"; 8 - version = "2.6.0"; 8 + version = "2.6.1"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "GoogleCloudPlatform"; 12 12 repo = "cloud-sql-proxy"; 13 13 rev = "v${version}"; 14 - hash = "sha256-/mXaNRTRIBIPUHY/MOHpGmpB8wBp18wwftn/EdmoffQ="; 14 + hash = "sha256-YbfN9ZdcxP78/dNaONBhb1UqcZYJcet+lHuKmvXk9MI="; 15 15 }; 16 16 17 17 subPackages = [ "." ]; 18 18 19 - vendorSha256 = "sha256-VadE9E4B8BIIHGl+PN4oDl0H56xE3GQn0MxGw5fGsvM="; 19 + vendorHash = "sha256-2Cu9o26R9y2EBUB9kLf98n2AKFOE7NE1NrcMD+8pvRY="; 20 20 21 21 preCheck = '' 22 22 buildFlagsArray+="-short"
+2 -2
pkgs/tools/misc/diffoscope/default.nix
··· 78 78 # Note: when upgrading this package, please run the list-missing-tools.sh script as described below! 79 79 python3.pkgs.buildPythonApplication rec { 80 80 pname = "diffoscope"; 81 - version = "246"; 81 + version = "247"; 82 82 83 83 src = fetchurl { 84 84 url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2"; 85 - hash = "sha256-z7wrc8hveKqMJsJMLQXO3z+wcJxpY8QFoYxTBUzfGPg="; 85 + hash = "sha256-sbLny1eK/eyCQKeSUyQc3DTvlHeCp8rAgrx681KjvNQ="; 86 86 }; 87 87 88 88 outputs = [
+6 -5
pkgs/tools/misc/gaphor/default.nix
··· 59 59 desktopName = "Gaphor"; 60 60 }; 61 61 62 - # We need to wrap it manually to resolve all icons 62 + # Disable automatic wrapGAppsHook to prevent double wrapping 63 63 dontWrapGApps = true; 64 64 65 65 postInstall = '' ··· 67 67 ''; 68 68 69 69 preFixup = '' 70 - wrapProgram $out/bin/gaphor \ 71 - ''${gappsWrapperArgs[@]} \ 72 - --prefix XDG_DATA_DIRS : "${gtk3}/share/gsettings-schemas/${gtk3.name}/" \ 73 - --set GDK_PIXBUF_MODULE_FILE "${librsvg.out}/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache" 70 + makeWrapperArgs+=( 71 + "''${gappsWrapperArgs[@]}" \ 72 + --prefix XDG_DATA_DIRS : "${gtk3}/share/gsettings-schemas/${gtk3.name}/" \ 73 + --set GDK_PIXBUF_MODULE_FILE "${librsvg.out}/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache" 74 + ) 74 75 ''; 75 76 76 77 meta = with lib; {
+3 -3
pkgs/tools/misc/ollama/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "ollama"; 10 - version = "0.0.14"; 10 + version = "0.0.15"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "jmorganca"; 14 14 repo = "ollama"; 15 15 rev = "v${version}"; 16 - hash = "sha256-QFik6Vlo06s2Nz5tsS3yvm3JYhCTIZHMiphtqz99sTI="; 16 + hash = "sha256-p2YLgLyjmf2MPvFue45+wW7kqKpUli9rX3aWNH08cDk="; 17 17 }; 18 18 19 19 buildInputs = lib.optionals stdenv.isDarwin (with darwin.apple_sdk_11_0.frameworks; [ ··· 22 22 MetalKit 23 23 ]); 24 24 25 - vendorHash = "sha256-eAvedN47InwUcsWLtnzxuLnmyeOoxHEDtQy9kjsFJnE="; 25 + vendorHash = "sha256-IgEf/WOc1eNGCif1fViIFxbgZAd6mHBqfxcaqH/WvGg="; 26 26 27 27 ldflags = [ "-s" "-w" ]; 28 28
+2 -2
pkgs/tools/misc/pipreqs/default.nix
··· 4 4 5 5 buildPythonApplication rec { 6 6 pname = "pipreqs"; 7 - version = "0.4.11"; 7 + version = "0.4.13"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "c793b4e147ac437871b3a962c5ce467e129c859ece5ba79aca83c20f4d9c3aef"; 11 + hash = "sha256-oX8WeIC2khvjdTPOTIHdxuIrRlwQeq1VfbQ7Gt1WqZs="; 12 12 }; 13 13 14 14 propagatedBuildInputs = [ yarg docopt ];
+3 -3
pkgs/tools/misc/tere/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "tere"; 5 - version = "1.4.0"; 5 + version = "1.5.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "mgunyho"; 9 9 repo = "tere"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-gEoy7pwZxlCIPTQZVPSo5TIdmSliSSePunXO3hD3Ryo="; 11 + sha256 = "sha256-xqbFBRzBfTwSdkC8e85yANdVA45G6E1FYlTXP8QfVIk="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-4XvVisRLSHw4jz+nUndWzS1IK2tnzmxdcgqNHHOvkQg="; 14 + cargoHash = "sha256-Y2Zgo/VAJxzQd2cXxyiJS5AqcVRClAuUsEogivK3EJw="; 15 15 16 16 postPatch = '' 17 17 rm .cargo/config.toml;
+2 -2
pkgs/tools/networking/chisel/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "chisel"; 8 - version = "1.9.0"; 8 + version = "1.9.1"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "jpillora"; 12 12 repo = pname; 13 13 rev = "refs/tags/v${version}"; 14 - hash = "sha256-Rq8IBT29K3QiaYXFaARg5ak9llcNS/9laal/LrHM4zY="; 14 + hash = "sha256-hZm0dVDwX6cHiN0TvAcHCWbMAf+k9CCQfC9nlV2vfN4="; 15 15 }; 16 16 17 17 vendorHash = "sha256-i6Fb+jSP6LzZoPTHhjQi3YbPBWY6OmsORV8ATcLrHG0=";
+2 -2
pkgs/tools/networking/opensnitch/daemon.nix
··· 18 18 19 19 buildGoModule rec { 20 20 pname = "opensnitch"; 21 - version = "1.6.2"; 21 + version = "1.6.3"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "evilsocket"; 25 25 repo = "opensnitch"; 26 26 rev = "v${version}"; 27 - hash = "sha256-1ArwbewgZuoDF2lxY720yFQSsTuLR0WkS8vsTCr2FL4="; 27 + hash = "sha256-C8Uuz2FC7Zu07ZmFpp+ejpNxkyC3/mM9J2dc5FUKx64="; 28 28 }; 29 29 30 30 modRoot = "daemon";
+1
pkgs/tools/package-management/deploy-rs/default.nix
··· 29 29 homepage = "https://github.com/serokell/deploy-rs"; 30 30 license = licenses.mpl20; 31 31 maintainers = with maintainers; [ teutat3s ]; 32 + mainProgram = "deploy"; 32 33 }; 33 34 }
+3 -3
pkgs/tools/security/nuclei/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "nuclei"; 8 - version = "2.9.11"; 8 + version = "2.9.12"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "projectdiscovery"; 12 12 repo = pname; 13 13 rev = "refs/tags/v${version}"; 14 - hash = "sha256-OZAHB1QmdZSARHF7Nd8SzmTGfRk4Wi/89nVYjW0Cpso="; 14 + hash = "sha256-XLSNBFblgDkGGimwx0KqgHfDOekj7GH81EaKQ106v5U="; 15 15 }; 16 16 17 - vendorHash = "sha256-L8EwfyYtsnQChs0KQW2e/tU3zKua1HdDX91YX5ay9qo="; 17 + vendorHash = "sha256-/1F2aY3cRLRz06s1KXQ6bt7UgaZgiXEjS/5stGi7xIw="; 18 18 19 19 modRoot = "./v2"; 20 20 subPackages = [
+9 -5
pkgs/tools/text/wrap/default.nix
··· 8 8 owner = "Wraparound"; 9 9 repo = "wrap"; 10 10 rev = "v${version}"; 11 - sha256 = "0scf7v83p40r9k7k5v41rwiy9yyanfv3jm6jxs9bspxpywgjrk77"; 11 + hash = "sha256-58wsH/e3X72S7tJUObazyvvkI8+B7DLPTBmQO9A+jmk="; 12 12 }; 13 + 14 + vendorHash = "sha256-vg61Vypd+mSF9FyLFVpnS5UCTJDoobkDE1Cneg8O0RM="; 13 15 14 16 nativeBuildInputs = [ makeWrapper ]; 15 17 16 - vendorSha256 = null; #vendorSha256 = ""; 17 - 18 18 patches = [ 19 19 (fetchpatch { 20 20 name = "courier-prime-variants.patch"; 21 21 url = "https://github.com/Wraparound/wrap/commit/b72c280b6eddba9ec7b3507c1f143eb28a85c9c1.patch"; 22 - sha256 = "1d9v0agfd7mgd17k4a8l6vr2kyswyfsyq3933dz56pgs5d3jric5"; 22 + hash = "sha256-hcUsRyv6XVN+GyMN7LXzXPsp8jYUKTJPaK+e5p4CO7U="; 23 + }) 24 + # Fix build on Go 1.17+ 25 + (fetchpatch { 26 + url = "https://github.com/Wraparound/wrap/commit/a222c18a7e0810486741684781ff6158a359a8ba.patch"; 27 + hash = "sha256-eIKvA91olfbNJhOhIUu3GOL/rbgX3m6unmU8nRdKbtc="; 23 28 }) 24 29 ]; 25 30 ··· 32 37 homepage = "https://github.com/Wraparound/wrap"; 33 38 license = licenses.gpl3Only; 34 39 maintainers = [ maintainers.austinbutler ]; 35 - broken = true; # vendor isn't reproducible with go > 1.17: nix-build -A $name.goModules --check 36 40 }; 37 41 }
+2 -2
pkgs/tools/virtualization/cri-tools/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "cri-tools"; 9 - version = "1.27.1"; 9 + version = "1.28.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "kubernetes-sigs"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-GcfRnYOMrkMBIc2s6u/kwzh1kCFo2+PQCIcQyXxVdDM="; 15 + sha256 = "sha256-inw4bPeObMlwtgFLR/8+tqRKTkcViZeEFZ1MOm0HYI4="; 16 16 }; 17 17 18 18 vendorHash = null;
+1
pkgs/top-level/aliases.nix
··· 833 833 kexpand = throw "kexpand awless has been dropped due to the lack of maintenance from upstream since 2017"; # Added 2022-06-01 834 834 keybase-go = throw "'keybase-go' has been renamed to/replaced by 'keybase'"; # Converted to throw 2022-02-22 835 835 keysmith = libsForQt5.kdeGear.keysmith; # Added 2021-07-14 836 + kfctl = throw "kfctl is broken and has been archived by upstream" ; # Added 2023-08-21 836 837 kgx = gnome-console; # Added 2022-02-19 837 838 kibana7-oss = throw "kibana7-oss has been removed, as the distribution is no longer provided by upstream. https://github.com/NixOS/nixpkgs/pull/114456"; # Added 2021-06-09 838 839 kicad-with-packages3d = kicad; # Added 2019-11-25
+1 -2
pkgs/top-level/all-packages.nix
··· 9666 9666 jdk = jdk11; 9667 9667 }; 9668 9668 9669 - kfctl = callPackage ../applications/networking/cluster/kfctl { }; 9670 - 9671 9669 kluctl = callPackage ../applications/networking/cluster/kluctl { }; 9672 9670 9673 9671 kibana7 = callPackage ../development/tools/misc/kibana/7.x.nix { }; ··· 25534 25532 inherit (darwin.apple_sdk.frameworks) AppKit Cocoa; 25535 25533 }; 25536 25534 vulkan-tools-lunarg = callPackage ../tools/graphics/vulkan-tools-lunarg { }; 25535 + vulkan-utility-libraries = callPackage ../development/libraries/vulkan-utility-libraries { }; 25537 25536 vulkan-validation-layers = callPackage ../development/tools/vulkan-validation-layers { }; 25538 25537 25539 25538 vxl = callPackage ../development/libraries/vxl { };