lol

Merge remote-tracking branch 'origin/staging-next' into staging

K900 8dc719e1 4ef1d709

+2665 -690
-6
ci/OWNERS
··· 395 395 /pkgs/development/compilers/ocaml @ulrikstrid 396 396 /pkgs/development/ocaml-modules @ulrikstrid 397 397 398 - # ZFS 399 - pkgs/os-specific/linux/zfs/2_1.nix @raitobezarius 400 - pkgs/os-specific/linux/zfs/generic.nix @raitobezarius 401 - nixos/modules/tasks/filesystems/zfs.nix @raitobezarius 402 - nixos/tests/zfs.nix @raitobezarius 403 - 404 398 # Zig 405 399 /pkgs/development/compilers/zig @figsoda 406 400 /doc/hooks/zig.section.md @figsoda
+4 -2
doc/build-helpers/special/fhs-environments.section.md
··· 6 6 Accepted arguments are: 7 7 8 8 - `name` 9 - The name of the environment, and the wrapper executable if `pname` is unset. 9 + The name of the environment. 10 10 - `pname` 11 - The pname of the environment and the wrapper executable. 11 + The pname of the environment. 12 12 - `version` 13 13 The version of the environment. 14 + - `executableName` 15 + The name of the wrapper executable. Defaults to `pname` if set, or `name` otherwise. 14 16 - `targetPkgs` 15 17 Packages to be installed for the main host's architecture (i.e. x86_64 on x86_64 installations). Along with libraries binaries are also installed. 16 18 - `multiPkgs`
+6
maintainers/maintainer-list.nix
··· 19461 19461 githubId = 807447; 19462 19462 name = "Robert Scott"; 19463 19463 }; 19464 + Rishik-Y = { 19465 + name = "Rishik Yalamanchili"; 19466 + email = "202301258@daiict.ac.in"; 19467 + github = "Rishik-Y"; 19468 + githubId = 73787402; 19469 + }; 19464 19470 risson = { 19465 19471 name = "Marc Schmitt"; 19466 19472 email = "marc.schmitt@risson.space";
+3
nixos/README.md
··· 84 84 - Ensure that the introduced options are correct. 85 85 - Type should be appropriate (string related types differs in their merging capabilities, `loaOf` and `string` types are deprecated). 86 86 - Description, default and example should be provided. 87 + - Defaults may only be omitted if both: 88 + 1. The user is required to set the default in order to properly use the service. 89 + 2. The lack of a default does not break evaluation when the module is not enabled. 87 90 - Ensure that module `meta` field is present 88 91 - Maintainers should be declared in `meta.maintainers`. 89 92 - Module documentation should be declared with `meta.doc`.
+6
nixos/lib/make-options-doc/default.nix
··· 1 + # Tests: ./tests.nix 2 + 1 3 /** 2 4 Generates documentation for [nix modules](https://nix.dev/tutorials/module-system/index.html). 3 5 ··· 193 195 optionsCommonMark = 194 196 pkgs.runCommand "options.md" 195 197 { 198 + __structuredAttrs = true; 196 199 nativeBuildInputs = [ pkgs.nixos-render-docs ]; 200 + # For overriding 201 + extraArgs = [ ]; 197 202 } 198 203 '' 199 204 nixos-render-docs -j $NIX_BUILD_CORES options commonmark \ 200 205 --manpage-urls ${pkgs.path + "/doc/manpage-urls.json"} \ 201 206 --revision ${lib.escapeShellArg revision} \ 207 + ''${extraArgs[@]} \ 202 208 ${optionsJSON}/share/doc/nixos/options.json \ 203 209 $out 204 210 '';
+59
nixos/lib/make-options-doc/tests.nix
··· 1 + # Run tests: nix-build -A tests.nixosOptionsDoc 2 + 3 + { 4 + lib, 5 + nixosOptionsDoc, 6 + runCommand, 7 + }: 8 + let 9 + inherit (lib) mkOption types; 10 + 11 + eval = lib.evalModules { 12 + modules = [ 13 + { 14 + options.foo.bar.enable = mkOption { 15 + type = types.bool; 16 + default = false; 17 + description = '' 18 + Enable the foo bar feature. 19 + ''; 20 + }; 21 + } 22 + ]; 23 + }; 24 + 25 + doc = nixosOptionsDoc { 26 + inherit (eval) options; 27 + }; 28 + in 29 + { 30 + /** 31 + Test that 32 + - the `nixosOptionsDoc` function can be invoked 33 + - integration of the module system and `nixosOptionsDoc` (limited coverage) 34 + 35 + The more interesting tests happen in the `nixos-render-docs` package. 36 + */ 37 + commonMark = 38 + runCommand "test-nixosOptionsDoc-commonMark" 39 + { 40 + commonMarkDefault = doc.optionsCommonMark; 41 + commonMarkAnchors = doc.optionsCommonMark.overrideAttrs { 42 + extraArgs = [ 43 + "--anchor-prefix" 44 + "my-opt-" 45 + "--anchor-style" 46 + "legacy" 47 + ]; 48 + }; 49 + } 50 + '' 51 + env | grep ^commonMark | sed -e 's/=/ = /' 52 + ( 53 + set -x 54 + grep -F 'foo\.bar\.enable' $commonMarkDefault >/dev/null 55 + grep -F '{#my-opt-foo.bar.enable}' $commonMarkAnchors >/dev/null 56 + ) 57 + touch $out 58 + ''; 59 + }
+4 -5
nixos/tests/zfs.nix
··· 191 191 192 192 in { 193 193 194 - # maintainer: @raitobezarius 195 - series_2_1 = makeZfsTest { 196 - zfsPackage = pkgs.zfs_2_1; 194 + series_2_2 = makeZfsTest { 195 + zfsPackage = pkgs.zfs_2_2; 197 196 kernelPackages = pkgs.linuxPackages; 198 197 }; 199 198 200 - series_2_2 = makeZfsTest { 201 - zfsPackage = pkgs.zfs_2_2; 199 + series_2_3 = makeZfsTest { 200 + zfsPackage = pkgs.zfs_2_3; 202 201 kernelPackages = pkgs.linuxPackages; 203 202 }; 204 203
+14 -4
pkgs/applications/audio/ladspa-plugins/default.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 autoreconfHook, 6 + automake, 6 7 fftw, 7 8 ladspaH, 8 9 libxml2, ··· 21 22 sha256 = "sha256-eOtIhNcuItREUShI8JRlBVKfMfovpdfIYu+m37v4KLE="; 22 23 }; 23 24 25 + preBuild = '' 26 + shopt -s globstar 27 + for f in **/Makefile; do 28 + substituteInPlace "$f" \ 29 + --replace-quiet 'ranlib' '${stdenv.cc.targetPrefix}ranlib' 30 + done 31 + shopt -u globstar 32 + ''; 33 + 24 34 nativeBuildInputs = [ 25 35 autoreconfHook 36 + perlPackages.perl 37 + perlPackages.XMLParser 26 38 pkg-config 27 39 perlPackages.perl 28 40 perlPackages.XMLParser ··· 34 46 ]; 35 47 36 48 postPatch = '' 37 - patchShebangs . 38 - substituteInPlace util/Makefile.am --replace-fail "ranlib" "$RANLIB" 39 - substituteInPlace gsm/Makefile.am --replace-fail "ranlib" "$RANLIB" 40 - substituteInPlace gverb/Makefile.am --replace-fail "ranlib" "$RANLIB" 49 + patchShebangs --build . ./metadata/ makestub.pl 50 + cp ${automake}/share/automake-*/mkinstalldirs . 41 51 ''; 42 52 43 53 meta = with lib; {
+21 -30
pkgs/applications/gis/spatialite-gui/default.nix pkgs/by-name/sp/spatialite-gui/package.nix
··· 23 23 wxGTK, 24 24 xz, 25 25 zstd, 26 - Carbon, 27 - Cocoa, 28 - IOKit, 29 26 }: 30 27 31 28 stdenv.mkDerivation rec { ··· 41 38 pkg-config 42 39 ] ++ lib.optional stdenv.hostPlatform.isDarwin desktopToDarwinBundle; 43 40 44 - buildInputs = 45 - [ 46 - curl 47 - freexl 48 - geos 49 - librasterlite2 50 - librttopo 51 - libspatialite 52 - libwebp 53 - libxlsxwriter 54 - libxml2 55 - lz4 56 - minizip 57 - openjpeg 58 - postgresql 59 - proj 60 - sqlite 61 - virtualpg 62 - wxGTK 63 - xz 64 - zstd 65 - ] 66 - ++ lib.optionals stdenv.hostPlatform.isDarwin [ 67 - Carbon 68 - Cocoa 69 - IOKit 70 - ]; 41 + buildInputs = [ 42 + curl 43 + freexl 44 + geos 45 + librasterlite2 46 + librttopo 47 + libspatialite 48 + libwebp 49 + libxlsxwriter 50 + libxml2 51 + lz4 52 + minizip 53 + openjpeg 54 + postgresql 55 + proj 56 + sqlite 57 + virtualpg 58 + wxGTK 59 + xz 60 + zstd 61 + ]; 71 62 72 63 enableParallelBuilding = true; 73 64
+2 -13
pkgs/applications/misc/rofi/wayland.nix
··· 1 1 { 2 2 lib, 3 3 fetchFromGitHub, 4 - fetchpatch, 5 4 rofi-unwrapped, 6 5 wayland-scanner, 7 6 pkg-config, ··· 11 10 12 11 rofi-unwrapped.overrideAttrs (oldAttrs: rec { 13 12 pname = "rofi-wayland-unwrapped"; 14 - version = "1.7.5+wayland3"; 13 + version = "1.7.7+wayland1"; 15 14 16 15 src = fetchFromGitHub { 17 16 owner = "lbonn"; 18 17 repo = "rofi"; 19 18 rev = version; 20 19 fetchSubmodules = true; 21 - hash = "sha256-pKxraG3fhBh53m+bLPzCigRr6dBcH/A9vbdf67CO2d8="; 20 + hash = "sha256-wGBB7h2gZRQNmHV0NIbD0vvHtKZqnT5hd2gz5smKGoU="; 22 21 }; 23 - 24 - patches = [ 25 - # Fix use on niri window manager 26 - # ref. https://github.com/davatorium/rofi/discussions/2008 27 - # this was merged upstream, and can be removed on next release 28 - (fetchpatch { 29 - url = "https://github.com/lbonn/rofi/commit/55425f72ff913eb72f5ba5f5d422b905d87577d0.patch"; 30 - hash = "sha256-vTUxtJs4SuyPk0PgnGlDIe/GVm/w1qZirEhKdBp4bHI="; 31 - }) 32 - ]; 33 22 34 23 depsBuildBuild = oldAttrs.depsBuildBuild ++ [ pkg-config ]; 35 24 nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [
+2 -2
pkgs/applications/networking/browsers/firefox/packages/firefox-devedition.nix
··· 9 9 10 10 buildMozillaMach rec { 11 11 pname = "firefox-devedition"; 12 - version = "133.0b1"; 12 + version = "135.0b4"; 13 13 applicationName = "Mozilla Firefox Developer Edition"; 14 14 requireSigning = false; 15 15 branding = "browser/branding/aurora"; 16 16 src = fetchurl { 17 17 url = "mirror://mozilla/devedition/releases/${version}/source/firefox-${version}.source.tar.xz"; 18 - sha512 = "dced4aba71b07b68ee31c283945e7d62a7032f08f5cf71aa261fc7ba32f58277acbe9fdbdd28777d7f4b824e411815b069cab0ce791438088c9ad19c3d2de62e"; 18 + sha512 = "d3ee20d264c4c26308b814f4cc997349a6df32da17b9a29514b0504f7548606f4b6793ccd2e7464babf6588f13bfcc0e0641f9ac8d620f7da7d7e45684fdf775"; 19 19 }; 20 20 21 21 meta = {
+151
pkgs/applications/networking/sync/rsync/CVE-2024-12084/0001-Some-checksum-buffer-fixes.patch
··· 1 + From 0902b52f6687b1f7952422080d50b93108742e53 Mon Sep 17 00:00:00 2001 2 + From: Wayne Davison <wayne@opencoder.net> 3 + Date: Tue, 29 Oct 2024 22:55:29 -0700 4 + Subject: [PATCH 1/2] Some checksum buffer fixes. 5 + 6 + - Put sum2_array into sum_struct to hold an array of sum2 checksums 7 + that are each xfer_sum_len bytes. 8 + - Remove sum2 buf from sum_buf. 9 + - Add macro sum2_at() to access each sum2 array element. 10 + - Throw an error if a sums header has an s2length larger than 11 + xfer_sum_len. 12 + --- 13 + io.c | 3 ++- 14 + match.c | 8 ++++---- 15 + rsync.c | 5 ++++- 16 + rsync.h | 4 +++- 17 + sender.c | 4 +++- 18 + 5 files changed, 16 insertions(+), 8 deletions(-) 19 + 20 + diff --git a/io.c b/io.c 21 + index a99ac0ec..bb60eeca 100644 22 + --- a/io.c 23 + +++ b/io.c 24 + @@ -55,6 +55,7 @@ extern int read_batch; 25 + extern int compat_flags; 26 + extern int protect_args; 27 + extern int checksum_seed; 28 + +extern int xfer_sum_len; 29 + extern int daemon_connection; 30 + extern int protocol_version; 31 + extern int remove_source_files; 32 + @@ -1977,7 +1978,7 @@ void read_sum_head(int f, struct sum_struct *sum) 33 + exit_cleanup(RERR_PROTOCOL); 34 + } 35 + sum->s2length = protocol_version < 27 ? csum_length : (int)read_int(f); 36 + - if (sum->s2length < 0 || sum->s2length > MAX_DIGEST_LEN) { 37 + + if (sum->s2length < 0 || sum->s2length > xfer_sum_len) { 38 + rprintf(FERROR, "Invalid checksum length %d [%s]\n", 39 + sum->s2length, who_am_i()); 40 + exit_cleanup(RERR_PROTOCOL); 41 + diff --git a/match.c b/match.c 42 + index cdb30a15..36e78ed2 100644 43 + --- a/match.c 44 + +++ b/match.c 45 + @@ -232,7 +232,7 @@ static void hash_search(int f,struct sum_struct *s, 46 + done_csum2 = 1; 47 + } 48 + 49 + - if (memcmp(sum2,s->sums[i].sum2,s->s2length) != 0) { 50 + + if (memcmp(sum2, sum2_at(s, i), s->s2length) != 0) { 51 + false_alarms++; 52 + continue; 53 + } 54 + @@ -252,7 +252,7 @@ static void hash_search(int f,struct sum_struct *s, 55 + if (i != aligned_i) { 56 + if (sum != s->sums[aligned_i].sum1 57 + || l != s->sums[aligned_i].len 58 + - || memcmp(sum2, s->sums[aligned_i].sum2, s->s2length) != 0) 59 + + || memcmp(sum2, sum2_at(s, aligned_i), s->s2length) != 0) 60 + goto check_want_i; 61 + i = aligned_i; 62 + } 63 + @@ -271,7 +271,7 @@ static void hash_search(int f,struct sum_struct *s, 64 + if (sum != s->sums[i].sum1) 65 + goto check_want_i; 66 + get_checksum2((char *)map, l, sum2); 67 + - if (memcmp(sum2, s->sums[i].sum2, s->s2length) != 0) 68 + + if (memcmp(sum2, sum2_at(s, i), s->s2length) != 0) 69 + goto check_want_i; 70 + /* OK, we have a re-alignment match. Bump the offset 71 + * forward to the new match point. */ 72 + @@ -290,7 +290,7 @@ static void hash_search(int f,struct sum_struct *s, 73 + && (!updating_basis_file || s->sums[want_i].offset >= offset 74 + || s->sums[want_i].flags & SUMFLG_SAME_OFFSET) 75 + && sum == s->sums[want_i].sum1 76 + - && memcmp(sum2, s->sums[want_i].sum2, s->s2length) == 0) { 77 + + && memcmp(sum2, sum2_at(s, want_i), s->s2length) == 0) { 78 + /* we've found an adjacent match - the RLL coder 79 + * will be happy */ 80 + i = want_i; 81 + diff --git a/rsync.c b/rsync.c 82 + index cd288f57..b130aba5 100644 83 + --- a/rsync.c 84 + +++ b/rsync.c 85 + @@ -437,7 +437,10 @@ int read_ndx_and_attrs(int f_in, int f_out, int *iflag_ptr, uchar *type_ptr, cha 86 + */ 87 + void free_sums(struct sum_struct *s) 88 + { 89 + - if (s->sums) free(s->sums); 90 + + if (s->sums) { 91 + + free(s->sums); 92 + + free(s->sum2_array); 93 + + } 94 + free(s); 95 + } 96 + 97 + diff --git a/rsync.h b/rsync.h 98 + index d3709fe0..8ddbe702 100644 99 + --- a/rsync.h 100 + +++ b/rsync.h 101 + @@ -958,12 +958,12 @@ struct sum_buf { 102 + uint32 sum1; /**< simple checksum */ 103 + int32 chain; /**< next hash-table collision */ 104 + short flags; /**< flag bits */ 105 + - char sum2[SUM_LENGTH]; /**< checksum */ 106 + }; 107 + 108 + struct sum_struct { 109 + OFF_T flength; /**< total file length */ 110 + struct sum_buf *sums; /**< points to info for each chunk */ 111 + + char *sum2_array; /**< checksums of length xfer_sum_len */ 112 + int32 count; /**< how many chunks */ 113 + int32 blength; /**< block_length */ 114 + int32 remainder; /**< flength % block_length */ 115 + @@ -982,6 +982,8 @@ struct map_struct { 116 + int status; /* first errno from read errors */ 117 + }; 118 + 119 + +#define sum2_at(s, i) ((s)->sum2_array + ((OFF_T)(i) * xfer_sum_len)) 120 + + 121 + #define NAME_IS_FILE (0) /* filter name as a file */ 122 + #define NAME_IS_DIR (1<<0) /* filter name as a dir */ 123 + #define NAME_IS_XATTR (1<<2) /* filter name as an xattr */ 124 + diff --git a/sender.c b/sender.c 125 + index 3d4f052e..ab205341 100644 126 + --- a/sender.c 127 + +++ b/sender.c 128 + @@ -31,6 +31,7 @@ extern int log_before_transfer; 129 + extern int stdout_format_has_i; 130 + extern int logfile_format_has_i; 131 + extern int want_xattr_optim; 132 + +extern int xfer_sum_len; 133 + extern int csum_length; 134 + extern int append_mode; 135 + extern int copy_links; 136 + @@ -94,10 +95,11 @@ static struct sum_struct *receive_sums(int f) 137 + return(s); 138 + 139 + s->sums = new_array(struct sum_buf, s->count); 140 + + s->sum2_array = new_array(char, s->count * xfer_sum_len); 141 + 142 + for (i = 0; i < s->count; i++) { 143 + s->sums[i].sum1 = read_int(f); 144 + - read_buf(f, s->sums[i].sum2, s->s2length); 145 + + read_buf(f, sum2_at(s, i), s->s2length); 146 + 147 + s->sums[i].offset = offset; 148 + s->sums[i].flags = 0; 149 + -- 150 + 2.34.1 151 +
+39
pkgs/applications/networking/sync/rsync/CVE-2024-12084/0002-Another-cast-when-multiplying-integers.patch
··· 1 + From 42e2b56c4ede3ab164f9a5c6dae02aa84606a6c1 Mon Sep 17 00:00:00 2001 2 + From: Wayne Davison <wayne@opencoder.net> 3 + Date: Tue, 5 Nov 2024 11:01:03 -0800 4 + Subject: [PATCH 2/2] Another cast when multiplying integers. 5 + 6 + --- 7 + rsync.h | 2 +- 8 + sender.c | 2 +- 9 + 2 files changed, 2 insertions(+), 2 deletions(-) 10 + 11 + diff --git a/rsync.h b/rsync.h 12 + index 8ddbe702..0f9e277f 100644 13 + --- a/rsync.h 14 + +++ b/rsync.h 15 + @@ -982,7 +982,7 @@ struct map_struct { 16 + int status; /* first errno from read errors */ 17 + }; 18 + 19 + -#define sum2_at(s, i) ((s)->sum2_array + ((OFF_T)(i) * xfer_sum_len)) 20 + +#define sum2_at(s, i) ((s)->sum2_array + ((size_t)(i) * xfer_sum_len)) 21 + 22 + #define NAME_IS_FILE (0) /* filter name as a file */ 23 + #define NAME_IS_DIR (1<<0) /* filter name as a dir */ 24 + diff --git a/sender.c b/sender.c 25 + index ab205341..2bbff2fa 100644 26 + --- a/sender.c 27 + +++ b/sender.c 28 + @@ -95,7 +95,7 @@ static struct sum_struct *receive_sums(int f) 29 + return(s); 30 + 31 + s->sums = new_array(struct sum_buf, s->count); 32 + - s->sum2_array = new_array(char, s->count * xfer_sum_len); 33 + + s->sum2_array = new_array(char, (size_t)s->count * xfer_sum_len); 34 + 35 + for (i = 0; i < s->count; i++) { 36 + s->sums[i].sum1 = read_int(f); 37 + -- 38 + 2.34.1 39 +
+27
pkgs/applications/networking/sync/rsync/CVE-2024-12085/0001-prevent-information-leak-off-the-stack.patch
··· 1 + From cf620065502f065d4ea44f5df4f81295a738aa21 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Thu, 14 Nov 2024 09:57:08 +1100 4 + Subject: [PATCH] prevent information leak off the stack 5 + 6 + prevent leak of uninitialised stack data in hash_search 7 + --- 8 + match.c | 3 +++ 9 + 1 file changed, 3 insertions(+) 10 + 11 + diff --git a/match.c b/match.c 12 + index 36e78ed2..dfd6af2c 100644 13 + --- a/match.c 14 + +++ b/match.c 15 + @@ -147,6 +147,9 @@ static void hash_search(int f,struct sum_struct *s, 16 + int more; 17 + schar *map; 18 + 19 + + // prevent possible memory leaks 20 + + memset(sum2, 0, sizeof sum2); 21 + + 22 + /* want_i is used to encourage adjacent matches, allowing the RLL 23 + * coding of the output to work more efficiently. */ 24 + want_i = 0; 25 + -- 26 + 2.34.1 27 +
+37
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0001-refuse-fuzzy-options-when-fuzzy-not-selected.patch
··· 1 + From 3feb8669d875d03c9ceb82e208ef40ddda8eb908 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Sat, 23 Nov 2024 11:08:03 +1100 4 + Subject: [PATCH 1/4] refuse fuzzy options when fuzzy not selected 5 + 6 + this prevents a malicious server providing a file to compare to when 7 + the user has not given the fuzzy option 8 + --- 9 + receiver.c | 5 +++++ 10 + 1 file changed, 5 insertions(+) 11 + 12 + diff --git a/receiver.c b/receiver.c 13 + index 6b4b369e..2d7f6033 100644 14 + --- a/receiver.c 15 + +++ b/receiver.c 16 + @@ -66,6 +66,7 @@ extern char sender_file_sum[MAX_DIGEST_LEN]; 17 + extern struct file_list *cur_flist, *first_flist, *dir_flist; 18 + extern filter_rule_list daemon_filter_list; 19 + extern OFF_T preallocated_len; 20 + +extern int fuzzy_basis; 21 + 22 + extern struct name_num_item *xfer_sum_nni; 23 + extern int xfer_sum_len; 24 + @@ -716,6 +717,10 @@ int recv_files(int f_in, int f_out, char *local_name) 25 + fnamecmp = get_backup_name(fname); 26 + break; 27 + case FNAMECMP_FUZZY: 28 + + if (fuzzy_basis == 0) { 29 + + rprintf(FERROR_XFER, "rsync: refusing malicious fuzzy operation for %s\n", xname); 30 + + exit_cleanup(RERR_PROTOCOL); 31 + + } 32 + if (file->dirname) { 33 + pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, file->dirname, xname); 34 + fnamecmp = fnamecmpbuf; 35 + -- 36 + 2.34.1 37 +
+103
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0002-added-secure_relative_open.patch
··· 1 + From 33385aefe4773e7a3982d41995681eb079c92d12 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Sat, 23 Nov 2024 12:26:10 +1100 4 + Subject: [PATCH 2/4] added secure_relative_open() 5 + 6 + this is an open that enforces no symlink following for all path 7 + components in a relative path 8 + --- 9 + syscall.c | 74 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 10 + 1 file changed, 74 insertions(+) 11 + 12 + diff --git a/syscall.c b/syscall.c 13 + index d92074aa..a4b7f542 100644 14 + --- a/syscall.c 15 + +++ b/syscall.c 16 + @@ -33,6 +33,8 @@ 17 + #include <sys/syscall.h> 18 + #endif 19 + 20 + +#include "ifuncs.h" 21 + + 22 + extern int dry_run; 23 + extern int am_root; 24 + extern int am_sender; 25 + @@ -712,3 +714,75 @@ int do_open_nofollow(const char *pathname, int flags) 26 + 27 + return fd; 28 + } 29 + + 30 + +/* 31 + + open a file relative to a base directory. The basedir can be NULL, 32 + + in which case the current working directory is used. The relpath 33 + + must be a relative path, and the relpath must not contain any 34 + + elements in the path which follow symlinks (ie. like O_NOFOLLOW, but 35 + + applies to all path components, not just the last component) 36 + +*/ 37 + +int secure_relative_open(const char *basedir, const char *relpath, int flags, mode_t mode) 38 + +{ 39 + + if (!relpath || relpath[0] == '/') { 40 + + // must be a relative path 41 + + errno = EINVAL; 42 + + return -1; 43 + + } 44 + + 45 + +#if !defined(O_NOFOLLOW) || !defined(O_DIRECTORY) 46 + + // really old system, all we can do is live with the risks 47 + + if (!basedir) { 48 + + return open(relpath, flags, mode); 49 + + } 50 + + char fullpath[MAXPATHLEN]; 51 + + pathjoin(fullpath, sizeof fullpath, basedir, relpath); 52 + + return open(fullpath, flags, mode); 53 + +#else 54 + + int dirfd = AT_FDCWD; 55 + + if (basedir != NULL) { 56 + + dirfd = openat(AT_FDCWD, basedir, O_RDONLY | O_DIRECTORY); 57 + + if (dirfd == -1) { 58 + + return -1; 59 + + } 60 + + } 61 + + int retfd = -1; 62 + + 63 + + char *path_copy = my_strdup(relpath, __FILE__, __LINE__); 64 + + if (!path_copy) { 65 + + return -1; 66 + + } 67 + + 68 + + for (const char *part = strtok(path_copy, "/"); 69 + + part != NULL; 70 + + part = strtok(NULL, "/")) 71 + + { 72 + + int next_fd = openat(dirfd, part, O_RDONLY | O_DIRECTORY | O_NOFOLLOW); 73 + + if (next_fd == -1 && errno == ENOTDIR) { 74 + + if (strtok(NULL, "/") != NULL) { 75 + + // this is not the last component of the path 76 + + errno = ELOOP; 77 + + goto cleanup; 78 + + } 79 + + // this could be the last component of the path, try as a file 80 + + retfd = openat(dirfd, part, flags | O_NOFOLLOW, mode); 81 + + goto cleanup; 82 + + } 83 + + if (next_fd == -1) { 84 + + goto cleanup; 85 + + } 86 + + if (dirfd != AT_FDCWD) close(dirfd); 87 + + dirfd = next_fd; 88 + + } 89 + + 90 + + // the path must be a directory 91 + + errno = EINVAL; 92 + + 93 + +cleanup: 94 + + free(path_copy); 95 + + if (dirfd != AT_FDCWD) { 96 + + close(dirfd); 97 + + } 98 + + return retfd; 99 + +#endif // O_NOFOLLOW, O_DIRECTORY 100 + +} 101 + -- 102 + 2.34.1 103 +
+103
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0003-receiver-use-secure_relative_open-for-basis-file.patch
··· 1 + From e59ef9939d3f0ccc8f9bab51442989a81be0c914 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Sat, 23 Nov 2024 12:28:13 +1100 4 + Subject: [PATCH 3/4] receiver: use secure_relative_open() for basis file 5 + 6 + this prevents attacks where the basis file is manipulated by a 7 + malicious sender to gain information about files outside the 8 + destination tree 9 + --- 10 + receiver.c | 42 ++++++++++++++++++++++++++---------------- 11 + 1 file changed, 26 insertions(+), 16 deletions(-) 12 + 13 + diff --git a/receiver.c b/receiver.c 14 + index 2d7f6033..8031b8f4 100644 15 + --- a/receiver.c 16 + +++ b/receiver.c 17 + @@ -552,6 +552,8 @@ int recv_files(int f_in, int f_out, char *local_name) 18 + progress_init(); 19 + 20 + while (1) { 21 + + const char *basedir = NULL; 22 + + 23 + cleanup_disable(); 24 + 25 + /* This call also sets cur_flist. */ 26 + @@ -722,27 +724,29 @@ int recv_files(int f_in, int f_out, char *local_name) 27 + exit_cleanup(RERR_PROTOCOL); 28 + } 29 + if (file->dirname) { 30 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, file->dirname, xname); 31 + - fnamecmp = fnamecmpbuf; 32 + - } else 33 + - fnamecmp = xname; 34 + + basedir = file->dirname; 35 + + } 36 + + fnamecmp = xname; 37 + break; 38 + default: 39 + if (fnamecmp_type > FNAMECMP_FUZZY && fnamecmp_type-FNAMECMP_FUZZY <= basis_dir_cnt) { 40 + fnamecmp_type -= FNAMECMP_FUZZY + 1; 41 + if (file->dirname) { 42 + - stringjoin(fnamecmpbuf, sizeof fnamecmpbuf, 43 + - basis_dir[fnamecmp_type], "/", file->dirname, "/", xname, NULL); 44 + - } else 45 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basis_dir[fnamecmp_type], xname); 46 + + pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basis_dir[fnamecmp_type], file->dirname); 47 + + basedir = fnamecmpbuf; 48 + + } else { 49 + + basedir = basis_dir[fnamecmp_type]; 50 + + } 51 + + fnamecmp = xname; 52 + } else if (fnamecmp_type >= basis_dir_cnt) { 53 + rprintf(FERROR, 54 + "invalid basis_dir index: %d.\n", 55 + fnamecmp_type); 56 + exit_cleanup(RERR_PROTOCOL); 57 + - } else 58 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basis_dir[fnamecmp_type], fname); 59 + - fnamecmp = fnamecmpbuf; 60 + + } else { 61 + + basedir = basis_dir[fnamecmp_type]; 62 + + fnamecmp = fname; 63 + + } 64 + break; 65 + } 66 + if (!fnamecmp || (daemon_filter_list.head 67 + @@ -765,7 +769,7 @@ int recv_files(int f_in, int f_out, char *local_name) 68 + } 69 + 70 + /* open the file */ 71 + - fd1 = do_open(fnamecmp, O_RDONLY, 0); 72 + + fd1 = secure_relative_open(basedir, fnamecmp, O_RDONLY, 0); 73 + 74 + if (fd1 == -1 && protocol_version < 29) { 75 + if (fnamecmp != fname) { 76 + @@ -776,14 +780,20 @@ int recv_files(int f_in, int f_out, char *local_name) 77 + 78 + if (fd1 == -1 && basis_dir[0]) { 79 + /* pre-29 allowed only one alternate basis */ 80 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, 81 + - basis_dir[0], fname); 82 + - fnamecmp = fnamecmpbuf; 83 + + basedir = basis_dir[0]; 84 + + fnamecmp = fname; 85 + fnamecmp_type = FNAMECMP_BASIS_DIR_LOW; 86 + - fd1 = do_open(fnamecmp, O_RDONLY, 0); 87 + + fd1 = secure_relative_open(basedir, fnamecmp, O_RDONLY, 0); 88 + } 89 + } 90 + 91 + + if (basedir) { 92 + + // for the following code we need the full 93 + + // path name as a single string 94 + + pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basedir, fnamecmp); 95 + + fnamecmp = fnamecmpbuf; 96 + + } 97 + + 98 + one_inplace = inplace_partial && fnamecmp_type == FNAMECMP_PARTIAL_DIR; 99 + updating_basis_or_equiv = one_inplace 100 + || (inplace && (fnamecmp == fname || fnamecmp_type == FNAMECMP_BACKUP)); 101 + -- 102 + 2.34.1 103 +
+37
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0004-disallow-.-elements-in-relpath-for-secure_relative_o.patch
··· 1 + From c78e53edb802d04f7e4e070fe8314f2544749e7a Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Tue, 26 Nov 2024 09:16:31 +1100 4 + Subject: [PATCH 4/4] disallow ../ elements in relpath for secure_relative_open 5 + 6 + --- 7 + syscall.c | 7 +++++++ 8 + 1 file changed, 7 insertions(+) 9 + 10 + diff --git a/syscall.c b/syscall.c 11 + index a4b7f542..47c5ea57 100644 12 + --- a/syscall.c 13 + +++ b/syscall.c 14 + @@ -721,6 +721,8 @@ int do_open_nofollow(const char *pathname, int flags) 15 + must be a relative path, and the relpath must not contain any 16 + elements in the path which follow symlinks (ie. like O_NOFOLLOW, but 17 + applies to all path components, not just the last component) 18 + + 19 + + The relpath must also not contain any ../ elements in the path 20 + */ 21 + int secure_relative_open(const char *basedir, const char *relpath, int flags, mode_t mode) 22 + { 23 + @@ -729,6 +731,11 @@ int secure_relative_open(const char *basedir, const char *relpath, int flags, mo 24 + errno = EINVAL; 25 + return -1; 26 + } 27 + + if (strncmp(relpath, "../", 3) == 0 || strstr(relpath, "/../")) { 28 + + // no ../ elements allowed in the relpath 29 + + errno = EINVAL; 30 + + return -1; 31 + + } 32 + 33 + #if !defined(O_NOFOLLOW) || !defined(O_DIRECTORY) 34 + // really old system, all we can do is live with the risks 35 + -- 36 + 2.34.1 37 +
+45
pkgs/applications/networking/sync/rsync/CVE-2024-12087/0001-Refuse-a-duplicate-dirlist.patch
··· 1 + From 0ebc19ee486a8e928a68d8f98d07d40f176770aa Mon Sep 17 00:00:00 2001 2 + From: Wayne Davison <wayne@opencoder.net> 3 + Date: Thu, 14 Nov 2024 15:46:50 -0800 4 + Subject: [PATCH 1/2] Refuse a duplicate dirlist. 5 + 6 + --- 7 + flist.c | 9 +++++++++ 8 + rsync.h | 1 + 9 + 2 files changed, 10 insertions(+) 10 + 11 + diff --git a/flist.c b/flist.c 12 + index 464d556e..847b1054 100644 13 + --- a/flist.c 14 + +++ b/flist.c 15 + @@ -2584,6 +2584,15 @@ struct file_list *recv_file_list(int f, int dir_ndx) 16 + init_hard_links(); 17 + #endif 18 + 19 + + if (inc_recurse && dir_ndx >= 0) { 20 + + struct file_struct *file = dir_flist->files[dir_ndx]; 21 + + if (file->flags & FLAG_GOT_DIR_FLIST) { 22 + + rprintf(FERROR_XFER, "rsync: refusing malicious duplicate flist for dir %d\n", dir_ndx); 23 + + exit_cleanup(RERR_PROTOCOL); 24 + + } 25 + + file->flags |= FLAG_GOT_DIR_FLIST; 26 + + } 27 + + 28 + flist = flist_new(0, "recv_file_list"); 29 + flist_expand(flist, FLIST_START_LARGE); 30 + 31 + diff --git a/rsync.h b/rsync.h 32 + index 0f9e277f..b9a7101a 100644 33 + --- a/rsync.h 34 + +++ b/rsync.h 35 + @@ -84,6 +84,7 @@ 36 + #define FLAG_DUPLICATE (1<<4) /* sender */ 37 + #define FLAG_MISSING_DIR (1<<4) /* generator */ 38 + #define FLAG_HLINKED (1<<5) /* receiver/generator (checked on all types) */ 39 + +#define FLAG_GOT_DIR_FLIST (1<<5)/* sender/receiver/generator - dir_flist only */ 40 + #define FLAG_HLINK_FIRST (1<<6) /* receiver/generator (w/FLAG_HLINKED) */ 41 + #define FLAG_IMPLIED_DIR (1<<6) /* sender/receiver/generator (dirs only) */ 42 + #define FLAG_HLINK_LAST (1<<7) /* receiver/generator */ 43 + -- 44 + 2.34.1 45 +
+27
pkgs/applications/networking/sync/rsync/CVE-2024-12087/0002-range-check-dir_ndx-before-use.patch
··· 1 + From b3e16be18d582dac1513c0a932d146b36e867b1b Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Tue, 26 Nov 2024 16:12:45 +1100 4 + Subject: [PATCH 2/2] range check dir_ndx before use 5 + 6 + --- 7 + flist.c | 4 ++++ 8 + 1 file changed, 4 insertions(+) 9 + 10 + diff --git a/flist.c b/flist.c 11 + index 847b1054..087f9da6 100644 12 + --- a/flist.c 13 + +++ b/flist.c 14 + @@ -2585,6 +2585,10 @@ struct file_list *recv_file_list(int f, int dir_ndx) 15 + #endif 16 + 17 + if (inc_recurse && dir_ndx >= 0) { 18 + + if (dir_ndx >= dir_flist->used) { 19 + + rprintf(FERROR_XFER, "rsync: refusing invalid dir_ndx %u >= %u\n", dir_ndx, dir_flist->used); 20 + + exit_cleanup(RERR_PROTOCOL); 21 + + } 22 + struct file_struct *file = dir_flist->files[dir_ndx]; 23 + if (file->flags & FLAG_GOT_DIR_FLIST) { 24 + rprintf(FERROR_XFER, "rsync: refusing malicious duplicate flist for dir %d\n", dir_ndx); 25 + -- 26 + 2.34.1 27 +
+12
pkgs/applications/networking/sync/rsync/default.nix
··· 38 38 patches = [ 39 39 # https://github.com/WayneD/rsync/pull/558 40 40 ./configure.ac-fix-failing-IPv6-check.patch 41 + ./CVE-2024-12084/0001-Some-checksum-buffer-fixes.patch 42 + ./CVE-2024-12084/0002-Another-cast-when-multiplying-integers.patch 43 + ./CVE-2024-12085/0001-prevent-information-leak-off-the-stack.patch 44 + ./CVE-2024-12086/0001-refuse-fuzzy-options-when-fuzzy-not-selected.patch 45 + ./CVE-2024-12086/0002-added-secure_relative_open.patch 46 + ./CVE-2024-12086/0003-receiver-use-secure_relative_open-for-basis-file.patch 47 + ./CVE-2024-12086/0004-disallow-.-elements-in-relpath-for-secure_relative_o.patch 48 + ./CVE-2024-12087/0001-Refuse-a-duplicate-dirlist.patch 49 + ./CVE-2024-12087/0002-range-check-dir_ndx-before-use.patch 50 + ./CVE-2024-12088/0001-make-safe-links-stricter.patch 51 + ./CVE-2024-12747/0001-fixed-symlink-race-condition-in-sender.patch 52 + ./raise-protocol-version-to-32.patch 41 53 ]; 42 54 43 55 buildInputs =
+26
pkgs/applications/networking/sync/rsync/raise-protocol-version-to-32.patch
··· 1 + From 163e05b1680c4a3b448fa68d03c3fca9589f3bc4 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Tue, 10 Dec 2024 13:34:01 +1100 4 + Subject: [PATCH 1/3] raise protocol version to 32 5 + 6 + make it easier to spot unpatched servers 7 + --- 8 + rsync.h | 2 +- 9 + 1 file changed, 1 insertion(+), 1 deletion(-) 10 + 11 + diff --git a/rsync.h b/rsync.h 12 + index b9a7101a..9be1297b 100644 13 + --- a/rsync.h 14 + +++ b/rsync.h 15 + @@ -111,7 +111,7 @@ 16 + 17 + /* Update this if you make incompatible changes and ALSO update the 18 + * SUBPROTOCOL_VERSION if it is not a final (official) release. */ 19 + -#define PROTOCOL_VERSION 31 20 + +#define PROTOCOL_VERSION 32 21 + 22 + /* This is used when working on a new protocol version or for any unofficial 23 + * protocol tweaks. It should be a non-zero value for each pre-release repo 24 + -- 25 + 2.34.1 26 +
+3 -7
pkgs/applications/video/obs-studio/plugins/obs-transition-table.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "obs-transition-table"; 12 - version = "0.2.7"; 12 + version = "0.2.7-unstable-2024-11-27"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "exeldro"; 16 16 repo = "obs-transition-table"; 17 - rev = version; 18 - sha256 = "sha256-rGF7hugC5ybpZBAIIXDiy3YDooMawf/yYX2YucQm2/U="; 17 + rev = "976fe236dac7082b6c953f950fcb9e50495ce624"; 18 + sha256 = "sha256-TPRqKjEXdvjv+RfHTaeeO4GHur2j/+onehcu0I/HdD0="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ cmake ]; 22 22 buildInputs = [ 23 23 obs-studio 24 24 qtbase 25 - ]; 26 - 27 - cmakeFlags = [ 28 - "-DBUILD_OUT_OF_TREE=On" 29 25 ]; 30 26 31 27 dontWrapQtApps = true;
+10 -3
pkgs/build-support/build-fhsenv-bubblewrap/default.nix
··· 12 12 }: 13 13 14 14 { 15 + pname ? throw "You must provide either `name` or `pname`", 16 + version ? throw "You must provide either `name` or `version`", 17 + name ? "${pname}-${version}", 15 18 runScript ? "bash", 16 19 nativeBuildInputs ? [ ], 17 20 extraInstallCommands ? "", 21 + executableName ? args.pname or name, 18 22 meta ? { }, 19 23 passthru ? { }, 20 24 extraPreBwrapCmds ? "", ··· 30 34 ... 31 35 }@args: 32 36 33 - assert (!args ? pname || !args ? version) -> (args ? name); # You must provide name if pname or version (preferred) is missing. 37 + # NOTE: 38 + # `pname` and `version` will throw if they were not provided. 39 + # Use `name` instead of directly evaluating `pname` or `version`. 40 + # 41 + # If you need `pname` or `version` sepcifically, use `args` instead: 42 + # e.g. `args.pname or ...`. 34 43 35 44 let 36 45 inherit (lib) ··· 48 57 # explicit about which package set it's coming from. 49 58 inherit (pkgsHostTarget) pkgsi686Linux; 50 59 51 - name = args.name or "${args.pname}-${args.version}"; 52 - executableName = args.pname or args.name; 53 60 # we don't know which have been supplied, and want to avoid defaulting missing attrs to null. Passed into runCommandLocal 54 61 nameAttrs = lib.filterAttrs ( 55 62 key: value:
+2 -2
pkgs/by-name/ae/aerospike/package.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "aerospike-server"; 15 - version = "7.2.0.4"; 15 + version = "7.2.0.6"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "aerospike"; 19 19 repo = "aerospike-server"; 20 20 rev = version; 21 - hash = "sha256-g07rfQabjfvfl8rkLDgeTGq1J0pczdasTXIsWqUvz7w="; 21 + hash = "sha256-YjX/2+0n+nrtNwQaZSY5PPYAOnhR+jrIMp02STcJHRY="; 22 22 fetchSubmodules = true; 23 23 }; 24 24
+2 -2
pkgs/by-name/au/authentik/package.nix
··· 15 15 }: 16 16 17 17 let 18 - version = "2024.12.1"; 18 + version = "2024.12.2"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "goauthentik"; 22 22 repo = "authentik"; 23 23 rev = "version/${version}"; 24 - hash = "sha256-CkUmsVKzAQ/VWIhtxWxlcGtrWVa8hxqsMqvfcsG5ktA="; 24 + hash = "sha256-Z3rFFrXrOKaF9NpY/fInsEbzdOWnWqLfEYl7YX9hFEU="; 25 25 }; 26 26 27 27 meta = with lib; {
+63 -26
pkgs/by-name/co/code-cursor/package.nix
··· 9 9 let 10 10 pname = "cursor"; 11 11 version = "0.44.11"; 12 - appKey = "230313mzl4w4u92"; 13 - src = fetchurl { 14 - url = "https://download.todesktop.com/230313mzl4w4u92/cursor-0.44.11-build-250103fqxdt5u9z-x86_64.AppImage"; 15 - hash = "sha256-eOZuofnpED9F6wic0S9m933Tb7Gq7cb/v0kRDltvFVg="; 12 + 13 + sources = { 14 + x86_64-linux = fetchurl { 15 + url = "https://download.todesktop.com/230313mzl4w4u92/cursor-0.44.11-build-250103fqxdt5u9z-x86_64.AppImage"; 16 + hash = "sha256-eOZuofnpED9F6wic0S9m933Tb7Gq7cb/v0kRDltvFVg="; 17 + }; 18 + aarch64-linux = fetchurl { 19 + url = "https://download.todesktop.com/230313mzl4w4u92/cursor-0.44.11-build-250103fqxdt5u9z-arm64.AppImage"; 20 + hash = "sha256-mxq7tQJfDccE0QsZDZbaFUKO0Xc141N00ntX3oEYRcc="; 21 + }; 16 22 }; 17 - appimageContents = appimageTools.extractType2 { inherit version pname src; }; 18 - in 19 - stdenvNoCC.mkDerivation { 20 - inherit pname version; 23 + 24 + supportedPlatforms = [ 25 + "x86_64-linux" 26 + "aarch64-linux" 27 + ]; 28 + 29 + src = sources.${stdenvNoCC.hostPlatform.system}; 21 30 22 - src = appimageTools.wrapType2 { inherit version pname src; }; 31 + appimageContents = appimageTools.extractType2 { 32 + inherit version pname src; 33 + }; 23 34 24 - nativeBuildInputs = [ makeWrapper ]; 35 + wrappedAppImage = appimageTools.wrapType2 { inherit version pname src; }; 25 36 26 - installPhase = '' 37 + appimageInstall = '' 27 38 runHook preInstall 28 39 29 40 mkdir -p $out/ ··· 43 54 runHook postInstall 44 55 ''; 45 56 46 - passthru.updateScript = writeScript "update.sh" '' 47 - #!/usr/bin/env nix-shell 48 - #!nix-shell -i bash -p curl yq coreutils gnused common-updater-scripts 49 - set -eu -o pipefail 50 - latestLinux="$(curl -s https://download.todesktop.com/${appKey}/latest-linux.yml)" 51 - version="$(echo "$latestLinux" | yq -r .version)" 52 - filename="$(echo "$latestLinux" | yq -r '.files[] | .url | select(. | endswith(".AppImage"))')" 53 - url="https://download.todesktop.com/${appKey}/$filename" 54 - currentVersion=$(nix-instantiate --eval -E "with import ./. {}; code-cursor.version or (lib.getVersion code-cursor)" | tr -d '"') 57 + in 58 + stdenvNoCC.mkDerivation { 59 + inherit pname version; 60 + 61 + src = wrappedAppImage; 62 + 63 + nativeBuildInputs = [ makeWrapper ]; 64 + 65 + installPhase = appimageInstall; 66 + 67 + passthru = { 68 + inherit sources; 69 + updateScript = writeScript "update.sh" '' 70 + #!/usr/bin/env nix-shell 71 + #!nix-shell -i bash -p curl yq coreutils gnused common-updater-scripts 72 + set -eu -o pipefail 73 + baseUrl="https://download.todesktop.com/230313mzl4w4u92" 74 + latestLinux="$(curl -s $baseUrl/latest-linux.yml)" 75 + version="$(echo "$latestLinux" | yq -r .version)" 76 + filename="$(echo "$latestLinux" | yq -r '.files[] | .url | select(. | endswith(".AppImage"))')" 77 + linuxStem="$(echo "$filename" | sed -E s/^\(cursor-.+-build-.*\)-.+$/\\1/)" 55 78 56 - if [[ "$version" != "$currentVersion" ]]; then 57 - hash=$(nix-hash --to-sri --type sha256 "$(nix-prefetch-url "$url")") 58 - update-source-version code-cursor "$version" "$hash" "$url" --source-key=src.src 59 - fi 60 - ''; 79 + currentVersion=$(nix-instantiate --eval -E "with import ./. {}; code-cursor.version or (lib.getVersion code-cursor)" | tr -d '"') 80 + 81 + if [[ "$version" != "$currentVersion" ]]; then 82 + for platform in ${lib.escapeShellArgs supportedPlatforms}; do 83 + if [ $platform = "x86_64-linux" ]; then 84 + url="$baseUrl/$linuxStem-x86_64.AppImage" 85 + elif [ $platform = "aarch64-linux" ]; then 86 + url="$baseUrl/$linuxStem-arm64.AppImage" 87 + else 88 + echo "Unsupported platform: $platform" 89 + exit 1 90 + fi 91 + 92 + hash=$(nix-hash --to-sri --type sha256 "$(nix-prefetch-url "$url")") 93 + update-source-version code-cursor $version $hash $url --system=$platform --ignore-same-version --source-key="sources.$platform" 94 + done 95 + fi 96 + ''; 97 + }; 61 98 62 99 meta = { 63 100 description = "AI-powered code editor built on vscode"; ··· 66 103 license = lib.licenses.unfree; 67 104 sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 68 105 maintainers = with lib.maintainers; [ sarahec ]; 69 - platforms = [ "x86_64-linux" ]; 106 + platforms = lib.platforms.linux; 70 107 mainProgram = "cursor"; 71 108 }; 72 109 }
+3 -3
pkgs/by-name/co/containerd/package.nix
··· 16 16 17 17 buildGoModule rec { 18 18 pname = "containerd"; 19 - version = "2.0.1"; 19 + version = "2.0.2"; 20 20 21 21 outputs = [ 22 22 "out" ··· 27 27 owner = "containerd"; 28 28 repo = "containerd"; 29 29 tag = "v${version}"; 30 - hash = "sha256-gD0XRZThU/T8qxLyyboyE6GsX911ylt7hH59S+rB7vQ="; 30 + hash = "sha256-aCC6nH+bxjk6dUIzUva4ILH0FD6QkWiJmdrcMLA18Jw="; 31 31 }; 32 32 33 33 postPatch = "patchShebangs ."; ··· 89 89 meta = { 90 90 description = "Daemon to control runC"; 91 91 homepage = "https://containerd.io/"; 92 - changelog = "https://github.com/containerd/containerd/releases/tag/${version}"; 92 + changelog = "https://github.com/containerd/containerd/releases/tag/v${version}"; 93 93 license = lib.licenses.asl20; 94 94 maintainers = with lib.maintainers; [ 95 95 offline
+11 -6
pkgs/by-name/cu/curv/package.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchFromGitHub, 4 + fetchFromGitea, 5 5 cmake, 6 + git, 7 + pkg-config, 6 8 boost, 7 9 eigen, 8 10 glm, ··· 17 19 18 20 stdenv.mkDerivation rec { 19 21 pname = "curv"; 20 - version = "0.5"; 22 + version = "0.5-unstable-2025-01-06"; 21 23 22 - src = fetchFromGitHub { 23 - owner = "curv3d"; 24 + src = fetchFromGitea { 25 + domain = "codeberg.org"; 26 + owner = "doug-moen"; 24 27 repo = "curv"; 25 - tag = version; 26 - hash = "sha256-m4p5uxRk6kEJUilmbQ1zJcQDRvRCV7pkxnqupZJxyjo="; 28 + rev = "a496d98459b65d15feae8e69036944dafb7ec26e"; 29 + hash = "sha256-2pe76fBU78xRvHxol8O1xv0bBVwbpKDVPLQqqUCTO0Y="; 27 30 fetchSubmodules = true; 28 31 }; 29 32 30 33 strictDeps = true; 31 34 nativeBuildInputs = [ 32 35 cmake 36 + git 37 + pkg-config 33 38 ]; 34 39 35 40 buildInputs =
+1
pkgs/by-name/cy/cyrus-imapd/package.nix
··· 126 126 [ 127 127 zlib 128 128 cyrus_sasl 129 + sqlite 129 130 ] 130 131 # Darwin doesn't have libuuid, try to build without it 131 132 ++ lib.optional (!stdenv.hostPlatform.isDarwin) libuuid;
+3 -3
pkgs/by-name/dd/ddns-go/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "ddns-go"; 9 - version = "6.7.7"; 9 + version = "6.8.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "jeessy2"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - hash = "sha256-MzhZ9u4noPLdtrbALi42GI9i+nb4rRdugMzd20rJ6b0="; 15 + hash = "sha256-zVNlsFPSLI8mXBUOo8z7nM4nShNd0ZwG5lZL2VyeGi8="; 16 16 }; 17 17 18 - vendorHash = "sha256-e8/z1vriyHXPY1OvkGFqeZHJhz5ssOlqD/Uwt5xq8Uw="; 18 + vendorHash = "sha256-D66uremGVcTcyBlCA9vrQM5zGPFR96FqVak6tATEdI0="; 19 19 20 20 ldflags = [ 21 21 "-X main.version=${version}"
+2 -2
pkgs/by-name/ds/dsniff/package.nix
··· 71 71 domain = "salsa.debian.org"; 72 72 owner = "pkg-security-team"; 73 73 repo = "dsniff"; 74 - rev = "debian/${version}+debian-30"; 75 - sha256 = "1fk2k0sfdp5g27i11g0sbzm7al52raz5yr1aibzssnysv7l9xgzh"; 74 + rev = "debian/${version}+debian-34"; 75 + sha256 = "sha256-CY0+G09KZXtAwKuaYh5/qcmZjuNhdGis3zCG14hWtqw="; 76 76 name = "dsniff.tar.gz"; 77 77 }; 78 78
+51
pkgs/by-name/ff/ffizer/package.nix
··· 1 + { 2 + lib, 3 + rustPlatform, 4 + fetchFromGitHub, 5 + pkg-config, 6 + libgit2, 7 + openssl, 8 + zlib, 9 + }: 10 + 11 + rustPlatform.buildRustPackage rec { 12 + pname = "ffizer"; 13 + version = "2.13.1"; 14 + 15 + buildFeatures = [ "cli" ]; 16 + 17 + src = fetchFromGitHub { 18 + owner = "ffizer"; 19 + repo = "ffizer"; 20 + rev = version; 21 + hash = "sha256-ZX6Zv6ioAO33Cc5WCVBgJWlOmNvbVgckMylRnphpOdw="; 22 + }; 23 + 24 + cargoHash = "sha256-4fZLL4vQxAeyqQssmEd1C72fzMXCGHtUPCGpaVupy6Q="; 25 + 26 + nativeBuildInputs = [ 27 + pkg-config 28 + ]; 29 + 30 + buildInputs = [ 31 + libgit2 32 + openssl 33 + zlib 34 + ]; 35 + 36 + env.OPENSSL_NO_VENDOR = true; 37 + 38 + checkFlags = [ 39 + # requires internet access 40 + "--skip=run_test_samples_tests_data_template_2" 41 + ]; 42 + 43 + meta = { 44 + description = "Files and folders initializer / generator based on templates"; 45 + homepage = "https://github.com/ffizer/ffizer"; 46 + changelog = "https://github.com/ffizer/ffizer/blob/${src.rev}/CHANGELOG.md"; 47 + license = lib.licenses.cc0; 48 + maintainers = with lib.maintainers; [ XBagon ]; 49 + mainProgram = "ffizer"; 50 + }; 51 + }
+2
pkgs/by-name/gn/gnome-builder/package.nix
··· 142 142 gappsWrapperArgs+=( 143 143 # For sysprof-agent 144 144 --prefix PATH : "${sysprof}/bin" 145 + # libpanel icons 146 + --prefix XDG_DATA_DIRS : "${libpanel}/share" 145 147 ) 146 148 147 149 # Ensure that all plugins get their interpreter paths fixed up.
+3 -3
pkgs/by-name/go/gogup/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "gogup"; 9 - version = "0.27.5"; 9 + version = "0.27.6"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "nao1215"; 13 13 repo = "gup"; 14 14 rev = "v${version}"; 15 - hash = "sha256-I4l/sDqafc/ZO8kKc4iOSMFLS0YZrAqRFOXn0N7Myo4="; 15 + hash = "sha256-d+VN3BBhGiVdLpCHP08vi7lYSeL6QovswtPNvEbS9fc="; 16 16 }; 17 17 18 - vendorHash = "sha256-rtdbPwVZHwofpGccYU8NBiaikzNMIwSDggbRdnGTBu8="; 18 + vendorHash = "sha256-jvVtwA7563ptWat/YS8klRnG3+NO3PeW0vl17yt8q8M="; 19 19 doCheck = false; 20 20 21 21 ldflags = [
+4 -4
pkgs/by-name/go/goperf/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "goperf"; 12 - version = "0-unstable-2024-12-04"; 12 + version = "0-unstable-2025-01-06"; 13 13 14 14 src = fetchgit { 15 15 url = "https://go.googlesource.com/perf"; 16 - rev = "711ff2ab72314f5a878a356d9ff7ab8460de731f"; 17 - hash = "sha256-T0LHlO9ObVJ68pERkY+6eJCxY+Lj9eHvOxlCRevwbuE="; 16 + rev = "400946f43c825f133ced1d2662be611959d1335c"; 17 + hash = "sha256-w7HUDDfsZ60ZNryewh83mJ6ZMfMpnvW6ehhijKss7B0="; 18 18 }; 19 19 20 - vendorHash = "sha256-OrrciJqJLTMM+yF9SD/eRucwOrfcZuuyR+xE6+DlYpo="; 20 + vendorHash = "sha256-WHkeLS8Sdq2oP7hD0MKVrcENclaOWTeSVCXm+aimqIU="; 21 21 22 22 passthru.updateScript = writeShellScript "update-goperf" '' 23 23 export UPDATE_NIX_ATTR_PATH=goperf
+67
pkgs/by-name/gr/greetd-mini-wl-greeter/package.nix
··· 1 + { 2 + fetchFromGitHub, 3 + lib, 4 + stdenv, 5 + unstableGitUpdater, 6 + cairo, 7 + glib, 8 + json_c, 9 + libGL, 10 + libepoxy, 11 + libpng, 12 + libxkbcommon, 13 + meson, 14 + ninja, 15 + pango, 16 + pkg-config, 17 + scdoc, 18 + wayland, 19 + wayland-protocols, 20 + wayland-scanner, 21 + }: 22 + stdenv.mkDerivation { 23 + pname = "greetd-mini-wl-greeter"; 24 + version = "0-unstable-2024-12-27"; 25 + 26 + src = fetchFromGitHub { 27 + owner = "philj56"; 28 + repo = "greetd-mini-wl-greeter"; 29 + rev = "61f25ed34a1a35a061c2f3605fc3d4b37a7d0d8e"; 30 + hash = "sha256-ifeQbzMA9O+yhLveTXpEmgG2BsSp4lxbd3yo8o69fxA="; 31 + }; 32 + 33 + nativeBuildInputs = [ 34 + libGL 35 + cairo 36 + glib 37 + json_c 38 + libepoxy 39 + libpng 40 + libxkbcommon 41 + pango 42 + wayland 43 + wayland-protocols 44 + wayland-scanner 45 + ]; 46 + 47 + # https://github.com/philj56/greetd-mini-wl-greeter/issues/2 48 + mesonBuildType = "release"; 49 + 50 + buildInputs = [ 51 + meson 52 + ninja 53 + pkg-config 54 + scdoc 55 + ]; 56 + 57 + passthru.updateScript = unstableGitUpdater { }; 58 + 59 + meta = { 60 + description = "Extremely minimal raw Wayland greeter for greetd"; 61 + license = lib.licenses.mit; 62 + homepage = "https://github.com/philj56/greetd-mini-wl-greeter"; 63 + mainProgram = "greetd-mini-wl-greeter"; 64 + platforms = lib.platforms.linux; 65 + maintainers = with lib.maintainers; [ _0x5a4 ]; 66 + }; 67 + }
+3 -12
pkgs/by-name/im/imhex/package.nix
··· 2 2 lib, 3 3 stdenv, 4 4 cmake, 5 - llvmPackages_17, 5 + llvm, 6 6 fetchFromGitHub, 7 7 mbedtls, 8 8 gtk3, ··· 24 24 nix-update-script, 25 25 autoPatchelfHook, 26 26 makeWrapper, 27 - overrideSDK, 28 27 }: 29 28 30 29 let 31 30 version = "1.36.2"; 32 31 patterns_version = "1.36.2"; 33 32 34 - llvmPackages = llvmPackages_17; 35 - 36 - stdenv' = 37 - let 38 - baseStdenv = if stdenv.cc.isClang then llvmPackages.stdenv else stdenv; 39 - in 40 - if stdenv.hostPlatform.isDarwin then overrideSDK baseStdenv "11.0" else baseStdenv; 41 - 42 33 patterns_src = fetchFromGitHub { 43 34 name = "ImHex-Patterns-source-${patterns_version}"; 44 35 owner = "WerWolv"; ··· 48 39 }; 49 40 50 41 in 51 - stdenv'.mkDerivation (finalAttrs: { 42 + stdenv.mkDerivation (finalAttrs: { 52 43 pname = "imhex"; 53 44 inherit version; 54 45 ··· 65 56 66 57 nativeBuildInputs = [ 67 58 cmake 68 - llvmPackages.llvm 59 + llvm 69 60 python3 70 61 perl 71 62 pkg-config
+3 -3
pkgs/by-name/ja/jawiki-all-titles-in-ns0/package.nix
··· 7 7 8 8 stdenvNoCC.mkDerivation { 9 9 pname = "jawiki-all-titles-in-ns0"; 10 - version = "0-unstable-2024-12-01"; 10 + version = "0-unstable-2025-01-01"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "musjj"; 14 14 repo = "jawiki-archive"; 15 - rev = "a4146faaca34c37a36f26e1e75990187cac40954"; 16 - hash = "sha256-FuLtXgyEpHZWeZbbrKXalXeycf7gtkfWMYoM7j2mOds="; 15 + rev = "dbd1e032f8685387c0dbeb1a472ab9215250d11f"; 16 + hash = "sha256-2GjbXjsf8OV/9EuX675hBXTWQsf+KhKhh1IiAxbzqfU="; 17 17 }; 18 18 19 19 installPhase = ''
+3 -3
pkgs/by-name/jp/jp-zip-codes/package.nix
··· 7 7 8 8 stdenvNoCC.mkDerivation { 9 9 pname = "jp-zip-code"; 10 - version = "0-unstable-2024-12-01"; 10 + version = "0-unstable-2025-01-01"; 11 11 12 12 # This package uses a mirror as the source because the 13 13 # original provider uses the same URL for updated content. 14 14 src = fetchFromGitHub { 15 15 owner = "musjj"; 16 16 repo = "jp-zip-codes"; 17 - rev = "94071d5f73bcea043694d1e9a557f6e526b44096"; 18 - hash = "sha256-RyXJZOwZmtW9vP0lEctE3t1DItBFOop7vdTi0IAH8E8="; 17 + rev = "45aa11f1f60515893b0eb8f533f540632b394564"; 18 + hash = "sha256-qcP1lc5E1RS+n7e3hmZwaHtnf9ErOYprW+/w0r65ZuI="; 19 19 }; 20 20 21 21 installPhase = ''
+2 -2
pkgs/by-name/ju/justbuild/package.nix
··· 33 33 in 34 34 stdenv.mkDerivation rec { 35 35 pname = "justbuild"; 36 - version = "1.4.1"; 36 + version = "1.4.2"; 37 37 38 38 src = fetchFromGitHub { 39 39 owner = "just-buildsystem"; 40 40 repo = "justbuild"; 41 41 rev = "refs/tags/v${version}"; 42 - hash = "sha256-asbJdm50srMinr8sguGR3rWT7YXm75Zjm2Dvj53PpMc="; 42 + hash = "sha256-oMl+hY7E4vYB4J/5LXq6sw9bafYwhXY8lkEWwU6j0Fk="; 43 43 }; 44 44 45 45 bazelapi = fetchurl {
+2 -2
pkgs/by-name/k6/k6/package.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "k6"; 11 - version = "0.55.2"; 11 + version = "0.56.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "grafana"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - hash = "sha256-BuZsz5+vp4obL/Gj/gJSgA0xxdYmqd+MKggS62Jo+bM="; 17 + hash = "sha256-QU/FJZqyodwUGxb3MjaQXIGWZSlrkxKe4bh6r/p7jrQ="; 18 18 }; 19 19 20 20 subPackages = [ "./" ];
+2 -2
pkgs/by-name/ke/keycloak/package.nix
··· 24 24 in 25 25 stdenv.mkDerivation rec { 26 26 pname = "keycloak"; 27 - version = "26.0.7"; 27 + version = "26.0.8"; 28 28 29 29 src = fetchzip { 30 30 url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; 31 - hash = "sha256-yIv9gAjCfzjWDLZHQbgGEjhMefY1idzZTEbqVyXjFdw="; 31 + hash = "sha256-o4Yken4PlitebEBNI+BrQqYM+RtsURj0LvYFBSjuQIE="; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+3 -3
pkgs/by-name/lo/lockbook-desktop/package.nix
··· 18 18 in 19 19 rustPlatform.buildRustPackage rec { 20 20 pname = "lockbook-desktop"; 21 - version = "0.9.15"; 21 + version = "0.9.16"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "lockbook"; 25 25 repo = "lockbook"; 26 26 tag = version; 27 - hash = "sha256-hqBjA/6MWlhVjV4m+cIcnoRTApHuzbPzivMsaQHfRcc="; 27 + hash = "sha256-FHD84IJ2ahxB8L75xep+TSb8e+DtUsjEyHc6P/SFi9c="; 28 28 }; 29 29 30 30 useFetchCargoVendor = true; 31 - cargoHash = "sha256-+M+wL26KDbLKhcujPyWAsTlXwLrQVCUbTnnu/7sXul4="; 31 + cargoHash = "sha256-z00WBA/51zmqFCBX1hD3dLKvuvxQvuyvtBGrxxAr7FE="; 32 32 33 33 nativeBuildInputs = [ 34 34 pkg-config
+3 -3
pkgs/by-name/lo/lockbook/package.nix
··· 7 7 }: 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "lockbook"; 10 - version = "0.9.15"; 10 + version = "0.9.16"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "lockbook"; 14 14 repo = "lockbook"; 15 15 tag = version; 16 - hash = "sha256-hqBjA/6MWlhVjV4m+cIcnoRTApHuzbPzivMsaQHfRcc="; 16 + hash = "sha256-FHD84IJ2ahxB8L75xep+TSb8e+DtUsjEyHc6P/SFi9c="; 17 17 }; 18 18 19 19 useFetchCargoVendor = true; 20 - cargoHash = "sha256-+M+wL26KDbLKhcujPyWAsTlXwLrQVCUbTnnu/7sXul4="; 20 + cargoHash = "sha256-z00WBA/51zmqFCBX1hD3dLKvuvxQvuyvtBGrxxAr7FE="; 21 21 22 22 doCheck = false; # there are no cli tests 23 23 cargoBuildFlags = [
+2 -2
pkgs/by-name/lz/lzlib/package.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "lzlib"; 11 - version = "1.14"; 11 + version = "1.15"; 12 12 outputs = [ 13 13 "out" 14 14 "info" ··· 21 21 22 22 src = fetchurl { 23 23 url = "mirror://savannah/lzip/lzlib/lzlib-${finalAttrs.version}.tar.lz"; 24 - hash = "sha256-42LszNgtTdKX32pRuVLGXSFy+b9BpcRZDTYE2DqlGdM="; 24 + hash = "sha256-nUVIDnyBccZPodW+7iy9guaf6+kQ8M5ii4dqj+IUFTQ="; 25 25 # hash from release email 26 26 }; 27 27
+3 -3
pkgs/by-name/me/mercure/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "mercure"; 12 - version = "0.17.1"; 12 + version = "0.18.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "dunglas"; 16 16 repo = "mercure"; 17 17 rev = "v${version}"; 18 - hash = "sha256-TRKlX4dNCvD9wBp+JNpmB9J1lt0Eyc0pQ/ucvtiDGto="; 18 + hash = "sha256-BJVCVvz8AdkQwLD37oQc7YPaZ7l74o9Dik9u/ZBSRro="; 19 19 }; 20 20 21 21 sourceRoot = "${src.name}/caddy"; 22 22 23 - vendorHash = "sha256-0tyvb11rBtrTbA+eAV1E5Y2tZeAwtrpONHBOLaVxuaQ="; 23 + vendorHash = "sha256-QqG8rxGQW+Lmd2L+wKiKUV+GXcxoO04yhJhDvMqwTVc="; 24 24 25 25 subPackages = [ "mercure" ]; 26 26 excludedPackages = [ "../cmd/mercure" ];
+2 -2
pkgs/by-name/mq/mqtt-exporter/package.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication rec { 8 8 pname = "mqtt-exporter"; 9 - version = "1.5.0"; 9 + version = "1.6.1"; 10 10 pyproject = true; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "kpetremann"; 14 14 repo = "mqtt-exporter"; 15 15 tag = "v${version}"; 16 - hash = "sha256-3gUAiujfBXJpVailx8cMmSJS7l69XpE4UGK/aebcQqY="; 16 + hash = "sha256-XTgnD3H48KKclPhfmBPiWQPaJkfiBxjq2YQusOPLFJQ="; 17 17 }; 18 18 19 19 pythonRelaxDeps = [ "prometheus-client" ];
+1 -1
pkgs/by-name/my/mysql-workbench/dont-search-for-antlr-jar.patch
··· 1 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index b7320bb..d7169da 100644 2 + index 3dd3e19..4290041 100644 3 3 --- a/CMakeLists.txt 4 4 +++ b/CMakeLists.txt 5 5 @@ -143,25 +143,6 @@ check_function_exists (strtoull HAVE_STRTOULL)
+17 -17
pkgs/by-name/my/mysql-workbench/hardcode-paths.patch
··· 84 84 if to_spawn: 85 85 command += ' &' 86 86 - sudo_prefix += ' /usr/bin/nohup' 87 - + sudo_prefix += ' @nohup@' 87 + + sudo_prefix += ' @coreutils@/bin/nohup' 88 88 89 89 # If as_user is the CURRENT then there's no need to sudo 90 90 if as_user != Users.CURRENT: ··· 102 102 def get_file_owner(self, path, as_user = Users.CURRENT, user_password = None): 103 103 if self.target_os == wbaOS.linux: 104 104 - command = 'LC_ALL=C stat -c %U ' 105 - + command = 'LC_ALL=C @stat@ -c %U ' 105 + + command = 'LC_ALL=C @coreutils@/bin/stat -c %U ' 106 106 else: 107 107 - command = 'LC_ALL=C /usr/bin/stat -f "%Su" ' 108 - + command = 'LC_ALL=C @stat@ -f "%Su" ' 108 + + command = 'LC_ALL=C @coreutils@/bin/stat -f "%Su" ' 109 109 110 110 output = io.StringIO() 111 111 command = command + quote_path(path) ··· 114 114 raise PermissionDeniedError("Cannot set owner of directory %s" % path) 115 115 else: 116 116 - command = "/bin/mkdir %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 117 - + command = "@mkdir@ %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 117 + + command = "@coreutils@/bin/mkdir %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 118 118 else: 119 119 - command = "/bin/mkdir %s" % (quote_path(path)) 120 - + command = "@mkdir@ %s" % (quote_path(path)) 120 + + command = "@coreutils@/bin/mkdir %s" % (quote_path(path)) 121 121 122 122 res = self.process_ops.exec_cmd(command, 123 123 as_user = as_user, ··· 126 126 def remove_directory(self, path, as_user = Users.CURRENT, user_password = None): 127 127 output = io.StringIO() 128 128 - res = self.process_ops.exec_cmd('/bin/rmdir ' + quote_path(path), 129 - + res = self.process_ops.exec_cmd('@rmdir@ ' + quote_path(path), 129 + + res = self.process_ops.exec_cmd('@coreutils@/bin/rmdir ' + quote_path(path), 130 130 as_user = as_user, 131 131 user_password = user_password, 132 132 output_handler = output.write, ··· 135 135 def remove_directory_recursive(self, path, as_user = Users.CURRENT, user_password = None): 136 136 output = io.StringIO() 137 137 - res = self.process_ops.exec_cmd('/bin/rm -R ' + quote_path(path), 138 - + res = self.process_ops.exec_cmd('@rm@ -R ' + quote_path(path), 138 + + res = self.process_ops.exec_cmd('@coreutils@/bin/rm -R ' + quote_path(path), 139 139 as_user = as_user, 140 140 user_password = user_password, 141 141 output_handler = output.write, ··· 144 144 def delete_file(self, path, as_user = Users.CURRENT, user_password = None): 145 145 output = io.StringIO() 146 146 - res = self.process_ops.exec_cmd("/bin/rm " + quote_path(path), 147 - + res = self.process_ops.exec_cmd("@rm@ " + quote_path(path), 147 + + res = self.process_ops.exec_cmd("@coreutils@/bin/rm " + quote_path(path), 148 148 as_user = as_user, 149 149 user_password = user_password, 150 150 output_handler = output.write, ··· 153 153 output = io.StringIO() 154 154 155 155 - res = self.process_ops.exec_cmd("LC_ALL=C /bin/cp " + quote_path(source) + " " + quote_path(dest), 156 - + res = self.process_ops.exec_cmd("LC_ALL=C @cp@ " + quote_path(source) + " " + quote_path(dest), 156 + + res = self.process_ops.exec_cmd("LC_ALL=C @coreutils@/bin/cp " + quote_path(source) + " " + quote_path(dest), 157 157 as_user = as_user, 158 158 user_password = user_password, 159 159 output_handler = output.write, ··· 162 162 # since both cases are possible, we need to handle both at the same time (1st line being total <nnnn> or not) 163 163 # the good news is that if the line is there, then it will always start with total, regardless of the locale 164 164 - command = 'LC_ALL=C /bin/ls -l -p %s' % quote_path(path) 165 - + command = 'LC_ALL=C @ls@ -l -p %s' % quote_path(path) 165 + + command = 'LC_ALL=C @coreutils@/bin/ls -l -p %s' % quote_path(path) 166 166 else: 167 167 - command = 'LC_ALL=C /bin/ls -1 -p %s' % quote_path(path) 168 - + command = 'LC_ALL=C @ls@ -1 -p %s' % quote_path(path) 168 + + command = 'LC_ALL=C @coreutils@/bin/ls -1 -p %s' % quote_path(path) 169 169 170 170 output = io.StringIO() 171 171 res = self.process_ops.exec_cmd(command, ··· 174 174 f = io.StringIO() 175 175 if not self._need_sudo: 176 176 - ret = self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 177 - + ret = self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 177 + + ret = self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 178 178 else: 179 179 - ret = self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 180 - + ret = self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 180 + + ret = self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 181 181 182 182 if ret != 0: 183 183 raise RuntimeError("Could not get data from file %s" % self.path) ··· 186 186 def read_task(self, offset, file): 187 187 if not self._need_sudo: 188 188 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 189 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 189 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 190 190 else: 191 191 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 192 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 192 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 193 193 # this will signal the reader end that there's no more data 194 194 file.close() 195 195 ··· 198 198 f = io.StringIO() 199 199 if not self._need_sudo: 200 200 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 201 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 201 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 202 202 else: 203 203 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 204 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 204 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 205 205 self.data = f 206 206 self.data.seek(0) 207 207 if self.skip_first_newline:
+1 -10
pkgs/by-name/my/mysql-workbench/package.nix
··· 46 46 }; 47 47 }); 48 48 49 - getCoreExe = lib.getExe' coreutils; 50 - 51 49 inherit (python3Packages) paramiko pycairo pyodbc; 52 50 in 53 51 stdenv.mkDerivation (finalAttrs: { ··· 63 61 (replaceVars ./hardcode-paths.patch { 64 62 bash = lib.getExe bash; 65 63 catchsegv = lib.getExe' glibc "catchsegv"; 66 - cp = getCoreExe "cp"; 67 - dd = getCoreExe "dd"; 68 - ls = getCoreExe "ls"; 69 - mkdir = getCoreExe "mkdir"; 70 - nohup = getCoreExe "nohup"; 71 - rm = getCoreExe "rm"; 72 - rmdir = getCoreExe "rmdir"; 73 - stat = getCoreExe "stat"; 64 + coreutils = lib.getBin coreutils; 74 65 sudo = lib.getExe sudo; 75 66 }) 76 67
+3 -3
pkgs/by-name/n8/n8n/package.nix
··· 16 16 17 17 stdenv.mkDerivation (finalAttrs: { 18 18 pname = "n8n"; 19 - version = "1.72.1"; 19 + version = "1.73.1"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "n8n-io"; 23 23 repo = "n8n"; 24 24 tag = "n8n@${finalAttrs.version}"; 25 - hash = "sha256-GIA2y81nuKWe1zuZQ99oczQtQWStyT1Qh3bZ1oe8me4="; 25 + hash = "sha256-gPdJKVOZlizdS0o+2nBgCImnIhtHzRjE2xk0zJA52go="; 26 26 }; 27 27 28 28 pnpmDeps = pnpm.fetchDeps { 29 29 inherit (finalAttrs) pname version src; 30 - hash = "sha256-riuN7o+uUXS5G7fMgE7cZhGWHZtGwSHm4CP7G46R5Cw="; 30 + hash = "sha256-Am9R2rfQiw1IPd22/UraqzEqvVeB5XuSrrLSYXWsWfU="; 31 31 }; 32 32 33 33 nativeBuildInputs = [
+3 -3
pkgs/by-name/ni/nixos-facter/package.nix
··· 24 24 in 25 25 buildGoModule rec { 26 26 pname = "nixos-facter"; 27 - version = "0.3.0"; 27 + version = "0.3.1"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "numtide"; 31 31 repo = "nixos-facter"; 32 32 rev = "v${version}"; 33 - hash = "sha256-T7x9xU/Tr2BKfrHQHrP6Mm6rNUWYASjEPzHIKgyS7aE="; 33 + hash = "sha256-HJt6FEQbzwlVMow47p1DtqXdmCxLYA6g3D1EgGnKcUo="; 34 34 }; 35 35 36 - vendorHash = "sha256-qDzd+aq08PN9kl1YkvNLGvWaFVh7xFXJhGdx/ELwYGY="; 36 + vendorHash = "sha256-WCItbRbGgclXGtJyHCkDgaPe3Mobe4mT/4c16AEdF5o="; 37 37 38 38 env.CGO_ENABLED = 1; 39 39
+43 -4
pkgs/by-name/ni/nixos-render-docs/src/nixos_render_docs/options.py
··· 21 21 from .manpage import ManpageRenderer, man_escape 22 22 from .manual_structure import make_xml_id, XrefTarget 23 23 from .md import Converter, md_escape, md_make_code 24 - from .types import OptionLoc, Option, RenderedOption 24 + from .types import OptionLoc, Option, RenderedOption, AnchorStyle 25 25 26 26 def option_is(option: Option, key: str, typ: str) -> Optional[dict[str, str]]: 27 27 if key not in option: ··· 317 317 318 318 class CommonMarkConverter(BaseConverter[OptionsCommonMarkRenderer]): 319 319 __option_block_separator__ = "" 320 + _anchor_style: AnchorStyle 321 + _anchor_prefix: str 320 322 321 - def __init__(self, manpage_urls: Mapping[str, str], revision: str): 323 + 324 + def __init__(self, manpage_urls: Mapping[str, str], revision: str, anchor_style: AnchorStyle = AnchorStyle.NONE, anchor_prefix: str = ""): 322 325 super().__init__(revision) 323 326 self._renderer = OptionsCommonMarkRenderer(manpage_urls) 327 + self._anchor_style = anchor_style 328 + self._anchor_prefix = anchor_prefix 324 329 325 330 def _parallel_render_prepare(self) -> Any: 326 331 return (self._renderer._manpage_urls, self._revision) ··· 342 347 def _decl_def_footer(self) -> list[str]: 343 348 return [] 344 349 350 + def _make_anchor_suffix(self, loc: list[str]) -> str: 351 + if self._anchor_style == AnchorStyle.NONE: 352 + return "" 353 + elif self._anchor_style == AnchorStyle.LEGACY: 354 + sanitized = ".".join(map(make_xml_id, loc)) 355 + return f" {{#{self._anchor_prefix}{sanitized}}}" 356 + else: 357 + raise RuntimeError("unhandled anchor style", self._anchor_style) 358 + 345 359 def finalize(self) -> str: 346 360 result = [] 347 361 348 362 for (name, opt) in self._sorted_options(): 349 - result.append(f"## {md_escape(name)}\n") 363 + anchor_suffix = self._make_anchor_suffix(opt.loc) 364 + result.append(f"## {md_escape(name)}{anchor_suffix}\n") 350 365 result += opt.lines 351 366 result.append("\n\n") 352 367 ··· 490 505 p.add_argument("infile") 491 506 p.add_argument("outfile") 492 507 508 + def parse_anchor_style(value: str|AnchorStyle) -> AnchorStyle: 509 + if isinstance(value, AnchorStyle): 510 + # Used by `argparse.add_argument`'s `default` 511 + return value 512 + try: 513 + return AnchorStyle(value.lower()) 514 + except ValueError: 515 + raise argparse.ArgumentTypeError(f"Invalid value {value}\nExpected one of {', '.join(style.value for style in AnchorStyle)}") 516 + 493 517 def _build_cli_commonmark(p: argparse.ArgumentParser) -> None: 494 518 p.add_argument('--manpage-urls', required=True) 495 519 p.add_argument('--revision', required=True) 520 + p.add_argument( 521 + '--anchor-style', 522 + required=False, 523 + default=AnchorStyle.NONE.value, 524 + choices = [style.value for style in AnchorStyle], 525 + help = "(default: %(default)s) Anchor style to use for links to options. \nOnly none is standard CommonMark." 526 + ) 527 + p.add_argument('--anchor-prefix', 528 + required=False, 529 + default="", 530 + help="(default: no prefix) String to prepend to anchor ids. Not used when anchor style is none." 531 + ) 496 532 p.add_argument("infile") 497 533 p.add_argument("outfile") 498 534 ··· 527 563 528 564 def _run_cli_commonmark(args: argparse.Namespace) -> None: 529 565 with open(args.manpage_urls, 'r') as manpage_urls: 530 - md = CommonMarkConverter(json.load(manpage_urls), revision = args.revision) 566 + md = CommonMarkConverter(json.load(manpage_urls), 567 + revision = args.revision, 568 + anchor_style = parse_anchor_style(args.anchor_style), 569 + anchor_prefix = args.anchor_prefix) 531 570 532 571 with open(args.infile, 'r') as f: 533 572 md.add_options(json.load(f))
+5
pkgs/by-name/ni/nixos-render-docs/src/nixos_render_docs/types.py
··· 1 1 from collections.abc import Sequence 2 + from enum import Enum 2 3 from typing import Callable, Optional, NamedTuple 3 4 4 5 from markdown_it.token import Token ··· 12 13 links: Optional[list[str]] = None 13 14 14 15 RenderFn = Callable[[Token, Sequence[Token], int], str] 16 + 17 + class AnchorStyle(Enum): 18 + NONE = "none" 19 + LEGACY = "legacy"
+17
pkgs/by-name/ni/nixos-render-docs/src/tests/sample_options_simple.json
··· 1 + { 2 + "services.frobnicator.types.<name>.enable": { 3 + "declarations": [ 4 + "nixos/modules/services/frobnicator.nix" 5 + ], 6 + "description": "Whether to enable the frobnication of this (`<name>`) type.", 7 + "loc": [ 8 + "services", 9 + "frobnicator", 10 + "types", 11 + "<name>", 12 + "enable" 13 + ], 14 + "readOnly": false, 15 + "type": "boolean" 16 + } 17 + }
+13
pkgs/by-name/ni/nixos-render-docs/src/tests/sample_options_simple_default.md
··· 1 + ## services\.frobnicator\.types\.\<name>\.enable 2 + 3 + Whether to enable the frobnication of this (` <name> `) type\. 4 + 5 + 6 + 7 + *Type:* 8 + boolean 9 + 10 + *Declared by:* 11 + - [\<nixpkgs/nixos/modules/services/frobnicator\.nix>](https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/frobnicator.nix) 12 + 13 +
+13
pkgs/by-name/ni/nixos-render-docs/src/tests/sample_options_simple_legacy.md
··· 1 + ## services\.frobnicator\.types\.\<name>\.enable {#opt-services.frobnicator.types._name_.enable} 2 + 3 + Whether to enable the frobnication of this (` <name> `) type\. 4 + 5 + 6 + 7 + *Type:* 8 + boolean 9 + 10 + *Declared by:* 11 + - [\<nixpkgs/nixos/modules/services/frobnicator\.nix>](https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/frobnicator.nix) 12 + 13 +
+27
pkgs/by-name/ni/nixos-render-docs/src/tests/test_options.py
··· 1 1 import nixos_render_docs 2 + from nixos_render_docs.options import AnchorStyle 2 3 4 + import json 3 5 from markdown_it.token import Token 6 + from pathlib import Path 4 7 import pytest 5 8 6 9 def test_option_headings() -> None: ··· 12 15 type='heading_open', tag='h1', nesting=1, attrs={}, map=[0, 1], level=0, children=None, 13 16 content='', markup='#', info='', meta={}, block=True, hidden=False 14 17 ) 18 + 19 + def test_options_commonmark() -> None: 20 + c = nixos_render_docs.options.CommonMarkConverter({}, 'local') 21 + with Path('tests/sample_options_simple.json').open() as f: 22 + opts = json.load(f) 23 + assert opts is not None 24 + with Path('tests/sample_options_simple_default.md').open() as f: 25 + expected = f.read() 26 + 27 + c.add_options(opts) 28 + s = c.finalize() 29 + assert s == expected 30 + 31 + def test_options_commonmark_legacy_anchors() -> None: 32 + c = nixos_render_docs.options.CommonMarkConverter({}, 'local', anchor_style = AnchorStyle.LEGACY, anchor_prefix = 'opt-') 33 + with Path('tests/sample_options_simple.json').open() as f: 34 + opts = json.load(f) 35 + assert opts is not None 36 + with Path('tests/sample_options_simple_legacy.md').open() as f: 37 + expected = f.read() 38 + 39 + c.add_options(opts) 40 + s = c.finalize() 41 + assert s == expected
+4 -2
pkgs/by-name/op/opencomposite/package.nix
··· 26 26 hash = "sha256-SV8E+4qu5J7MueHmdsdTDKNx4CH085fidgIJyewj8RQ="; 27 27 }; 28 28 29 - nativeBuildInputs = [ cmake ]; 29 + nativeBuildInputs = [ 30 + cmake 31 + python3 32 + ]; 30 33 31 34 buildInputs = [ 32 35 glm 33 36 jsoncpp 34 37 libGL 35 - python3 36 38 vulkan-headers 37 39 vulkan-loader 38 40 xorg.libX11
+2 -2
pkgs/by-name/p2/p2pool/package.nix
··· 20 20 in 21 21 stdenv.mkDerivation rec { 22 22 pname = "p2pool"; 23 - version = "4.2"; 23 + version = "4.3"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "SChernykh"; 27 27 repo = "p2pool"; 28 28 rev = "v${version}"; 29 - hash = "sha256-zowRQeFrT0sY9L5XJQ10f8tRnEchjKVdBixtPbAQyvo="; 29 + hash = "sha256-PHrmTkmpYOPKx9q+/mhjr8MIbFqmljKs2F26tqyCzcE="; 30 30 fetchSubmodules = true; 31 31 }; 32 32
+1
pkgs/by-name/pi/pigz/package.nix
··· 40 40 meta = with lib; { 41 41 homepage = "https://www.zlib.net/pigz/"; 42 42 description = "Parallel implementation of gzip for multi-core machines"; 43 + mainProgram = "pigz"; 43 44 maintainers = [ ]; 44 45 license = licenses.zlib; 45 46 platforms = platforms.unix;
+5 -2
pkgs/by-name/po/poptracker/package.nix
··· 12 12 makeWrapper, 13 13 makeDesktopItem, 14 14 copyDesktopItems, 15 + nix-update-script, 15 16 }: 16 17 17 18 stdenv.mkDerivation (finalAttrs: { 18 19 pname = "poptracker"; 19 - version = "0.27.0"; 20 + version = "0.29.0"; 20 21 21 22 src = fetchFromGitHub { 22 23 owner = "black-sliver"; 23 24 repo = "PopTracker"; 24 25 rev = "v${finalAttrs.version}"; 25 - hash = "sha256-Tz3rVbaHw5RfFKuLih4BEEnn3uNeLrtDQpBD2yYUzkM="; 26 + hash = "sha256-rkEaq8YLt0NhspXVgEqZ/9FF7GDlTU5fKgWGXeA6UX4="; 26 27 fetchSubmodules = true; 27 28 }; 29 + 30 + passthru.updateScript = nix-update-script { }; 28 31 29 32 patches = [ ./assets-path.diff ]; 30 33
+4 -4
pkgs/by-name/re/readarr/package.nix
··· 24 24 ."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 25 25 hash = 26 26 { 27 - x64-linux_hash = "sha256-ijBsMc/37cpw1WJ36vIUm1d0wzHjpTsBX9mZRkL91BU="; 28 - arm64-linux_hash = "sha256-oTA1O6M/P7kGI/YCoWzTw6kvmMg+QGhpn/jWrOc4rug="; 29 - x64-osx_hash = "sha256-ZAZ0Y5O64llljc/NjnOHynEP7wXB/U4J5T1n5Pe+2A4="; 27 + x64-linux_hash = "sha256-dYYvrsYR+xsS9N/btJPCaCg4mS2UVgZs5FaBbWU4ytM="; 28 + arm64-linux_hash = "sha256-Vfdq6Mngr3Cbq844Upq84k6gH0SnbpdPK0dU7LBnJO8="; 29 + x64-osx_hash = "sha256-7mtnnbEQ+70qY5iSfX7pDUYPqKQG2JdzGRFgm1CEhs4="; 30 30 } 31 31 ."${arch}-${os}_hash"; 32 32 in 33 33 stdenv.mkDerivation rec { 34 34 pname = "readarr"; 35 - version = "0.4.6.2711"; 35 + version = "0.4.8.2726"; 36 36 37 37 src = fetchurl { 38 38 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
+903 -284
pkgs/by-name/re/recordbox/Cargo.lock
··· 1 1 # This file is automatically @generated by Cargo. 2 2 # It is not intended for manual editing. 3 - version = 3 3 + version = 4 4 4 5 5 [[package]] 6 6 name = "adler2" ··· 46 46 47 47 [[package]] 48 48 name = "ashpd" 49 - version = "0.9.2" 49 + version = "0.10.2" 50 50 source = "registry+https://github.com/rust-lang/crates.io-index" 51 - checksum = "4d43c03d9e36dd40cab48435be0b09646da362c278223ca535493877b2c1dee9" 51 + checksum = "e9c39d707614dbcc6bed00015539f488d8e3fe3e66ed60961efc0c90f4b380b3" 52 52 dependencies = [ 53 53 "async-fs", 54 54 "async-net", ··· 59 59 "serde", 60 60 "serde_repr", 61 61 "url", 62 - "zbus", 62 + "zbus 5.2.0", 63 63 ] 64 64 65 65 [[package]] 66 66 name = "async-broadcast" 67 - version = "0.7.1" 67 + version = "0.7.2" 68 68 source = "registry+https://github.com/rust-lang/crates.io-index" 69 - checksum = "20cd0e2e25ea8e5f7e9df04578dc6cf5c83577fd09b1a46aaf5c85e1c33f2a7e" 69 + checksum = "435a87a52755b8f27fcf321ac4f04b2802e337c8c4872923137471ec39c37532" 70 70 dependencies = [ 71 - "event-listener", 71 + "event-listener 5.3.1", 72 72 "event-listener-strategy", 73 73 "futures-core", 74 74 "pin-project-lite", ··· 76 76 77 77 [[package]] 78 78 name = "async-channel" 79 + version = "1.9.0" 80 + source = "registry+https://github.com/rust-lang/crates.io-index" 81 + checksum = "81953c529336010edd6d8e358f886d9581267795c61b19475b71314bffa46d35" 82 + dependencies = [ 83 + "concurrent-queue", 84 + "event-listener 2.5.3", 85 + "futures-core", 86 + ] 87 + 88 + [[package]] 89 + name = "async-channel" 79 90 version = "2.3.1" 80 91 source = "registry+https://github.com/rust-lang/crates.io-index" 81 92 checksum = "89b47800b0be77592da0afd425cc03468052844aff33b84e33cc696f64e77b6a" ··· 111 122 ] 112 123 113 124 [[package]] 125 + name = "async-global-executor" 126 + version = "2.4.1" 127 + source = "registry+https://github.com/rust-lang/crates.io-index" 128 + checksum = "05b1b633a2115cd122d73b955eadd9916c18c8f510ec9cd1686404c60ad1c29c" 129 + dependencies = [ 130 + "async-channel 2.3.1", 131 + "async-executor", 132 + "async-io", 133 + "async-lock", 134 + "blocking", 135 + "futures-lite", 136 + "once_cell", 137 + ] 138 + 139 + [[package]] 114 140 name = "async-io" 115 - version = "2.3.4" 141 + version = "2.4.0" 116 142 source = "registry+https://github.com/rust-lang/crates.io-index" 117 - checksum = "444b0228950ee6501b3568d3c93bf1176a1fdbc3b758dcd9475046d30f4dc7e8" 143 + checksum = "43a2b323ccce0a1d90b449fd71f2a06ca7faa7c54c2751f06c9bd851fc061059" 118 144 dependencies = [ 119 145 "async-lock", 120 146 "cfg-if", ··· 135 161 source = "registry+https://github.com/rust-lang/crates.io-index" 136 162 checksum = "ff6e472cdea888a4bd64f342f09b3f50e1886d32afe8df3d663c01140b811b18" 137 163 dependencies = [ 138 - "event-listener", 164 + "event-listener 5.3.1", 139 165 "event-listener-strategy", 140 166 "pin-project-lite", 141 167 ] ··· 157 183 source = "registry+https://github.com/rust-lang/crates.io-index" 158 184 checksum = "63255f1dc2381611000436537bbedfe83183faa303a5a0edaf191edef06526bb" 159 185 dependencies = [ 160 - "async-channel", 186 + "async-channel 2.3.1", 161 187 "async-io", 162 188 "async-lock", 163 189 "async-signal", 164 190 "async-task", 165 191 "blocking", 166 192 "cfg-if", 167 - "event-listener", 193 + "event-listener 5.3.1", 168 194 "futures-lite", 169 195 "rustix", 170 196 "tracing", ··· 200 226 ] 201 227 202 228 [[package]] 229 + name = "async-std" 230 + version = "1.13.0" 231 + source = "registry+https://github.com/rust-lang/crates.io-index" 232 + checksum = "c634475f29802fde2b8f0b505b1bd00dfe4df7d4a000f0b36f7671197d5c3615" 233 + dependencies = [ 234 + "async-channel 1.9.0", 235 + "async-global-executor", 236 + "async-io", 237 + "async-lock", 238 + "async-process", 239 + "crossbeam-utils", 240 + "futures-channel", 241 + "futures-core", 242 + "futures-io", 243 + "futures-lite", 244 + "gloo-timers", 245 + "kv-log-macro", 246 + "log", 247 + "memchr", 248 + "once_cell", 249 + "pin-project-lite", 250 + "pin-utils", 251 + "slab", 252 + "wasm-bindgen-futures", 253 + ] 254 + 255 + [[package]] 203 256 name = "async-task" 204 257 version = "4.7.1" 205 258 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 235 288 checksum = "ace50bade8e6234aa140d9a2f552bbee1db4d353f69b8217bc503490fc1a9f26" 236 289 237 290 [[package]] 291 + name = "base64" 292 + version = "0.21.7" 293 + source = "registry+https://github.com/rust-lang/crates.io-index" 294 + checksum = "9d297deb1925b89f2ccc13d7635fa0714f12c87adce1c75356b39ca9b7178567" 295 + 296 + [[package]] 238 297 name = "bitflags" 239 298 version = "1.3.2" 240 299 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 267 326 source = "registry+https://github.com/rust-lang/crates.io-index" 268 327 checksum = "703f41c54fc768e63e091340b424302bb1c29ef4aa0c7f10fe849dfb114d29ea" 269 328 dependencies = [ 270 - "async-channel", 329 + "async-channel 2.3.1", 271 330 "async-task", 272 331 "futures-io", 273 332 "futures-lite", ··· 282 341 283 342 [[package]] 284 343 name = "bytemuck" 285 - version = "1.19.0" 344 + version = "1.21.0" 286 345 source = "registry+https://github.com/rust-lang/crates.io-index" 287 - checksum = "8334215b81e418a0a7bdb8ef0849474f40bb10c8b71f1c4ed315cff49f32494d" 346 + checksum = "ef657dfab802224e671f5818e9a4935f9b1957ed18e58292690cc39e7a4092a3" 288 347 289 348 [[package]] 290 349 name = "byteorder" ··· 293 352 checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" 294 353 295 354 [[package]] 355 + name = "cacache" 356 + version = "13.1.0" 357 + source = "registry+https://github.com/rust-lang/crates.io-index" 358 + checksum = "5c5063741c7b2e260bbede781cf4679632dd90e2718e99f7715e46824b65670b" 359 + dependencies = [ 360 + "async-std", 361 + "digest", 362 + "either", 363 + "futures", 364 + "hex", 365 + "libc", 366 + "memmap2", 367 + "miette", 368 + "reflink-copy", 369 + "serde", 370 + "serde_derive", 371 + "serde_json", 372 + "sha1", 373 + "sha2", 374 + "ssri", 375 + "tempfile", 376 + "thiserror 1.0.69", 377 + "walkdir", 378 + ] 379 + 380 + [[package]] 296 381 name = "cairo-rs" 297 - version = "0.20.5" 382 + version = "0.20.7" 298 383 source = "registry+https://github.com/rust-lang/crates.io-index" 299 - checksum = "d7fa699e1d7ae691001a811dda5ef0e3e42e1d4119b26426352989df9e94e3e6" 384 + checksum = "ae50b5510d86cf96ac2370e66d8dc960882f3df179d6a5a1e52bd94a1416c0f7" 300 385 dependencies = [ 301 386 "bitflags 2.6.0", 302 387 "cairo-sys-rs", ··· 306 391 307 392 [[package]] 308 393 name = "cairo-sys-rs" 309 - version = "0.20.0" 394 + version = "0.20.7" 310 395 source = "registry+https://github.com/rust-lang/crates.io-index" 311 - checksum = "428290f914b9b86089f60f5d8a9f6e440508e1bcff23b25afd51502b0a2da88f" 396 + checksum = "f18b6bb8e43c7eb0f2aac7976afe0c61b6f5fc2ab7bc4c139537ea56c92290df" 312 397 dependencies = [ 313 398 "glib-sys", 314 399 "libc", ··· 317 402 318 403 [[package]] 319 404 name = "cc" 320 - version = "1.1.35" 405 + version = "1.2.5" 321 406 source = "registry+https://github.com/rust-lang/crates.io-index" 322 - checksum = "0f57c4b4da2a9d619dd035f27316d7a426305b75be93d09e92f2b9229c34feaf" 407 + checksum = "c31a0499c1dc64f458ad13872de75c0eb7e3fdb0e67964610c914b034fc5956e" 323 408 dependencies = [ 324 409 "shlex", 325 410 ] 326 411 327 412 [[package]] 328 413 name = "cfg-expr" 329 - version = "0.17.0" 414 + version = "0.17.2" 330 415 source = "registry+https://github.com/rust-lang/crates.io-index" 331 - checksum = "d0890061c4d3223e7267f3bad2ec40b997d64faac1c2815a4a9d95018e2b9e9c" 416 + checksum = "8d4ba6e40bd1184518716a6e1a781bf9160e286d219ccdb8ab2612e74cfe4789" 332 417 dependencies = [ 333 418 "smallvec", 334 419 "target-lexicon", ··· 348 433 349 434 [[package]] 350 435 name = "chrono" 351 - version = "0.4.38" 436 + version = "0.4.39" 352 437 source = "registry+https://github.com/rust-lang/crates.io-index" 353 - checksum = "a21f936df1771bf62b77f047b726c4625ff2e8aa607c01ec06e5a05bd8463401" 438 + checksum = "7e36cc9d416881d2e24f9a963be5fb1cd90966419ac844274161d10488b3e825" 354 439 dependencies = [ 355 440 "android-tzdata", 356 441 "iana-time-zone", 357 442 "num-traits", 358 - "windows-targets 0.52.6", 443 + "windows-targets", 359 444 ] 360 445 361 446 [[package]] ··· 390 475 391 476 [[package]] 392 477 name = "cpufeatures" 393 - version = "0.2.14" 478 + version = "0.2.16" 394 479 source = "registry+https://github.com/rust-lang/crates.io-index" 395 - checksum = "608697df725056feaccfa42cffdaeeec3fccc4ffc38358ecd19b243e716a78e0" 480 + checksum = "16b80225097f2e5ae4e7179dd2266824648f3e2f49d9134d584b76389d31c4c3" 396 481 dependencies = [ 397 482 "libc", 398 483 ] ··· 408 493 409 494 [[package]] 410 495 name = "crossbeam-channel" 411 - version = "0.5.13" 496 + version = "0.5.14" 497 + source = "registry+https://github.com/rust-lang/crates.io-index" 498 + checksum = "06ba6d68e24814cb8de6bb986db8222d3a027d15872cabc0d18817bc3c0e4471" 499 + dependencies = [ 500 + "crossbeam-utils", 501 + ] 502 + 503 + [[package]] 504 + name = "crossbeam-epoch" 505 + version = "0.9.18" 412 506 source = "registry+https://github.com/rust-lang/crates.io-index" 413 - checksum = "33480d6946193aa8033910124896ca395333cae7e2d1113d1fef6c3272217df2" 507 + checksum = "5b82ac4a3c2ca9c3460964f020e1402edd5753411d7737aa39c3714ad1b5420e" 414 508 dependencies = [ 415 509 "crossbeam-utils", 416 510 ] 417 511 418 512 [[package]] 419 513 name = "crossbeam-utils" 420 - version = "0.8.20" 514 + version = "0.8.21" 421 515 source = "registry+https://github.com/rust-lang/crates.io-index" 422 - checksum = "22ec99545bb0ed0ea7bb9b8e1e9122ea386ff8a48c0922e43f36d45ab09e0e80" 516 + checksum = "d0a5c400df2834b80a4c3327b3aad3a4c4cd4de0629063962b03235697506a28" 423 517 424 518 [[package]] 425 519 name = "crypto-common" ··· 499 593 500 594 [[package]] 501 595 name = "errno" 502 - version = "0.3.9" 596 + version = "0.3.10" 503 597 source = "registry+https://github.com/rust-lang/crates.io-index" 504 - checksum = "534c5cf6194dfab3db3242765c03bbe257cf92f22b38f6bc0c58d59108a820ba" 598 + checksum = "33d852cb9b869c2a9b3df2f71a3074817f01e1844f839a144f5fcef059a4eb5d" 505 599 dependencies = [ 506 600 "libc", 507 - "windows-sys 0.52.0", 601 + "windows-sys 0.59.0", 508 602 ] 509 603 510 604 [[package]] 511 605 name = "event-listener" 606 + version = "2.5.3" 607 + source = "registry+https://github.com/rust-lang/crates.io-index" 608 + checksum = "0206175f82b8d6bf6652ff7d71a1e27fd2e4efde587fd368662814d6ec1d9ce0" 609 + 610 + [[package]] 611 + name = "event-listener" 512 612 version = "5.3.1" 513 613 source = "registry+https://github.com/rust-lang/crates.io-index" 514 614 checksum = "6032be9bd27023a771701cc49f9f053c751055f71efb2e0ae5c15809093675ba" ··· 520 620 521 621 [[package]] 522 622 name = "event-listener-strategy" 523 - version = "0.5.2" 623 + version = "0.5.3" 524 624 source = "registry+https://github.com/rust-lang/crates.io-index" 525 - checksum = "0f214dc438f977e6d4e3500aaa277f5ad94ca83fbbd9b1a15713ce2344ccc5a1" 625 + checksum = "3c3e4e0dd3673c1139bf041f3008816d9cf2946bbfac2945c09e523b8d7b05b2" 526 626 dependencies = [ 527 - "event-listener", 627 + "event-listener 5.3.1", 528 628 "pin-project-lite", 529 629 ] 530 630 ··· 542 642 543 643 [[package]] 544 644 name = "fastrand" 545 - version = "2.1.1" 645 + version = "2.3.0" 546 646 source = "registry+https://github.com/rust-lang/crates.io-index" 547 - checksum = "e8c02a5121d4ea3eb16a80748c74f5549a5665e4c21333c6098f283870fbdea6" 647 + checksum = "37909eebbb50d72f9059c3b6d82c0463f2ff062c9e95845c43a6c9c0355411be" 548 648 549 649 [[package]] 550 650 name = "field-offset" ··· 579 679 580 680 [[package]] 581 681 name = "flate2" 582 - version = "1.0.34" 682 + version = "1.0.35" 583 683 source = "registry+https://github.com/rust-lang/crates.io-index" 584 - checksum = "a1b589b4dc103969ad3cf85c950899926ec64300a1a46d76c03a6072957036f0" 684 + checksum = "c936bfdafb507ebbf50b8074c54fa31c5be9a1e7e5f467dd659697041407d07c" 585 685 dependencies = [ 586 686 "crc32fast", 587 687 "miniz_oxide", ··· 589 689 590 690 [[package]] 591 691 name = "flexi_logger" 592 - version = "0.29.6" 692 + version = "0.29.8" 593 693 source = "registry+https://github.com/rust-lang/crates.io-index" 594 - checksum = "d26948e37cfcb1f2c2cd38e0602d3a8ab6b9472c0c6eff4516fc8def9a3124d7" 694 + checksum = "88a5a6882b2e137c4f2664562995865084eb5a00611fba30c582ef10354c4ad8" 595 695 dependencies = [ 596 696 "chrono", 597 697 "log", 598 698 "nu-ansi-term", 599 699 "regex", 600 - "thiserror", 700 + "thiserror 2.0.9", 601 701 ] 602 702 603 703 [[package]] ··· 608 708 dependencies = [ 609 709 "percent-encoding", 610 710 ] 611 - 612 - [[package]] 613 - name = "formatx" 614 - version = "0.2.2" 615 - source = "registry+https://github.com/rust-lang/crates.io-index" 616 - checksum = "db0f0c49aba98a3b2578315766960bd242885ff672fd62610c5557cd6c6efe03" 617 711 618 712 [[package]] 619 713 name = "fsevent-sys" ··· 674 768 675 769 [[package]] 676 770 name = "futures-lite" 677 - version = "2.4.0" 771 + version = "2.5.0" 678 772 source = "registry+https://github.com/rust-lang/crates.io-index" 679 - checksum = "3f1fa2f9765705486b33fd2acf1577f8ec449c2ba1f318ae5447697b7c08d210" 773 + checksum = "cef40d21ae2c515b51041df9ed313ed21e572df340ea58a922a0aefe7e8891a1" 680 774 dependencies = [ 681 775 "fastrand", 682 776 "futures-core", ··· 727 821 ] 728 822 729 823 [[package]] 824 + name = "fuzzy-matcher" 825 + version = "0.3.7" 826 + source = "registry+https://github.com/rust-lang/crates.io-index" 827 + checksum = "54614a3312934d066701a80f20f15fa3b56d67ac7722b39eea5b4c9dd1d66c94" 828 + dependencies = [ 829 + "thread_local", 830 + ] 831 + 832 + [[package]] 730 833 name = "gdk-pixbuf" 731 - version = "0.20.4" 834 + version = "0.20.7" 732 835 source = "registry+https://github.com/rust-lang/crates.io-index" 733 - checksum = "c4c29071a9e92337d8270a85cb0510cda4ac478be26d09ad027cc1d081911b19" 836 + checksum = "b6efc7705f7863d37b12ad6974cbb310d35d054f5108cdc1e69037742f573c4c" 734 837 dependencies = [ 735 838 "gdk-pixbuf-sys", 736 839 "gio", ··· 740 843 741 844 [[package]] 742 845 name = "gdk-pixbuf-sys" 743 - version = "0.20.4" 846 + version = "0.20.7" 744 847 source = "registry+https://github.com/rust-lang/crates.io-index" 745 - checksum = "687343b059b91df5f3fbd87b4307038fa9e647fcc0461d0d3f93e94fee20bf3d" 848 + checksum = "67f2587c9202bf997476bbba6aaed4f78a11538a2567df002a5f57f5331d0b5c" 746 849 dependencies = [ 747 850 "gio-sys", 748 851 "glib-sys", ··· 753 856 754 857 [[package]] 755 858 name = "gdk4" 756 - version = "0.9.3" 859 + version = "0.9.5" 757 860 source = "registry+https://github.com/rust-lang/crates.io-index" 758 - checksum = "d3fb4af2d606b0ac4e81f982f0d064bcb71ca73859ce5f30475f7eb2e2be4bc3" 861 + checksum = "d0196720118f880f71fe7da971eff58cc43a89c9cf73f46076b7cb1e60889b15" 759 862 dependencies = [ 760 863 "cairo-rs", 761 864 "gdk-pixbuf", ··· 768 871 769 872 [[package]] 770 873 name = "gdk4-sys" 771 - version = "0.9.3" 874 + version = "0.9.5" 772 875 source = "registry+https://github.com/rust-lang/crates.io-index" 773 - checksum = "3642625b384ad43c006871462e6c498488b503dbf219542591f4ddf0f5f2032b" 876 + checksum = "60b0e1340bd15e7a78810cf39fed9e5d85f0a8f80b1d999d384ca17dcc452b60" 774 877 dependencies = [ 775 878 "cairo-sys-rs", 776 879 "gdk-pixbuf-sys", ··· 826 929 827 930 [[package]] 828 931 name = "gio" 829 - version = "0.20.5" 932 + version = "0.20.7" 830 933 source = "registry+https://github.com/rust-lang/crates.io-index" 831 - checksum = "d8569975884fdfdbed536b682448fbd8c70bafbd69cac2d45eb1a7a372702241" 934 + checksum = "a517657589a174be9f60c667f1fec8b7ac82ed5db4ebf56cf073a3b5955d8e2e" 832 935 dependencies = [ 833 936 "futures-channel", 834 937 "futures-core", ··· 843 946 844 947 [[package]] 845 948 name = "gio-sys" 846 - version = "0.20.5" 949 + version = "0.20.8" 847 950 source = "registry+https://github.com/rust-lang/crates.io-index" 848 - checksum = "217f464cad5946ae4369c355155e2d16b488c08920601083cb4891e352ae777b" 951 + checksum = "8446d9b475730ebef81802c1738d972db42fde1c5a36a627ebc4d665fc87db04" 849 952 dependencies = [ 850 953 "glib-sys", 851 954 "gobject-sys", 852 955 "libc", 853 956 "system-deps", 854 - "windows-sys 0.52.0", 957 + "windows-sys 0.59.0", 855 958 ] 856 959 857 960 [[package]] 858 961 name = "glib" 859 - version = "0.20.5" 962 + version = "0.20.7" 860 963 source = "registry+https://github.com/rust-lang/crates.io-index" 861 - checksum = "358431b0e0eb15b9d02db52e1f19c805b953c5c168099deb3de88beab761768c" 964 + checksum = "f969edf089188d821a30cde713b6f9eb08b20c63fc2e584aba2892a7984a8cc0" 862 965 dependencies = [ 863 966 "bitflags 2.6.0", 864 967 "futures-channel", ··· 877 980 878 981 [[package]] 879 982 name = "glib-macros" 880 - version = "0.20.5" 983 + version = "0.20.7" 881 984 source = "registry+https://github.com/rust-lang/crates.io-index" 882 - checksum = "e7d21ca27acfc3e91da70456edde144b4ac7c36f78ee77b10189b3eb4901c156" 985 + checksum = "715601f8f02e71baef9c1f94a657a9a77c192aea6097cf9ae7e5e177cd8cde68" 883 986 dependencies = [ 884 987 "heck", 885 988 "proc-macro-crate", ··· 890 993 891 994 [[package]] 892 995 name = "glib-sys" 893 - version = "0.20.5" 996 + version = "0.20.7" 894 997 source = "registry+https://github.com/rust-lang/crates.io-index" 895 - checksum = "8a5911863ab7ecd4a6f8d5976f12eeba076b23669c49b066d877e742544aa389" 998 + checksum = "b360ff0f90d71de99095f79c526a5888c9c92fc9ee1b19da06c6f5e75f0c2a53" 896 999 dependencies = [ 897 1000 "libc", 898 1001 "system-deps", 899 1002 ] 900 1003 901 1004 [[package]] 1005 + name = "gloo-timers" 1006 + version = "0.3.0" 1007 + source = "registry+https://github.com/rust-lang/crates.io-index" 1008 + checksum = "bbb143cf96099802033e0d4f4963b19fd2e0b728bcf076cd9cf7f6634f092994" 1009 + dependencies = [ 1010 + "futures-channel", 1011 + "futures-core", 1012 + "js-sys", 1013 + "wasm-bindgen", 1014 + ] 1015 + 1016 + [[package]] 902 1017 name = "gobject-sys" 903 - version = "0.20.4" 1018 + version = "0.20.7" 904 1019 source = "registry+https://github.com/rust-lang/crates.io-index" 905 - checksum = "a4c674d2ff8478cf0ec29d2be730ed779fef54415a2fb4b565c52def62696462" 1020 + checksum = "67a56235e971a63bfd75abb13ef70064e1346388723422a68580d8a6fbac6423" 906 1021 dependencies = [ 907 1022 "glib-sys", 908 1023 "libc", ··· 911 1026 912 1027 [[package]] 913 1028 name = "graphene-rs" 914 - version = "0.20.4" 1029 + version = "0.20.7" 915 1030 source = "registry+https://github.com/rust-lang/crates.io-index" 916 - checksum = "1f53144c7fe78292705ff23935f1477d511366fb2f73c43d63b37be89076d2fe" 1031 + checksum = "f39d3bcd2e24fd9c2874a56f277b72c03e728de9bdc95a8d4ef4c962f10ced98" 917 1032 dependencies = [ 918 1033 "glib", 919 1034 "graphene-sys", ··· 922 1037 923 1038 [[package]] 924 1039 name = "graphene-sys" 925 - version = "0.20.4" 1040 + version = "0.20.7" 926 1041 source = "registry+https://github.com/rust-lang/crates.io-index" 927 - checksum = "e741797dc5081e59877a4d72c442c72d61efdd99161a0b1c1b29b6b988934b99" 1042 + checksum = "11a68d39515bf340e879b72cecd4a25c1332557757ada6e8aba8654b4b81d23a" 928 1043 dependencies = [ 929 1044 "glib-sys", 930 1045 "libc", ··· 934 1049 935 1050 [[package]] 936 1051 name = "gsk4" 937 - version = "0.9.3" 1052 + version = "0.9.5" 938 1053 source = "registry+https://github.com/rust-lang/crates.io-index" 939 - checksum = "3deb9ae5a7fb759b2405e248d52850d9ef733079b90af2d6b01638f5b9eeafe1" 1054 + checksum = "32b9188db0a6219e708b6b6e7225718e459def664023dbddb8395ca1486d8102" 940 1055 dependencies = [ 941 1056 "cairo-rs", 942 1057 "gdk4", ··· 949 1064 950 1065 [[package]] 951 1066 name = "gsk4-sys" 952 - version = "0.9.3" 1067 + version = "0.9.5" 953 1068 source = "registry+https://github.com/rust-lang/crates.io-index" 954 - checksum = "2226662e97948f3f241c9a6c432cd95eeca662daf4a327e201458bb540ad9590" 1069 + checksum = "bca10fc65d68528a548efa3d8747934adcbe7058b73695c9a7f43a25352fce14" 955 1070 dependencies = [ 956 1071 "cairo-sys-rs", 957 1072 "gdk4-sys", ··· 965 1080 966 1081 [[package]] 967 1082 name = "gstreamer" 968 - version = "0.23.3" 1083 + version = "0.23.4" 969 1084 source = "registry+https://github.com/rust-lang/crates.io-index" 970 - checksum = "680006694e79692f831ca4f3ba6e147b8c23db289b2df1d33a4a97fd038145d7" 1085 + checksum = "700cb1b2e86dda424f85eb728102a111602317e40b4dd71cf1c0dc04e0cc5d95" 971 1086 dependencies = [ 972 1087 "cfg-if", 973 1088 "futures-channel", ··· 985 1100 "paste", 986 1101 "pin-project-lite", 987 1102 "smallvec", 988 - "thiserror", 1103 + "thiserror 2.0.9", 989 1104 ] 990 1105 991 1106 [[package]] 992 1107 name = "gstreamer-audio" 993 - version = "0.23.2" 1108 + version = "0.23.4" 994 1109 source = "registry+https://github.com/rust-lang/crates.io-index" 995 - checksum = "36d39b07213f83055fc705a384fa32ad581776b8e5b04c86f3a419ec5dfc0f81" 1110 + checksum = "52a6009b5c9c942cab1089956a501bd63778e65a3e69310949d173e90e2cdda2" 996 1111 dependencies = [ 997 1112 "cfg-if", 998 1113 "glib", ··· 1006 1121 1007 1122 [[package]] 1008 1123 name = "gstreamer-audio-sys" 1009 - version = "0.23.3" 1124 + version = "0.23.4" 1010 1125 source = "registry+https://github.com/rust-lang/crates.io-index" 1011 - checksum = "980a205553927ec2167ad79b80819df79c3683632abefbe255baffe1b4112044" 1126 + checksum = "ef70a3d80e51ef9a45749a844cb8579d4cabe5ff59cb43a65d6f3a377943262f" 1012 1127 dependencies = [ 1013 1128 "glib-sys", 1014 1129 "gobject-sys", ··· 1020 1135 1021 1136 [[package]] 1022 1137 name = "gstreamer-base" 1023 - version = "0.23.3" 1138 + version = "0.23.4" 1024 1139 source = "registry+https://github.com/rust-lang/crates.io-index" 1025 - checksum = "a11df90e3abf1d9747111c41902338fc1bd13b1c23b27fb828d43e57bd190134" 1140 + checksum = "d152db7983f98d5950cf64e53805286548063475fb61a5e5450fba4cec05899b" 1026 1141 dependencies = [ 1027 1142 "atomic_refcell", 1028 1143 "cfg-if", ··· 1034 1149 1035 1150 [[package]] 1036 1151 name = "gstreamer-base-sys" 1037 - version = "0.23.3" 1152 + version = "0.23.4" 1038 1153 source = "registry+https://github.com/rust-lang/crates.io-index" 1039 - checksum = "d691b2bb51a9e5727fb33c3b53fb64ee5b80c40cbbd250941a6d44b142f7a6a0" 1154 + checksum = "d47cc2d15f2a3d5eb129e5dacbbeec9600432b706805c15dff57b6aa11b2791c" 1040 1155 dependencies = [ 1041 1156 "glib-sys", 1042 1157 "gobject-sys", ··· 1046 1161 ] 1047 1162 1048 1163 [[package]] 1164 + name = "gstreamer-play" 1165 + version = "0.23.4" 1166 + source = "registry+https://github.com/rust-lang/crates.io-index" 1167 + checksum = "2d7a815750a28ac838bfd745d6da07cfd142bb2fa471397cd9992c8b6f235665" 1168 + dependencies = [ 1169 + "glib", 1170 + "gstreamer", 1171 + "gstreamer-play-sys", 1172 + "gstreamer-video", 1173 + "libc", 1174 + ] 1175 + 1176 + [[package]] 1177 + name = "gstreamer-play-sys" 1178 + version = "0.23.4" 1179 + source = "registry+https://github.com/rust-lang/crates.io-index" 1180 + checksum = "a1f8ef790b8a697c759a9bbbaa7b0c061f529c4581e0cc72839ae753af533591" 1181 + dependencies = [ 1182 + "glib-sys", 1183 + "gobject-sys", 1184 + "gstreamer-sys", 1185 + "gstreamer-video-sys", 1186 + "libc", 1187 + "system-deps", 1188 + ] 1189 + 1190 + [[package]] 1049 1191 name = "gstreamer-sys" 1050 - version = "0.23.3" 1192 + version = "0.23.4" 1193 + source = "registry+https://github.com/rust-lang/crates.io-index" 1194 + checksum = "16cf1ae0a869aa7066ce3c685b76053b4b4f48f364a5b18c4b1f36ef57469719" 1195 + dependencies = [ 1196 + "glib-sys", 1197 + "gobject-sys", 1198 + "libc", 1199 + "system-deps", 1200 + ] 1201 + 1202 + [[package]] 1203 + name = "gstreamer-video" 1204 + version = "0.23.4" 1205 + source = "registry+https://github.com/rust-lang/crates.io-index" 1206 + checksum = "8fa41e40319e923236e96f0b691711d1504746ab9c89607d77d22aa84777f33f" 1207 + dependencies = [ 1208 + "cfg-if", 1209 + "futures-channel", 1210 + "glib", 1211 + "gstreamer", 1212 + "gstreamer-base", 1213 + "gstreamer-video-sys", 1214 + "libc", 1215 + "once_cell", 1216 + "thiserror 2.0.9", 1217 + ] 1218 + 1219 + [[package]] 1220 + name = "gstreamer-video-sys" 1221 + version = "0.23.4" 1051 1222 source = "registry+https://github.com/rust-lang/crates.io-index" 1052 - checksum = "db89964774a97d5b092e2d124debc6bbcaf34b5c7cdef1759f4a9e1e3f8326ef" 1223 + checksum = "31dc0f49c117f4867b0f98c712aa55ebf25580151d794be8f9179ec2d877fd14" 1053 1224 dependencies = [ 1054 1225 "glib-sys", 1055 1226 "gobject-sys", 1227 + "gstreamer-base-sys", 1228 + "gstreamer-sys", 1056 1229 "libc", 1057 1230 "system-deps", 1058 1231 ] 1059 1232 1060 1233 [[package]] 1061 1234 name = "gtk4" 1062 - version = "0.9.3" 1235 + version = "0.9.5" 1063 1236 source = "registry+https://github.com/rust-lang/crates.io-index" 1064 - checksum = "d34465497f5a4c182c9c94a582a187db7d6af0863f28e87ccf4379f21f0e2a22" 1237 + checksum = "b697ff938136625f6acf75f01951220f47a45adcf0060ee55b4671cf734dac44" 1065 1238 dependencies = [ 1066 1239 "cairo-rs", 1067 1240 "field-offset", ··· 1080 1253 1081 1254 [[package]] 1082 1255 name = "gtk4-macros" 1083 - version = "0.9.3" 1256 + version = "0.9.5" 1084 1257 source = "registry+https://github.com/rust-lang/crates.io-index" 1085 - checksum = "a7c518d5dd41c57385c7cd30af52e261820c897fc1144e558bb88c303d048ae2" 1258 + checksum = "0ed1786c4703dd196baf7e103525ce0cf579b3a63a0570fe653b7ee6bac33999" 1086 1259 dependencies = [ 1087 1260 "proc-macro-crate", 1088 1261 "proc-macro2", ··· 1092 1265 1093 1266 [[package]] 1094 1267 name = "gtk4-sys" 1095 - version = "0.9.3" 1268 + version = "0.9.5" 1096 1269 source = "registry+https://github.com/rust-lang/crates.io-index" 1097 - checksum = "f11c7812e28542edb4d0495a2fde1f4588899e2accfcebaa80115f27dc7358a3" 1270 + checksum = "3af4b680cee5d2f786a2f91f1c77e95ecf2254522f0ca4edf3a2dce6cb35cecf" 1098 1271 dependencies = [ 1099 1272 "cairo-sys-rs", 1100 1273 "gdk-pixbuf-sys", ··· 1120 1293 1121 1294 [[package]] 1122 1295 name = "hashbrown" 1123 - version = "0.15.1" 1296 + version = "0.15.2" 1124 1297 source = "registry+https://github.com/rust-lang/crates.io-index" 1125 - checksum = "3a9bfc1af68b1726ea47d3d5109de126281def866b33970e10fbab11b5dafab3" 1298 + checksum = "bf151400ff0baff5465007dd2f3e717f3fe502074ca563069ce3a6629d07b289" 1126 1299 1127 1300 [[package]] 1128 1301 name = "hashlink" ··· 1162 1335 "iana-time-zone-haiku", 1163 1336 "js-sys", 1164 1337 "wasm-bindgen", 1165 - "windows-core", 1338 + "windows-core 0.52.0", 1166 1339 ] 1167 1340 1168 1341 [[package]] ··· 1315 1488 1316 1489 [[package]] 1317 1490 name = "indexmap" 1318 - version = "2.6.0" 1491 + version = "2.7.0" 1319 1492 source = "registry+https://github.com/rust-lang/crates.io-index" 1320 - checksum = "707907fe3c25f5424cce2cb7e1cbcafee6bdbe735ca90ef77c29e84591e5b9da" 1493 + checksum = "62f822373a4fe84d4bb149bf54e584a7f4abec90e072ed49cda0edea5b95471f" 1321 1494 dependencies = [ 1322 1495 "equivalent", 1323 - "hashbrown 0.15.1", 1496 + "hashbrown 0.15.2", 1324 1497 ] 1325 1498 1326 1499 [[package]] 1327 1500 name = "inotify" 1328 - version = "0.9.6" 1501 + version = "0.10.2" 1329 1502 source = "registry+https://github.com/rust-lang/crates.io-index" 1330 - checksum = "f8069d3ec154eb856955c1c0fbffefbf5f3c40a104ec912d4797314c1801abff" 1503 + checksum = "fdd168d97690d0b8c412d6b6c10360277f4d7ee495c5d0d5d5fe0854923255cc" 1331 1504 dependencies = [ 1332 1505 "bitflags 1.3.2", 1333 1506 "inotify-sys", ··· 1344 1517 ] 1345 1518 1346 1519 [[package]] 1347 - name = "intersection" 1348 - version = "1.0.0" 1520 + name = "instant" 1521 + version = "0.1.13" 1349 1522 source = "registry+https://github.com/rust-lang/crates.io-index" 1350 - checksum = "133d3551b09a5131c0ffc31eaefdafdd58b1cdd272f7d1bab4db623c245a266c" 1523 + checksum = "e0242819d153cba4b4b05a5a8f2a7e9bbf97b6055b2a002b395c96b5ff3c0222" 1524 + dependencies = [ 1525 + "cfg-if", 1526 + ] 1351 1527 1352 1528 [[package]] 1353 1529 name = "itertools" ··· 1359 1535 ] 1360 1536 1361 1537 [[package]] 1538 + name = "itoa" 1539 + version = "1.0.14" 1540 + source = "registry+https://github.com/rust-lang/crates.io-index" 1541 + checksum = "d75a2a4b1b190afb6f5425f10f6a8f959d2ea0b9c2b1d79553551850539e4674" 1542 + 1543 + [[package]] 1362 1544 name = "js-sys" 1363 - version = "0.3.72" 1545 + version = "0.3.76" 1364 1546 source = "registry+https://github.com/rust-lang/crates.io-index" 1365 - checksum = "6a88f1bda2bd75b0452a14784937d796722fdebfe50df998aeb3f0b7603019a9" 1547 + checksum = "6717b6b5b077764fb5966237269cb3c64edddde4b14ce42647430a78ced9e7b7" 1366 1548 dependencies = [ 1549 + "once_cell", 1367 1550 "wasm-bindgen", 1368 1551 ] 1369 1552 ··· 1394 1577 ] 1395 1578 1396 1579 [[package]] 1580 + name = "kv-log-macro" 1581 + version = "1.0.7" 1582 + source = "registry+https://github.com/rust-lang/crates.io-index" 1583 + checksum = "0de8b303297635ad57c9f5059fd9cee7a47f8e8daa09df0fcd07dd39fb22977f" 1584 + dependencies = [ 1585 + "log", 1586 + ] 1587 + 1588 + [[package]] 1397 1589 name = "lazy_static" 1398 1590 version = "1.5.0" 1399 1591 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1432 1624 1433 1625 [[package]] 1434 1626 name = "libc" 1435 - version = "0.2.161" 1627 + version = "0.2.169" 1436 1628 source = "registry+https://github.com/rust-lang/crates.io-index" 1437 - checksum = "8e9489c2807c139ffd9c1794f4af0ebe86a828db53ecdc7fea2111d0fed085d1" 1629 + checksum = "b5aba8db14291edd000dfcc4d620c7ebfb122c613afb886ca8803fa4e128a20a" 1438 1630 1439 1631 [[package]] 1440 1632 name = "libredox" ··· 1465 1657 1466 1658 [[package]] 1467 1659 name = "litemap" 1468 - version = "0.7.3" 1660 + version = "0.7.4" 1469 1661 source = "registry+https://github.com/rust-lang/crates.io-index" 1470 - checksum = "643cb0b8d4fcc284004d5fd0d67ccf61dfffadb7f75e1e71bc420f4688a3a704" 1662 + checksum = "4ee93343901ab17bd981295f2cf0026d4ad018c7c31ba84549a4ddbb47a45104" 1471 1663 1472 1664 [[package]] 1473 1665 name = "locale_config" ··· 1523 1715 version = "0.4.22" 1524 1716 source = "registry+https://github.com/rust-lang/crates.io-index" 1525 1717 checksum = "a7a70ba024b9dc04c27ea2f0c0548feb474ec5c54bba33a7f72f873a39d07b24" 1718 + dependencies = [ 1719 + "value-bag", 1720 + ] 1526 1721 1527 1722 [[package]] 1528 1723 name = "malloc_buf" ··· 1540 1735 checksum = "78ca9ab1a0babb1e7d5695e3530886289c18cf2f87ec19a575a0abdce112e3a3" 1541 1736 1542 1737 [[package]] 1738 + name = "memmap2" 1739 + version = "0.5.10" 1740 + source = "registry+https://github.com/rust-lang/crates.io-index" 1741 + checksum = "83faa42c0a078c393f6b29d5db232d8be22776a891f8f56e5284faee4a20b327" 1742 + dependencies = [ 1743 + "libc", 1744 + ] 1745 + 1746 + [[package]] 1543 1747 name = "memoffset" 1544 1748 version = "0.9.1" 1545 1749 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1549 1753 ] 1550 1754 1551 1755 [[package]] 1756 + name = "miette" 1757 + version = "5.10.0" 1758 + source = "registry+https://github.com/rust-lang/crates.io-index" 1759 + checksum = "59bb584eaeeab6bd0226ccf3509a69d7936d148cf3d036ad350abe35e8c6856e" 1760 + dependencies = [ 1761 + "miette-derive", 1762 + "once_cell", 1763 + "thiserror 1.0.69", 1764 + "unicode-width", 1765 + ] 1766 + 1767 + [[package]] 1768 + name = "miette-derive" 1769 + version = "5.10.0" 1770 + source = "registry+https://github.com/rust-lang/crates.io-index" 1771 + checksum = "49e7bc1560b95a3c4a25d03de42fe76ca718ab92d1a22a55b9b4cf67b3ae635c" 1772 + dependencies = [ 1773 + "proc-macro2", 1774 + "quote", 1775 + "syn", 1776 + ] 1777 + 1778 + [[package]] 1552 1779 name = "mime" 1553 1780 version = "0.3.17" 1554 1781 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1566 1793 1567 1794 [[package]] 1568 1795 name = "miniz_oxide" 1569 - version = "0.8.0" 1796 + version = "0.8.2" 1570 1797 source = "registry+https://github.com/rust-lang/crates.io-index" 1571 - checksum = "e2d80299ef12ff69b16a84bb182e3b9df68b5a91574d3d4fa6e41b65deec4df1" 1798 + checksum = "4ffbe83022cedc1d264172192511ae958937694cd57ce297164951b8b3568394" 1572 1799 dependencies = [ 1573 1800 "adler2", 1574 1801 ] 1575 1802 1576 1803 [[package]] 1577 1804 name = "mio" 1578 - version = "0.8.11" 1805 + version = "1.0.3" 1579 1806 source = "registry+https://github.com/rust-lang/crates.io-index" 1580 - checksum = "a4a650543ca06a924e8b371db273b2756685faae30f8487da1b56505a8f78b0c" 1807 + checksum = "2886843bf800fba2e3377cff24abf6379b4c4d5c6681eaf9ea5b0d15090450bd" 1581 1808 dependencies = [ 1582 1809 "libc", 1583 1810 "log", 1584 1811 "wasi", 1585 - "windows-sys 0.48.0", 1812 + "windows-sys 0.52.0", 1813 + ] 1814 + 1815 + [[package]] 1816 + name = "moka" 1817 + version = "0.12.8" 1818 + source = "registry+https://github.com/rust-lang/crates.io-index" 1819 + checksum = "32cf62eb4dd975d2dde76432fb1075c49e3ee2331cf36f1f8fd4b66550d32b6f" 1820 + dependencies = [ 1821 + "async-lock", 1822 + "async-trait", 1823 + "crossbeam-channel", 1824 + "crossbeam-epoch", 1825 + "crossbeam-utils", 1826 + "event-listener 5.3.1", 1827 + "futures-util", 1828 + "once_cell", 1829 + "parking_lot", 1830 + "quanta", 1831 + "rustc_version", 1832 + "smallvec", 1833 + "tagptr", 1834 + "thiserror 1.0.69", 1835 + "triomphe", 1836 + "uuid", 1586 1837 ] 1587 1838 1588 1839 [[package]] ··· 1591 1842 source = "registry+https://github.com/rust-lang/crates.io-index" 1592 1843 checksum = "058bc2227727af394f34aa51da3e36aeecf2c808f39315d35f754872660750ae" 1593 1844 dependencies = [ 1594 - "async-channel", 1845 + "async-channel 2.3.1", 1595 1846 "futures-channel", 1596 1847 "serde", 1597 1848 "trait-variant", 1598 - "zbus", 1849 + "zbus 4.4.0", 1599 1850 ] 1600 1851 1601 1852 [[package]] ··· 1619 1870 1620 1871 [[package]] 1621 1872 name = "notify" 1622 - version = "6.1.1" 1873 + version = "7.0.0" 1623 1874 source = "registry+https://github.com/rust-lang/crates.io-index" 1624 - checksum = "6205bd8bb1e454ad2e27422015fb5e4f2bcc7e08fa8f27058670d208324a4d2d" 1875 + checksum = "c533b4c39709f9ba5005d8002048266593c1cfaf3c5f0739d5b8ab0c6c504009" 1625 1876 dependencies = [ 1626 1877 "bitflags 2.6.0", 1627 - "crossbeam-channel", 1628 1878 "filetime", 1629 1879 "fsevent-sys", 1630 1880 "inotify", ··· 1632 1882 "libc", 1633 1883 "log", 1634 1884 "mio", 1885 + "notify-types", 1635 1886 "walkdir", 1636 - "windows-sys 0.48.0", 1887 + "windows-sys 0.52.0", 1637 1888 ] 1638 1889 1639 1890 [[package]] 1640 1891 name = "notify-debouncer-full" 1641 - version = "0.3.2" 1892 + version = "0.4.0" 1642 1893 source = "registry+https://github.com/rust-lang/crates.io-index" 1643 - checksum = "fb7fd166739789c9ff169e654dc1501373db9d80a4c3f972817c8a4d7cf8f34e" 1894 + checksum = "9dcf855483228259b2353f89e99df35fc639b2b2510d1166e4858e3f67ec1afb" 1644 1895 dependencies = [ 1645 - "crossbeam-channel", 1646 1896 "file-id", 1647 1897 "log", 1648 1898 "notify", 1649 - "parking_lot", 1899 + "notify-types", 1650 1900 "walkdir", 1651 1901 ] 1652 1902 1653 1903 [[package]] 1904 + name = "notify-types" 1905 + version = "1.0.1" 1906 + source = "registry+https://github.com/rust-lang/crates.io-index" 1907 + checksum = "585d3cb5e12e01aed9e8a1f70d5c6b5e86fe2a6e48fc8cd0b3e0b8df6f6eb174" 1908 + dependencies = [ 1909 + "instant", 1910 + ] 1911 + 1912 + [[package]] 1654 1913 name = "nu-ansi-term" 1655 1914 version = "0.50.1" 1656 1915 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1752 2011 1753 2012 [[package]] 1754 2013 name = "pango" 1755 - version = "0.20.4" 2014 + version = "0.20.7" 1756 2015 source = "registry+https://github.com/rust-lang/crates.io-index" 1757 - checksum = "aa26aa54b11094d72141a754901cd71d9356432bb8147f9cace8d9c7ba95f356" 2016 + checksum = "9e89bd74250a03a05cec047b43465469102af803be2bf5e5a1088f8b8455e087" 1758 2017 dependencies = [ 1759 2018 "gio", 1760 2019 "glib", ··· 1764 2023 1765 2024 [[package]] 1766 2025 name = "pango-sys" 1767 - version = "0.20.4" 2026 + version = "0.20.7" 1768 2027 source = "registry+https://github.com/rust-lang/crates.io-index" 1769 - checksum = "84fd65917bf12f06544ae2bbc200abf9fc0a513a5a88a0fa81013893aef2b838" 2028 + checksum = "71787e0019b499a5eda889279e4adb455a4f3fdd6870cd5ab7f4a5aa25df6699" 1770 2029 dependencies = [ 1771 2030 "glib-sys", 1772 2031 "gobject-sys", ··· 1800 2059 "libc", 1801 2060 "redox_syscall", 1802 2061 "smallvec", 1803 - "windows-targets 0.52.6", 2062 + "windows-targets", 1804 2063 ] 1805 2064 1806 2065 [[package]] ··· 1846 2105 1847 2106 [[package]] 1848 2107 name = "polling" 1849 - version = "3.7.3" 2108 + version = "3.7.4" 1850 2109 source = "registry+https://github.com/rust-lang/crates.io-index" 1851 - checksum = "cc2790cd301dec6cd3b7a025e4815cf825724a51c98dccfe6a3e55f05ffb6511" 2110 + checksum = "a604568c3202727d1507653cb121dbd627a58684eb09a820fd746bee38b4442f" 1852 2111 dependencies = [ 1853 2112 "cfg-if", 1854 2113 "concurrent-queue", ··· 1879 2138 1880 2139 [[package]] 1881 2140 name = "proc-macro2" 1882 - version = "1.0.89" 2141 + version = "1.0.92" 1883 2142 source = "registry+https://github.com/rust-lang/crates.io-index" 1884 - checksum = "f139b0662de085916d1fb67d2b4169d1addddda1919e696f3252b740b629986e" 2143 + checksum = "37d3544b3f2748c54e147655edb5025752e2303145b5aefb3c3ea2c78b973bb0" 1885 2144 dependencies = [ 1886 2145 "unicode-ident", 1887 2146 ] 1888 2147 1889 2148 [[package]] 2149 + name = "quanta" 2150 + version = "0.12.4" 2151 + source = "registry+https://github.com/rust-lang/crates.io-index" 2152 + checksum = "773ce68d0bb9bc7ef20be3536ffe94e223e1f365bd374108b2659fac0c65cfe6" 2153 + dependencies = [ 2154 + "crossbeam-utils", 2155 + "libc", 2156 + "once_cell", 2157 + "raw-cpuid", 2158 + "wasi", 2159 + "web-sys", 2160 + "winapi", 2161 + ] 2162 + 2163 + [[package]] 1890 2164 name = "quote" 1891 2165 version = "1.0.37" 1892 2166 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1896 2170 ] 1897 2171 1898 2172 [[package]] 2173 + name = "r2d2" 2174 + version = "0.8.10" 2175 + source = "registry+https://github.com/rust-lang/crates.io-index" 2176 + checksum = "51de85fb3fb6524929c8a2eb85e6b6d363de4e8c48f9e2c2eac4944abc181c93" 2177 + dependencies = [ 2178 + "log", 2179 + "parking_lot", 2180 + "scheduled-thread-pool", 2181 + ] 2182 + 2183 + [[package]] 2184 + name = "r2d2_sqlite" 2185 + version = "0.25.0" 2186 + source = "registry+https://github.com/rust-lang/crates.io-index" 2187 + checksum = "eb14dba8247a6a15b7fdbc7d389e2e6f03ee9f184f87117706d509c092dfe846" 2188 + dependencies = [ 2189 + "r2d2", 2190 + "rusqlite", 2191 + "uuid", 2192 + ] 2193 + 2194 + [[package]] 1899 2195 name = "rand" 1900 2196 version = "0.8.5" 1901 2197 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1926 2222 ] 1927 2223 1928 2224 [[package]] 2225 + name = "raw-cpuid" 2226 + version = "11.2.0" 2227 + source = "registry+https://github.com/rust-lang/crates.io-index" 2228 + checksum = "1ab240315c661615f2ee9f0f2cd32d5a7343a84d5ebcccb99d46e6637565e7b0" 2229 + dependencies = [ 2230 + "bitflags 2.6.0", 2231 + ] 2232 + 2233 + [[package]] 1929 2234 name = "recordbox" 1930 - version = "0.8.3" 2235 + version = "0.9.0" 1931 2236 dependencies = [ 1932 2237 "ashpd", 1933 - "async-channel", 2238 + "async-channel 2.3.1", 1934 2239 "async-lock", 2240 + "cacache", 1935 2241 "color-thief", 1936 2242 "common-path", 1937 2243 "flexi_logger", 1938 - "formatx", 1939 2244 "futures", 2245 + "fuzzy-matcher", 1940 2246 "gettext-rs", 1941 2247 "gstreamer", 1942 2248 "gstreamer-audio", 1943 2249 "gstreamer-base", 2250 + "gstreamer-play", 1944 2251 "gtk4", 1945 - "intersection", 1946 2252 "json", 1947 2253 "lazy_static", 1948 2254 "libadwaita", 1949 2255 "lofty", 1950 2256 "log", 1951 2257 "mime_guess", 2258 + "moka", 1952 2259 "mpris-server", 1953 2260 "notify-debouncer-full", 2261 + "r2d2", 2262 + "r2d2_sqlite", 1954 2263 "rand", 1955 2264 "rusqlite", 1956 2265 "rusqlite_migration", 1957 2266 "search-provider", 1958 - "similar", 2267 + "strum", 2268 + "strum_macros", 2269 + "tr", 2270 + "urlencoding", 1959 2271 "walkdir", 1960 2272 ] 1961 2273 1962 2274 [[package]] 1963 2275 name = "redox_syscall" 1964 - version = "0.5.7" 2276 + version = "0.5.8" 1965 2277 source = "registry+https://github.com/rust-lang/crates.io-index" 1966 - checksum = "9b6dfecf2c74bce2466cabf93f6664d6998a69eb21e39f4207930065b27b771f" 2278 + checksum = "03a862b389f93e68874fbf580b9de08dd02facb9a788ebadaf4a3fd33cf58834" 1967 2279 dependencies = [ 1968 2280 "bitflags 2.6.0", 1969 2281 ] 1970 2282 1971 2283 [[package]] 2284 + name = "reflink-copy" 2285 + version = "0.1.20" 2286 + source = "registry+https://github.com/rust-lang/crates.io-index" 2287 + checksum = "17400ed684c3a0615932f00c271ae3eea13e47056a1455821995122348ab6438" 2288 + dependencies = [ 2289 + "cfg-if", 2290 + "rustix", 2291 + "windows", 2292 + ] 2293 + 2294 + [[package]] 1972 2295 name = "regex" 1973 2296 version = "1.11.1" 1974 2297 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1982 2305 1983 2306 [[package]] 1984 2307 name = "regex-automata" 1985 - version = "0.4.8" 2308 + version = "0.4.9" 1986 2309 source = "registry+https://github.com/rust-lang/crates.io-index" 1987 - checksum = "368758f23274712b504848e9d5a6f010445cc8b87a7cdb4d7cbee666c1288da3" 2310 + checksum = "809e8dc61f6de73b46c85f4c96486310fe304c434cfa43669d7b40f711150908" 1988 2311 dependencies = [ 1989 2312 "aho-corasick", 1990 2313 "memchr", ··· 2041 2364 2042 2365 [[package]] 2043 2366 name = "rustix" 2044 - version = "0.38.39" 2367 + version = "0.38.42" 2045 2368 source = "registry+https://github.com/rust-lang/crates.io-index" 2046 - checksum = "375116bee2be9ed569afe2154ea6a99dfdffd257f533f187498c2a8f5feaf4ee" 2369 + checksum = "f93dc38ecbab2eb790ff964bb77fa94faf256fd3e73285fd7ba0903b76bedb85" 2047 2370 dependencies = [ 2048 2371 "bitflags 2.6.0", 2049 2372 "errno", 2050 2373 "libc", 2051 2374 "linux-raw-sys", 2052 - "windows-sys 0.52.0", 2375 + "windows-sys 0.59.0", 2053 2376 ] 2054 2377 2055 2378 [[package]] 2379 + name = "rustversion" 2380 + version = "1.0.18" 2381 + source = "registry+https://github.com/rust-lang/crates.io-index" 2382 + checksum = "0e819f2bc632f285be6d7cd36e25940d45b2391dd6d9b939e79de557f7014248" 2383 + 2384 + [[package]] 2385 + name = "ryu" 2386 + version = "1.0.18" 2387 + source = "registry+https://github.com/rust-lang/crates.io-index" 2388 + checksum = "f3cb5ba0dc43242ce17de99c180e96db90b235b8a9fdc9543c96d2209116bd9f" 2389 + 2390 + [[package]] 2056 2391 name = "same-file" 2057 2392 version = "1.0.6" 2058 2393 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2062 2397 ] 2063 2398 2064 2399 [[package]] 2400 + name = "scheduled-thread-pool" 2401 + version = "0.2.7" 2402 + source = "registry+https://github.com/rust-lang/crates.io-index" 2403 + checksum = "3cbc66816425a074528352f5789333ecff06ca41b36b0b0efdfbb29edc391a19" 2404 + dependencies = [ 2405 + "parking_lot", 2406 + ] 2407 + 2408 + [[package]] 2065 2409 name = "scopeguard" 2066 2410 version = "1.2.0" 2067 2411 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2076 2420 "futures-channel", 2077 2421 "futures-util", 2078 2422 "serde", 2079 - "zbus", 2423 + "zbus 4.4.0", 2080 2424 ] 2081 2425 2082 2426 [[package]] 2083 2427 name = "semver" 2084 - version = "1.0.23" 2428 + version = "1.0.24" 2085 2429 source = "registry+https://github.com/rust-lang/crates.io-index" 2086 - checksum = "61697e0a1c7e512e84a621326239844a24d8207b4669b41bc18b32ea5cbf988b" 2430 + checksum = "3cb6eb87a131f756572d7fb904f6e7b68633f09cca868c5df1c4b8d1a694bbba" 2087 2431 2088 2432 [[package]] 2089 2433 name = "serde" 2090 - version = "1.0.214" 2434 + version = "1.0.216" 2091 2435 source = "registry+https://github.com/rust-lang/crates.io-index" 2092 - checksum = "f55c3193aca71c12ad7890f1785d2b73e1b9f63a0bbc353c08ef26fe03fc56b5" 2436 + checksum = "0b9781016e935a97e8beecf0c933758c97a5520d32930e460142b4cd80c6338e" 2093 2437 dependencies = [ 2094 2438 "serde_derive", 2095 2439 ] 2096 2440 2097 2441 [[package]] 2098 2442 name = "serde_derive" 2099 - version = "1.0.214" 2443 + version = "1.0.216" 2100 2444 source = "registry+https://github.com/rust-lang/crates.io-index" 2101 - checksum = "de523f781f095e28fa605cdce0f8307e451cc0fd14e2eb4cd2e98a355b147766" 2445 + checksum = "46f859dbbf73865c6627ed570e78961cd3ac92407a2d117204c49232485da55e" 2102 2446 dependencies = [ 2103 2447 "proc-macro2", 2104 2448 "quote", ··· 2106 2450 ] 2107 2451 2108 2452 [[package]] 2453 + name = "serde_json" 2454 + version = "1.0.134" 2455 + source = "registry+https://github.com/rust-lang/crates.io-index" 2456 + checksum = "d00f4175c42ee48b15416f6193a959ba3a0d67fc699a0db9ad12df9f83991c7d" 2457 + dependencies = [ 2458 + "itoa", 2459 + "memchr", 2460 + "ryu", 2461 + "serde", 2462 + ] 2463 + 2464 + [[package]] 2109 2465 name = "serde_repr" 2110 2466 version = "0.1.19" 2111 2467 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2126 2482 ] 2127 2483 2128 2484 [[package]] 2485 + name = "sha-1" 2486 + version = "0.10.1" 2487 + source = "registry+https://github.com/rust-lang/crates.io-index" 2488 + checksum = "f5058ada175748e33390e40e872bd0fe59a19f265d0158daa551c5a88a76009c" 2489 + dependencies = [ 2490 + "cfg-if", 2491 + "cpufeatures", 2492 + "digest", 2493 + ] 2494 + 2495 + [[package]] 2129 2496 name = "sha1" 2130 2497 version = "0.10.6" 2131 2498 source = "registry+https://github.com/rust-lang/crates.io-index" 2132 2499 checksum = "e3bf829a2d51ab4a5ddf1352d8470c140cadc8301b2ae1789db023f01cedd6ba" 2500 + dependencies = [ 2501 + "cfg-if", 2502 + "cpufeatures", 2503 + "digest", 2504 + ] 2505 + 2506 + [[package]] 2507 + name = "sha2" 2508 + version = "0.10.8" 2509 + source = "registry+https://github.com/rust-lang/crates.io-index" 2510 + checksum = "793db75ad2bcafc3ffa7c68b215fee268f537982cd901d132f89c6343f3a3dc8" 2133 2511 dependencies = [ 2134 2512 "cfg-if", 2135 2513 "cpufeatures", ··· 2150 2528 dependencies = [ 2151 2529 "libc", 2152 2530 ] 2153 - 2154 - [[package]] 2155 - name = "similar" 2156 - version = "2.6.0" 2157 - source = "registry+https://github.com/rust-lang/crates.io-index" 2158 - checksum = "1de1d4f81173b03af4c0cbed3c898f6bff5b870e4a7f5d6f4057d62a7a4b686e" 2159 2531 2160 2532 [[package]] 2161 2533 name = "slab" ··· 2173 2545 checksum = "3c5e1a9a646d36c3599cd173a41282daf47c44583ad367b8e6837255952e5c67" 2174 2546 2175 2547 [[package]] 2548 + name = "ssri" 2549 + version = "9.2.0" 2550 + source = "registry+https://github.com/rust-lang/crates.io-index" 2551 + checksum = "da7a2b3c2bc9693bcb40870c4e9b5bf0d79f9cb46273321bf855ec513e919082" 2552 + dependencies = [ 2553 + "base64", 2554 + "digest", 2555 + "hex", 2556 + "miette", 2557 + "serde", 2558 + "sha-1", 2559 + "sha2", 2560 + "thiserror 1.0.69", 2561 + "xxhash-rust", 2562 + ] 2563 + 2564 + [[package]] 2176 2565 name = "stable_deref_trait" 2177 2566 version = "1.2.0" 2178 2567 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2185 2574 checksum = "a2eb9349b6444b326872e140eb1cf5e7c522154d69e7a0ffb0fb81c06b37543f" 2186 2575 2187 2576 [[package]] 2577 + name = "strum" 2578 + version = "0.26.3" 2579 + source = "registry+https://github.com/rust-lang/crates.io-index" 2580 + checksum = "8fec0f0aef304996cf250b31b5a10dee7980c85da9d759361292b8bca5a18f06" 2581 + 2582 + [[package]] 2583 + name = "strum_macros" 2584 + version = "0.26.4" 2585 + source = "registry+https://github.com/rust-lang/crates.io-index" 2586 + checksum = "4c6bee85a5a24955dc440386795aa378cd9cf82acd5f764469152d2270e581be" 2587 + dependencies = [ 2588 + "heck", 2589 + "proc-macro2", 2590 + "quote", 2591 + "rustversion", 2592 + "syn", 2593 + ] 2594 + 2595 + [[package]] 2188 2596 name = "syn" 2189 - version = "2.0.87" 2597 + version = "2.0.91" 2190 2598 source = "registry+https://github.com/rust-lang/crates.io-index" 2191 - checksum = "25aa4ce346d03a6dcd68dd8b4010bcb74e54e62c90c573f394c46eae99aba32d" 2599 + checksum = "d53cbcb5a243bd33b7858b1d7f4aca2153490815872d86d955d6ea29f743c035" 2192 2600 dependencies = [ 2193 2601 "proc-macro2", 2194 2602 "quote", ··· 2220 2628 ] 2221 2629 2222 2630 [[package]] 2631 + name = "tagptr" 2632 + version = "0.2.0" 2633 + source = "registry+https://github.com/rust-lang/crates.io-index" 2634 + checksum = "7b2093cf4c8eb1e67749a6762251bc9cd836b6fc171623bd0a9d324d37af2417" 2635 + 2636 + [[package]] 2223 2637 name = "target-lexicon" 2224 2638 version = "0.12.16" 2225 2639 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2233 2647 2234 2648 [[package]] 2235 2649 name = "tempfile" 2236 - version = "3.13.0" 2650 + version = "3.14.0" 2237 2651 source = "registry+https://github.com/rust-lang/crates.io-index" 2238 - checksum = "f0f2c9fc62d0beef6951ccffd757e241266a2c833136efbe35af6cd2567dca5b" 2652 + checksum = "28cce251fcbc87fac86a866eeb0d6c2d536fc16d06f184bb61aeae11aa4cee0c" 2239 2653 dependencies = [ 2240 2654 "cfg-if", 2241 2655 "fastrand", ··· 2246 2660 2247 2661 [[package]] 2248 2662 name = "thiserror" 2249 - version = "1.0.68" 2663 + version = "1.0.69" 2664 + source = "registry+https://github.com/rust-lang/crates.io-index" 2665 + checksum = "b6aaf5339b578ea85b50e080feb250a3e8ae8cfcdff9a461c9ec2904bc923f52" 2666 + dependencies = [ 2667 + "thiserror-impl 1.0.69", 2668 + ] 2669 + 2670 + [[package]] 2671 + name = "thiserror" 2672 + version = "2.0.9" 2250 2673 source = "registry+https://github.com/rust-lang/crates.io-index" 2251 - checksum = "02dd99dc800bbb97186339685293e1cc5d9df1f8fae2d0aecd9ff1c77efea892" 2674 + checksum = "f072643fd0190df67a8bab670c20ef5d8737177d6ac6b2e9a236cb096206b2cc" 2252 2675 dependencies = [ 2253 - "thiserror-impl", 2676 + "thiserror-impl 2.0.9", 2254 2677 ] 2255 2678 2256 2679 [[package]] 2257 2680 name = "thiserror-impl" 2258 - version = "1.0.68" 2681 + version = "1.0.69" 2259 2682 source = "registry+https://github.com/rust-lang/crates.io-index" 2260 - checksum = "a7c61ec9a6f64d2793d8a45faba21efbe3ced62a886d44c36a009b2b519b4c7e" 2683 + checksum = "4fee6c4efc90059e10f81e6d42c60a18f76588c3d74cb83a0b242a2b6c7504c1" 2261 2684 dependencies = [ 2262 2685 "proc-macro2", 2263 2686 "quote", ··· 2265 2688 ] 2266 2689 2267 2690 [[package]] 2691 + name = "thiserror-impl" 2692 + version = "2.0.9" 2693 + source = "registry+https://github.com/rust-lang/crates.io-index" 2694 + checksum = "7b50fa271071aae2e6ee85f842e2e28ba8cd2c5fb67f11fcb1fd70b276f9e7d4" 2695 + dependencies = [ 2696 + "proc-macro2", 2697 + "quote", 2698 + "syn", 2699 + ] 2700 + 2701 + [[package]] 2702 + name = "thread_local" 2703 + version = "1.1.8" 2704 + source = "registry+https://github.com/rust-lang/crates.io-index" 2705 + checksum = "8b9ef9bad013ada3808854ceac7b46812a6465ba368859a37e2100283d2d719c" 2706 + dependencies = [ 2707 + "cfg-if", 2708 + "once_cell", 2709 + ] 2710 + 2711 + [[package]] 2268 2712 name = "tinystr" 2269 2713 version = "0.7.6" 2270 2714 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2309 2753 ] 2310 2754 2311 2755 [[package]] 2756 + name = "tr" 2757 + version = "0.1.10" 2758 + source = "registry+https://github.com/rust-lang/crates.io-index" 2759 + checksum = "a592877f7cb2e5a6327b8c908fa6d51098482b1c87d478abdd783e61218f8151" 2760 + dependencies = [ 2761 + "gettext-rs", 2762 + "lazy_static", 2763 + ] 2764 + 2765 + [[package]] 2312 2766 name = "tracing" 2313 - version = "0.1.40" 2767 + version = "0.1.41" 2314 2768 source = "registry+https://github.com/rust-lang/crates.io-index" 2315 - checksum = "c3523ab5a71916ccf420eebdf5521fcef02141234bbc0b8a49f2fdc4544364ef" 2769 + checksum = "784e0ac535deb450455cbfa28a6f0df145ea1bb7ae51b821cf5e7927fdcfbdd0" 2316 2770 dependencies = [ 2317 2771 "pin-project-lite", 2318 2772 "tracing-attributes", ··· 2321 2775 2322 2776 [[package]] 2323 2777 name = "tracing-attributes" 2324 - version = "0.1.27" 2778 + version = "0.1.28" 2325 2779 source = "registry+https://github.com/rust-lang/crates.io-index" 2326 - checksum = "34704c8d6ebcbc939824180af020566b01a7c01f80641264eba0999f6c2b6be7" 2780 + checksum = "395ae124c09f9e6918a2310af6038fba074bcf474ac352496d5910dd59a2226d" 2327 2781 dependencies = [ 2328 2782 "proc-macro2", 2329 2783 "quote", ··· 2332 2786 2333 2787 [[package]] 2334 2788 name = "tracing-core" 2335 - version = "0.1.32" 2789 + version = "0.1.33" 2336 2790 source = "registry+https://github.com/rust-lang/crates.io-index" 2337 - checksum = "c06d3da6113f116aaee68e4d601191614c9053067f9ab7f6edbcb161237daa54" 2791 + checksum = "e672c95779cf947c5311f83787af4fa8fffd12fb27e4993211a84bdfd9610f9c" 2338 2792 dependencies = [ 2339 2793 "once_cell", 2340 2794 ] ··· 2349 2803 "quote", 2350 2804 "syn", 2351 2805 ] 2806 + 2807 + [[package]] 2808 + name = "triomphe" 2809 + version = "0.1.11" 2810 + source = "registry+https://github.com/rust-lang/crates.io-index" 2811 + checksum = "859eb650cfee7434994602c3a68b25d77ad9e68c8a6cd491616ef86661382eb3" 2352 2812 2353 2813 [[package]] 2354 2814 name = "typenum" ··· 2375 2835 2376 2836 [[package]] 2377 2837 name = "unicode-ident" 2378 - version = "1.0.13" 2838 + version = "1.0.14" 2839 + source = "registry+https://github.com/rust-lang/crates.io-index" 2840 + checksum = "adb9e6ca4f869e1180728b7950e35922a7fc6397f7b641499e8f3ef06e50dc83" 2841 + 2842 + [[package]] 2843 + name = "unicode-width" 2844 + version = "0.1.14" 2379 2845 source = "registry+https://github.com/rust-lang/crates.io-index" 2380 - checksum = "e91b56cd4cadaeb79bbf1a5645f6b4f8dc5bde8834ad5894a8db35fda9efa1fe" 2846 + checksum = "7dd6e30e90baa6f72411720665d41d89b9a3d039dc45b8faea1ddd07f617f6af" 2381 2847 2382 2848 [[package]] 2383 2849 name = "url" 2384 - version = "2.5.3" 2850 + version = "2.5.4" 2385 2851 source = "registry+https://github.com/rust-lang/crates.io-index" 2386 - checksum = "8d157f1b96d14500ffdc1f10ba712e780825526c03d9a49b4d0324b0d9113ada" 2852 + checksum = "32f8b686cadd1473f4bd0117a5d28d36b1ade384ea9b5069a1c40aefed7fda60" 2387 2853 dependencies = [ 2388 2854 "form_urlencoded", 2389 2855 "idna", ··· 2392 2858 ] 2393 2859 2394 2860 [[package]] 2861 + name = "urlencoding" 2862 + version = "2.1.3" 2863 + source = "registry+https://github.com/rust-lang/crates.io-index" 2864 + checksum = "daf8dba3b7eb870caf1ddeed7bc9d2a049f3cfdfae7cb521b087cc33ae4c49da" 2865 + 2866 + [[package]] 2395 2867 name = "utf16_iter" 2396 2868 version = "1.0.5" 2397 2869 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2404 2876 checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" 2405 2877 2406 2878 [[package]] 2879 + name = "uuid" 2880 + version = "1.11.0" 2881 + source = "registry+https://github.com/rust-lang/crates.io-index" 2882 + checksum = "f8c5f0a0af699448548ad1a2fbf920fb4bee257eae39953ba95cb84891a0446a" 2883 + dependencies = [ 2884 + "getrandom", 2885 + "rand", 2886 + ] 2887 + 2888 + [[package]] 2889 + name = "value-bag" 2890 + version = "1.10.0" 2891 + source = "registry+https://github.com/rust-lang/crates.io-index" 2892 + checksum = "3ef4c4aa54d5d05a279399bfa921ec387b7aba77caf7a682ae8d86785b8fdad2" 2893 + 2894 + [[package]] 2407 2895 name = "vcpkg" 2408 2896 version = "0.2.15" 2409 2897 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2439 2927 2440 2928 [[package]] 2441 2929 name = "wasm-bindgen" 2442 - version = "0.2.95" 2930 + version = "0.2.99" 2443 2931 source = "registry+https://github.com/rust-lang/crates.io-index" 2444 - checksum = "128d1e363af62632b8eb57219c8fd7877144af57558fb2ef0368d0087bddeb2e" 2932 + checksum = "a474f6281d1d70c17ae7aa6a613c87fce69a127e2624002df63dcb39d6cf6396" 2445 2933 dependencies = [ 2446 2934 "cfg-if", 2447 2935 "once_cell", ··· 2450 2938 2451 2939 [[package]] 2452 2940 name = "wasm-bindgen-backend" 2453 - version = "0.2.95" 2941 + version = "0.2.99" 2454 2942 source = "registry+https://github.com/rust-lang/crates.io-index" 2455 - checksum = "cb6dd4d3ca0ddffd1dd1c9c04f94b868c37ff5fac97c30b97cff2d74fce3a358" 2943 + checksum = "5f89bb38646b4f81674e8f5c3fb81b562be1fd936d84320f3264486418519c79" 2456 2944 dependencies = [ 2457 2945 "bumpalo", 2458 2946 "log", 2459 - "once_cell", 2460 2947 "proc-macro2", 2461 2948 "quote", 2462 2949 "syn", ··· 2464 2951 ] 2465 2952 2466 2953 [[package]] 2954 + name = "wasm-bindgen-futures" 2955 + version = "0.4.49" 2956 + source = "registry+https://github.com/rust-lang/crates.io-index" 2957 + checksum = "38176d9b44ea84e9184eff0bc34cc167ed044f816accfe5922e54d84cf48eca2" 2958 + dependencies = [ 2959 + "cfg-if", 2960 + "js-sys", 2961 + "once_cell", 2962 + "wasm-bindgen", 2963 + "web-sys", 2964 + ] 2965 + 2966 + [[package]] 2467 2967 name = "wasm-bindgen-macro" 2468 - version = "0.2.95" 2968 + version = "0.2.99" 2469 2969 source = "registry+https://github.com/rust-lang/crates.io-index" 2470 - checksum = "e79384be7f8f5a9dd5d7167216f022090cf1f9ec128e6e6a482a2cb5c5422c56" 2970 + checksum = "2cc6181fd9a7492eef6fef1f33961e3695e4579b9872a6f7c83aee556666d4fe" 2471 2971 dependencies = [ 2472 2972 "quote", 2473 2973 "wasm-bindgen-macro-support", ··· 2475 2975 2476 2976 [[package]] 2477 2977 name = "wasm-bindgen-macro-support" 2478 - version = "0.2.95" 2978 + version = "0.2.99" 2479 2979 source = "registry+https://github.com/rust-lang/crates.io-index" 2480 - checksum = "26c6ab57572f7a24a4985830b120de1594465e5d500f24afe89e16b4e833ef68" 2980 + checksum = "30d7a95b763d3c45903ed6c81f156801839e5ee968bb07e534c44df0fcd330c2" 2481 2981 dependencies = [ 2482 2982 "proc-macro2", 2483 2983 "quote", ··· 2488 2988 2489 2989 [[package]] 2490 2990 name = "wasm-bindgen-shared" 2491 - version = "0.2.95" 2991 + version = "0.2.99" 2992 + source = "registry+https://github.com/rust-lang/crates.io-index" 2993 + checksum = "943aab3fdaaa029a6e0271b35ea10b72b943135afe9bffca82384098ad0e06a6" 2994 + 2995 + [[package]] 2996 + name = "web-sys" 2997 + version = "0.3.76" 2492 2998 source = "registry+https://github.com/rust-lang/crates.io-index" 2493 - checksum = "65fc09f10666a9f147042251e0dda9c18f166ff7de300607007e96bdebc1068d" 2999 + checksum = "04dd7223427d52553d3702c004d3b2fe07c148165faa56313cb00211e31c12bc" 3000 + dependencies = [ 3001 + "js-sys", 3002 + "wasm-bindgen", 3003 + ] 2494 3004 2495 3005 [[package]] 2496 3006 name = "winapi" ··· 2524 3034 checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" 2525 3035 2526 3036 [[package]] 3037 + name = "windows" 3038 + version = "0.58.0" 3039 + source = "registry+https://github.com/rust-lang/crates.io-index" 3040 + checksum = "dd04d41d93c4992d421894c18c8b43496aa748dd4c081bac0dc93eb0489272b6" 3041 + dependencies = [ 3042 + "windows-core 0.58.0", 3043 + "windows-targets", 3044 + ] 3045 + 3046 + [[package]] 2527 3047 name = "windows-core" 2528 3048 version = "0.52.0" 2529 3049 source = "registry+https://github.com/rust-lang/crates.io-index" 2530 3050 checksum = "33ab640c8d7e35bf8ba19b884ba838ceb4fba93a4e8c65a9059d08afcfc683d9" 2531 3051 dependencies = [ 2532 - "windows-targets 0.52.6", 3052 + "windows-targets", 2533 3053 ] 2534 3054 2535 3055 [[package]] 2536 - name = "windows-sys" 2537 - version = "0.48.0" 3056 + name = "windows-core" 3057 + version = "0.58.0" 2538 3058 source = "registry+https://github.com/rust-lang/crates.io-index" 2539 - checksum = "677d2418bec65e3338edb076e806bc1ec15693c5d0104683f2efe857f61056a9" 3059 + checksum = "6ba6d44ec8c2591c134257ce647b7ea6b20335bf6379a27dac5f1641fcf59f99" 2540 3060 dependencies = [ 2541 - "windows-targets 0.48.5", 3061 + "windows-implement", 3062 + "windows-interface", 3063 + "windows-result", 3064 + "windows-strings", 3065 + "windows-targets", 2542 3066 ] 2543 3067 2544 3068 [[package]] 2545 - name = "windows-sys" 2546 - version = "0.52.0" 3069 + name = "windows-implement" 3070 + version = "0.58.0" 3071 + source = "registry+https://github.com/rust-lang/crates.io-index" 3072 + checksum = "2bbd5b46c938e506ecbce286b6628a02171d56153ba733b6c741fc627ec9579b" 3073 + dependencies = [ 3074 + "proc-macro2", 3075 + "quote", 3076 + "syn", 3077 + ] 3078 + 3079 + [[package]] 3080 + name = "windows-interface" 3081 + version = "0.58.0" 3082 + source = "registry+https://github.com/rust-lang/crates.io-index" 3083 + checksum = "053c4c462dc91d3b1504c6fe5a726dd15e216ba718e84a0e46a88fbe5ded3515" 3084 + dependencies = [ 3085 + "proc-macro2", 3086 + "quote", 3087 + "syn", 3088 + ] 3089 + 3090 + [[package]] 3091 + name = "windows-result" 3092 + version = "0.2.0" 2547 3093 source = "registry+https://github.com/rust-lang/crates.io-index" 2548 - checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" 3094 + checksum = "1d1043d8214f791817bab27572aaa8af63732e11bf84aa21a45a78d6c317ae0e" 2549 3095 dependencies = [ 2550 - "windows-targets 0.52.6", 3096 + "windows-targets", 3097 + ] 3098 + 3099 + [[package]] 3100 + name = "windows-strings" 3101 + version = "0.1.0" 3102 + source = "registry+https://github.com/rust-lang/crates.io-index" 3103 + checksum = "4cd9b125c486025df0eabcb585e62173c6c9eddcec5d117d3b6e8c30e2ee4d10" 3104 + dependencies = [ 3105 + "windows-result", 3106 + "windows-targets", 2551 3107 ] 2552 3108 2553 3109 [[package]] 2554 3110 name = "windows-sys" 2555 - version = "0.59.0" 3111 + version = "0.52.0" 2556 3112 source = "registry+https://github.com/rust-lang/crates.io-index" 2557 - checksum = "1e38bc4d79ed67fd075bcc251a1c39b32a1776bbe92e5bef1f0bf1f8c531853b" 3113 + checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" 2558 3114 dependencies = [ 2559 - "windows-targets 0.52.6", 3115 + "windows-targets", 2560 3116 ] 2561 3117 2562 3118 [[package]] 2563 - name = "windows-targets" 2564 - version = "0.48.5" 3119 + name = "windows-sys" 3120 + version = "0.59.0" 2565 3121 source = "registry+https://github.com/rust-lang/crates.io-index" 2566 - checksum = "9a2fa6e2155d7247be68c096456083145c183cbbbc2764150dda45a87197940c" 3122 + checksum = "1e38bc4d79ed67fd075bcc251a1c39b32a1776bbe92e5bef1f0bf1f8c531853b" 2567 3123 dependencies = [ 2568 - "windows_aarch64_gnullvm 0.48.5", 2569 - "windows_aarch64_msvc 0.48.5", 2570 - "windows_i686_gnu 0.48.5", 2571 - "windows_i686_msvc 0.48.5", 2572 - "windows_x86_64_gnu 0.48.5", 2573 - "windows_x86_64_gnullvm 0.48.5", 2574 - "windows_x86_64_msvc 0.48.5", 3124 + "windows-targets", 2575 3125 ] 2576 3126 2577 3127 [[package]] ··· 2580 3130 source = "registry+https://github.com/rust-lang/crates.io-index" 2581 3131 checksum = "9b724f72796e036ab90c1021d4780d4d3d648aca59e491e6b98e725b84e99973" 2582 3132 dependencies = [ 2583 - "windows_aarch64_gnullvm 0.52.6", 2584 - "windows_aarch64_msvc 0.52.6", 2585 - "windows_i686_gnu 0.52.6", 3133 + "windows_aarch64_gnullvm", 3134 + "windows_aarch64_msvc", 3135 + "windows_i686_gnu", 2586 3136 "windows_i686_gnullvm", 2587 - "windows_i686_msvc 0.52.6", 2588 - "windows_x86_64_gnu 0.52.6", 2589 - "windows_x86_64_gnullvm 0.52.6", 2590 - "windows_x86_64_msvc 0.52.6", 3137 + "windows_i686_msvc", 3138 + "windows_x86_64_gnu", 3139 + "windows_x86_64_gnullvm", 3140 + "windows_x86_64_msvc", 2591 3141 ] 2592 3142 2593 3143 [[package]] 2594 3144 name = "windows_aarch64_gnullvm" 2595 - version = "0.48.5" 2596 - source = "registry+https://github.com/rust-lang/crates.io-index" 2597 - checksum = "2b38e32f0abccf9987a4e3079dfb67dcd799fb61361e53e2882c3cbaf0d905d8" 2598 - 2599 - [[package]] 2600 - name = "windows_aarch64_gnullvm" 2601 3145 version = "0.52.6" 2602 3146 source = "registry+https://github.com/rust-lang/crates.io-index" 2603 3147 checksum = "32a4622180e7a0ec044bb555404c800bc9fd9ec262ec147edd5989ccd0c02cd3" 2604 3148 2605 3149 [[package]] 2606 3150 name = "windows_aarch64_msvc" 2607 - version = "0.48.5" 2608 - source = "registry+https://github.com/rust-lang/crates.io-index" 2609 - checksum = "dc35310971f3b2dbbf3f0690a219f40e2d9afcf64f9ab7cc1be722937c26b4bc" 2610 - 2611 - [[package]] 2612 - name = "windows_aarch64_msvc" 2613 3151 version = "0.52.6" 2614 3152 source = "registry+https://github.com/rust-lang/crates.io-index" 2615 3153 checksum = "09ec2a7bb152e2252b53fa7803150007879548bc709c039df7627cabbd05d469" 2616 - 2617 - [[package]] 2618 - name = "windows_i686_gnu" 2619 - version = "0.48.5" 2620 - source = "registry+https://github.com/rust-lang/crates.io-index" 2621 - checksum = "a75915e7def60c94dcef72200b9a8e58e5091744960da64ec734a6c6e9b3743e" 2622 3154 2623 3155 [[package]] 2624 3156 name = "windows_i686_gnu" ··· 2634 3166 2635 3167 [[package]] 2636 3168 name = "windows_i686_msvc" 2637 - version = "0.48.5" 2638 - source = "registry+https://github.com/rust-lang/crates.io-index" 2639 - checksum = "8f55c233f70c4b27f66c523580f78f1004e8b5a8b659e05a4eb49d4166cca406" 2640 - 2641 - [[package]] 2642 - name = "windows_i686_msvc" 2643 3169 version = "0.52.6" 2644 3170 source = "registry+https://github.com/rust-lang/crates.io-index" 2645 3171 checksum = "240948bc05c5e7c6dabba28bf89d89ffce3e303022809e73deaefe4f6ec56c66" 2646 3172 2647 3173 [[package]] 2648 3174 name = "windows_x86_64_gnu" 2649 - version = "0.48.5" 2650 - source = "registry+https://github.com/rust-lang/crates.io-index" 2651 - checksum = "53d40abd2583d23e4718fddf1ebec84dbff8381c07cae67ff7768bbf19c6718e" 2652 - 2653 - [[package]] 2654 - name = "windows_x86_64_gnu" 2655 3175 version = "0.52.6" 2656 3176 source = "registry+https://github.com/rust-lang/crates.io-index" 2657 3177 checksum = "147a5c80aabfbf0c7d901cb5895d1de30ef2907eb21fbbab29ca94c5b08b1a78" 2658 3178 2659 3179 [[package]] 2660 3180 name = "windows_x86_64_gnullvm" 2661 - version = "0.48.5" 2662 - source = "registry+https://github.com/rust-lang/crates.io-index" 2663 - checksum = "0b7b52767868a23d5bab768e390dc5f5c55825b6d30b86c844ff2dc7414044cc" 2664 - 2665 - [[package]] 2666 - name = "windows_x86_64_gnullvm" 2667 3181 version = "0.52.6" 2668 3182 source = "registry+https://github.com/rust-lang/crates.io-index" 2669 3183 checksum = "24d5b23dc417412679681396f2b49f3de8c1473deb516bd34410872eff51ed0d" 2670 3184 2671 3185 [[package]] 2672 3186 name = "windows_x86_64_msvc" 2673 - version = "0.48.5" 2674 - source = "registry+https://github.com/rust-lang/crates.io-index" 2675 - checksum = "ed94fce61571a4006852b7389a063ab983c02eb1bb37b47f8272ce92d06d9538" 2676 - 2677 - [[package]] 2678 - name = "windows_x86_64_msvc" 2679 3187 version = "0.52.6" 2680 3188 source = "registry+https://github.com/rust-lang/crates.io-index" 2681 3189 checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" ··· 2712 3220 ] 2713 3221 2714 3222 [[package]] 3223 + name = "xxhash-rust" 3224 + version = "0.8.14" 3225 + source = "registry+https://github.com/rust-lang/crates.io-index" 3226 + checksum = "d7d48f1b18be023c95e7b75f481cac649d74be7c507ff4a407c55cfb957f7934" 3227 + 3228 + [[package]] 2715 3229 name = "yoke" 2716 - version = "0.7.4" 3230 + version = "0.7.5" 2717 3231 source = "registry+https://github.com/rust-lang/crates.io-index" 2718 - checksum = "6c5b1314b079b0930c31e3af543d8ee1757b1951ae1e1565ec704403a7240ca5" 3232 + checksum = "120e6aef9aa629e3d4f52dc8cc43a015c7724194c97dfaf45180d2daf2b77f40" 2719 3233 dependencies = [ 2720 3234 "serde", 2721 3235 "stable_deref_trait", ··· 2725 3239 2726 3240 [[package]] 2727 3241 name = "yoke-derive" 2728 - version = "0.7.4" 3242 + version = "0.7.5" 2729 3243 source = "registry+https://github.com/rust-lang/crates.io-index" 2730 - checksum = "28cc31741b18cb6f1d5ff12f5b7523e3d6eb0852bbbad19d73905511d9849b95" 3244 + checksum = "2380878cad4ac9aac1e2435f3eb4020e8374b5f13c296cb75b4620ff8e229154" 2731 3245 dependencies = [ 2732 3246 "proc-macro2", 2733 3247 "quote", ··· 2752 3266 "async-trait", 2753 3267 "blocking", 2754 3268 "enumflags2", 2755 - "event-listener", 3269 + "event-listener 5.3.1", 2756 3270 "futures-core", 2757 3271 "futures-sink", 2758 3272 "futures-util", ··· 2768 3282 "uds_windows", 2769 3283 "windows-sys 0.52.0", 2770 3284 "xdg-home", 2771 - "zbus_macros", 2772 - "zbus_names", 2773 - "zvariant", 3285 + "zbus_macros 4.4.0", 3286 + "zbus_names 3.0.0", 3287 + "zvariant 4.2.0", 3288 + ] 3289 + 3290 + [[package]] 3291 + name = "zbus" 3292 + version = "5.2.0" 3293 + source = "registry+https://github.com/rust-lang/crates.io-index" 3294 + checksum = "fb67eadba43784b6fb14857eba0d8fc518686d3ee537066eb6086dc318e2c8a1" 3295 + dependencies = [ 3296 + "async-broadcast", 3297 + "async-executor", 3298 + "async-fs", 3299 + "async-io", 3300 + "async-lock", 3301 + "async-process", 3302 + "async-recursion", 3303 + "async-task", 3304 + "async-trait", 3305 + "blocking", 3306 + "enumflags2", 3307 + "event-listener 5.3.1", 3308 + "futures-core", 3309 + "futures-util", 3310 + "hex", 3311 + "nix", 3312 + "ordered-stream", 3313 + "serde", 3314 + "serde_repr", 3315 + "static_assertions", 3316 + "tracing", 3317 + "uds_windows", 3318 + "windows-sys 0.59.0", 3319 + "winnow", 3320 + "xdg-home", 3321 + "zbus_macros 5.2.0", 3322 + "zbus_names 4.1.0", 3323 + "zvariant 5.1.0", 2774 3324 ] 2775 3325 2776 3326 [[package]] ··· 2783 3333 "proc-macro2", 2784 3334 "quote", 2785 3335 "syn", 2786 - "zvariant_utils", 3336 + "zvariant_utils 2.1.0", 3337 + ] 3338 + 3339 + [[package]] 3340 + name = "zbus_macros" 3341 + version = "5.2.0" 3342 + source = "registry+https://github.com/rust-lang/crates.io-index" 3343 + checksum = "2c9d49ebc960ceb660f2abe40a5904da975de6986f2af0d7884b39eec6528c57" 3344 + dependencies = [ 3345 + "proc-macro-crate", 3346 + "proc-macro2", 3347 + "quote", 3348 + "syn", 3349 + "zbus_names 4.1.0", 3350 + "zvariant 5.1.0", 3351 + "zvariant_utils 3.0.2", 2787 3352 ] 2788 3353 2789 3354 [[package]] ··· 2794 3359 dependencies = [ 2795 3360 "serde", 2796 3361 "static_assertions", 2797 - "zvariant", 3362 + "zvariant 4.2.0", 3363 + ] 3364 + 3365 + [[package]] 3366 + name = "zbus_names" 3367 + version = "4.1.0" 3368 + source = "registry+https://github.com/rust-lang/crates.io-index" 3369 + checksum = "856b7a38811f71846fd47856ceee8bccaec8399ff53fb370247e66081ace647b" 3370 + dependencies = [ 3371 + "serde", 3372 + "static_assertions", 3373 + "winnow", 3374 + "zvariant 5.1.0", 2798 3375 ] 2799 3376 2800 3377 [[package]] ··· 2820 3397 2821 3398 [[package]] 2822 3399 name = "zerofrom" 2823 - version = "0.1.4" 3400 + version = "0.1.5" 2824 3401 source = "registry+https://github.com/rust-lang/crates.io-index" 2825 - checksum = "91ec111ce797d0e0784a1116d0ddcdbea84322cd79e5d5ad173daeba4f93ab55" 3402 + checksum = "cff3ee08c995dee1859d998dea82f7374f2826091dd9cd47def953cae446cd2e" 2826 3403 dependencies = [ 2827 3404 "zerofrom-derive", 2828 3405 ] 2829 3406 2830 3407 [[package]] 2831 3408 name = "zerofrom-derive" 2832 - version = "0.1.4" 3409 + version = "0.1.5" 2833 3410 source = "registry+https://github.com/rust-lang/crates.io-index" 2834 - checksum = "0ea7b4a3637ea8669cedf0f1fd5c286a17f3de97b8dd5a70a6c167a1730e63a5" 3411 + checksum = "595eed982f7d355beb85837f651fa22e90b3c044842dc7f2c2842c086f295808" 2835 3412 dependencies = [ 2836 3413 "proc-macro2", 2837 3414 "quote", ··· 2871 3448 "enumflags2", 2872 3449 "serde", 2873 3450 "static_assertions", 3451 + "zvariant_derive 4.2.0", 3452 + ] 3453 + 3454 + [[package]] 3455 + name = "zvariant" 3456 + version = "5.1.0" 3457 + source = "registry+https://github.com/rust-lang/crates.io-index" 3458 + checksum = "a1200ee6ac32f1e5a312e455a949a4794855515d34f9909f4a3e082d14e1a56f" 3459 + dependencies = [ 3460 + "endi", 3461 + "enumflags2", 3462 + "serde", 3463 + "static_assertions", 2874 3464 "url", 2875 - "zvariant_derive", 3465 + "winnow", 3466 + "zvariant_derive 5.1.0", 3467 + "zvariant_utils 3.0.2", 2876 3468 ] 2877 3469 2878 3470 [[package]] ··· 2885 3477 "proc-macro2", 2886 3478 "quote", 2887 3479 "syn", 2888 - "zvariant_utils", 3480 + "zvariant_utils 2.1.0", 3481 + ] 3482 + 3483 + [[package]] 3484 + name = "zvariant_derive" 3485 + version = "5.1.0" 3486 + source = "registry+https://github.com/rust-lang/crates.io-index" 3487 + checksum = "687e3b97fae6c9104fbbd36c73d27d149abf04fb874e2efbd84838763daa8916" 3488 + dependencies = [ 3489 + "proc-macro-crate", 3490 + "proc-macro2", 3491 + "quote", 3492 + "syn", 3493 + "zvariant_utils 3.0.2", 2889 3494 ] 2890 3495 2891 3496 [[package]] ··· 2898 3503 "quote", 2899 3504 "syn", 2900 3505 ] 3506 + 3507 + [[package]] 3508 + name = "zvariant_utils" 3509 + version = "3.0.2" 3510 + source = "registry+https://github.com/rust-lang/crates.io-index" 3511 + checksum = "20d1d011a38f12360e5fcccceeff5e2c42a8eb7f27f0dcba97a0862ede05c9c6" 3512 + dependencies = [ 3513 + "proc-macro2", 3514 + "quote", 3515 + "serde", 3516 + "static_assertions", 3517 + "syn", 3518 + "winnow", 3519 + ]
+2 -2
pkgs/by-name/re/recordbox/package.nix
··· 24 24 25 25 stdenv.mkDerivation (finalAttrs: { 26 26 pname = "recordbox"; 27 - version = "0.8.3"; 27 + version = "0.9.0"; 28 28 29 29 src = fetchFromGitea { 30 30 domain = "codeberg.org"; 31 31 owner = "edestcroix"; 32 32 repo = "Recordbox"; 33 33 rev = "refs/tags/v${finalAttrs.version}"; 34 - hash = "sha256-/yg/75LswCj3HhsUhMXgIDpx2tlNkdTuImkqMwU6uio="; 34 + hash = "sha256-KfIlh9ORqjJ5V8mNOx7Q9jsYg4OJDX6q+ht+eckxMRU="; 35 35 }; 36 36 37 37 # Patch in our Cargo.lock and ensure AppStream tests don't use the network
+9
pkgs/by-name/se/seafile-server/package.nix
··· 2 2 stdenv, 3 3 lib, 4 4 fetchFromGitHub, 5 + fetchpatch, 5 6 pkg-config, 6 7 python3, 7 8 autoreconfHook, ··· 67 68 vala 68 69 libevhtp 69 70 oniguruma 71 + ]; 72 + 73 + patches = [ 74 + # https://github.com/haiwen/seafile-server/pull/658 75 + (fetchpatch { 76 + url = "https://github.com/haiwen/seafile-server/commit/8029a11a731bfe142af43f230f47b93811ebaaaa.patch"; 77 + hash = "sha256-AWNDXIyrKXgqgq3p0m8+s3YH8dKxWnf7uEMYzSsjmX4="; 78 + }) 70 79 ]; 71 80 72 81 postInstall = ''
+2 -2
pkgs/by-name/si/simdutf/package.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "simdutf"; 11 - version = "5.7.2"; 11 + version = "6.0.3"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "simdutf"; 15 15 repo = "simdutf"; 16 16 rev = "v${finalAttrs.version}"; 17 - hash = "sha256-rSEl5g9FZiOrYRoHkBAUbMWE1kZvl3pbhkskzoMbIb0="; 17 + hash = "sha256-BTnj7SUKgbJ2LM2gzw+8bSJ4+Zd6Z/KZy9B46fxIvsg="; 18 18 }; 19 19 20 20 # Fix build on darwin
+2 -2
pkgs/by-name/sw/swiftlint/package.nix
··· 8 8 }: 9 9 stdenvNoCC.mkDerivation rec { 10 10 pname = "swiftlint"; 11 - version = "0.57.1"; 11 + version = "0.58.0"; 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/realm/SwiftLint/releases/download/${version}/portable_swiftlint.zip"; 15 - hash = "sha256-qi4Pj4JyVF5Vk+vt14cttREy/OxOrXbQAbvhevaceuU="; 15 + hash = "sha256-Mp8S0f/xn3XHF4/doLF5s/kvhE+X6KiswY+3lZ/J4wc="; 16 16 }; 17 17 18 18 dontPatch = true;
+7 -6
pkgs/by-name/te/tempo/package.nix
··· 1 1 { 2 2 lib, 3 - buildGo122Module, 3 + buildGoModule, 4 4 fetchFromGitHub, 5 + nix-update-script, 5 6 }: 6 7 7 - # Does not build with Go 1.23 8 - # FIXME: check again for next release 9 - buildGo122Module rec { 8 + buildGoModule rec { 10 9 pname = "tempo"; 11 - version = "2.6.0"; 10 + version = "2.7.0"; 12 11 13 12 src = fetchFromGitHub { 14 13 owner = "grafana"; 15 14 repo = "tempo"; 16 15 rev = "v${version}"; 17 16 fetchSubmodules = true; 18 - hash = "sha256-jWoGKY+kC9VAK7jPFaGMJQkC/JeAiUjzqKhE2XjuJio="; 17 + hash = "sha256-aCtITq5qT0a1DuoSDK3F46cPvfVsvXOPkZELEuRYi5w="; 19 18 }; 20 19 21 20 vendorHash = null; ··· 38 37 39 38 # tests use docker 40 39 doCheck = false; 40 + 41 + passthru.updateScript = nix-update-script { }; 41 42 42 43 meta = with lib; { 43 44 description = "High volume, minimal dependency trace storage";
+2 -2
pkgs/by-name/ti/ticktick/package.nix
··· 16 16 }: 17 17 stdenv.mkDerivation (finalAttrs: { 18 18 pname = "ticktick"; 19 - version = "6.0.10"; 19 + version = "6.0.20"; 20 20 21 21 src = fetchurl { 22 22 url = "https://d2atcrkye2ik4e.cloudfront.net/download/linux/linux_deb_x64/ticktick-${finalAttrs.version}-amd64.deb"; 23 - hash = "sha256-/SaQJFaz8quuFk4bLmRrvfYpqyDNTV/dJBrAJpOT4S4="; 23 + hash = "sha256-aKUK0/9Y/ac9ISYJnWDUdwmvN8UYKzTY0f94nd8ofGw="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+2 -2
pkgs/by-name/tr/traccar/package.nix
··· 6 6 }: 7 7 stdenvNoCC.mkDerivation rec { 8 8 pname = "traccar"; 9 - version = "6.5"; 9 + version = "6.6"; 10 10 nativeBuildInputs = [ pkgs.makeWrapper ]; 11 11 12 12 src = fetchzip { 13 13 stripRoot = false; 14 14 url = "https://github.com/traccar/traccar/releases/download/v${version}/traccar-other-${version}.zip"; 15 - hash = "sha256-XCG3G24oe/qR6LiMJASb9STOnyTCtw+2HigaPawcQvU="; 15 + hash = "sha256-NhsIp6u9XIMZC5PMTYBPAqpW4iNJWC0J4zxbG3c12cs="; 16 16 }; 17 17 18 18 installPhase = ''
+2 -2
pkgs/by-name/vo/vokoscreen-ng/package.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "vokoscreen-ng"; 16 - version = "4.3.0"; 16 + version = "4.4.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "vkohaupt"; 20 20 repo = "vokoscreenNG"; 21 21 tag = version; 22 - hash = "sha256-efgvq/jl/ecjtINy5BdqtYRp2gxEvOsMzQVyCZ3ig+Q="; 22 + hash = "sha256-5rESTLIvjc/Jztc7LAPl74fxgDsam9SfBa6B5yTXb8E="; 23 23 }; 24 24 25 25 qmakeFlags = [ "src/vokoscreenNG.pro" ];
+6 -6
pkgs/by-name/we/webdav/package.nix
··· 2 2 3 3 buildGo123Module rec { 4 4 pname = "webdav"; 5 - version = "5.7.0"; 5 + version = "5.7.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "hacdias"; 9 9 repo = "webdav"; 10 - rev = "v${version}"; 11 - sha256 = "sha256-vQLYg7qqNO3b/93fO6/zydsakfvyfYSsCUGwNPF6PXY="; 10 + tag = "v${version}"; 11 + hash = "sha256-nLQ77RuOGYaL+U3X3yb4Kq47NA1A3SSUMKBbFnRP6o4="; 12 12 }; 13 13 14 14 vendorHash = "sha256-x5CUy46c4SunzMw/v2DWpdahuXFZnJdGInQ0lSho/es="; 15 15 16 16 __darwinAllowLocalNetworking = true; 17 17 18 - meta = with lib; { 18 + meta = { 19 19 description = "Simple WebDAV server"; 20 20 homepage = "https://github.com/hacdias/webdav"; 21 - license = licenses.mit; 22 - maintainers = with maintainers; [ 21 + license = lib.licenses.mit; 22 + maintainers = with lib.maintainers; [ 23 23 pmy 24 24 pbsds 25 25 ];
+4 -3
pkgs/by-name/wl/wluma/package.nix
··· 17 17 18 18 rustPlatform.buildRustPackage rec { 19 19 pname = "wluma"; 20 - version = "4.5.1"; 20 + version = "4.6.0"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "maximbaz"; 24 24 repo = "wluma"; 25 25 rev = version; 26 - sha256 = "sha256-5uSExmh1a88kZDly4VrHzI8YwfTDB8wm2mMGZyvKsk4="; 26 + sha256 = "sha256-Z4sd2v6Ukr0bLGMiG/oBi0uic87Y1Ag9C3ZgyrR4VmI="; 27 27 }; 28 28 29 29 postPatch = '' ··· 39 39 'ExecStart=/usr/bin/wluma' 'ExecStart=${placeholder "out"}/bin/wluma' 40 40 ''; 41 41 42 - cargoHash = "sha256-hKxKEs88tB05AiWC/LuC/0jJ1RxeUnpp35A6UTQK4xw="; 42 + cargoHash = "sha256-QyRGKhKsCVt6ykzzr+WJdiLpIZHVvL5sRzNucg/3llk="; 43 43 44 44 nativeBuildInputs = [ 45 45 makeWrapper ··· 77 77 yshym 78 78 jmc-figueira 79 79 atemu 80 + Rishik-Y 80 81 ]; 81 82 platforms = platforms.linux; 82 83 mainProgram = "wluma";
+2 -2
pkgs/by-name/xs/xssproxy/package.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "xssproxy"; 13 - version = "1.1.0"; 13 + version = "1.1.1"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "vincentbernat"; 17 17 repo = "xssproxy"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-BE/v1CJAwKwxlK3Xg3ezD+IXyT7ZFGz3bQzGxFQfEnU="; 19 + sha256 = "sha256-OPzFI1ifbV/DJo0hC2xybHKaWTprictN0muKtuq1JaY="; 20 20 }; 21 21 22 22 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/desktops/gnome/extensions/guillotine/default.nix
··· 9 9 # https://gitlab.com/ente76/guillotine/-/issues/17 10 10 stdenv.mkDerivation (finalAttrs: { 11 11 pname = "gnome-shell-extension-guillotine"; 12 - version = "24"; 12 + version = "25"; 13 13 14 14 src = fetchFromGitLab { 15 15 owner = "ente76"; 16 16 repo = "guillotine"; 17 17 rev = "v${finalAttrs.version}"; 18 - hash = "sha256-eNhK3h9luPGXHR3lPkfu/mUN9+ixma64rbCk0cjF4Fc="; 18 + hash = "sha256-HEk1owolLIea4kymoVVeviZ1Ms0kSuHWUda+u+uIh0A="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ glib ];
+1 -1
pkgs/development/libraries/opencolorio/default.nix
··· 49 49 --replace 'OCIO_ADD_TEST(Config, virtual_display_with_active_displays)' 'static void _skip_virtual_display_with_active_displays()' 50 50 ''; 51 51 52 - nativeBuildInputs = [ cmake ]; 52 + nativeBuildInputs = [ cmake ] ++ lib.optionals pythonBindings [ python3Packages.python ]; 53 53 buildInputs = 54 54 [ 55 55 expat
+7
pkgs/development/python-modules/pyrender/default.nix
··· 39 39 url = "https://github.com/mmatl/pyrender/commit/7c613e8aed7142df9ff40767a8f10b7a19b6255c.patch"; 40 40 hash = "sha256-SXRV9RC3PfQGjjIQ+n97HZrSDPae3rAHnTBiHXSFLaY="; 41 41 }) 42 + # fix on numpy 2.0 (np.infty -> np.inf) 43 + # https://github.com/mmatl/pyrender/pull/292 44 + (fetchpatch { 45 + name = "fix-numpy2.patch"; 46 + url = "https://github.com/mmatl/pyrender/commit/5408c7b45261473511d2399ab625efe11f0b6991.patch"; 47 + hash = "sha256-RIv6lMpxMmops5Tb1itzYdT7GkhPScVWslBXITR3IBM="; 48 + }) 42 49 ]; 43 50 44 51 # trimesh too new
+5
pkgs/development/python-modules/pyunpack/default.nix
··· 45 45 46 46 pythonImportsCheck = [ "pyunpack" ]; 47 47 48 + disabledTests = [ 49 + # pinning test of `--help` sensitive to python version 50 + "test_help" 51 + ]; 52 + 48 53 disabledTestPaths = [ 49 54 # unfree 50 55 "tests/test_rar.py"
+9 -3
pkgs/development/python-modules/remi/default.nix
··· 2 2 lib, 3 3 buildPythonPackage, 4 4 fetchFromGitHub, 5 + pythonOlder, 5 6 setuptools, 6 7 pytestCheckHook, 7 8 matplotlib, 9 + legacy-cgi, 8 10 python-snap7, 9 11 opencv4, 10 12 }: ··· 43 45 44 46 build-system = [ setuptools ]; 45 47 46 - dependencies = [ 47 - setuptools # pkg_resources is referenced at runtime 48 - ]; 48 + dependencies = 49 + [ 50 + setuptools # pkg_resources is referenced at runtime 51 + ] 52 + ++ lib.optionals (!pythonOlder "3.13") [ 53 + legacy-cgi 54 + ]; 49 55 50 56 nativeCheckInputs = [ 51 57 pytestCheckHook
+8
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
··· 17 17 freefont_ttf, 18 18 wrapQtAppsHook, 19 19 qtwayland, 20 + fetchpatch, 20 21 }: 21 22 22 23 stdenv.mkDerivation (finalAttrs: { ··· 27 28 url = "https://git.kernel.org/pub/scm/utils/trace-cmd/kernel-shark.git/snapshot/kernelshark-v${finalAttrs.version}.tar.gz"; 28 29 hash = "sha256-KV8ahV2koX7OL1C42H5If14e7m54jv0DlZ1dNsVRUWE="; 29 30 }; 31 + 32 + patches = [ 33 + (fetchpatch { 34 + url = "https://git.kernel.org/pub/scm/utils/trace-cmd/kernel-shark.git/patch/?id=9e33324644fff49b7aa15d34f836e72af8b32c78"; 35 + hash = "sha256-2XtEQ4WscLlUiEQYG2HiHuysMzVzlG05PVreLRVM8Lc="; 36 + }) 37 + ]; 30 38 31 39 outputs = [ "out" ]; 32 40
-30
pkgs/os-specific/linux/zfs/2_1.nix
··· 1 - { callPackage 2 - , kernel ? null 3 - , stdenv 4 - , lib 5 - , nixosTests 6 - , ... 7 - } @ args: 8 - 9 - let 10 - stdenv' = if kernel == null then stdenv else kernel.stdenv; 11 - in 12 - callPackage ./generic.nix args { 13 - # You have to ensure that in `pkgs/top-level/linux-kernels.nix` 14 - # this attribute is the correct one for this package. 15 - kernelModuleAttribute = "zfs_2_1"; 16 - # check the release notes for compatible kernels 17 - kernelCompatible = kernel: kernel.kernelOlder "6.8"; 18 - 19 - # This is a fixed version to the 2.1.x series, move only 20 - # if the 2.1.x series moves. 21 - version = "2.1.16"; 22 - 23 - hash = "sha256-egs7paAOdbRAJH4QwIjlK3jAL/le51kDQrdW4deHfAI="; 24 - 25 - tests = { 26 - inherit (nixosTests.zfs) series_2_1; 27 - }; 28 - 29 - maintainers = [ lib.maintainers.raitobezarius ]; 30 - }
+33
pkgs/os-specific/linux/zfs/2_3.nix
··· 1 + { 2 + callPackage, 3 + kernel ? null, 4 + stdenv, 5 + lib, 6 + nixosTests, 7 + ... 8 + }@args: 9 + 10 + let 11 + stdenv' = if kernel == null then stdenv else kernel.stdenv; 12 + in 13 + callPackage ./generic.nix args { 14 + # You have to ensure that in `pkgs/top-level/linux-kernels.nix` 15 + # this attribute is the correct one for this package. 16 + kernelModuleAttribute = "zfs_2_3"; 17 + # check the release notes for compatible kernels 18 + kernelCompatible = kernel: kernel.kernelOlder "6.13"; 19 + 20 + # this package should point to the latest release. 21 + version = "2.3.0"; 22 + 23 + tests = { 24 + inherit (nixosTests.zfs) installer series_2_3; 25 + }; 26 + 27 + maintainers = with lib.maintainers; [ 28 + adamcstephens 29 + amarshall 30 + ]; 31 + 32 + hash = "sha256-ZWWrVwMP/DSSIxuXp6GuHCD0wiRekHbRXFGaclqd/ns="; 33 + }
+2 -2
pkgs/os-specific/linux/zfs/unstable.nix
··· 21 21 # IMPORTANT: Always use a tagged release candidate or commits from the 22 22 # zfs-<version>-staging branch, because this is tested by the OpenZFS 23 23 # maintainers. 24 - version = "2.3.0-rc5"; 24 + version = "2.3.0"; 25 25 # rev = ""; 26 26 27 27 tests = { 28 28 inherit (nixosTests.zfs) unstable; 29 29 }; 30 30 31 - hash = "sha256-gTpj1hYEkx+f/VvvfgeZeqwUhBVQyOIMKic8AaiwYzg="; 31 + hash = "sha256-ZWWrVwMP/DSSIxuXp6GuHCD0wiRekHbRXFGaclqd/ns="; 32 32 33 33 extraLongDescription = '' 34 34 This is "unstable" ZFS, and will usually be a pre-release version of ZFS.
+2 -2
pkgs/servers/home-assistant/custom-lovelace-modules/bubble-card/package.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "bubble-card"; 9 - version = "2.3.3"; 9 + version = "2.3.4"; 10 10 11 11 dontBuild = true; 12 12 ··· 14 14 owner = "Clooos"; 15 15 repo = "Bubble-Card"; 16 16 rev = "v${version}"; 17 - hash = "sha256-fBkiOhUwXa7Fy8Q7n2DBrTek7SQF37exQkvBREWx0Zk="; 17 + hash = "sha256-90If8QKlxacJZoEG3+IFHPd9cuFJS5Ki9XMdTaq67IA="; 18 18 }; 19 19 20 20 installPhase = ''
+3 -3
pkgs/servers/spicedb/zed.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "zed"; 9 - version = "0.21.2"; 9 + version = "0.24.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "authzed"; 13 13 repo = "zed"; 14 14 rev = "v${version}"; 15 - hash = "sha256-nSvWNelmqzgwf7M+9drqahwwo+YoQLgEscnigsBUwdI="; 15 + hash = "sha256-gaTTHkJkKO3MY5tAVJNHEq6ZkcS1iSBSEh1eyPzsXQY="; 16 16 }; 17 17 18 - vendorHash = "sha256-uTuI8rYmRUkbRf46+hZm1xHflFDcro6hVG8aI2C4eWs="; 18 + vendorHash = "sha256-7UwpkmFwYT8XP00pTlOK25WDweaalQfA4zX7yvlFWow="; 19 19 20 20 ldflags = [ 21 21 "-X 'github.com/jzelinskie/cobrautil/v2.Version=${src.rev}'"
+2
pkgs/test/default.nix
··· 155 155 156 156 nixos-functions = callPackage ./nixos-functions { }; 157 157 158 + nixosOptionsDoc = callPackage ../../nixos/lib/make-options-doc/tests.nix { }; 159 + 158 160 overriding = callPackage ./overriding.nix { }; 159 161 160 162 texlive = callPackage ./texlive { };
+166 -118
pkgs/test/overriding.nix
··· 1 - { lib, pkgs, stdenvNoCC }: 1 + { 2 + lib, 3 + pkgs, 4 + stdenvNoCC, 5 + }: 2 6 3 7 let 4 - tests = 8 + tests = tests-stdenv // tests-go // tests-python; 9 + 10 + tests-stdenv = 5 11 let 6 - p = pkgs.python3Packages.xpybutil.overridePythonAttrs (_: { dontWrapPythonPrograms = true; }); 12 + addEntangled = 13 + origOverrideAttrs: f: 14 + origOverrideAttrs ( 15 + lib.composeExtensions f ( 16 + self: super: { 17 + passthru = super.passthru // { 18 + entangled = super.passthru.entangled.overrideAttrs f; 19 + overrideAttrs = addEntangled self.overrideAttrs; 20 + }; 21 + } 22 + ) 23 + ); 24 + 25 + entangle = 26 + pkg1: pkg2: 27 + pkg1.overrideAttrs ( 28 + self: super: { 29 + passthru = super.passthru // { 30 + entangled = pkg2; 31 + overrideAttrs = addEntangled self.overrideAttrs; 32 + }; 33 + } 34 + ); 35 + 36 + example = entangle pkgs.hello pkgs.figlet; 37 + 38 + overrides1 = example.overrideAttrs (_: super: { pname = "a-better-${super.pname}"; }); 39 + 40 + repeatedOverrides = overrides1.overrideAttrs ( 41 + _: super: { pname = "${super.pname}-with-blackjack"; } 42 + ); 7 43 in 8 44 { 9 - overridePythonAttrs = { 10 - expr = !lib.hasInfix "wrapPythonPrograms" p.postFixup; 11 - expected = true; 12 - }; 13 45 repeatedOverrides-pname = { 14 46 expr = repeatedOverrides.pname == "a-better-hello-with-blackjack"; 15 47 expected = true; ··· 24 56 }; 25 57 overriding-using-only-attrset-no-final-attrs = { 26 58 name = "overriding-using-only-attrset-no-final-attrs"; 27 - expr = ((stdenvNoCC.mkDerivation { pname = "hello-no-final-attrs"; }).overrideAttrs { pname = "hello-no-final-attrs-overridden"; }).pname == "hello-no-final-attrs-overridden"; 28 - expected = true; 29 - }; 30 - buildGoModule-overrideAttrs = { 31 - expr = lib.all ( 32 - attrPath: 33 - let 34 - attrPathPretty = lib.concatStringsSep "." attrPath; 35 - valueNative = lib.getAttrFromPath attrPath pet_0_4_0; 36 - valueOverridden = lib.getAttrFromPath attrPath pet_0_4_0-overridden; 37 - in 38 - lib.warnIfNot 39 - (valueNative == valueOverridden) 40 - "pet_0_4_0.${attrPathPretty} (${valueNative}) does not equal pet_0_4_0-overridden.${attrPathPretty} (${valueOverridden})" 41 - true 42 - ) [ 43 - [ "drvPath" ] 44 - [ "name" ] 45 - [ "pname" ] 46 - [ "version" ] 47 - [ "vendorHash" ] 48 - [ "goModules" "drvPath" ] 49 - [ "goModules" "name" ] 50 - [ "goModules" "outputHash" ] 51 - ]; 52 - expected = true; 53 - }; 54 - buildGoModule-goModules-overrideAttrs = { 55 - expr = pet-foo.goModules.FOO == "foo"; 56 - expected = true; 57 - }; 58 - buildGoModule-goModules-overrideAttrs-vendored = { 59 - expr = lib.isString pet-vendored.drvPath; 59 + expr = 60 + ((stdenvNoCC.mkDerivation { pname = "hello-no-final-attrs"; }).overrideAttrs { 61 + pname = "hello-no-final-attrs-overridden"; 62 + }).pname == "hello-no-final-attrs-overridden"; 60 63 expected = true; 61 64 }; 62 65 }; 63 66 64 - addEntangled = origOverrideAttrs: f: 65 - origOverrideAttrs ( 66 - lib.composeExtensions f (self: super: { 67 - passthru = super.passthru // { 68 - entangled = super.passthru.entangled.overrideAttrs f; 69 - overrideAttrs = addEntangled self.overrideAttrs; 67 + tests-go = 68 + let 69 + pet_0_3_4 = pkgs.buildGoModule rec { 70 + pname = "pet"; 71 + version = "0.3.4"; 72 + 73 + src = pkgs.fetchFromGitHub { 74 + owner = "knqyf263"; 75 + repo = "pet"; 76 + rev = "v${version}"; 77 + hash = "sha256-Gjw1dRrgM8D3G7v6WIM2+50r4HmTXvx0Xxme2fH9TlQ="; 70 78 }; 71 - }) 72 - ); 73 79 74 - entangle = pkg1: pkg2: pkg1.overrideAttrs (self: super: { 75 - passthru = super.passthru // { 76 - entangled = pkg2; 77 - overrideAttrs = addEntangled self.overrideAttrs; 78 - }; 79 - }); 80 + vendorHash = "sha256-ciBIR+a1oaYH+H1PcC8cD8ncfJczk1IiJ8iYNM+R6aA="; 80 81 81 - example = entangle pkgs.hello pkgs.figlet; 82 + meta = { 83 + description = "Simple command-line snippet manager, written in Go"; 84 + homepage = "https://github.com/knqyf263/pet"; 85 + license = lib.licenses.mit; 86 + maintainers = with lib.maintainers; [ kalbasit ]; 87 + }; 88 + }; 82 89 83 - overrides1 = example.overrideAttrs (_: super: { pname = "a-better-${super.pname}"; }); 90 + pet_0_4_0 = pkgs.buildGoModule rec { 91 + pname = "pet"; 92 + version = "0.4.0"; 84 93 85 - repeatedOverrides = overrides1.overrideAttrs (_: super: { pname = "${super.pname}-with-blackjack"; }); 94 + src = pkgs.fetchFromGitHub { 95 + owner = "knqyf263"; 96 + repo = "pet"; 97 + rev = "v${version}"; 98 + hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 99 + }; 86 100 87 - pet_0_3_4 = pkgs.buildGoModule rec { 88 - pname = "pet"; 89 - version = "0.3.4"; 101 + vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 90 102 91 - src = pkgs.fetchFromGitHub { 92 - owner = "knqyf263"; 93 - repo = "pet"; 94 - rev = "v${version}"; 95 - hash = "sha256-Gjw1dRrgM8D3G7v6WIM2+50r4HmTXvx0Xxme2fH9TlQ="; 96 - }; 97 - 98 - vendorHash = "sha256-ciBIR+a1oaYH+H1PcC8cD8ncfJczk1IiJ8iYNM+R6aA="; 103 + meta = { 104 + description = "Simple command-line snippet manager, written in Go"; 105 + homepage = "https://github.com/knqyf263/pet"; 106 + license = lib.licenses.mit; 107 + maintainers = with lib.maintainers; [ kalbasit ]; 108 + }; 109 + }; 99 110 100 - meta = { 101 - description = "Simple command-line snippet manager, written in Go"; 102 - homepage = "https://github.com/knqyf263/pet"; 103 - license = lib.licenses.mit; 104 - maintainers = with lib.maintainers; [ kalbasit ]; 105 - }; 106 - }; 111 + pet_0_4_0-overridden = pet_0_3_4.overrideAttrs ( 112 + finalAttrs: previousAttrs: { 113 + version = "0.4.0"; 107 114 108 - pet_0_4_0 = pkgs.buildGoModule rec { 109 - pname = "pet"; 110 - version = "0.4.0"; 115 + src = pkgs.fetchFromGitHub { 116 + inherit (previousAttrs.src) owner repo; 117 + rev = "v${finalAttrs.version}"; 118 + hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 119 + }; 111 120 112 - src = pkgs.fetchFromGitHub { 113 - owner = "knqyf263"; 114 - repo = "pet"; 115 - rev = "v${version}"; 116 - hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 117 - }; 121 + vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 122 + } 123 + ); 118 124 119 - vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 125 + pet-foo = pet_0_3_4.overrideAttrs ( 126 + finalAttrs: previousAttrs: { 127 + passthru = previousAttrs.passthru // { 128 + overrideModAttrs = lib.composeExtensions previousAttrs.passthru.overrideModAttrs ( 129 + finalModAttrs: previousModAttrs: { 130 + FOO = "foo"; 131 + } 132 + ); 133 + }; 134 + } 135 + ); 120 136 121 - meta = { 122 - description = "Simple command-line snippet manager, written in Go"; 123 - homepage = "https://github.com/knqyf263/pet"; 124 - license = lib.licenses.mit; 125 - maintainers = with lib.maintainers; [ kalbasit ]; 137 + pet-vendored = pet-foo.overrideAttrs { vendorHash = null; }; 138 + in 139 + { 140 + buildGoModule-overrideAttrs = { 141 + expr = 142 + lib.all 143 + ( 144 + attrPath: 145 + let 146 + attrPathPretty = lib.concatStringsSep "." attrPath; 147 + valueNative = lib.getAttrFromPath attrPath pet_0_4_0; 148 + valueOverridden = lib.getAttrFromPath attrPath pet_0_4_0-overridden; 149 + in 150 + lib.warnIfNot (valueNative == valueOverridden) 151 + "pet_0_4_0.${attrPathPretty} (${valueNative}) does not equal pet_0_4_0-overridden.${attrPathPretty} (${valueOverridden})" 152 + true 153 + ) 154 + [ 155 + [ "drvPath" ] 156 + [ "name" ] 157 + [ "pname" ] 158 + [ "version" ] 159 + [ "vendorHash" ] 160 + [ 161 + "goModules" 162 + "drvPath" 163 + ] 164 + [ 165 + "goModules" 166 + "name" 167 + ] 168 + [ 169 + "goModules" 170 + "outputHash" 171 + ] 172 + ]; 173 + expected = true; 174 + }; 175 + buildGoModule-goModules-overrideAttrs = { 176 + expr = pet-foo.goModules.FOO == "foo"; 177 + expected = true; 178 + }; 179 + buildGoModule-goModules-overrideAttrs-vendored = { 180 + expr = lib.isString pet-vendored.drvPath; 181 + expected = true; 182 + }; 126 183 }; 127 - }; 128 184 129 - pet_0_4_0-overridden = pet_0_3_4.overrideAttrs (finalAttrs: previousAttrs: { 130 - version = "0.4.0"; 131 - 132 - src = pkgs.fetchFromGitHub { 133 - inherit (previousAttrs.src) owner repo; 134 - rev = "v${finalAttrs.version}"; 135 - hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 136 - }; 137 - 138 - vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 139 - }); 140 - 141 - pet-foo = pet_0_3_4.overrideAttrs ( 142 - finalAttrs: previousAttrs: { 143 - passthru = previousAttrs.passthru // { 144 - overrideModAttrs = lib.composeExtensions previousAttrs.passthru.overrideModAttrs ( 145 - finalModAttrs: previousModAttrs: { 146 - FOO = "foo"; 147 - } 148 - ); 185 + tests-python = 186 + let 187 + p = pkgs.python3Packages.xpybutil.overridePythonAttrs (_: { 188 + dontWrapPythonPrograms = true; 189 + }); 190 + in 191 + { 192 + overridePythonAttrs = { 193 + expr = !lib.hasInfix "wrapPythonPrograms" p.postFixup; 194 + expected = true; 149 195 }; 150 - } 151 - ); 152 - 153 - pet-vendored = pet-foo.overrideAttrs { vendorHash = null; }; 196 + }; 154 197 in 155 198 156 199 stdenvNoCC.mkDerivation { 157 200 name = "test-overriding"; 158 201 passthru = { inherit tests; }; 159 - buildCommand = '' 160 - touch $out 161 - '' + lib.concatMapAttrsStringSep "\n" (name: t: "([[ ${lib.boolToString t.expr} == ${lib.boolToString t.expected} ]] && echo '${name} success') || (echo '${name} fail' && exit 1)") tests; 202 + buildCommand = 203 + '' 204 + touch $out 205 + '' 206 + + lib.concatMapAttrsStringSep "\n" ( 207 + name: t: 208 + "([[ ${lib.boolToString t.expr} == ${lib.boolToString t.expected} ]] && echo '${name} success') || (echo '${name} fail' && exit 1)" 209 + ) tests; 162 210 }
+7
pkgs/tools/networking/openvpn/openvpn-auth-ldap.nix
··· 31 31 }) 32 32 ]; 33 33 34 + # clang > 17 dropped support for `-export-dynamic` but `-rdynamic` does the 35 + # same thing 36 + postPatch = '' 37 + substituteInPlace platform.m4 \ 38 + --replace-fail -export-dynamic -rdynamic 39 + ''; 40 + 34 41 nativeBuildInputs = [ 35 42 autoreconfHook 36 43 gnustep.base
+2
pkgs/top-level/aliases.nix
··· 1228 1228 SP800-90B_EntropyAssessment = sp800-90b-entropyassessment; # Added on 2024-06-12 1229 1229 SPAdes = spades; # Added 2024-06-12 1230 1230 spark2014 = gnatprove; # Added 2024-02-25 1231 + spatialite_gui = throw "spatialite_gui has been renamed to spatialite-gui"; # Added 2025-01-12 1231 1232 1232 1233 # Added 2020-02-10 1233 1234 sourceHanSansPackages = { ··· 1496 1497 zeromq4 = zeromq; # Added 2024-11-03 1497 1498 zfsStable = zfs; # Added 2024-02-26 1498 1499 zfsUnstable = zfs_unstable; # Added 2024-02-26 1500 + zfs_2_1 = throw "zfs 2.1 has been removed as it is EOL. Please upgrade to a newer version"; # Added 2024-12-25 1499 1501 zinc = zincsearch; # Added 2023-05-28 1500 1502 zk-shell = throw "zk-shell has been removed as it was broken and unmaintained"; # Added 2024-08-10 1501 1503 zkg = throw "'zkg' has been replaced by 'zeek'";
+5 -6
pkgs/top-level/all-packages.nix
··· 4539 4539 openvpn_learnaddress = callPackage ../tools/networking/openvpn/openvpn_learnaddress.nix { }; 4540 4540 4541 4541 openvpn-auth-ldap = callPackage ../tools/networking/openvpn/openvpn-auth-ldap.nix { 4542 - inherit (llvmPackages_17) stdenv; 4542 + inherit (llvmPackages) stdenv; 4543 4543 }; 4544 4544 4545 4545 namespaced-openvpn = python3Packages.callPackage ../tools/networking/namespaced-openvpn { }; ··· 12545 12545 12546 12546 inherit 12547 12547 ({ 12548 - zfs_2_1 = callPackage ../os-specific/linux/zfs/2_1.nix { 12548 + zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 12549 12549 configFile = "user"; 12550 12550 }; 12551 - zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 12551 + zfs_2_3 = callPackage ../os-specific/linux/zfs/2_3.nix { 12552 12552 configFile = "user"; 12553 12553 }; 12554 12554 zfs_unstable = callPackage ../os-specific/linux/zfs/unstable.nix { 12555 12555 configFile = "user"; 12556 12556 }; 12557 12557 }) 12558 - zfs_2_1 12559 12558 zfs_2_2 12559 + zfs_2_3 12560 12560 zfs_unstable; 12561 12561 zfs = zfs_2_2; 12562 12562 ··· 12855 12855 12856 12856 qmapshack = libsForQt5.callPackage ../applications/gis/qmapshack { }; 12857 12857 12858 - spatialite_gui = callPackage ../applications/gis/spatialite-gui { 12859 - inherit (darwin.apple_sdk.frameworks) Carbon Cocoa IOKit; 12858 + spatialite-gui = callPackage ../by-name/sp/spatialite-gui/package.nix { 12860 12859 wxGTK = wxGTK32; 12861 12860 }; 12862 12861
+3 -2
pkgs/top-level/linux-kernels.nix
··· 585 585 586 586 zenpower = callPackage ../os-specific/linux/zenpower { }; 587 587 588 - zfs_2_1 = callPackage ../os-specific/linux/zfs/2_1.nix { 588 + zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 589 589 configFile = "kernel"; 590 590 inherit pkgs kernel; 591 591 }; 592 - zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 592 + zfs_2_3 = callPackage ../os-specific/linux/zfs/2_3.nix { 593 593 configFile = "kernel"; 594 594 inherit pkgs kernel; 595 595 }; ··· 620 620 tsme-test = callPackage ../os-specific/linux/tsme-test { }; 621 621 622 622 } // lib.optionalAttrs config.allowAliases { 623 + zfs_2_1 = throw "zfs_2_1 has been removed"; # added 2024-12-25; 623 624 ati_drivers_x11 = throw "ati drivers are no longer supported by any kernel >=4.1"; # added 2021-05-18; 624 625 hid-nintendo = throw "hid-nintendo was added in mainline kernel version 5.16"; # Added 2023-07-30 625 626 sch_cake = throw "sch_cake was added in mainline kernel version 4.19"; # Added 2023-06-14