lol

Merge remote-tracking branch 'origin/staging-next' into staging

K900 8dc719e1 4ef1d709

+2665 -690
-6
ci/OWNERS
··· 395 /pkgs/development/compilers/ocaml @ulrikstrid 396 /pkgs/development/ocaml-modules @ulrikstrid 397 398 - # ZFS 399 - pkgs/os-specific/linux/zfs/2_1.nix @raitobezarius 400 - pkgs/os-specific/linux/zfs/generic.nix @raitobezarius 401 - nixos/modules/tasks/filesystems/zfs.nix @raitobezarius 402 - nixos/tests/zfs.nix @raitobezarius 403 - 404 # Zig 405 /pkgs/development/compilers/zig @figsoda 406 /doc/hooks/zig.section.md @figsoda
··· 395 /pkgs/development/compilers/ocaml @ulrikstrid 396 /pkgs/development/ocaml-modules @ulrikstrid 397 398 # Zig 399 /pkgs/development/compilers/zig @figsoda 400 /doc/hooks/zig.section.md @figsoda
+4 -2
doc/build-helpers/special/fhs-environments.section.md
··· 6 Accepted arguments are: 7 8 - `name` 9 - The name of the environment, and the wrapper executable if `pname` is unset. 10 - `pname` 11 - The pname of the environment and the wrapper executable. 12 - `version` 13 The version of the environment. 14 - `targetPkgs` 15 Packages to be installed for the main host's architecture (i.e. x86_64 on x86_64 installations). Along with libraries binaries are also installed. 16 - `multiPkgs`
··· 6 Accepted arguments are: 7 8 - `name` 9 + The name of the environment. 10 - `pname` 11 + The pname of the environment. 12 - `version` 13 The version of the environment. 14 + - `executableName` 15 + The name of the wrapper executable. Defaults to `pname` if set, or `name` otherwise. 16 - `targetPkgs` 17 Packages to be installed for the main host's architecture (i.e. x86_64 on x86_64 installations). Along with libraries binaries are also installed. 18 - `multiPkgs`
+6
maintainers/maintainer-list.nix
··· 19461 githubId = 807447; 19462 name = "Robert Scott"; 19463 }; 19464 risson = { 19465 name = "Marc Schmitt"; 19466 email = "marc.schmitt@risson.space";
··· 19461 githubId = 807447; 19462 name = "Robert Scott"; 19463 }; 19464 + Rishik-Y = { 19465 + name = "Rishik Yalamanchili"; 19466 + email = "202301258@daiict.ac.in"; 19467 + github = "Rishik-Y"; 19468 + githubId = 73787402; 19469 + }; 19470 risson = { 19471 name = "Marc Schmitt"; 19472 email = "marc.schmitt@risson.space";
+3
nixos/README.md
··· 84 - Ensure that the introduced options are correct. 85 - Type should be appropriate (string related types differs in their merging capabilities, `loaOf` and `string` types are deprecated). 86 - Description, default and example should be provided. 87 - Ensure that module `meta` field is present 88 - Maintainers should be declared in `meta.maintainers`. 89 - Module documentation should be declared with `meta.doc`.
··· 84 - Ensure that the introduced options are correct. 85 - Type should be appropriate (string related types differs in their merging capabilities, `loaOf` and `string` types are deprecated). 86 - Description, default and example should be provided. 87 + - Defaults may only be omitted if both: 88 + 1. The user is required to set the default in order to properly use the service. 89 + 2. The lack of a default does not break evaluation when the module is not enabled. 90 - Ensure that module `meta` field is present 91 - Maintainers should be declared in `meta.maintainers`. 92 - Module documentation should be declared with `meta.doc`.
+6
nixos/lib/make-options-doc/default.nix
··· 1 /** 2 Generates documentation for [nix modules](https://nix.dev/tutorials/module-system/index.html). 3 ··· 193 optionsCommonMark = 194 pkgs.runCommand "options.md" 195 { 196 nativeBuildInputs = [ pkgs.nixos-render-docs ]; 197 } 198 '' 199 nixos-render-docs -j $NIX_BUILD_CORES options commonmark \ 200 --manpage-urls ${pkgs.path + "/doc/manpage-urls.json"} \ 201 --revision ${lib.escapeShellArg revision} \ 202 ${optionsJSON}/share/doc/nixos/options.json \ 203 $out 204 '';
··· 1 + # Tests: ./tests.nix 2 + 3 /** 4 Generates documentation for [nix modules](https://nix.dev/tutorials/module-system/index.html). 5 ··· 195 optionsCommonMark = 196 pkgs.runCommand "options.md" 197 { 198 + __structuredAttrs = true; 199 nativeBuildInputs = [ pkgs.nixos-render-docs ]; 200 + # For overriding 201 + extraArgs = [ ]; 202 } 203 '' 204 nixos-render-docs -j $NIX_BUILD_CORES options commonmark \ 205 --manpage-urls ${pkgs.path + "/doc/manpage-urls.json"} \ 206 --revision ${lib.escapeShellArg revision} \ 207 + ''${extraArgs[@]} \ 208 ${optionsJSON}/share/doc/nixos/options.json \ 209 $out 210 '';
+59
nixos/lib/make-options-doc/tests.nix
···
··· 1 + # Run tests: nix-build -A tests.nixosOptionsDoc 2 + 3 + { 4 + lib, 5 + nixosOptionsDoc, 6 + runCommand, 7 + }: 8 + let 9 + inherit (lib) mkOption types; 10 + 11 + eval = lib.evalModules { 12 + modules = [ 13 + { 14 + options.foo.bar.enable = mkOption { 15 + type = types.bool; 16 + default = false; 17 + description = '' 18 + Enable the foo bar feature. 19 + ''; 20 + }; 21 + } 22 + ]; 23 + }; 24 + 25 + doc = nixosOptionsDoc { 26 + inherit (eval) options; 27 + }; 28 + in 29 + { 30 + /** 31 + Test that 32 + - the `nixosOptionsDoc` function can be invoked 33 + - integration of the module system and `nixosOptionsDoc` (limited coverage) 34 + 35 + The more interesting tests happen in the `nixos-render-docs` package. 36 + */ 37 + commonMark = 38 + runCommand "test-nixosOptionsDoc-commonMark" 39 + { 40 + commonMarkDefault = doc.optionsCommonMark; 41 + commonMarkAnchors = doc.optionsCommonMark.overrideAttrs { 42 + extraArgs = [ 43 + "--anchor-prefix" 44 + "my-opt-" 45 + "--anchor-style" 46 + "legacy" 47 + ]; 48 + }; 49 + } 50 + '' 51 + env | grep ^commonMark | sed -e 's/=/ = /' 52 + ( 53 + set -x 54 + grep -F 'foo\.bar\.enable' $commonMarkDefault >/dev/null 55 + grep -F '{#my-opt-foo.bar.enable}' $commonMarkAnchors >/dev/null 56 + ) 57 + touch $out 58 + ''; 59 + }
+4 -5
nixos/tests/zfs.nix
··· 191 192 in { 193 194 - # maintainer: @raitobezarius 195 - series_2_1 = makeZfsTest { 196 - zfsPackage = pkgs.zfs_2_1; 197 kernelPackages = pkgs.linuxPackages; 198 }; 199 200 - series_2_2 = makeZfsTest { 201 - zfsPackage = pkgs.zfs_2_2; 202 kernelPackages = pkgs.linuxPackages; 203 }; 204
··· 191 192 in { 193 194 + series_2_2 = makeZfsTest { 195 + zfsPackage = pkgs.zfs_2_2; 196 kernelPackages = pkgs.linuxPackages; 197 }; 198 199 + series_2_3 = makeZfsTest { 200 + zfsPackage = pkgs.zfs_2_3; 201 kernelPackages = pkgs.linuxPackages; 202 }; 203
+14 -4
pkgs/applications/audio/ladspa-plugins/default.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 autoreconfHook, 6 fftw, 7 ladspaH, 8 libxml2, ··· 21 sha256 = "sha256-eOtIhNcuItREUShI8JRlBVKfMfovpdfIYu+m37v4KLE="; 22 }; 23 24 nativeBuildInputs = [ 25 autoreconfHook 26 pkg-config 27 perlPackages.perl 28 perlPackages.XMLParser ··· 34 ]; 35 36 postPatch = '' 37 - patchShebangs . 38 - substituteInPlace util/Makefile.am --replace-fail "ranlib" "$RANLIB" 39 - substituteInPlace gsm/Makefile.am --replace-fail "ranlib" "$RANLIB" 40 - substituteInPlace gverb/Makefile.am --replace-fail "ranlib" "$RANLIB" 41 ''; 42 43 meta = with lib; {
··· 3 stdenv, 4 fetchFromGitHub, 5 autoreconfHook, 6 + automake, 7 fftw, 8 ladspaH, 9 libxml2, ··· 22 sha256 = "sha256-eOtIhNcuItREUShI8JRlBVKfMfovpdfIYu+m37v4KLE="; 23 }; 24 25 + preBuild = '' 26 + shopt -s globstar 27 + for f in **/Makefile; do 28 + substituteInPlace "$f" \ 29 + --replace-quiet 'ranlib' '${stdenv.cc.targetPrefix}ranlib' 30 + done 31 + shopt -u globstar 32 + ''; 33 + 34 nativeBuildInputs = [ 35 autoreconfHook 36 + perlPackages.perl 37 + perlPackages.XMLParser 38 pkg-config 39 perlPackages.perl 40 perlPackages.XMLParser ··· 46 ]; 47 48 postPatch = '' 49 + patchShebangs --build . ./metadata/ makestub.pl 50 + cp ${automake}/share/automake-*/mkinstalldirs . 51 ''; 52 53 meta = with lib; {
+21 -30
pkgs/applications/gis/spatialite-gui/default.nix pkgs/by-name/sp/spatialite-gui/package.nix
··· 23 wxGTK, 24 xz, 25 zstd, 26 - Carbon, 27 - Cocoa, 28 - IOKit, 29 }: 30 31 stdenv.mkDerivation rec { ··· 41 pkg-config 42 ] ++ lib.optional stdenv.hostPlatform.isDarwin desktopToDarwinBundle; 43 44 - buildInputs = 45 - [ 46 - curl 47 - freexl 48 - geos 49 - librasterlite2 50 - librttopo 51 - libspatialite 52 - libwebp 53 - libxlsxwriter 54 - libxml2 55 - lz4 56 - minizip 57 - openjpeg 58 - postgresql 59 - proj 60 - sqlite 61 - virtualpg 62 - wxGTK 63 - xz 64 - zstd 65 - ] 66 - ++ lib.optionals stdenv.hostPlatform.isDarwin [ 67 - Carbon 68 - Cocoa 69 - IOKit 70 - ]; 71 72 enableParallelBuilding = true; 73
··· 23 wxGTK, 24 xz, 25 zstd, 26 }: 27 28 stdenv.mkDerivation rec { ··· 38 pkg-config 39 ] ++ lib.optional stdenv.hostPlatform.isDarwin desktopToDarwinBundle; 40 41 + buildInputs = [ 42 + curl 43 + freexl 44 + geos 45 + librasterlite2 46 + librttopo 47 + libspatialite 48 + libwebp 49 + libxlsxwriter 50 + libxml2 51 + lz4 52 + minizip 53 + openjpeg 54 + postgresql 55 + proj 56 + sqlite 57 + virtualpg 58 + wxGTK 59 + xz 60 + zstd 61 + ]; 62 63 enableParallelBuilding = true; 64
+2 -13
pkgs/applications/misc/rofi/wayland.nix
··· 1 { 2 lib, 3 fetchFromGitHub, 4 - fetchpatch, 5 rofi-unwrapped, 6 wayland-scanner, 7 pkg-config, ··· 11 12 rofi-unwrapped.overrideAttrs (oldAttrs: rec { 13 pname = "rofi-wayland-unwrapped"; 14 - version = "1.7.5+wayland3"; 15 16 src = fetchFromGitHub { 17 owner = "lbonn"; 18 repo = "rofi"; 19 rev = version; 20 fetchSubmodules = true; 21 - hash = "sha256-pKxraG3fhBh53m+bLPzCigRr6dBcH/A9vbdf67CO2d8="; 22 }; 23 - 24 - patches = [ 25 - # Fix use on niri window manager 26 - # ref. https://github.com/davatorium/rofi/discussions/2008 27 - # this was merged upstream, and can be removed on next release 28 - (fetchpatch { 29 - url = "https://github.com/lbonn/rofi/commit/55425f72ff913eb72f5ba5f5d422b905d87577d0.patch"; 30 - hash = "sha256-vTUxtJs4SuyPk0PgnGlDIe/GVm/w1qZirEhKdBp4bHI="; 31 - }) 32 - ]; 33 34 depsBuildBuild = oldAttrs.depsBuildBuild ++ [ pkg-config ]; 35 nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [
··· 1 { 2 lib, 3 fetchFromGitHub, 4 rofi-unwrapped, 5 wayland-scanner, 6 pkg-config, ··· 10 11 rofi-unwrapped.overrideAttrs (oldAttrs: rec { 12 pname = "rofi-wayland-unwrapped"; 13 + version = "1.7.7+wayland1"; 14 15 src = fetchFromGitHub { 16 owner = "lbonn"; 17 repo = "rofi"; 18 rev = version; 19 fetchSubmodules = true; 20 + hash = "sha256-wGBB7h2gZRQNmHV0NIbD0vvHtKZqnT5hd2gz5smKGoU="; 21 }; 22 23 depsBuildBuild = oldAttrs.depsBuildBuild ++ [ pkg-config ]; 24 nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [
+2 -2
pkgs/applications/networking/browsers/firefox/packages/firefox-devedition.nix
··· 9 10 buildMozillaMach rec { 11 pname = "firefox-devedition"; 12 - version = "133.0b1"; 13 applicationName = "Mozilla Firefox Developer Edition"; 14 requireSigning = false; 15 branding = "browser/branding/aurora"; 16 src = fetchurl { 17 url = "mirror://mozilla/devedition/releases/${version}/source/firefox-${version}.source.tar.xz"; 18 - sha512 = "dced4aba71b07b68ee31c283945e7d62a7032f08f5cf71aa261fc7ba32f58277acbe9fdbdd28777d7f4b824e411815b069cab0ce791438088c9ad19c3d2de62e"; 19 }; 20 21 meta = {
··· 9 10 buildMozillaMach rec { 11 pname = "firefox-devedition"; 12 + version = "135.0b4"; 13 applicationName = "Mozilla Firefox Developer Edition"; 14 requireSigning = false; 15 branding = "browser/branding/aurora"; 16 src = fetchurl { 17 url = "mirror://mozilla/devedition/releases/${version}/source/firefox-${version}.source.tar.xz"; 18 + sha512 = "d3ee20d264c4c26308b814f4cc997349a6df32da17b9a29514b0504f7548606f4b6793ccd2e7464babf6588f13bfcc0e0641f9ac8d620f7da7d7e45684fdf775"; 19 }; 20 21 meta = {
+151
pkgs/applications/networking/sync/rsync/CVE-2024-12084/0001-Some-checksum-buffer-fixes.patch
···
··· 1 + From 0902b52f6687b1f7952422080d50b93108742e53 Mon Sep 17 00:00:00 2001 2 + From: Wayne Davison <wayne@opencoder.net> 3 + Date: Tue, 29 Oct 2024 22:55:29 -0700 4 + Subject: [PATCH 1/2] Some checksum buffer fixes. 5 + 6 + - Put sum2_array into sum_struct to hold an array of sum2 checksums 7 + that are each xfer_sum_len bytes. 8 + - Remove sum2 buf from sum_buf. 9 + - Add macro sum2_at() to access each sum2 array element. 10 + - Throw an error if a sums header has an s2length larger than 11 + xfer_sum_len. 12 + --- 13 + io.c | 3 ++- 14 + match.c | 8 ++++---- 15 + rsync.c | 5 ++++- 16 + rsync.h | 4 +++- 17 + sender.c | 4 +++- 18 + 5 files changed, 16 insertions(+), 8 deletions(-) 19 + 20 + diff --git a/io.c b/io.c 21 + index a99ac0ec..bb60eeca 100644 22 + --- a/io.c 23 + +++ b/io.c 24 + @@ -55,6 +55,7 @@ extern int read_batch; 25 + extern int compat_flags; 26 + extern int protect_args; 27 + extern int checksum_seed; 28 + +extern int xfer_sum_len; 29 + extern int daemon_connection; 30 + extern int protocol_version; 31 + extern int remove_source_files; 32 + @@ -1977,7 +1978,7 @@ void read_sum_head(int f, struct sum_struct *sum) 33 + exit_cleanup(RERR_PROTOCOL); 34 + } 35 + sum->s2length = protocol_version < 27 ? csum_length : (int)read_int(f); 36 + - if (sum->s2length < 0 || sum->s2length > MAX_DIGEST_LEN) { 37 + + if (sum->s2length < 0 || sum->s2length > xfer_sum_len) { 38 + rprintf(FERROR, "Invalid checksum length %d [%s]\n", 39 + sum->s2length, who_am_i()); 40 + exit_cleanup(RERR_PROTOCOL); 41 + diff --git a/match.c b/match.c 42 + index cdb30a15..36e78ed2 100644 43 + --- a/match.c 44 + +++ b/match.c 45 + @@ -232,7 +232,7 @@ static void hash_search(int f,struct sum_struct *s, 46 + done_csum2 = 1; 47 + } 48 + 49 + - if (memcmp(sum2,s->sums[i].sum2,s->s2length) != 0) { 50 + + if (memcmp(sum2, sum2_at(s, i), s->s2length) != 0) { 51 + false_alarms++; 52 + continue; 53 + } 54 + @@ -252,7 +252,7 @@ static void hash_search(int f,struct sum_struct *s, 55 + if (i != aligned_i) { 56 + if (sum != s->sums[aligned_i].sum1 57 + || l != s->sums[aligned_i].len 58 + - || memcmp(sum2, s->sums[aligned_i].sum2, s->s2length) != 0) 59 + + || memcmp(sum2, sum2_at(s, aligned_i), s->s2length) != 0) 60 + goto check_want_i; 61 + i = aligned_i; 62 + } 63 + @@ -271,7 +271,7 @@ static void hash_search(int f,struct sum_struct *s, 64 + if (sum != s->sums[i].sum1) 65 + goto check_want_i; 66 + get_checksum2((char *)map, l, sum2); 67 + - if (memcmp(sum2, s->sums[i].sum2, s->s2length) != 0) 68 + + if (memcmp(sum2, sum2_at(s, i), s->s2length) != 0) 69 + goto check_want_i; 70 + /* OK, we have a re-alignment match. Bump the offset 71 + * forward to the new match point. */ 72 + @@ -290,7 +290,7 @@ static void hash_search(int f,struct sum_struct *s, 73 + && (!updating_basis_file || s->sums[want_i].offset >= offset 74 + || s->sums[want_i].flags & SUMFLG_SAME_OFFSET) 75 + && sum == s->sums[want_i].sum1 76 + - && memcmp(sum2, s->sums[want_i].sum2, s->s2length) == 0) { 77 + + && memcmp(sum2, sum2_at(s, want_i), s->s2length) == 0) { 78 + /* we've found an adjacent match - the RLL coder 79 + * will be happy */ 80 + i = want_i; 81 + diff --git a/rsync.c b/rsync.c 82 + index cd288f57..b130aba5 100644 83 + --- a/rsync.c 84 + +++ b/rsync.c 85 + @@ -437,7 +437,10 @@ int read_ndx_and_attrs(int f_in, int f_out, int *iflag_ptr, uchar *type_ptr, cha 86 + */ 87 + void free_sums(struct sum_struct *s) 88 + { 89 + - if (s->sums) free(s->sums); 90 + + if (s->sums) { 91 + + free(s->sums); 92 + + free(s->sum2_array); 93 + + } 94 + free(s); 95 + } 96 + 97 + diff --git a/rsync.h b/rsync.h 98 + index d3709fe0..8ddbe702 100644 99 + --- a/rsync.h 100 + +++ b/rsync.h 101 + @@ -958,12 +958,12 @@ struct sum_buf { 102 + uint32 sum1; /**< simple checksum */ 103 + int32 chain; /**< next hash-table collision */ 104 + short flags; /**< flag bits */ 105 + - char sum2[SUM_LENGTH]; /**< checksum */ 106 + }; 107 + 108 + struct sum_struct { 109 + OFF_T flength; /**< total file length */ 110 + struct sum_buf *sums; /**< points to info for each chunk */ 111 + + char *sum2_array; /**< checksums of length xfer_sum_len */ 112 + int32 count; /**< how many chunks */ 113 + int32 blength; /**< block_length */ 114 + int32 remainder; /**< flength % block_length */ 115 + @@ -982,6 +982,8 @@ struct map_struct { 116 + int status; /* first errno from read errors */ 117 + }; 118 + 119 + +#define sum2_at(s, i) ((s)->sum2_array + ((OFF_T)(i) * xfer_sum_len)) 120 + + 121 + #define NAME_IS_FILE (0) /* filter name as a file */ 122 + #define NAME_IS_DIR (1<<0) /* filter name as a dir */ 123 + #define NAME_IS_XATTR (1<<2) /* filter name as an xattr */ 124 + diff --git a/sender.c b/sender.c 125 + index 3d4f052e..ab205341 100644 126 + --- a/sender.c 127 + +++ b/sender.c 128 + @@ -31,6 +31,7 @@ extern int log_before_transfer; 129 + extern int stdout_format_has_i; 130 + extern int logfile_format_has_i; 131 + extern int want_xattr_optim; 132 + +extern int xfer_sum_len; 133 + extern int csum_length; 134 + extern int append_mode; 135 + extern int copy_links; 136 + @@ -94,10 +95,11 @@ static struct sum_struct *receive_sums(int f) 137 + return(s); 138 + 139 + s->sums = new_array(struct sum_buf, s->count); 140 + + s->sum2_array = new_array(char, s->count * xfer_sum_len); 141 + 142 + for (i = 0; i < s->count; i++) { 143 + s->sums[i].sum1 = read_int(f); 144 + - read_buf(f, s->sums[i].sum2, s->s2length); 145 + + read_buf(f, sum2_at(s, i), s->s2length); 146 + 147 + s->sums[i].offset = offset; 148 + s->sums[i].flags = 0; 149 + -- 150 + 2.34.1 151 +
+39
pkgs/applications/networking/sync/rsync/CVE-2024-12084/0002-Another-cast-when-multiplying-integers.patch
···
··· 1 + From 42e2b56c4ede3ab164f9a5c6dae02aa84606a6c1 Mon Sep 17 00:00:00 2001 2 + From: Wayne Davison <wayne@opencoder.net> 3 + Date: Tue, 5 Nov 2024 11:01:03 -0800 4 + Subject: [PATCH 2/2] Another cast when multiplying integers. 5 + 6 + --- 7 + rsync.h | 2 +- 8 + sender.c | 2 +- 9 + 2 files changed, 2 insertions(+), 2 deletions(-) 10 + 11 + diff --git a/rsync.h b/rsync.h 12 + index 8ddbe702..0f9e277f 100644 13 + --- a/rsync.h 14 + +++ b/rsync.h 15 + @@ -982,7 +982,7 @@ struct map_struct { 16 + int status; /* first errno from read errors */ 17 + }; 18 + 19 + -#define sum2_at(s, i) ((s)->sum2_array + ((OFF_T)(i) * xfer_sum_len)) 20 + +#define sum2_at(s, i) ((s)->sum2_array + ((size_t)(i) * xfer_sum_len)) 21 + 22 + #define NAME_IS_FILE (0) /* filter name as a file */ 23 + #define NAME_IS_DIR (1<<0) /* filter name as a dir */ 24 + diff --git a/sender.c b/sender.c 25 + index ab205341..2bbff2fa 100644 26 + --- a/sender.c 27 + +++ b/sender.c 28 + @@ -95,7 +95,7 @@ static struct sum_struct *receive_sums(int f) 29 + return(s); 30 + 31 + s->sums = new_array(struct sum_buf, s->count); 32 + - s->sum2_array = new_array(char, s->count * xfer_sum_len); 33 + + s->sum2_array = new_array(char, (size_t)s->count * xfer_sum_len); 34 + 35 + for (i = 0; i < s->count; i++) { 36 + s->sums[i].sum1 = read_int(f); 37 + -- 38 + 2.34.1 39 +
+27
pkgs/applications/networking/sync/rsync/CVE-2024-12085/0001-prevent-information-leak-off-the-stack.patch
···
··· 1 + From cf620065502f065d4ea44f5df4f81295a738aa21 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Thu, 14 Nov 2024 09:57:08 +1100 4 + Subject: [PATCH] prevent information leak off the stack 5 + 6 + prevent leak of uninitialised stack data in hash_search 7 + --- 8 + match.c | 3 +++ 9 + 1 file changed, 3 insertions(+) 10 + 11 + diff --git a/match.c b/match.c 12 + index 36e78ed2..dfd6af2c 100644 13 + --- a/match.c 14 + +++ b/match.c 15 + @@ -147,6 +147,9 @@ static void hash_search(int f,struct sum_struct *s, 16 + int more; 17 + schar *map; 18 + 19 + + // prevent possible memory leaks 20 + + memset(sum2, 0, sizeof sum2); 21 + + 22 + /* want_i is used to encourage adjacent matches, allowing the RLL 23 + * coding of the output to work more efficiently. */ 24 + want_i = 0; 25 + -- 26 + 2.34.1 27 +
+37
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0001-refuse-fuzzy-options-when-fuzzy-not-selected.patch
···
··· 1 + From 3feb8669d875d03c9ceb82e208ef40ddda8eb908 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Sat, 23 Nov 2024 11:08:03 +1100 4 + Subject: [PATCH 1/4] refuse fuzzy options when fuzzy not selected 5 + 6 + this prevents a malicious server providing a file to compare to when 7 + the user has not given the fuzzy option 8 + --- 9 + receiver.c | 5 +++++ 10 + 1 file changed, 5 insertions(+) 11 + 12 + diff --git a/receiver.c b/receiver.c 13 + index 6b4b369e..2d7f6033 100644 14 + --- a/receiver.c 15 + +++ b/receiver.c 16 + @@ -66,6 +66,7 @@ extern char sender_file_sum[MAX_DIGEST_LEN]; 17 + extern struct file_list *cur_flist, *first_flist, *dir_flist; 18 + extern filter_rule_list daemon_filter_list; 19 + extern OFF_T preallocated_len; 20 + +extern int fuzzy_basis; 21 + 22 + extern struct name_num_item *xfer_sum_nni; 23 + extern int xfer_sum_len; 24 + @@ -716,6 +717,10 @@ int recv_files(int f_in, int f_out, char *local_name) 25 + fnamecmp = get_backup_name(fname); 26 + break; 27 + case FNAMECMP_FUZZY: 28 + + if (fuzzy_basis == 0) { 29 + + rprintf(FERROR_XFER, "rsync: refusing malicious fuzzy operation for %s\n", xname); 30 + + exit_cleanup(RERR_PROTOCOL); 31 + + } 32 + if (file->dirname) { 33 + pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, file->dirname, xname); 34 + fnamecmp = fnamecmpbuf; 35 + -- 36 + 2.34.1 37 +
+103
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0002-added-secure_relative_open.patch
···
··· 1 + From 33385aefe4773e7a3982d41995681eb079c92d12 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Sat, 23 Nov 2024 12:26:10 +1100 4 + Subject: [PATCH 2/4] added secure_relative_open() 5 + 6 + this is an open that enforces no symlink following for all path 7 + components in a relative path 8 + --- 9 + syscall.c | 74 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 10 + 1 file changed, 74 insertions(+) 11 + 12 + diff --git a/syscall.c b/syscall.c 13 + index d92074aa..a4b7f542 100644 14 + --- a/syscall.c 15 + +++ b/syscall.c 16 + @@ -33,6 +33,8 @@ 17 + #include <sys/syscall.h> 18 + #endif 19 + 20 + +#include "ifuncs.h" 21 + + 22 + extern int dry_run; 23 + extern int am_root; 24 + extern int am_sender; 25 + @@ -712,3 +714,75 @@ int do_open_nofollow(const char *pathname, int flags) 26 + 27 + return fd; 28 + } 29 + + 30 + +/* 31 + + open a file relative to a base directory. The basedir can be NULL, 32 + + in which case the current working directory is used. The relpath 33 + + must be a relative path, and the relpath must not contain any 34 + + elements in the path which follow symlinks (ie. like O_NOFOLLOW, but 35 + + applies to all path components, not just the last component) 36 + +*/ 37 + +int secure_relative_open(const char *basedir, const char *relpath, int flags, mode_t mode) 38 + +{ 39 + + if (!relpath || relpath[0] == '/') { 40 + + // must be a relative path 41 + + errno = EINVAL; 42 + + return -1; 43 + + } 44 + + 45 + +#if !defined(O_NOFOLLOW) || !defined(O_DIRECTORY) 46 + + // really old system, all we can do is live with the risks 47 + + if (!basedir) { 48 + + return open(relpath, flags, mode); 49 + + } 50 + + char fullpath[MAXPATHLEN]; 51 + + pathjoin(fullpath, sizeof fullpath, basedir, relpath); 52 + + return open(fullpath, flags, mode); 53 + +#else 54 + + int dirfd = AT_FDCWD; 55 + + if (basedir != NULL) { 56 + + dirfd = openat(AT_FDCWD, basedir, O_RDONLY | O_DIRECTORY); 57 + + if (dirfd == -1) { 58 + + return -1; 59 + + } 60 + + } 61 + + int retfd = -1; 62 + + 63 + + char *path_copy = my_strdup(relpath, __FILE__, __LINE__); 64 + + if (!path_copy) { 65 + + return -1; 66 + + } 67 + + 68 + + for (const char *part = strtok(path_copy, "/"); 69 + + part != NULL; 70 + + part = strtok(NULL, "/")) 71 + + { 72 + + int next_fd = openat(dirfd, part, O_RDONLY | O_DIRECTORY | O_NOFOLLOW); 73 + + if (next_fd == -1 && errno == ENOTDIR) { 74 + + if (strtok(NULL, "/") != NULL) { 75 + + // this is not the last component of the path 76 + + errno = ELOOP; 77 + + goto cleanup; 78 + + } 79 + + // this could be the last component of the path, try as a file 80 + + retfd = openat(dirfd, part, flags | O_NOFOLLOW, mode); 81 + + goto cleanup; 82 + + } 83 + + if (next_fd == -1) { 84 + + goto cleanup; 85 + + } 86 + + if (dirfd != AT_FDCWD) close(dirfd); 87 + + dirfd = next_fd; 88 + + } 89 + + 90 + + // the path must be a directory 91 + + errno = EINVAL; 92 + + 93 + +cleanup: 94 + + free(path_copy); 95 + + if (dirfd != AT_FDCWD) { 96 + + close(dirfd); 97 + + } 98 + + return retfd; 99 + +#endif // O_NOFOLLOW, O_DIRECTORY 100 + +} 101 + -- 102 + 2.34.1 103 +
+103
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0003-receiver-use-secure_relative_open-for-basis-file.patch
···
··· 1 + From e59ef9939d3f0ccc8f9bab51442989a81be0c914 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Sat, 23 Nov 2024 12:28:13 +1100 4 + Subject: [PATCH 3/4] receiver: use secure_relative_open() for basis file 5 + 6 + this prevents attacks where the basis file is manipulated by a 7 + malicious sender to gain information about files outside the 8 + destination tree 9 + --- 10 + receiver.c | 42 ++++++++++++++++++++++++++---------------- 11 + 1 file changed, 26 insertions(+), 16 deletions(-) 12 + 13 + diff --git a/receiver.c b/receiver.c 14 + index 2d7f6033..8031b8f4 100644 15 + --- a/receiver.c 16 + +++ b/receiver.c 17 + @@ -552,6 +552,8 @@ int recv_files(int f_in, int f_out, char *local_name) 18 + progress_init(); 19 + 20 + while (1) { 21 + + const char *basedir = NULL; 22 + + 23 + cleanup_disable(); 24 + 25 + /* This call also sets cur_flist. */ 26 + @@ -722,27 +724,29 @@ int recv_files(int f_in, int f_out, char *local_name) 27 + exit_cleanup(RERR_PROTOCOL); 28 + } 29 + if (file->dirname) { 30 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, file->dirname, xname); 31 + - fnamecmp = fnamecmpbuf; 32 + - } else 33 + - fnamecmp = xname; 34 + + basedir = file->dirname; 35 + + } 36 + + fnamecmp = xname; 37 + break; 38 + default: 39 + if (fnamecmp_type > FNAMECMP_FUZZY && fnamecmp_type-FNAMECMP_FUZZY <= basis_dir_cnt) { 40 + fnamecmp_type -= FNAMECMP_FUZZY + 1; 41 + if (file->dirname) { 42 + - stringjoin(fnamecmpbuf, sizeof fnamecmpbuf, 43 + - basis_dir[fnamecmp_type], "/", file->dirname, "/", xname, NULL); 44 + - } else 45 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basis_dir[fnamecmp_type], xname); 46 + + pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basis_dir[fnamecmp_type], file->dirname); 47 + + basedir = fnamecmpbuf; 48 + + } else { 49 + + basedir = basis_dir[fnamecmp_type]; 50 + + } 51 + + fnamecmp = xname; 52 + } else if (fnamecmp_type >= basis_dir_cnt) { 53 + rprintf(FERROR, 54 + "invalid basis_dir index: %d.\n", 55 + fnamecmp_type); 56 + exit_cleanup(RERR_PROTOCOL); 57 + - } else 58 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basis_dir[fnamecmp_type], fname); 59 + - fnamecmp = fnamecmpbuf; 60 + + } else { 61 + + basedir = basis_dir[fnamecmp_type]; 62 + + fnamecmp = fname; 63 + + } 64 + break; 65 + } 66 + if (!fnamecmp || (daemon_filter_list.head 67 + @@ -765,7 +769,7 @@ int recv_files(int f_in, int f_out, char *local_name) 68 + } 69 + 70 + /* open the file */ 71 + - fd1 = do_open(fnamecmp, O_RDONLY, 0); 72 + + fd1 = secure_relative_open(basedir, fnamecmp, O_RDONLY, 0); 73 + 74 + if (fd1 == -1 && protocol_version < 29) { 75 + if (fnamecmp != fname) { 76 + @@ -776,14 +780,20 @@ int recv_files(int f_in, int f_out, char *local_name) 77 + 78 + if (fd1 == -1 && basis_dir[0]) { 79 + /* pre-29 allowed only one alternate basis */ 80 + - pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, 81 + - basis_dir[0], fname); 82 + - fnamecmp = fnamecmpbuf; 83 + + basedir = basis_dir[0]; 84 + + fnamecmp = fname; 85 + fnamecmp_type = FNAMECMP_BASIS_DIR_LOW; 86 + - fd1 = do_open(fnamecmp, O_RDONLY, 0); 87 + + fd1 = secure_relative_open(basedir, fnamecmp, O_RDONLY, 0); 88 + } 89 + } 90 + 91 + + if (basedir) { 92 + + // for the following code we need the full 93 + + // path name as a single string 94 + + pathjoin(fnamecmpbuf, sizeof fnamecmpbuf, basedir, fnamecmp); 95 + + fnamecmp = fnamecmpbuf; 96 + + } 97 + + 98 + one_inplace = inplace_partial && fnamecmp_type == FNAMECMP_PARTIAL_DIR; 99 + updating_basis_or_equiv = one_inplace 100 + || (inplace && (fnamecmp == fname || fnamecmp_type == FNAMECMP_BACKUP)); 101 + -- 102 + 2.34.1 103 +
+37
pkgs/applications/networking/sync/rsync/CVE-2024-12086/0004-disallow-.-elements-in-relpath-for-secure_relative_o.patch
···
··· 1 + From c78e53edb802d04f7e4e070fe8314f2544749e7a Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Tue, 26 Nov 2024 09:16:31 +1100 4 + Subject: [PATCH 4/4] disallow ../ elements in relpath for secure_relative_open 5 + 6 + --- 7 + syscall.c | 7 +++++++ 8 + 1 file changed, 7 insertions(+) 9 + 10 + diff --git a/syscall.c b/syscall.c 11 + index a4b7f542..47c5ea57 100644 12 + --- a/syscall.c 13 + +++ b/syscall.c 14 + @@ -721,6 +721,8 @@ int do_open_nofollow(const char *pathname, int flags) 15 + must be a relative path, and the relpath must not contain any 16 + elements in the path which follow symlinks (ie. like O_NOFOLLOW, but 17 + applies to all path components, not just the last component) 18 + + 19 + + The relpath must also not contain any ../ elements in the path 20 + */ 21 + int secure_relative_open(const char *basedir, const char *relpath, int flags, mode_t mode) 22 + { 23 + @@ -729,6 +731,11 @@ int secure_relative_open(const char *basedir, const char *relpath, int flags, mo 24 + errno = EINVAL; 25 + return -1; 26 + } 27 + + if (strncmp(relpath, "../", 3) == 0 || strstr(relpath, "/../")) { 28 + + // no ../ elements allowed in the relpath 29 + + errno = EINVAL; 30 + + return -1; 31 + + } 32 + 33 + #if !defined(O_NOFOLLOW) || !defined(O_DIRECTORY) 34 + // really old system, all we can do is live with the risks 35 + -- 36 + 2.34.1 37 +
+45
pkgs/applications/networking/sync/rsync/CVE-2024-12087/0001-Refuse-a-duplicate-dirlist.patch
···
··· 1 + From 0ebc19ee486a8e928a68d8f98d07d40f176770aa Mon Sep 17 00:00:00 2001 2 + From: Wayne Davison <wayne@opencoder.net> 3 + Date: Thu, 14 Nov 2024 15:46:50 -0800 4 + Subject: [PATCH 1/2] Refuse a duplicate dirlist. 5 + 6 + --- 7 + flist.c | 9 +++++++++ 8 + rsync.h | 1 + 9 + 2 files changed, 10 insertions(+) 10 + 11 + diff --git a/flist.c b/flist.c 12 + index 464d556e..847b1054 100644 13 + --- a/flist.c 14 + +++ b/flist.c 15 + @@ -2584,6 +2584,15 @@ struct file_list *recv_file_list(int f, int dir_ndx) 16 + init_hard_links(); 17 + #endif 18 + 19 + + if (inc_recurse && dir_ndx >= 0) { 20 + + struct file_struct *file = dir_flist->files[dir_ndx]; 21 + + if (file->flags & FLAG_GOT_DIR_FLIST) { 22 + + rprintf(FERROR_XFER, "rsync: refusing malicious duplicate flist for dir %d\n", dir_ndx); 23 + + exit_cleanup(RERR_PROTOCOL); 24 + + } 25 + + file->flags |= FLAG_GOT_DIR_FLIST; 26 + + } 27 + + 28 + flist = flist_new(0, "recv_file_list"); 29 + flist_expand(flist, FLIST_START_LARGE); 30 + 31 + diff --git a/rsync.h b/rsync.h 32 + index 0f9e277f..b9a7101a 100644 33 + --- a/rsync.h 34 + +++ b/rsync.h 35 + @@ -84,6 +84,7 @@ 36 + #define FLAG_DUPLICATE (1<<4) /* sender */ 37 + #define FLAG_MISSING_DIR (1<<4) /* generator */ 38 + #define FLAG_HLINKED (1<<5) /* receiver/generator (checked on all types) */ 39 + +#define FLAG_GOT_DIR_FLIST (1<<5)/* sender/receiver/generator - dir_flist only */ 40 + #define FLAG_HLINK_FIRST (1<<6) /* receiver/generator (w/FLAG_HLINKED) */ 41 + #define FLAG_IMPLIED_DIR (1<<6) /* sender/receiver/generator (dirs only) */ 42 + #define FLAG_HLINK_LAST (1<<7) /* receiver/generator */ 43 + -- 44 + 2.34.1 45 +
+27
pkgs/applications/networking/sync/rsync/CVE-2024-12087/0002-range-check-dir_ndx-before-use.patch
···
··· 1 + From b3e16be18d582dac1513c0a932d146b36e867b1b Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Tue, 26 Nov 2024 16:12:45 +1100 4 + Subject: [PATCH 2/2] range check dir_ndx before use 5 + 6 + --- 7 + flist.c | 4 ++++ 8 + 1 file changed, 4 insertions(+) 9 + 10 + diff --git a/flist.c b/flist.c 11 + index 847b1054..087f9da6 100644 12 + --- a/flist.c 13 + +++ b/flist.c 14 + @@ -2585,6 +2585,10 @@ struct file_list *recv_file_list(int f, int dir_ndx) 15 + #endif 16 + 17 + if (inc_recurse && dir_ndx >= 0) { 18 + + if (dir_ndx >= dir_flist->used) { 19 + + rprintf(FERROR_XFER, "rsync: refusing invalid dir_ndx %u >= %u\n", dir_ndx, dir_flist->used); 20 + + exit_cleanup(RERR_PROTOCOL); 21 + + } 22 + struct file_struct *file = dir_flist->files[dir_ndx]; 23 + if (file->flags & FLAG_GOT_DIR_FLIST) { 24 + rprintf(FERROR_XFER, "rsync: refusing malicious duplicate flist for dir %d\n", dir_ndx); 25 + -- 26 + 2.34.1 27 +
+12
pkgs/applications/networking/sync/rsync/default.nix
··· 38 patches = [ 39 # https://github.com/WayneD/rsync/pull/558 40 ./configure.ac-fix-failing-IPv6-check.patch 41 ]; 42 43 buildInputs =
··· 38 patches = [ 39 # https://github.com/WayneD/rsync/pull/558 40 ./configure.ac-fix-failing-IPv6-check.patch 41 + ./CVE-2024-12084/0001-Some-checksum-buffer-fixes.patch 42 + ./CVE-2024-12084/0002-Another-cast-when-multiplying-integers.patch 43 + ./CVE-2024-12085/0001-prevent-information-leak-off-the-stack.patch 44 + ./CVE-2024-12086/0001-refuse-fuzzy-options-when-fuzzy-not-selected.patch 45 + ./CVE-2024-12086/0002-added-secure_relative_open.patch 46 + ./CVE-2024-12086/0003-receiver-use-secure_relative_open-for-basis-file.patch 47 + ./CVE-2024-12086/0004-disallow-.-elements-in-relpath-for-secure_relative_o.patch 48 + ./CVE-2024-12087/0001-Refuse-a-duplicate-dirlist.patch 49 + ./CVE-2024-12087/0002-range-check-dir_ndx-before-use.patch 50 + ./CVE-2024-12088/0001-make-safe-links-stricter.patch 51 + ./CVE-2024-12747/0001-fixed-symlink-race-condition-in-sender.patch 52 + ./raise-protocol-version-to-32.patch 53 ]; 54 55 buildInputs =
+26
pkgs/applications/networking/sync/rsync/raise-protocol-version-to-32.patch
···
··· 1 + From 163e05b1680c4a3b448fa68d03c3fca9589f3bc4 Mon Sep 17 00:00:00 2001 2 + From: Andrew Tridgell <andrew@tridgell.net> 3 + Date: Tue, 10 Dec 2024 13:34:01 +1100 4 + Subject: [PATCH 1/3] raise protocol version to 32 5 + 6 + make it easier to spot unpatched servers 7 + --- 8 + rsync.h | 2 +- 9 + 1 file changed, 1 insertion(+), 1 deletion(-) 10 + 11 + diff --git a/rsync.h b/rsync.h 12 + index b9a7101a..9be1297b 100644 13 + --- a/rsync.h 14 + +++ b/rsync.h 15 + @@ -111,7 +111,7 @@ 16 + 17 + /* Update this if you make incompatible changes and ALSO update the 18 + * SUBPROTOCOL_VERSION if it is not a final (official) release. */ 19 + -#define PROTOCOL_VERSION 31 20 + +#define PROTOCOL_VERSION 32 21 + 22 + /* This is used when working on a new protocol version or for any unofficial 23 + * protocol tweaks. It should be a non-zero value for each pre-release repo 24 + -- 25 + 2.34.1 26 +
+3 -7
pkgs/applications/video/obs-studio/plugins/obs-transition-table.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "obs-transition-table"; 12 - version = "0.2.7"; 13 14 src = fetchFromGitHub { 15 owner = "exeldro"; 16 repo = "obs-transition-table"; 17 - rev = version; 18 - sha256 = "sha256-rGF7hugC5ybpZBAIIXDiy3YDooMawf/yYX2YucQm2/U="; 19 }; 20 21 nativeBuildInputs = [ cmake ]; 22 buildInputs = [ 23 obs-studio 24 qtbase 25 - ]; 26 - 27 - cmakeFlags = [ 28 - "-DBUILD_OUT_OF_TREE=On" 29 ]; 30 31 dontWrapQtApps = true;
··· 9 10 stdenv.mkDerivation rec { 11 pname = "obs-transition-table"; 12 + version = "0.2.7-unstable-2024-11-27"; 13 14 src = fetchFromGitHub { 15 owner = "exeldro"; 16 repo = "obs-transition-table"; 17 + rev = "976fe236dac7082b6c953f950fcb9e50495ce624"; 18 + sha256 = "sha256-TPRqKjEXdvjv+RfHTaeeO4GHur2j/+onehcu0I/HdD0="; 19 }; 20 21 nativeBuildInputs = [ cmake ]; 22 buildInputs = [ 23 obs-studio 24 qtbase 25 ]; 26 27 dontWrapQtApps = true;
+10 -3
pkgs/build-support/build-fhsenv-bubblewrap/default.nix
··· 12 }: 13 14 { 15 runScript ? "bash", 16 nativeBuildInputs ? [ ], 17 extraInstallCommands ? "", 18 meta ? { }, 19 passthru ? { }, 20 extraPreBwrapCmds ? "", ··· 30 ... 31 }@args: 32 33 - assert (!args ? pname || !args ? version) -> (args ? name); # You must provide name if pname or version (preferred) is missing. 34 35 let 36 inherit (lib) ··· 48 # explicit about which package set it's coming from. 49 inherit (pkgsHostTarget) pkgsi686Linux; 50 51 - name = args.name or "${args.pname}-${args.version}"; 52 - executableName = args.pname or args.name; 53 # we don't know which have been supplied, and want to avoid defaulting missing attrs to null. Passed into runCommandLocal 54 nameAttrs = lib.filterAttrs ( 55 key: value:
··· 12 }: 13 14 { 15 + pname ? throw "You must provide either `name` or `pname`", 16 + version ? throw "You must provide either `name` or `version`", 17 + name ? "${pname}-${version}", 18 runScript ? "bash", 19 nativeBuildInputs ? [ ], 20 extraInstallCommands ? "", 21 + executableName ? args.pname or name, 22 meta ? { }, 23 passthru ? { }, 24 extraPreBwrapCmds ? "", ··· 34 ... 35 }@args: 36 37 + # NOTE: 38 + # `pname` and `version` will throw if they were not provided. 39 + # Use `name` instead of directly evaluating `pname` or `version`. 40 + # 41 + # If you need `pname` or `version` sepcifically, use `args` instead: 42 + # e.g. `args.pname or ...`. 43 44 let 45 inherit (lib) ··· 57 # explicit about which package set it's coming from. 58 inherit (pkgsHostTarget) pkgsi686Linux; 59 60 # we don't know which have been supplied, and want to avoid defaulting missing attrs to null. Passed into runCommandLocal 61 nameAttrs = lib.filterAttrs ( 62 key: value:
+2 -2
pkgs/by-name/ae/aerospike/package.nix
··· 12 13 stdenv.mkDerivation rec { 14 pname = "aerospike-server"; 15 - version = "7.2.0.4"; 16 17 src = fetchFromGitHub { 18 owner = "aerospike"; 19 repo = "aerospike-server"; 20 rev = version; 21 - hash = "sha256-g07rfQabjfvfl8rkLDgeTGq1J0pczdasTXIsWqUvz7w="; 22 fetchSubmodules = true; 23 }; 24
··· 12 13 stdenv.mkDerivation rec { 14 pname = "aerospike-server"; 15 + version = "7.2.0.6"; 16 17 src = fetchFromGitHub { 18 owner = "aerospike"; 19 repo = "aerospike-server"; 20 rev = version; 21 + hash = "sha256-YjX/2+0n+nrtNwQaZSY5PPYAOnhR+jrIMp02STcJHRY="; 22 fetchSubmodules = true; 23 }; 24
+2 -2
pkgs/by-name/au/authentik/package.nix
··· 15 }: 16 17 let 18 - version = "2024.12.1"; 19 20 src = fetchFromGitHub { 21 owner = "goauthentik"; 22 repo = "authentik"; 23 rev = "version/${version}"; 24 - hash = "sha256-CkUmsVKzAQ/VWIhtxWxlcGtrWVa8hxqsMqvfcsG5ktA="; 25 }; 26 27 meta = with lib; {
··· 15 }: 16 17 let 18 + version = "2024.12.2"; 19 20 src = fetchFromGitHub { 21 owner = "goauthentik"; 22 repo = "authentik"; 23 rev = "version/${version}"; 24 + hash = "sha256-Z3rFFrXrOKaF9NpY/fInsEbzdOWnWqLfEYl7YX9hFEU="; 25 }; 26 27 meta = with lib; {
+63 -26
pkgs/by-name/co/code-cursor/package.nix
··· 9 let 10 pname = "cursor"; 11 version = "0.44.11"; 12 - appKey = "230313mzl4w4u92"; 13 - src = fetchurl { 14 - url = "https://download.todesktop.com/230313mzl4w4u92/cursor-0.44.11-build-250103fqxdt5u9z-x86_64.AppImage"; 15 - hash = "sha256-eOZuofnpED9F6wic0S9m933Tb7Gq7cb/v0kRDltvFVg="; 16 }; 17 - appimageContents = appimageTools.extractType2 { inherit version pname src; }; 18 - in 19 - stdenvNoCC.mkDerivation { 20 - inherit pname version; 21 22 - src = appimageTools.wrapType2 { inherit version pname src; }; 23 24 - nativeBuildInputs = [ makeWrapper ]; 25 26 - installPhase = '' 27 runHook preInstall 28 29 mkdir -p $out/ ··· 43 runHook postInstall 44 ''; 45 46 - passthru.updateScript = writeScript "update.sh" '' 47 - #!/usr/bin/env nix-shell 48 - #!nix-shell -i bash -p curl yq coreutils gnused common-updater-scripts 49 - set -eu -o pipefail 50 - latestLinux="$(curl -s https://download.todesktop.com/${appKey}/latest-linux.yml)" 51 - version="$(echo "$latestLinux" | yq -r .version)" 52 - filename="$(echo "$latestLinux" | yq -r '.files[] | .url | select(. | endswith(".AppImage"))')" 53 - url="https://download.todesktop.com/${appKey}/$filename" 54 - currentVersion=$(nix-instantiate --eval -E "with import ./. {}; code-cursor.version or (lib.getVersion code-cursor)" | tr -d '"') 55 56 - if [[ "$version" != "$currentVersion" ]]; then 57 - hash=$(nix-hash --to-sri --type sha256 "$(nix-prefetch-url "$url")") 58 - update-source-version code-cursor "$version" "$hash" "$url" --source-key=src.src 59 - fi 60 - ''; 61 62 meta = { 63 description = "AI-powered code editor built on vscode"; ··· 66 license = lib.licenses.unfree; 67 sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 68 maintainers = with lib.maintainers; [ sarahec ]; 69 - platforms = [ "x86_64-linux" ]; 70 mainProgram = "cursor"; 71 }; 72 }
··· 9 let 10 pname = "cursor"; 11 version = "0.44.11"; 12 + 13 + sources = { 14 + x86_64-linux = fetchurl { 15 + url = "https://download.todesktop.com/230313mzl4w4u92/cursor-0.44.11-build-250103fqxdt5u9z-x86_64.AppImage"; 16 + hash = "sha256-eOZuofnpED9F6wic0S9m933Tb7Gq7cb/v0kRDltvFVg="; 17 + }; 18 + aarch64-linux = fetchurl { 19 + url = "https://download.todesktop.com/230313mzl4w4u92/cursor-0.44.11-build-250103fqxdt5u9z-arm64.AppImage"; 20 + hash = "sha256-mxq7tQJfDccE0QsZDZbaFUKO0Xc141N00ntX3oEYRcc="; 21 + }; 22 }; 23 + 24 + supportedPlatforms = [ 25 + "x86_64-linux" 26 + "aarch64-linux" 27 + ]; 28 + 29 + src = sources.${stdenvNoCC.hostPlatform.system}; 30 31 + appimageContents = appimageTools.extractType2 { 32 + inherit version pname src; 33 + }; 34 35 + wrappedAppImage = appimageTools.wrapType2 { inherit version pname src; }; 36 37 + appimageInstall = '' 38 runHook preInstall 39 40 mkdir -p $out/ ··· 54 runHook postInstall 55 ''; 56 57 + in 58 + stdenvNoCC.mkDerivation { 59 + inherit pname version; 60 + 61 + src = wrappedAppImage; 62 + 63 + nativeBuildInputs = [ makeWrapper ]; 64 + 65 + installPhase = appimageInstall; 66 + 67 + passthru = { 68 + inherit sources; 69 + updateScript = writeScript "update.sh" '' 70 + #!/usr/bin/env nix-shell 71 + #!nix-shell -i bash -p curl yq coreutils gnused common-updater-scripts 72 + set -eu -o pipefail 73 + baseUrl="https://download.todesktop.com/230313mzl4w4u92" 74 + latestLinux="$(curl -s $baseUrl/latest-linux.yml)" 75 + version="$(echo "$latestLinux" | yq -r .version)" 76 + filename="$(echo "$latestLinux" | yq -r '.files[] | .url | select(. | endswith(".AppImage"))')" 77 + linuxStem="$(echo "$filename" | sed -E s/^\(cursor-.+-build-.*\)-.+$/\\1/)" 78 79 + currentVersion=$(nix-instantiate --eval -E "with import ./. {}; code-cursor.version or (lib.getVersion code-cursor)" | tr -d '"') 80 + 81 + if [[ "$version" != "$currentVersion" ]]; then 82 + for platform in ${lib.escapeShellArgs supportedPlatforms}; do 83 + if [ $platform = "x86_64-linux" ]; then 84 + url="$baseUrl/$linuxStem-x86_64.AppImage" 85 + elif [ $platform = "aarch64-linux" ]; then 86 + url="$baseUrl/$linuxStem-arm64.AppImage" 87 + else 88 + echo "Unsupported platform: $platform" 89 + exit 1 90 + fi 91 + 92 + hash=$(nix-hash --to-sri --type sha256 "$(nix-prefetch-url "$url")") 93 + update-source-version code-cursor $version $hash $url --system=$platform --ignore-same-version --source-key="sources.$platform" 94 + done 95 + fi 96 + ''; 97 + }; 98 99 meta = { 100 description = "AI-powered code editor built on vscode"; ··· 103 license = lib.licenses.unfree; 104 sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 105 maintainers = with lib.maintainers; [ sarahec ]; 106 + platforms = lib.platforms.linux; 107 mainProgram = "cursor"; 108 }; 109 }
+3 -3
pkgs/by-name/co/containerd/package.nix
··· 16 17 buildGoModule rec { 18 pname = "containerd"; 19 - version = "2.0.1"; 20 21 outputs = [ 22 "out" ··· 27 owner = "containerd"; 28 repo = "containerd"; 29 tag = "v${version}"; 30 - hash = "sha256-gD0XRZThU/T8qxLyyboyE6GsX911ylt7hH59S+rB7vQ="; 31 }; 32 33 postPatch = "patchShebangs ."; ··· 89 meta = { 90 description = "Daemon to control runC"; 91 homepage = "https://containerd.io/"; 92 - changelog = "https://github.com/containerd/containerd/releases/tag/${version}"; 93 license = lib.licenses.asl20; 94 maintainers = with lib.maintainers; [ 95 offline
··· 16 17 buildGoModule rec { 18 pname = "containerd"; 19 + version = "2.0.2"; 20 21 outputs = [ 22 "out" ··· 27 owner = "containerd"; 28 repo = "containerd"; 29 tag = "v${version}"; 30 + hash = "sha256-aCC6nH+bxjk6dUIzUva4ILH0FD6QkWiJmdrcMLA18Jw="; 31 }; 32 33 postPatch = "patchShebangs ."; ··· 89 meta = { 90 description = "Daemon to control runC"; 91 homepage = "https://containerd.io/"; 92 + changelog = "https://github.com/containerd/containerd/releases/tag/v${version}"; 93 license = lib.licenses.asl20; 94 maintainers = with lib.maintainers; [ 95 offline
+11 -6
pkgs/by-name/cu/curv/package.nix
··· 1 { 2 lib, 3 stdenv, 4 - fetchFromGitHub, 5 cmake, 6 boost, 7 eigen, 8 glm, ··· 17 18 stdenv.mkDerivation rec { 19 pname = "curv"; 20 - version = "0.5"; 21 22 - src = fetchFromGitHub { 23 - owner = "curv3d"; 24 repo = "curv"; 25 - tag = version; 26 - hash = "sha256-m4p5uxRk6kEJUilmbQ1zJcQDRvRCV7pkxnqupZJxyjo="; 27 fetchSubmodules = true; 28 }; 29 30 strictDeps = true; 31 nativeBuildInputs = [ 32 cmake 33 ]; 34 35 buildInputs =
··· 1 { 2 lib, 3 stdenv, 4 + fetchFromGitea, 5 cmake, 6 + git, 7 + pkg-config, 8 boost, 9 eigen, 10 glm, ··· 19 20 stdenv.mkDerivation rec { 21 pname = "curv"; 22 + version = "0.5-unstable-2025-01-06"; 23 24 + src = fetchFromGitea { 25 + domain = "codeberg.org"; 26 + owner = "doug-moen"; 27 repo = "curv"; 28 + rev = "a496d98459b65d15feae8e69036944dafb7ec26e"; 29 + hash = "sha256-2pe76fBU78xRvHxol8O1xv0bBVwbpKDVPLQqqUCTO0Y="; 30 fetchSubmodules = true; 31 }; 32 33 strictDeps = true; 34 nativeBuildInputs = [ 35 cmake 36 + git 37 + pkg-config 38 ]; 39 40 buildInputs =
+1
pkgs/by-name/cy/cyrus-imapd/package.nix
··· 126 [ 127 zlib 128 cyrus_sasl 129 ] 130 # Darwin doesn't have libuuid, try to build without it 131 ++ lib.optional (!stdenv.hostPlatform.isDarwin) libuuid;
··· 126 [ 127 zlib 128 cyrus_sasl 129 + sqlite 130 ] 131 # Darwin doesn't have libuuid, try to build without it 132 ++ lib.optional (!stdenv.hostPlatform.isDarwin) libuuid;
+3 -3
pkgs/by-name/dd/ddns-go/package.nix
··· 6 7 buildGoModule rec { 8 pname = "ddns-go"; 9 - version = "6.7.7"; 10 11 src = fetchFromGitHub { 12 owner = "jeessy2"; 13 repo = pname; 14 rev = "v${version}"; 15 - hash = "sha256-MzhZ9u4noPLdtrbALi42GI9i+nb4rRdugMzd20rJ6b0="; 16 }; 17 18 - vendorHash = "sha256-e8/z1vriyHXPY1OvkGFqeZHJhz5ssOlqD/Uwt5xq8Uw="; 19 20 ldflags = [ 21 "-X main.version=${version}"
··· 6 7 buildGoModule rec { 8 pname = "ddns-go"; 9 + version = "6.8.0"; 10 11 src = fetchFromGitHub { 12 owner = "jeessy2"; 13 repo = pname; 14 rev = "v${version}"; 15 + hash = "sha256-zVNlsFPSLI8mXBUOo8z7nM4nShNd0ZwG5lZL2VyeGi8="; 16 }; 17 18 + vendorHash = "sha256-D66uremGVcTcyBlCA9vrQM5zGPFR96FqVak6tATEdI0="; 19 20 ldflags = [ 21 "-X main.version=${version}"
+2 -2
pkgs/by-name/ds/dsniff/package.nix
··· 71 domain = "salsa.debian.org"; 72 owner = "pkg-security-team"; 73 repo = "dsniff"; 74 - rev = "debian/${version}+debian-30"; 75 - sha256 = "1fk2k0sfdp5g27i11g0sbzm7al52raz5yr1aibzssnysv7l9xgzh"; 76 name = "dsniff.tar.gz"; 77 }; 78
··· 71 domain = "salsa.debian.org"; 72 owner = "pkg-security-team"; 73 repo = "dsniff"; 74 + rev = "debian/${version}+debian-34"; 75 + sha256 = "sha256-CY0+G09KZXtAwKuaYh5/qcmZjuNhdGis3zCG14hWtqw="; 76 name = "dsniff.tar.gz"; 77 }; 78
+51
pkgs/by-name/ff/ffizer/package.nix
···
··· 1 + { 2 + lib, 3 + rustPlatform, 4 + fetchFromGitHub, 5 + pkg-config, 6 + libgit2, 7 + openssl, 8 + zlib, 9 + }: 10 + 11 + rustPlatform.buildRustPackage rec { 12 + pname = "ffizer"; 13 + version = "2.13.1"; 14 + 15 + buildFeatures = [ "cli" ]; 16 + 17 + src = fetchFromGitHub { 18 + owner = "ffizer"; 19 + repo = "ffizer"; 20 + rev = version; 21 + hash = "sha256-ZX6Zv6ioAO33Cc5WCVBgJWlOmNvbVgckMylRnphpOdw="; 22 + }; 23 + 24 + cargoHash = "sha256-4fZLL4vQxAeyqQssmEd1C72fzMXCGHtUPCGpaVupy6Q="; 25 + 26 + nativeBuildInputs = [ 27 + pkg-config 28 + ]; 29 + 30 + buildInputs = [ 31 + libgit2 32 + openssl 33 + zlib 34 + ]; 35 + 36 + env.OPENSSL_NO_VENDOR = true; 37 + 38 + checkFlags = [ 39 + # requires internet access 40 + "--skip=run_test_samples_tests_data_template_2" 41 + ]; 42 + 43 + meta = { 44 + description = "Files and folders initializer / generator based on templates"; 45 + homepage = "https://github.com/ffizer/ffizer"; 46 + changelog = "https://github.com/ffizer/ffizer/blob/${src.rev}/CHANGELOG.md"; 47 + license = lib.licenses.cc0; 48 + maintainers = with lib.maintainers; [ XBagon ]; 49 + mainProgram = "ffizer"; 50 + }; 51 + }
+2
pkgs/by-name/gn/gnome-builder/package.nix
··· 142 gappsWrapperArgs+=( 143 # For sysprof-agent 144 --prefix PATH : "${sysprof}/bin" 145 ) 146 147 # Ensure that all plugins get their interpreter paths fixed up.
··· 142 gappsWrapperArgs+=( 143 # For sysprof-agent 144 --prefix PATH : "${sysprof}/bin" 145 + # libpanel icons 146 + --prefix XDG_DATA_DIRS : "${libpanel}/share" 147 ) 148 149 # Ensure that all plugins get their interpreter paths fixed up.
+3 -3
pkgs/by-name/go/gogup/package.nix
··· 6 7 buildGoModule rec { 8 pname = "gogup"; 9 - version = "0.27.5"; 10 11 src = fetchFromGitHub { 12 owner = "nao1215"; 13 repo = "gup"; 14 rev = "v${version}"; 15 - hash = "sha256-I4l/sDqafc/ZO8kKc4iOSMFLS0YZrAqRFOXn0N7Myo4="; 16 }; 17 18 - vendorHash = "sha256-rtdbPwVZHwofpGccYU8NBiaikzNMIwSDggbRdnGTBu8="; 19 doCheck = false; 20 21 ldflags = [
··· 6 7 buildGoModule rec { 8 pname = "gogup"; 9 + version = "0.27.6"; 10 11 src = fetchFromGitHub { 12 owner = "nao1215"; 13 repo = "gup"; 14 rev = "v${version}"; 15 + hash = "sha256-d+VN3BBhGiVdLpCHP08vi7lYSeL6QovswtPNvEbS9fc="; 16 }; 17 18 + vendorHash = "sha256-jvVtwA7563ptWat/YS8klRnG3+NO3PeW0vl17yt8q8M="; 19 doCheck = false; 20 21 ldflags = [
+4 -4
pkgs/by-name/go/goperf/package.nix
··· 9 10 buildGoModule rec { 11 pname = "goperf"; 12 - version = "0-unstable-2024-12-04"; 13 14 src = fetchgit { 15 url = "https://go.googlesource.com/perf"; 16 - rev = "711ff2ab72314f5a878a356d9ff7ab8460de731f"; 17 - hash = "sha256-T0LHlO9ObVJ68pERkY+6eJCxY+Lj9eHvOxlCRevwbuE="; 18 }; 19 20 - vendorHash = "sha256-OrrciJqJLTMM+yF9SD/eRucwOrfcZuuyR+xE6+DlYpo="; 21 22 passthru.updateScript = writeShellScript "update-goperf" '' 23 export UPDATE_NIX_ATTR_PATH=goperf
··· 9 10 buildGoModule rec { 11 pname = "goperf"; 12 + version = "0-unstable-2025-01-06"; 13 14 src = fetchgit { 15 url = "https://go.googlesource.com/perf"; 16 + rev = "400946f43c825f133ced1d2662be611959d1335c"; 17 + hash = "sha256-w7HUDDfsZ60ZNryewh83mJ6ZMfMpnvW6ehhijKss7B0="; 18 }; 19 20 + vendorHash = "sha256-WHkeLS8Sdq2oP7hD0MKVrcENclaOWTeSVCXm+aimqIU="; 21 22 passthru.updateScript = writeShellScript "update-goperf" '' 23 export UPDATE_NIX_ATTR_PATH=goperf
+67
pkgs/by-name/gr/greetd-mini-wl-greeter/package.nix
···
··· 1 + { 2 + fetchFromGitHub, 3 + lib, 4 + stdenv, 5 + unstableGitUpdater, 6 + cairo, 7 + glib, 8 + json_c, 9 + libGL, 10 + libepoxy, 11 + libpng, 12 + libxkbcommon, 13 + meson, 14 + ninja, 15 + pango, 16 + pkg-config, 17 + scdoc, 18 + wayland, 19 + wayland-protocols, 20 + wayland-scanner, 21 + }: 22 + stdenv.mkDerivation { 23 + pname = "greetd-mini-wl-greeter"; 24 + version = "0-unstable-2024-12-27"; 25 + 26 + src = fetchFromGitHub { 27 + owner = "philj56"; 28 + repo = "greetd-mini-wl-greeter"; 29 + rev = "61f25ed34a1a35a061c2f3605fc3d4b37a7d0d8e"; 30 + hash = "sha256-ifeQbzMA9O+yhLveTXpEmgG2BsSp4lxbd3yo8o69fxA="; 31 + }; 32 + 33 + nativeBuildInputs = [ 34 + libGL 35 + cairo 36 + glib 37 + json_c 38 + libepoxy 39 + libpng 40 + libxkbcommon 41 + pango 42 + wayland 43 + wayland-protocols 44 + wayland-scanner 45 + ]; 46 + 47 + # https://github.com/philj56/greetd-mini-wl-greeter/issues/2 48 + mesonBuildType = "release"; 49 + 50 + buildInputs = [ 51 + meson 52 + ninja 53 + pkg-config 54 + scdoc 55 + ]; 56 + 57 + passthru.updateScript = unstableGitUpdater { }; 58 + 59 + meta = { 60 + description = "Extremely minimal raw Wayland greeter for greetd"; 61 + license = lib.licenses.mit; 62 + homepage = "https://github.com/philj56/greetd-mini-wl-greeter"; 63 + mainProgram = "greetd-mini-wl-greeter"; 64 + platforms = lib.platforms.linux; 65 + maintainers = with lib.maintainers; [ _0x5a4 ]; 66 + }; 67 + }
+3 -12
pkgs/by-name/im/imhex/package.nix
··· 2 lib, 3 stdenv, 4 cmake, 5 - llvmPackages_17, 6 fetchFromGitHub, 7 mbedtls, 8 gtk3, ··· 24 nix-update-script, 25 autoPatchelfHook, 26 makeWrapper, 27 - overrideSDK, 28 }: 29 30 let 31 version = "1.36.2"; 32 patterns_version = "1.36.2"; 33 34 - llvmPackages = llvmPackages_17; 35 - 36 - stdenv' = 37 - let 38 - baseStdenv = if stdenv.cc.isClang then llvmPackages.stdenv else stdenv; 39 - in 40 - if stdenv.hostPlatform.isDarwin then overrideSDK baseStdenv "11.0" else baseStdenv; 41 - 42 patterns_src = fetchFromGitHub { 43 name = "ImHex-Patterns-source-${patterns_version}"; 44 owner = "WerWolv"; ··· 48 }; 49 50 in 51 - stdenv'.mkDerivation (finalAttrs: { 52 pname = "imhex"; 53 inherit version; 54 ··· 65 66 nativeBuildInputs = [ 67 cmake 68 - llvmPackages.llvm 69 python3 70 perl 71 pkg-config
··· 2 lib, 3 stdenv, 4 cmake, 5 + llvm, 6 fetchFromGitHub, 7 mbedtls, 8 gtk3, ··· 24 nix-update-script, 25 autoPatchelfHook, 26 makeWrapper, 27 }: 28 29 let 30 version = "1.36.2"; 31 patterns_version = "1.36.2"; 32 33 patterns_src = fetchFromGitHub { 34 name = "ImHex-Patterns-source-${patterns_version}"; 35 owner = "WerWolv"; ··· 39 }; 40 41 in 42 + stdenv.mkDerivation (finalAttrs: { 43 pname = "imhex"; 44 inherit version; 45 ··· 56 57 nativeBuildInputs = [ 58 cmake 59 + llvm 60 python3 61 perl 62 pkg-config
+3 -3
pkgs/by-name/ja/jawiki-all-titles-in-ns0/package.nix
··· 7 8 stdenvNoCC.mkDerivation { 9 pname = "jawiki-all-titles-in-ns0"; 10 - version = "0-unstable-2024-12-01"; 11 12 src = fetchFromGitHub { 13 owner = "musjj"; 14 repo = "jawiki-archive"; 15 - rev = "a4146faaca34c37a36f26e1e75990187cac40954"; 16 - hash = "sha256-FuLtXgyEpHZWeZbbrKXalXeycf7gtkfWMYoM7j2mOds="; 17 }; 18 19 installPhase = ''
··· 7 8 stdenvNoCC.mkDerivation { 9 pname = "jawiki-all-titles-in-ns0"; 10 + version = "0-unstable-2025-01-01"; 11 12 src = fetchFromGitHub { 13 owner = "musjj"; 14 repo = "jawiki-archive"; 15 + rev = "dbd1e032f8685387c0dbeb1a472ab9215250d11f"; 16 + hash = "sha256-2GjbXjsf8OV/9EuX675hBXTWQsf+KhKhh1IiAxbzqfU="; 17 }; 18 19 installPhase = ''
+3 -3
pkgs/by-name/jp/jp-zip-codes/package.nix
··· 7 8 stdenvNoCC.mkDerivation { 9 pname = "jp-zip-code"; 10 - version = "0-unstable-2024-12-01"; 11 12 # This package uses a mirror as the source because the 13 # original provider uses the same URL for updated content. 14 src = fetchFromGitHub { 15 owner = "musjj"; 16 repo = "jp-zip-codes"; 17 - rev = "94071d5f73bcea043694d1e9a557f6e526b44096"; 18 - hash = "sha256-RyXJZOwZmtW9vP0lEctE3t1DItBFOop7vdTi0IAH8E8="; 19 }; 20 21 installPhase = ''
··· 7 8 stdenvNoCC.mkDerivation { 9 pname = "jp-zip-code"; 10 + version = "0-unstable-2025-01-01"; 11 12 # This package uses a mirror as the source because the 13 # original provider uses the same URL for updated content. 14 src = fetchFromGitHub { 15 owner = "musjj"; 16 repo = "jp-zip-codes"; 17 + rev = "45aa11f1f60515893b0eb8f533f540632b394564"; 18 + hash = "sha256-qcP1lc5E1RS+n7e3hmZwaHtnf9ErOYprW+/w0r65ZuI="; 19 }; 20 21 installPhase = ''
+2 -2
pkgs/by-name/ju/justbuild/package.nix
··· 33 in 34 stdenv.mkDerivation rec { 35 pname = "justbuild"; 36 - version = "1.4.1"; 37 38 src = fetchFromGitHub { 39 owner = "just-buildsystem"; 40 repo = "justbuild"; 41 rev = "refs/tags/v${version}"; 42 - hash = "sha256-asbJdm50srMinr8sguGR3rWT7YXm75Zjm2Dvj53PpMc="; 43 }; 44 45 bazelapi = fetchurl {
··· 33 in 34 stdenv.mkDerivation rec { 35 pname = "justbuild"; 36 + version = "1.4.2"; 37 38 src = fetchFromGitHub { 39 owner = "just-buildsystem"; 40 repo = "justbuild"; 41 rev = "refs/tags/v${version}"; 42 + hash = "sha256-oMl+hY7E4vYB4J/5LXq6sw9bafYwhXY8lkEWwU6j0Fk="; 43 }; 44 45 bazelapi = fetchurl {
+2 -2
pkgs/by-name/k6/k6/package.nix
··· 8 9 buildGoModule rec { 10 pname = "k6"; 11 - version = "0.55.2"; 12 13 src = fetchFromGitHub { 14 owner = "grafana"; 15 repo = pname; 16 rev = "v${version}"; 17 - hash = "sha256-BuZsz5+vp4obL/Gj/gJSgA0xxdYmqd+MKggS62Jo+bM="; 18 }; 19 20 subPackages = [ "./" ];
··· 8 9 buildGoModule rec { 10 pname = "k6"; 11 + version = "0.56.0"; 12 13 src = fetchFromGitHub { 14 owner = "grafana"; 15 repo = pname; 16 rev = "v${version}"; 17 + hash = "sha256-QU/FJZqyodwUGxb3MjaQXIGWZSlrkxKe4bh6r/p7jrQ="; 18 }; 19 20 subPackages = [ "./" ];
+2 -2
pkgs/by-name/ke/keycloak/package.nix
··· 24 in 25 stdenv.mkDerivation rec { 26 pname = "keycloak"; 27 - version = "26.0.7"; 28 29 src = fetchzip { 30 url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; 31 - hash = "sha256-yIv9gAjCfzjWDLZHQbgGEjhMefY1idzZTEbqVyXjFdw="; 32 }; 33 34 nativeBuildInputs = [
··· 24 in 25 stdenv.mkDerivation rec { 26 pname = "keycloak"; 27 + version = "26.0.8"; 28 29 src = fetchzip { 30 url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; 31 + hash = "sha256-o4Yken4PlitebEBNI+BrQqYM+RtsURj0LvYFBSjuQIE="; 32 }; 33 34 nativeBuildInputs = [
+3 -3
pkgs/by-name/lo/lockbook-desktop/package.nix
··· 18 in 19 rustPlatform.buildRustPackage rec { 20 pname = "lockbook-desktop"; 21 - version = "0.9.15"; 22 23 src = fetchFromGitHub { 24 owner = "lockbook"; 25 repo = "lockbook"; 26 tag = version; 27 - hash = "sha256-hqBjA/6MWlhVjV4m+cIcnoRTApHuzbPzivMsaQHfRcc="; 28 }; 29 30 useFetchCargoVendor = true; 31 - cargoHash = "sha256-+M+wL26KDbLKhcujPyWAsTlXwLrQVCUbTnnu/7sXul4="; 32 33 nativeBuildInputs = [ 34 pkg-config
··· 18 in 19 rustPlatform.buildRustPackage rec { 20 pname = "lockbook-desktop"; 21 + version = "0.9.16"; 22 23 src = fetchFromGitHub { 24 owner = "lockbook"; 25 repo = "lockbook"; 26 tag = version; 27 + hash = "sha256-FHD84IJ2ahxB8L75xep+TSb8e+DtUsjEyHc6P/SFi9c="; 28 }; 29 30 useFetchCargoVendor = true; 31 + cargoHash = "sha256-z00WBA/51zmqFCBX1hD3dLKvuvxQvuyvtBGrxxAr7FE="; 32 33 nativeBuildInputs = [ 34 pkg-config
+3 -3
pkgs/by-name/lo/lockbook/package.nix
··· 7 }: 8 rustPlatform.buildRustPackage rec { 9 pname = "lockbook"; 10 - version = "0.9.15"; 11 12 src = fetchFromGitHub { 13 owner = "lockbook"; 14 repo = "lockbook"; 15 tag = version; 16 - hash = "sha256-hqBjA/6MWlhVjV4m+cIcnoRTApHuzbPzivMsaQHfRcc="; 17 }; 18 19 useFetchCargoVendor = true; 20 - cargoHash = "sha256-+M+wL26KDbLKhcujPyWAsTlXwLrQVCUbTnnu/7sXul4="; 21 22 doCheck = false; # there are no cli tests 23 cargoBuildFlags = [
··· 7 }: 8 rustPlatform.buildRustPackage rec { 9 pname = "lockbook"; 10 + version = "0.9.16"; 11 12 src = fetchFromGitHub { 13 owner = "lockbook"; 14 repo = "lockbook"; 15 tag = version; 16 + hash = "sha256-FHD84IJ2ahxB8L75xep+TSb8e+DtUsjEyHc6P/SFi9c="; 17 }; 18 19 useFetchCargoVendor = true; 20 + cargoHash = "sha256-z00WBA/51zmqFCBX1hD3dLKvuvxQvuyvtBGrxxAr7FE="; 21 22 doCheck = false; # there are no cli tests 23 cargoBuildFlags = [
+2 -2
pkgs/by-name/lz/lzlib/package.nix
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "lzlib"; 11 - version = "1.14"; 12 outputs = [ 13 "out" 14 "info" ··· 21 22 src = fetchurl { 23 url = "mirror://savannah/lzip/lzlib/lzlib-${finalAttrs.version}.tar.lz"; 24 - hash = "sha256-42LszNgtTdKX32pRuVLGXSFy+b9BpcRZDTYE2DqlGdM="; 25 # hash from release email 26 }; 27
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "lzlib"; 11 + version = "1.15"; 12 outputs = [ 13 "out" 14 "info" ··· 21 22 src = fetchurl { 23 url = "mirror://savannah/lzip/lzlib/lzlib-${finalAttrs.version}.tar.lz"; 24 + hash = "sha256-nUVIDnyBccZPodW+7iy9guaf6+kQ8M5ii4dqj+IUFTQ="; 25 # hash from release email 26 }; 27
+3 -3
pkgs/by-name/me/mercure/package.nix
··· 9 10 buildGoModule rec { 11 pname = "mercure"; 12 - version = "0.17.1"; 13 14 src = fetchFromGitHub { 15 owner = "dunglas"; 16 repo = "mercure"; 17 rev = "v${version}"; 18 - hash = "sha256-TRKlX4dNCvD9wBp+JNpmB9J1lt0Eyc0pQ/ucvtiDGto="; 19 }; 20 21 sourceRoot = "${src.name}/caddy"; 22 23 - vendorHash = "sha256-0tyvb11rBtrTbA+eAV1E5Y2tZeAwtrpONHBOLaVxuaQ="; 24 25 subPackages = [ "mercure" ]; 26 excludedPackages = [ "../cmd/mercure" ];
··· 9 10 buildGoModule rec { 11 pname = "mercure"; 12 + version = "0.18.1"; 13 14 src = fetchFromGitHub { 15 owner = "dunglas"; 16 repo = "mercure"; 17 rev = "v${version}"; 18 + hash = "sha256-BJVCVvz8AdkQwLD37oQc7YPaZ7l74o9Dik9u/ZBSRro="; 19 }; 20 21 sourceRoot = "${src.name}/caddy"; 22 23 + vendorHash = "sha256-QqG8rxGQW+Lmd2L+wKiKUV+GXcxoO04yhJhDvMqwTVc="; 24 25 subPackages = [ "mercure" ]; 26 excludedPackages = [ "../cmd/mercure" ];
+2 -2
pkgs/by-name/mq/mqtt-exporter/package.nix
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "mqtt-exporter"; 9 - version = "1.5.0"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "kpetremann"; 14 repo = "mqtt-exporter"; 15 tag = "v${version}"; 16 - hash = "sha256-3gUAiujfBXJpVailx8cMmSJS7l69XpE4UGK/aebcQqY="; 17 }; 18 19 pythonRelaxDeps = [ "prometheus-client" ];
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "mqtt-exporter"; 9 + version = "1.6.1"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "kpetremann"; 14 repo = "mqtt-exporter"; 15 tag = "v${version}"; 16 + hash = "sha256-XTgnD3H48KKclPhfmBPiWQPaJkfiBxjq2YQusOPLFJQ="; 17 }; 18 19 pythonRelaxDeps = [ "prometheus-client" ];
+1 -1
pkgs/by-name/my/mysql-workbench/dont-search-for-antlr-jar.patch
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index b7320bb..d7169da 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 @@ -143,25 +143,6 @@ check_function_exists (strtoull HAVE_STRTOULL)
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 + index 3dd3e19..4290041 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 @@ -143,25 +143,6 @@ check_function_exists (strtoull HAVE_STRTOULL)
+17 -17
pkgs/by-name/my/mysql-workbench/hardcode-paths.patch
··· 84 if to_spawn: 85 command += ' &' 86 - sudo_prefix += ' /usr/bin/nohup' 87 - + sudo_prefix += ' @nohup@' 88 89 # If as_user is the CURRENT then there's no need to sudo 90 if as_user != Users.CURRENT: ··· 102 def get_file_owner(self, path, as_user = Users.CURRENT, user_password = None): 103 if self.target_os == wbaOS.linux: 104 - command = 'LC_ALL=C stat -c %U ' 105 - + command = 'LC_ALL=C @stat@ -c %U ' 106 else: 107 - command = 'LC_ALL=C /usr/bin/stat -f "%Su" ' 108 - + command = 'LC_ALL=C @stat@ -f "%Su" ' 109 110 output = io.StringIO() 111 command = command + quote_path(path) ··· 114 raise PermissionDeniedError("Cannot set owner of directory %s" % path) 115 else: 116 - command = "/bin/mkdir %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 117 - + command = "@mkdir@ %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 118 else: 119 - command = "/bin/mkdir %s" % (quote_path(path)) 120 - + command = "@mkdir@ %s" % (quote_path(path)) 121 122 res = self.process_ops.exec_cmd(command, 123 as_user = as_user, ··· 126 def remove_directory(self, path, as_user = Users.CURRENT, user_password = None): 127 output = io.StringIO() 128 - res = self.process_ops.exec_cmd('/bin/rmdir ' + quote_path(path), 129 - + res = self.process_ops.exec_cmd('@rmdir@ ' + quote_path(path), 130 as_user = as_user, 131 user_password = user_password, 132 output_handler = output.write, ··· 135 def remove_directory_recursive(self, path, as_user = Users.CURRENT, user_password = None): 136 output = io.StringIO() 137 - res = self.process_ops.exec_cmd('/bin/rm -R ' + quote_path(path), 138 - + res = self.process_ops.exec_cmd('@rm@ -R ' + quote_path(path), 139 as_user = as_user, 140 user_password = user_password, 141 output_handler = output.write, ··· 144 def delete_file(self, path, as_user = Users.CURRENT, user_password = None): 145 output = io.StringIO() 146 - res = self.process_ops.exec_cmd("/bin/rm " + quote_path(path), 147 - + res = self.process_ops.exec_cmd("@rm@ " + quote_path(path), 148 as_user = as_user, 149 user_password = user_password, 150 output_handler = output.write, ··· 153 output = io.StringIO() 154 155 - res = self.process_ops.exec_cmd("LC_ALL=C /bin/cp " + quote_path(source) + " " + quote_path(dest), 156 - + res = self.process_ops.exec_cmd("LC_ALL=C @cp@ " + quote_path(source) + " " + quote_path(dest), 157 as_user = as_user, 158 user_password = user_password, 159 output_handler = output.write, ··· 162 # since both cases are possible, we need to handle both at the same time (1st line being total <nnnn> or not) 163 # the good news is that if the line is there, then it will always start with total, regardless of the locale 164 - command = 'LC_ALL=C /bin/ls -l -p %s' % quote_path(path) 165 - + command = 'LC_ALL=C @ls@ -l -p %s' % quote_path(path) 166 else: 167 - command = 'LC_ALL=C /bin/ls -1 -p %s' % quote_path(path) 168 - + command = 'LC_ALL=C @ls@ -1 -p %s' % quote_path(path) 169 170 output = io.StringIO() 171 res = self.process_ops.exec_cmd(command, ··· 174 f = io.StringIO() 175 if not self._need_sudo: 176 - ret = self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 177 - + ret = self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 178 else: 179 - ret = self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 180 - + ret = self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 181 182 if ret != 0: 183 raise RuntimeError("Could not get data from file %s" % self.path) ··· 186 def read_task(self, offset, file): 187 if not self._need_sudo: 188 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 189 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 190 else: 191 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 192 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 193 # this will signal the reader end that there's no more data 194 file.close() 195 ··· 198 f = io.StringIO() 199 if not self._need_sudo: 200 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 201 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 202 else: 203 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 204 - + self.server_helper.execute_command("@dd@ if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 205 self.data = f 206 self.data.seek(0) 207 if self.skip_first_newline:
··· 84 if to_spawn: 85 command += ' &' 86 - sudo_prefix += ' /usr/bin/nohup' 87 + + sudo_prefix += ' @coreutils@/bin/nohup' 88 89 # If as_user is the CURRENT then there's no need to sudo 90 if as_user != Users.CURRENT: ··· 102 def get_file_owner(self, path, as_user = Users.CURRENT, user_password = None): 103 if self.target_os == wbaOS.linux: 104 - command = 'LC_ALL=C stat -c %U ' 105 + + command = 'LC_ALL=C @coreutils@/bin/stat -c %U ' 106 else: 107 - command = 'LC_ALL=C /usr/bin/stat -f "%Su" ' 108 + + command = 'LC_ALL=C @coreutils@/bin/stat -f "%Su" ' 109 110 output = io.StringIO() 111 command = command + quote_path(path) ··· 114 raise PermissionDeniedError("Cannot set owner of directory %s" % path) 115 else: 116 - command = "/bin/mkdir %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 117 + + command = "@coreutils@/bin/mkdir %s && chown %s %s" % (quote_path(path), with_owner, quote_path(path)) 118 else: 119 - command = "/bin/mkdir %s" % (quote_path(path)) 120 + + command = "@coreutils@/bin/mkdir %s" % (quote_path(path)) 121 122 res = self.process_ops.exec_cmd(command, 123 as_user = as_user, ··· 126 def remove_directory(self, path, as_user = Users.CURRENT, user_password = None): 127 output = io.StringIO() 128 - res = self.process_ops.exec_cmd('/bin/rmdir ' + quote_path(path), 129 + + res = self.process_ops.exec_cmd('@coreutils@/bin/rmdir ' + quote_path(path), 130 as_user = as_user, 131 user_password = user_password, 132 output_handler = output.write, ··· 135 def remove_directory_recursive(self, path, as_user = Users.CURRENT, user_password = None): 136 output = io.StringIO() 137 - res = self.process_ops.exec_cmd('/bin/rm -R ' + quote_path(path), 138 + + res = self.process_ops.exec_cmd('@coreutils@/bin/rm -R ' + quote_path(path), 139 as_user = as_user, 140 user_password = user_password, 141 output_handler = output.write, ··· 144 def delete_file(self, path, as_user = Users.CURRENT, user_password = None): 145 output = io.StringIO() 146 - res = self.process_ops.exec_cmd("/bin/rm " + quote_path(path), 147 + + res = self.process_ops.exec_cmd("@coreutils@/bin/rm " + quote_path(path), 148 as_user = as_user, 149 user_password = user_password, 150 output_handler = output.write, ··· 153 output = io.StringIO() 154 155 - res = self.process_ops.exec_cmd("LC_ALL=C /bin/cp " + quote_path(source) + " " + quote_path(dest), 156 + + res = self.process_ops.exec_cmd("LC_ALL=C @coreutils@/bin/cp " + quote_path(source) + " " + quote_path(dest), 157 as_user = as_user, 158 user_password = user_password, 159 output_handler = output.write, ··· 162 # since both cases are possible, we need to handle both at the same time (1st line being total <nnnn> or not) 163 # the good news is that if the line is there, then it will always start with total, regardless of the locale 164 - command = 'LC_ALL=C /bin/ls -l -p %s' % quote_path(path) 165 + + command = 'LC_ALL=C @coreutils@/bin/ls -l -p %s' % quote_path(path) 166 else: 167 - command = 'LC_ALL=C /bin/ls -1 -p %s' % quote_path(path) 168 + + command = 'LC_ALL=C @coreutils@/bin/ls -1 -p %s' % quote_path(path) 169 170 output = io.StringIO() 171 res = self.process_ops.exec_cmd(command, ··· 174 f = io.StringIO() 175 if not self._need_sudo: 176 - ret = self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 177 + + ret = self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 178 else: 179 - ret = self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 180 + + ret = self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i count=%i 2> /dev/null" % (quote_path(self.path), start, end-start), as_user = Users.ADMIN, user_password=self.get_password, output_handler=f.write) 181 182 if ret != 0: 183 raise RuntimeError("Could not get data from file %s" % self.path) ··· 186 def read_task(self, offset, file): 187 if not self._need_sudo: 188 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 189 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=file.write) 190 else: 191 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 192 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self.get_password, output_handler=file.write) 193 # this will signal the reader end that there's no more data 194 file.close() 195 ··· 198 f = io.StringIO() 199 if not self._need_sudo: 200 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 201 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.CURRENT, user_password=None, output_handler=f.write) 202 else: 203 - self.server_helper.execute_command("/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 204 + + self.server_helper.execute_command("@coreutils@/bin/dd if=%s ibs=1 skip=%i 2> /dev/null" % (quote_path(self.path), offset), as_user = Users.ADMIN, user_password=self._password, output_handler=f.write) 205 self.data = f 206 self.data.seek(0) 207 if self.skip_first_newline:
+1 -10
pkgs/by-name/my/mysql-workbench/package.nix
··· 46 }; 47 }); 48 49 - getCoreExe = lib.getExe' coreutils; 50 - 51 inherit (python3Packages) paramiko pycairo pyodbc; 52 in 53 stdenv.mkDerivation (finalAttrs: { ··· 63 (replaceVars ./hardcode-paths.patch { 64 bash = lib.getExe bash; 65 catchsegv = lib.getExe' glibc "catchsegv"; 66 - cp = getCoreExe "cp"; 67 - dd = getCoreExe "dd"; 68 - ls = getCoreExe "ls"; 69 - mkdir = getCoreExe "mkdir"; 70 - nohup = getCoreExe "nohup"; 71 - rm = getCoreExe "rm"; 72 - rmdir = getCoreExe "rmdir"; 73 - stat = getCoreExe "stat"; 74 sudo = lib.getExe sudo; 75 }) 76
··· 46 }; 47 }); 48 49 inherit (python3Packages) paramiko pycairo pyodbc; 50 in 51 stdenv.mkDerivation (finalAttrs: { ··· 61 (replaceVars ./hardcode-paths.patch { 62 bash = lib.getExe bash; 63 catchsegv = lib.getExe' glibc "catchsegv"; 64 + coreutils = lib.getBin coreutils; 65 sudo = lib.getExe sudo; 66 }) 67
+3 -3
pkgs/by-name/n8/n8n/package.nix
··· 16 17 stdenv.mkDerivation (finalAttrs: { 18 pname = "n8n"; 19 - version = "1.72.1"; 20 21 src = fetchFromGitHub { 22 owner = "n8n-io"; 23 repo = "n8n"; 24 tag = "n8n@${finalAttrs.version}"; 25 - hash = "sha256-GIA2y81nuKWe1zuZQ99oczQtQWStyT1Qh3bZ1oe8me4="; 26 }; 27 28 pnpmDeps = pnpm.fetchDeps { 29 inherit (finalAttrs) pname version src; 30 - hash = "sha256-riuN7o+uUXS5G7fMgE7cZhGWHZtGwSHm4CP7G46R5Cw="; 31 }; 32 33 nativeBuildInputs = [
··· 16 17 stdenv.mkDerivation (finalAttrs: { 18 pname = "n8n"; 19 + version = "1.73.1"; 20 21 src = fetchFromGitHub { 22 owner = "n8n-io"; 23 repo = "n8n"; 24 tag = "n8n@${finalAttrs.version}"; 25 + hash = "sha256-gPdJKVOZlizdS0o+2nBgCImnIhtHzRjE2xk0zJA52go="; 26 }; 27 28 pnpmDeps = pnpm.fetchDeps { 29 inherit (finalAttrs) pname version src; 30 + hash = "sha256-Am9R2rfQiw1IPd22/UraqzEqvVeB5XuSrrLSYXWsWfU="; 31 }; 32 33 nativeBuildInputs = [
+3 -3
pkgs/by-name/ni/nixos-facter/package.nix
··· 24 in 25 buildGoModule rec { 26 pname = "nixos-facter"; 27 - version = "0.3.0"; 28 29 src = fetchFromGitHub { 30 owner = "numtide"; 31 repo = "nixos-facter"; 32 rev = "v${version}"; 33 - hash = "sha256-T7x9xU/Tr2BKfrHQHrP6Mm6rNUWYASjEPzHIKgyS7aE="; 34 }; 35 36 - vendorHash = "sha256-qDzd+aq08PN9kl1YkvNLGvWaFVh7xFXJhGdx/ELwYGY="; 37 38 env.CGO_ENABLED = 1; 39
··· 24 in 25 buildGoModule rec { 26 pname = "nixos-facter"; 27 + version = "0.3.1"; 28 29 src = fetchFromGitHub { 30 owner = "numtide"; 31 repo = "nixos-facter"; 32 rev = "v${version}"; 33 + hash = "sha256-HJt6FEQbzwlVMow47p1DtqXdmCxLYA6g3D1EgGnKcUo="; 34 }; 35 36 + vendorHash = "sha256-WCItbRbGgclXGtJyHCkDgaPe3Mobe4mT/4c16AEdF5o="; 37 38 env.CGO_ENABLED = 1; 39
+43 -4
pkgs/by-name/ni/nixos-render-docs/src/nixos_render_docs/options.py
··· 21 from .manpage import ManpageRenderer, man_escape 22 from .manual_structure import make_xml_id, XrefTarget 23 from .md import Converter, md_escape, md_make_code 24 - from .types import OptionLoc, Option, RenderedOption 25 26 def option_is(option: Option, key: str, typ: str) -> Optional[dict[str, str]]: 27 if key not in option: ··· 317 318 class CommonMarkConverter(BaseConverter[OptionsCommonMarkRenderer]): 319 __option_block_separator__ = "" 320 321 - def __init__(self, manpage_urls: Mapping[str, str], revision: str): 322 super().__init__(revision) 323 self._renderer = OptionsCommonMarkRenderer(manpage_urls) 324 325 def _parallel_render_prepare(self) -> Any: 326 return (self._renderer._manpage_urls, self._revision) ··· 342 def _decl_def_footer(self) -> list[str]: 343 return [] 344 345 def finalize(self) -> str: 346 result = [] 347 348 for (name, opt) in self._sorted_options(): 349 - result.append(f"## {md_escape(name)}\n") 350 result += opt.lines 351 result.append("\n\n") 352 ··· 490 p.add_argument("infile") 491 p.add_argument("outfile") 492 493 def _build_cli_commonmark(p: argparse.ArgumentParser) -> None: 494 p.add_argument('--manpage-urls', required=True) 495 p.add_argument('--revision', required=True) 496 p.add_argument("infile") 497 p.add_argument("outfile") 498 ··· 527 528 def _run_cli_commonmark(args: argparse.Namespace) -> None: 529 with open(args.manpage_urls, 'r') as manpage_urls: 530 - md = CommonMarkConverter(json.load(manpage_urls), revision = args.revision) 531 532 with open(args.infile, 'r') as f: 533 md.add_options(json.load(f))
··· 21 from .manpage import ManpageRenderer, man_escape 22 from .manual_structure import make_xml_id, XrefTarget 23 from .md import Converter, md_escape, md_make_code 24 + from .types import OptionLoc, Option, RenderedOption, AnchorStyle 25 26 def option_is(option: Option, key: str, typ: str) -> Optional[dict[str, str]]: 27 if key not in option: ··· 317 318 class CommonMarkConverter(BaseConverter[OptionsCommonMarkRenderer]): 319 __option_block_separator__ = "" 320 + _anchor_style: AnchorStyle 321 + _anchor_prefix: str 322 323 + 324 + def __init__(self, manpage_urls: Mapping[str, str], revision: str, anchor_style: AnchorStyle = AnchorStyle.NONE, anchor_prefix: str = ""): 325 super().__init__(revision) 326 self._renderer = OptionsCommonMarkRenderer(manpage_urls) 327 + self._anchor_style = anchor_style 328 + self._anchor_prefix = anchor_prefix 329 330 def _parallel_render_prepare(self) -> Any: 331 return (self._renderer._manpage_urls, self._revision) ··· 347 def _decl_def_footer(self) -> list[str]: 348 return [] 349 350 + def _make_anchor_suffix(self, loc: list[str]) -> str: 351 + if self._anchor_style == AnchorStyle.NONE: 352 + return "" 353 + elif self._anchor_style == AnchorStyle.LEGACY: 354 + sanitized = ".".join(map(make_xml_id, loc)) 355 + return f" {{#{self._anchor_prefix}{sanitized}}}" 356 + else: 357 + raise RuntimeError("unhandled anchor style", self._anchor_style) 358 + 359 def finalize(self) -> str: 360 result = [] 361 362 for (name, opt) in self._sorted_options(): 363 + anchor_suffix = self._make_anchor_suffix(opt.loc) 364 + result.append(f"## {md_escape(name)}{anchor_suffix}\n") 365 result += opt.lines 366 result.append("\n\n") 367 ··· 505 p.add_argument("infile") 506 p.add_argument("outfile") 507 508 + def parse_anchor_style(value: str|AnchorStyle) -> AnchorStyle: 509 + if isinstance(value, AnchorStyle): 510 + # Used by `argparse.add_argument`'s `default` 511 + return value 512 + try: 513 + return AnchorStyle(value.lower()) 514 + except ValueError: 515 + raise argparse.ArgumentTypeError(f"Invalid value {value}\nExpected one of {', '.join(style.value for style in AnchorStyle)}") 516 + 517 def _build_cli_commonmark(p: argparse.ArgumentParser) -> None: 518 p.add_argument('--manpage-urls', required=True) 519 p.add_argument('--revision', required=True) 520 + p.add_argument( 521 + '--anchor-style', 522 + required=False, 523 + default=AnchorStyle.NONE.value, 524 + choices = [style.value for style in AnchorStyle], 525 + help = "(default: %(default)s) Anchor style to use for links to options. \nOnly none is standard CommonMark." 526 + ) 527 + p.add_argument('--anchor-prefix', 528 + required=False, 529 + default="", 530 + help="(default: no prefix) String to prepend to anchor ids. Not used when anchor style is none." 531 + ) 532 p.add_argument("infile") 533 p.add_argument("outfile") 534 ··· 563 564 def _run_cli_commonmark(args: argparse.Namespace) -> None: 565 with open(args.manpage_urls, 'r') as manpage_urls: 566 + md = CommonMarkConverter(json.load(manpage_urls), 567 + revision = args.revision, 568 + anchor_style = parse_anchor_style(args.anchor_style), 569 + anchor_prefix = args.anchor_prefix) 570 571 with open(args.infile, 'r') as f: 572 md.add_options(json.load(f))
+5
pkgs/by-name/ni/nixos-render-docs/src/nixos_render_docs/types.py
··· 1 from collections.abc import Sequence 2 from typing import Callable, Optional, NamedTuple 3 4 from markdown_it.token import Token ··· 12 links: Optional[list[str]] = None 13 14 RenderFn = Callable[[Token, Sequence[Token], int], str]
··· 1 from collections.abc import Sequence 2 + from enum import Enum 3 from typing import Callable, Optional, NamedTuple 4 5 from markdown_it.token import Token ··· 13 links: Optional[list[str]] = None 14 15 RenderFn = Callable[[Token, Sequence[Token], int], str] 16 + 17 + class AnchorStyle(Enum): 18 + NONE = "none" 19 + LEGACY = "legacy"
+17
pkgs/by-name/ni/nixos-render-docs/src/tests/sample_options_simple.json
···
··· 1 + { 2 + "services.frobnicator.types.<name>.enable": { 3 + "declarations": [ 4 + "nixos/modules/services/frobnicator.nix" 5 + ], 6 + "description": "Whether to enable the frobnication of this (`<name>`) type.", 7 + "loc": [ 8 + "services", 9 + "frobnicator", 10 + "types", 11 + "<name>", 12 + "enable" 13 + ], 14 + "readOnly": false, 15 + "type": "boolean" 16 + } 17 + }
+13
pkgs/by-name/ni/nixos-render-docs/src/tests/sample_options_simple_default.md
···
··· 1 + ## services\.frobnicator\.types\.\<name>\.enable 2 + 3 + Whether to enable the frobnication of this (` <name> `) type\. 4 + 5 + 6 + 7 + *Type:* 8 + boolean 9 + 10 + *Declared by:* 11 + - [\<nixpkgs/nixos/modules/services/frobnicator\.nix>](https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/frobnicator.nix) 12 + 13 +
+13
pkgs/by-name/ni/nixos-render-docs/src/tests/sample_options_simple_legacy.md
···
··· 1 + ## services\.frobnicator\.types\.\<name>\.enable {#opt-services.frobnicator.types._name_.enable} 2 + 3 + Whether to enable the frobnication of this (` <name> `) type\. 4 + 5 + 6 + 7 + *Type:* 8 + boolean 9 + 10 + *Declared by:* 11 + - [\<nixpkgs/nixos/modules/services/frobnicator\.nix>](https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/frobnicator.nix) 12 + 13 +
+27
pkgs/by-name/ni/nixos-render-docs/src/tests/test_options.py
··· 1 import nixos_render_docs 2 3 from markdown_it.token import Token 4 import pytest 5 6 def test_option_headings() -> None: ··· 12 type='heading_open', tag='h1', nesting=1, attrs={}, map=[0, 1], level=0, children=None, 13 content='', markup='#', info='', meta={}, block=True, hidden=False 14 )
··· 1 import nixos_render_docs 2 + from nixos_render_docs.options import AnchorStyle 3 4 + import json 5 from markdown_it.token import Token 6 + from pathlib import Path 7 import pytest 8 9 def test_option_headings() -> None: ··· 15 type='heading_open', tag='h1', nesting=1, attrs={}, map=[0, 1], level=0, children=None, 16 content='', markup='#', info='', meta={}, block=True, hidden=False 17 ) 18 + 19 + def test_options_commonmark() -> None: 20 + c = nixos_render_docs.options.CommonMarkConverter({}, 'local') 21 + with Path('tests/sample_options_simple.json').open() as f: 22 + opts = json.load(f) 23 + assert opts is not None 24 + with Path('tests/sample_options_simple_default.md').open() as f: 25 + expected = f.read() 26 + 27 + c.add_options(opts) 28 + s = c.finalize() 29 + assert s == expected 30 + 31 + def test_options_commonmark_legacy_anchors() -> None: 32 + c = nixos_render_docs.options.CommonMarkConverter({}, 'local', anchor_style = AnchorStyle.LEGACY, anchor_prefix = 'opt-') 33 + with Path('tests/sample_options_simple.json').open() as f: 34 + opts = json.load(f) 35 + assert opts is not None 36 + with Path('tests/sample_options_simple_legacy.md').open() as f: 37 + expected = f.read() 38 + 39 + c.add_options(opts) 40 + s = c.finalize() 41 + assert s == expected
+4 -2
pkgs/by-name/op/opencomposite/package.nix
··· 26 hash = "sha256-SV8E+4qu5J7MueHmdsdTDKNx4CH085fidgIJyewj8RQ="; 27 }; 28 29 - nativeBuildInputs = [ cmake ]; 30 31 buildInputs = [ 32 glm 33 jsoncpp 34 libGL 35 - python3 36 vulkan-headers 37 vulkan-loader 38 xorg.libX11
··· 26 hash = "sha256-SV8E+4qu5J7MueHmdsdTDKNx4CH085fidgIJyewj8RQ="; 27 }; 28 29 + nativeBuildInputs = [ 30 + cmake 31 + python3 32 + ]; 33 34 buildInputs = [ 35 glm 36 jsoncpp 37 libGL 38 vulkan-headers 39 vulkan-loader 40 xorg.libX11
+2 -2
pkgs/by-name/p2/p2pool/package.nix
··· 20 in 21 stdenv.mkDerivation rec { 22 pname = "p2pool"; 23 - version = "4.2"; 24 25 src = fetchFromGitHub { 26 owner = "SChernykh"; 27 repo = "p2pool"; 28 rev = "v${version}"; 29 - hash = "sha256-zowRQeFrT0sY9L5XJQ10f8tRnEchjKVdBixtPbAQyvo="; 30 fetchSubmodules = true; 31 }; 32
··· 20 in 21 stdenv.mkDerivation rec { 22 pname = "p2pool"; 23 + version = "4.3"; 24 25 src = fetchFromGitHub { 26 owner = "SChernykh"; 27 repo = "p2pool"; 28 rev = "v${version}"; 29 + hash = "sha256-PHrmTkmpYOPKx9q+/mhjr8MIbFqmljKs2F26tqyCzcE="; 30 fetchSubmodules = true; 31 }; 32
+1
pkgs/by-name/pi/pigz/package.nix
··· 40 meta = with lib; { 41 homepage = "https://www.zlib.net/pigz/"; 42 description = "Parallel implementation of gzip for multi-core machines"; 43 maintainers = [ ]; 44 license = licenses.zlib; 45 platforms = platforms.unix;
··· 40 meta = with lib; { 41 homepage = "https://www.zlib.net/pigz/"; 42 description = "Parallel implementation of gzip for multi-core machines"; 43 + mainProgram = "pigz"; 44 maintainers = [ ]; 45 license = licenses.zlib; 46 platforms = platforms.unix;
+5 -2
pkgs/by-name/po/poptracker/package.nix
··· 12 makeWrapper, 13 makeDesktopItem, 14 copyDesktopItems, 15 }: 16 17 stdenv.mkDerivation (finalAttrs: { 18 pname = "poptracker"; 19 - version = "0.27.0"; 20 21 src = fetchFromGitHub { 22 owner = "black-sliver"; 23 repo = "PopTracker"; 24 rev = "v${finalAttrs.version}"; 25 - hash = "sha256-Tz3rVbaHw5RfFKuLih4BEEnn3uNeLrtDQpBD2yYUzkM="; 26 fetchSubmodules = true; 27 }; 28 29 patches = [ ./assets-path.diff ]; 30
··· 12 makeWrapper, 13 makeDesktopItem, 14 copyDesktopItems, 15 + nix-update-script, 16 }: 17 18 stdenv.mkDerivation (finalAttrs: { 19 pname = "poptracker"; 20 + version = "0.29.0"; 21 22 src = fetchFromGitHub { 23 owner = "black-sliver"; 24 repo = "PopTracker"; 25 rev = "v${finalAttrs.version}"; 26 + hash = "sha256-rkEaq8YLt0NhspXVgEqZ/9FF7GDlTU5fKgWGXeA6UX4="; 27 fetchSubmodules = true; 28 }; 29 + 30 + passthru.updateScript = nix-update-script { }; 31 32 patches = [ ./assets-path.diff ]; 33
+4 -4
pkgs/by-name/re/readarr/package.nix
··· 24 ."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 25 hash = 26 { 27 - x64-linux_hash = "sha256-ijBsMc/37cpw1WJ36vIUm1d0wzHjpTsBX9mZRkL91BU="; 28 - arm64-linux_hash = "sha256-oTA1O6M/P7kGI/YCoWzTw6kvmMg+QGhpn/jWrOc4rug="; 29 - x64-osx_hash = "sha256-ZAZ0Y5O64llljc/NjnOHynEP7wXB/U4J5T1n5Pe+2A4="; 30 } 31 ."${arch}-${os}_hash"; 32 in 33 stdenv.mkDerivation rec { 34 pname = "readarr"; 35 - version = "0.4.6.2711"; 36 37 src = fetchurl { 38 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
··· 24 ."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 25 hash = 26 { 27 + x64-linux_hash = "sha256-dYYvrsYR+xsS9N/btJPCaCg4mS2UVgZs5FaBbWU4ytM="; 28 + arm64-linux_hash = "sha256-Vfdq6Mngr3Cbq844Upq84k6gH0SnbpdPK0dU7LBnJO8="; 29 + x64-osx_hash = "sha256-7mtnnbEQ+70qY5iSfX7pDUYPqKQG2JdzGRFgm1CEhs4="; 30 } 31 ."${arch}-${os}_hash"; 32 in 33 stdenv.mkDerivation rec { 34 pname = "readarr"; 35 + version = "0.4.8.2726"; 36 37 src = fetchurl { 38 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
+903 -284
pkgs/by-name/re/recordbox/Cargo.lock
··· 1 # This file is automatically @generated by Cargo. 2 # It is not intended for manual editing. 3 - version = 3 4 5 [[package]] 6 name = "adler2" ··· 46 47 [[package]] 48 name = "ashpd" 49 - version = "0.9.2" 50 source = "registry+https://github.com/rust-lang/crates.io-index" 51 - checksum = "4d43c03d9e36dd40cab48435be0b09646da362c278223ca535493877b2c1dee9" 52 dependencies = [ 53 "async-fs", 54 "async-net", ··· 59 "serde", 60 "serde_repr", 61 "url", 62 - "zbus", 63 ] 64 65 [[package]] 66 name = "async-broadcast" 67 - version = "0.7.1" 68 source = "registry+https://github.com/rust-lang/crates.io-index" 69 - checksum = "20cd0e2e25ea8e5f7e9df04578dc6cf5c83577fd09b1a46aaf5c85e1c33f2a7e" 70 dependencies = [ 71 - "event-listener", 72 "event-listener-strategy", 73 "futures-core", 74 "pin-project-lite", ··· 76 77 [[package]] 78 name = "async-channel" 79 version = "2.3.1" 80 source = "registry+https://github.com/rust-lang/crates.io-index" 81 checksum = "89b47800b0be77592da0afd425cc03468052844aff33b84e33cc696f64e77b6a" ··· 111 ] 112 113 [[package]] 114 name = "async-io" 115 - version = "2.3.4" 116 source = "registry+https://github.com/rust-lang/crates.io-index" 117 - checksum = "444b0228950ee6501b3568d3c93bf1176a1fdbc3b758dcd9475046d30f4dc7e8" 118 dependencies = [ 119 "async-lock", 120 "cfg-if", ··· 135 source = "registry+https://github.com/rust-lang/crates.io-index" 136 checksum = "ff6e472cdea888a4bd64f342f09b3f50e1886d32afe8df3d663c01140b811b18" 137 dependencies = [ 138 - "event-listener", 139 "event-listener-strategy", 140 "pin-project-lite", 141 ] ··· 157 source = "registry+https://github.com/rust-lang/crates.io-index" 158 checksum = "63255f1dc2381611000436537bbedfe83183faa303a5a0edaf191edef06526bb" 159 dependencies = [ 160 - "async-channel", 161 "async-io", 162 "async-lock", 163 "async-signal", 164 "async-task", 165 "blocking", 166 "cfg-if", 167 - "event-listener", 168 "futures-lite", 169 "rustix", 170 "tracing", ··· 200 ] 201 202 [[package]] 203 name = "async-task" 204 version = "4.7.1" 205 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 235 checksum = "ace50bade8e6234aa140d9a2f552bbee1db4d353f69b8217bc503490fc1a9f26" 236 237 [[package]] 238 name = "bitflags" 239 version = "1.3.2" 240 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 267 source = "registry+https://github.com/rust-lang/crates.io-index" 268 checksum = "703f41c54fc768e63e091340b424302bb1c29ef4aa0c7f10fe849dfb114d29ea" 269 dependencies = [ 270 - "async-channel", 271 "async-task", 272 "futures-io", 273 "futures-lite", ··· 282 283 [[package]] 284 name = "bytemuck" 285 - version = "1.19.0" 286 source = "registry+https://github.com/rust-lang/crates.io-index" 287 - checksum = "8334215b81e418a0a7bdb8ef0849474f40bb10c8b71f1c4ed315cff49f32494d" 288 289 [[package]] 290 name = "byteorder" ··· 293 checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" 294 295 [[package]] 296 name = "cairo-rs" 297 - version = "0.20.5" 298 source = "registry+https://github.com/rust-lang/crates.io-index" 299 - checksum = "d7fa699e1d7ae691001a811dda5ef0e3e42e1d4119b26426352989df9e94e3e6" 300 dependencies = [ 301 "bitflags 2.6.0", 302 "cairo-sys-rs", ··· 306 307 [[package]] 308 name = "cairo-sys-rs" 309 - version = "0.20.0" 310 source = "registry+https://github.com/rust-lang/crates.io-index" 311 - checksum = "428290f914b9b86089f60f5d8a9f6e440508e1bcff23b25afd51502b0a2da88f" 312 dependencies = [ 313 "glib-sys", 314 "libc", ··· 317 318 [[package]] 319 name = "cc" 320 - version = "1.1.35" 321 source = "registry+https://github.com/rust-lang/crates.io-index" 322 - checksum = "0f57c4b4da2a9d619dd035f27316d7a426305b75be93d09e92f2b9229c34feaf" 323 dependencies = [ 324 "shlex", 325 ] 326 327 [[package]] 328 name = "cfg-expr" 329 - version = "0.17.0" 330 source = "registry+https://github.com/rust-lang/crates.io-index" 331 - checksum = "d0890061c4d3223e7267f3bad2ec40b997d64faac1c2815a4a9d95018e2b9e9c" 332 dependencies = [ 333 "smallvec", 334 "target-lexicon", ··· 348 349 [[package]] 350 name = "chrono" 351 - version = "0.4.38" 352 source = "registry+https://github.com/rust-lang/crates.io-index" 353 - checksum = "a21f936df1771bf62b77f047b726c4625ff2e8aa607c01ec06e5a05bd8463401" 354 dependencies = [ 355 "android-tzdata", 356 "iana-time-zone", 357 "num-traits", 358 - "windows-targets 0.52.6", 359 ] 360 361 [[package]] ··· 390 391 [[package]] 392 name = "cpufeatures" 393 - version = "0.2.14" 394 source = "registry+https://github.com/rust-lang/crates.io-index" 395 - checksum = "608697df725056feaccfa42cffdaeeec3fccc4ffc38358ecd19b243e716a78e0" 396 dependencies = [ 397 "libc", 398 ] ··· 408 409 [[package]] 410 name = "crossbeam-channel" 411 - version = "0.5.13" 412 source = "registry+https://github.com/rust-lang/crates.io-index" 413 - checksum = "33480d6946193aa8033910124896ca395333cae7e2d1113d1fef6c3272217df2" 414 dependencies = [ 415 "crossbeam-utils", 416 ] 417 418 [[package]] 419 name = "crossbeam-utils" 420 - version = "0.8.20" 421 source = "registry+https://github.com/rust-lang/crates.io-index" 422 - checksum = "22ec99545bb0ed0ea7bb9b8e1e9122ea386ff8a48c0922e43f36d45ab09e0e80" 423 424 [[package]] 425 name = "crypto-common" ··· 499 500 [[package]] 501 name = "errno" 502 - version = "0.3.9" 503 source = "registry+https://github.com/rust-lang/crates.io-index" 504 - checksum = "534c5cf6194dfab3db3242765c03bbe257cf92f22b38f6bc0c58d59108a820ba" 505 dependencies = [ 506 "libc", 507 - "windows-sys 0.52.0", 508 ] 509 510 [[package]] 511 name = "event-listener" 512 version = "5.3.1" 513 source = "registry+https://github.com/rust-lang/crates.io-index" 514 checksum = "6032be9bd27023a771701cc49f9f053c751055f71efb2e0ae5c15809093675ba" ··· 520 521 [[package]] 522 name = "event-listener-strategy" 523 - version = "0.5.2" 524 source = "registry+https://github.com/rust-lang/crates.io-index" 525 - checksum = "0f214dc438f977e6d4e3500aaa277f5ad94ca83fbbd9b1a15713ce2344ccc5a1" 526 dependencies = [ 527 - "event-listener", 528 "pin-project-lite", 529 ] 530 ··· 542 543 [[package]] 544 name = "fastrand" 545 - version = "2.1.1" 546 source = "registry+https://github.com/rust-lang/crates.io-index" 547 - checksum = "e8c02a5121d4ea3eb16a80748c74f5549a5665e4c21333c6098f283870fbdea6" 548 549 [[package]] 550 name = "field-offset" ··· 579 580 [[package]] 581 name = "flate2" 582 - version = "1.0.34" 583 source = "registry+https://github.com/rust-lang/crates.io-index" 584 - checksum = "a1b589b4dc103969ad3cf85c950899926ec64300a1a46d76c03a6072957036f0" 585 dependencies = [ 586 "crc32fast", 587 "miniz_oxide", ··· 589 590 [[package]] 591 name = "flexi_logger" 592 - version = "0.29.6" 593 source = "registry+https://github.com/rust-lang/crates.io-index" 594 - checksum = "d26948e37cfcb1f2c2cd38e0602d3a8ab6b9472c0c6eff4516fc8def9a3124d7" 595 dependencies = [ 596 "chrono", 597 "log", 598 "nu-ansi-term", 599 "regex", 600 - "thiserror", 601 ] 602 603 [[package]] ··· 608 dependencies = [ 609 "percent-encoding", 610 ] 611 - 612 - [[package]] 613 - name = "formatx" 614 - version = "0.2.2" 615 - source = "registry+https://github.com/rust-lang/crates.io-index" 616 - checksum = "db0f0c49aba98a3b2578315766960bd242885ff672fd62610c5557cd6c6efe03" 617 618 [[package]] 619 name = "fsevent-sys" ··· 674 675 [[package]] 676 name = "futures-lite" 677 - version = "2.4.0" 678 source = "registry+https://github.com/rust-lang/crates.io-index" 679 - checksum = "3f1fa2f9765705486b33fd2acf1577f8ec449c2ba1f318ae5447697b7c08d210" 680 dependencies = [ 681 "fastrand", 682 "futures-core", ··· 727 ] 728 729 [[package]] 730 name = "gdk-pixbuf" 731 - version = "0.20.4" 732 source = "registry+https://github.com/rust-lang/crates.io-index" 733 - checksum = "c4c29071a9e92337d8270a85cb0510cda4ac478be26d09ad027cc1d081911b19" 734 dependencies = [ 735 "gdk-pixbuf-sys", 736 "gio", ··· 740 741 [[package]] 742 name = "gdk-pixbuf-sys" 743 - version = "0.20.4" 744 source = "registry+https://github.com/rust-lang/crates.io-index" 745 - checksum = "687343b059b91df5f3fbd87b4307038fa9e647fcc0461d0d3f93e94fee20bf3d" 746 dependencies = [ 747 "gio-sys", 748 "glib-sys", ··· 753 754 [[package]] 755 name = "gdk4" 756 - version = "0.9.3" 757 source = "registry+https://github.com/rust-lang/crates.io-index" 758 - checksum = "d3fb4af2d606b0ac4e81f982f0d064bcb71ca73859ce5f30475f7eb2e2be4bc3" 759 dependencies = [ 760 "cairo-rs", 761 "gdk-pixbuf", ··· 768 769 [[package]] 770 name = "gdk4-sys" 771 - version = "0.9.3" 772 source = "registry+https://github.com/rust-lang/crates.io-index" 773 - checksum = "3642625b384ad43c006871462e6c498488b503dbf219542591f4ddf0f5f2032b" 774 dependencies = [ 775 "cairo-sys-rs", 776 "gdk-pixbuf-sys", ··· 826 827 [[package]] 828 name = "gio" 829 - version = "0.20.5" 830 source = "registry+https://github.com/rust-lang/crates.io-index" 831 - checksum = "d8569975884fdfdbed536b682448fbd8c70bafbd69cac2d45eb1a7a372702241" 832 dependencies = [ 833 "futures-channel", 834 "futures-core", ··· 843 844 [[package]] 845 name = "gio-sys" 846 - version = "0.20.5" 847 source = "registry+https://github.com/rust-lang/crates.io-index" 848 - checksum = "217f464cad5946ae4369c355155e2d16b488c08920601083cb4891e352ae777b" 849 dependencies = [ 850 "glib-sys", 851 "gobject-sys", 852 "libc", 853 "system-deps", 854 - "windows-sys 0.52.0", 855 ] 856 857 [[package]] 858 name = "glib" 859 - version = "0.20.5" 860 source = "registry+https://github.com/rust-lang/crates.io-index" 861 - checksum = "358431b0e0eb15b9d02db52e1f19c805b953c5c168099deb3de88beab761768c" 862 dependencies = [ 863 "bitflags 2.6.0", 864 "futures-channel", ··· 877 878 [[package]] 879 name = "glib-macros" 880 - version = "0.20.5" 881 source = "registry+https://github.com/rust-lang/crates.io-index" 882 - checksum = "e7d21ca27acfc3e91da70456edde144b4ac7c36f78ee77b10189b3eb4901c156" 883 dependencies = [ 884 "heck", 885 "proc-macro-crate", ··· 890 891 [[package]] 892 name = "glib-sys" 893 - version = "0.20.5" 894 source = "registry+https://github.com/rust-lang/crates.io-index" 895 - checksum = "8a5911863ab7ecd4a6f8d5976f12eeba076b23669c49b066d877e742544aa389" 896 dependencies = [ 897 "libc", 898 "system-deps", 899 ] 900 901 [[package]] 902 name = "gobject-sys" 903 - version = "0.20.4" 904 source = "registry+https://github.com/rust-lang/crates.io-index" 905 - checksum = "a4c674d2ff8478cf0ec29d2be730ed779fef54415a2fb4b565c52def62696462" 906 dependencies = [ 907 "glib-sys", 908 "libc", ··· 911 912 [[package]] 913 name = "graphene-rs" 914 - version = "0.20.4" 915 source = "registry+https://github.com/rust-lang/crates.io-index" 916 - checksum = "1f53144c7fe78292705ff23935f1477d511366fb2f73c43d63b37be89076d2fe" 917 dependencies = [ 918 "glib", 919 "graphene-sys", ··· 922 923 [[package]] 924 name = "graphene-sys" 925 - version = "0.20.4" 926 source = "registry+https://github.com/rust-lang/crates.io-index" 927 - checksum = "e741797dc5081e59877a4d72c442c72d61efdd99161a0b1c1b29b6b988934b99" 928 dependencies = [ 929 "glib-sys", 930 "libc", ··· 934 935 [[package]] 936 name = "gsk4" 937 - version = "0.9.3" 938 source = "registry+https://github.com/rust-lang/crates.io-index" 939 - checksum = "3deb9ae5a7fb759b2405e248d52850d9ef733079b90af2d6b01638f5b9eeafe1" 940 dependencies = [ 941 "cairo-rs", 942 "gdk4", ··· 949 950 [[package]] 951 name = "gsk4-sys" 952 - version = "0.9.3" 953 source = "registry+https://github.com/rust-lang/crates.io-index" 954 - checksum = "2226662e97948f3f241c9a6c432cd95eeca662daf4a327e201458bb540ad9590" 955 dependencies = [ 956 "cairo-sys-rs", 957 "gdk4-sys", ··· 965 966 [[package]] 967 name = "gstreamer" 968 - version = "0.23.3" 969 source = "registry+https://github.com/rust-lang/crates.io-index" 970 - checksum = "680006694e79692f831ca4f3ba6e147b8c23db289b2df1d33a4a97fd038145d7" 971 dependencies = [ 972 "cfg-if", 973 "futures-channel", ··· 985 "paste", 986 "pin-project-lite", 987 "smallvec", 988 - "thiserror", 989 ] 990 991 [[package]] 992 name = "gstreamer-audio" 993 - version = "0.23.2" 994 source = "registry+https://github.com/rust-lang/crates.io-index" 995 - checksum = "36d39b07213f83055fc705a384fa32ad581776b8e5b04c86f3a419ec5dfc0f81" 996 dependencies = [ 997 "cfg-if", 998 "glib", ··· 1006 1007 [[package]] 1008 name = "gstreamer-audio-sys" 1009 - version = "0.23.3" 1010 source = "registry+https://github.com/rust-lang/crates.io-index" 1011 - checksum = "980a205553927ec2167ad79b80819df79c3683632abefbe255baffe1b4112044" 1012 dependencies = [ 1013 "glib-sys", 1014 "gobject-sys", ··· 1020 1021 [[package]] 1022 name = "gstreamer-base" 1023 - version = "0.23.3" 1024 source = "registry+https://github.com/rust-lang/crates.io-index" 1025 - checksum = "a11df90e3abf1d9747111c41902338fc1bd13b1c23b27fb828d43e57bd190134" 1026 dependencies = [ 1027 "atomic_refcell", 1028 "cfg-if", ··· 1034 1035 [[package]] 1036 name = "gstreamer-base-sys" 1037 - version = "0.23.3" 1038 source = "registry+https://github.com/rust-lang/crates.io-index" 1039 - checksum = "d691b2bb51a9e5727fb33c3b53fb64ee5b80c40cbbd250941a6d44b142f7a6a0" 1040 dependencies = [ 1041 "glib-sys", 1042 "gobject-sys", ··· 1046 ] 1047 1048 [[package]] 1049 name = "gstreamer-sys" 1050 - version = "0.23.3" 1051 source = "registry+https://github.com/rust-lang/crates.io-index" 1052 - checksum = "db89964774a97d5b092e2d124debc6bbcaf34b5c7cdef1759f4a9e1e3f8326ef" 1053 dependencies = [ 1054 "glib-sys", 1055 "gobject-sys", 1056 "libc", 1057 "system-deps", 1058 ] 1059 1060 [[package]] 1061 name = "gtk4" 1062 - version = "0.9.3" 1063 source = "registry+https://github.com/rust-lang/crates.io-index" 1064 - checksum = "d34465497f5a4c182c9c94a582a187db7d6af0863f28e87ccf4379f21f0e2a22" 1065 dependencies = [ 1066 "cairo-rs", 1067 "field-offset", ··· 1080 1081 [[package]] 1082 name = "gtk4-macros" 1083 - version = "0.9.3" 1084 source = "registry+https://github.com/rust-lang/crates.io-index" 1085 - checksum = "a7c518d5dd41c57385c7cd30af52e261820c897fc1144e558bb88c303d048ae2" 1086 dependencies = [ 1087 "proc-macro-crate", 1088 "proc-macro2", ··· 1092 1093 [[package]] 1094 name = "gtk4-sys" 1095 - version = "0.9.3" 1096 source = "registry+https://github.com/rust-lang/crates.io-index" 1097 - checksum = "f11c7812e28542edb4d0495a2fde1f4588899e2accfcebaa80115f27dc7358a3" 1098 dependencies = [ 1099 "cairo-sys-rs", 1100 "gdk-pixbuf-sys", ··· 1120 1121 [[package]] 1122 name = "hashbrown" 1123 - version = "0.15.1" 1124 source = "registry+https://github.com/rust-lang/crates.io-index" 1125 - checksum = "3a9bfc1af68b1726ea47d3d5109de126281def866b33970e10fbab11b5dafab3" 1126 1127 [[package]] 1128 name = "hashlink" ··· 1162 "iana-time-zone-haiku", 1163 "js-sys", 1164 "wasm-bindgen", 1165 - "windows-core", 1166 ] 1167 1168 [[package]] ··· 1315 1316 [[package]] 1317 name = "indexmap" 1318 - version = "2.6.0" 1319 source = "registry+https://github.com/rust-lang/crates.io-index" 1320 - checksum = "707907fe3c25f5424cce2cb7e1cbcafee6bdbe735ca90ef77c29e84591e5b9da" 1321 dependencies = [ 1322 "equivalent", 1323 - "hashbrown 0.15.1", 1324 ] 1325 1326 [[package]] 1327 name = "inotify" 1328 - version = "0.9.6" 1329 source = "registry+https://github.com/rust-lang/crates.io-index" 1330 - checksum = "f8069d3ec154eb856955c1c0fbffefbf5f3c40a104ec912d4797314c1801abff" 1331 dependencies = [ 1332 "bitflags 1.3.2", 1333 "inotify-sys", ··· 1344 ] 1345 1346 [[package]] 1347 - name = "intersection" 1348 - version = "1.0.0" 1349 source = "registry+https://github.com/rust-lang/crates.io-index" 1350 - checksum = "133d3551b09a5131c0ffc31eaefdafdd58b1cdd272f7d1bab4db623c245a266c" 1351 1352 [[package]] 1353 name = "itertools" ··· 1359 ] 1360 1361 [[package]] 1362 name = "js-sys" 1363 - version = "0.3.72" 1364 source = "registry+https://github.com/rust-lang/crates.io-index" 1365 - checksum = "6a88f1bda2bd75b0452a14784937d796722fdebfe50df998aeb3f0b7603019a9" 1366 dependencies = [ 1367 "wasm-bindgen", 1368 ] 1369 ··· 1394 ] 1395 1396 [[package]] 1397 name = "lazy_static" 1398 version = "1.5.0" 1399 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1432 1433 [[package]] 1434 name = "libc" 1435 - version = "0.2.161" 1436 source = "registry+https://github.com/rust-lang/crates.io-index" 1437 - checksum = "8e9489c2807c139ffd9c1794f4af0ebe86a828db53ecdc7fea2111d0fed085d1" 1438 1439 [[package]] 1440 name = "libredox" ··· 1465 1466 [[package]] 1467 name = "litemap" 1468 - version = "0.7.3" 1469 source = "registry+https://github.com/rust-lang/crates.io-index" 1470 - checksum = "643cb0b8d4fcc284004d5fd0d67ccf61dfffadb7f75e1e71bc420f4688a3a704" 1471 1472 [[package]] 1473 name = "locale_config" ··· 1523 version = "0.4.22" 1524 source = "registry+https://github.com/rust-lang/crates.io-index" 1525 checksum = "a7a70ba024b9dc04c27ea2f0c0548feb474ec5c54bba33a7f72f873a39d07b24" 1526 1527 [[package]] 1528 name = "malloc_buf" ··· 1540 checksum = "78ca9ab1a0babb1e7d5695e3530886289c18cf2f87ec19a575a0abdce112e3a3" 1541 1542 [[package]] 1543 name = "memoffset" 1544 version = "0.9.1" 1545 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1549 ] 1550 1551 [[package]] 1552 name = "mime" 1553 version = "0.3.17" 1554 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1566 1567 [[package]] 1568 name = "miniz_oxide" 1569 - version = "0.8.0" 1570 source = "registry+https://github.com/rust-lang/crates.io-index" 1571 - checksum = "e2d80299ef12ff69b16a84bb182e3b9df68b5a91574d3d4fa6e41b65deec4df1" 1572 dependencies = [ 1573 "adler2", 1574 ] 1575 1576 [[package]] 1577 name = "mio" 1578 - version = "0.8.11" 1579 source = "registry+https://github.com/rust-lang/crates.io-index" 1580 - checksum = "a4a650543ca06a924e8b371db273b2756685faae30f8487da1b56505a8f78b0c" 1581 dependencies = [ 1582 "libc", 1583 "log", 1584 "wasi", 1585 - "windows-sys 0.48.0", 1586 ] 1587 1588 [[package]] ··· 1591 source = "registry+https://github.com/rust-lang/crates.io-index" 1592 checksum = "058bc2227727af394f34aa51da3e36aeecf2c808f39315d35f754872660750ae" 1593 dependencies = [ 1594 - "async-channel", 1595 "futures-channel", 1596 "serde", 1597 "trait-variant", 1598 - "zbus", 1599 ] 1600 1601 [[package]] ··· 1619 1620 [[package]] 1621 name = "notify" 1622 - version = "6.1.1" 1623 source = "registry+https://github.com/rust-lang/crates.io-index" 1624 - checksum = "6205bd8bb1e454ad2e27422015fb5e4f2bcc7e08fa8f27058670d208324a4d2d" 1625 dependencies = [ 1626 "bitflags 2.6.0", 1627 - "crossbeam-channel", 1628 "filetime", 1629 "fsevent-sys", 1630 "inotify", ··· 1632 "libc", 1633 "log", 1634 "mio", 1635 "walkdir", 1636 - "windows-sys 0.48.0", 1637 ] 1638 1639 [[package]] 1640 name = "notify-debouncer-full" 1641 - version = "0.3.2" 1642 source = "registry+https://github.com/rust-lang/crates.io-index" 1643 - checksum = "fb7fd166739789c9ff169e654dc1501373db9d80a4c3f972817c8a4d7cf8f34e" 1644 dependencies = [ 1645 - "crossbeam-channel", 1646 "file-id", 1647 "log", 1648 "notify", 1649 - "parking_lot", 1650 "walkdir", 1651 ] 1652 1653 [[package]] 1654 name = "nu-ansi-term" 1655 version = "0.50.1" 1656 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1752 1753 [[package]] 1754 name = "pango" 1755 - version = "0.20.4" 1756 source = "registry+https://github.com/rust-lang/crates.io-index" 1757 - checksum = "aa26aa54b11094d72141a754901cd71d9356432bb8147f9cace8d9c7ba95f356" 1758 dependencies = [ 1759 "gio", 1760 "glib", ··· 1764 1765 [[package]] 1766 name = "pango-sys" 1767 - version = "0.20.4" 1768 source = "registry+https://github.com/rust-lang/crates.io-index" 1769 - checksum = "84fd65917bf12f06544ae2bbc200abf9fc0a513a5a88a0fa81013893aef2b838" 1770 dependencies = [ 1771 "glib-sys", 1772 "gobject-sys", ··· 1800 "libc", 1801 "redox_syscall", 1802 "smallvec", 1803 - "windows-targets 0.52.6", 1804 ] 1805 1806 [[package]] ··· 1846 1847 [[package]] 1848 name = "polling" 1849 - version = "3.7.3" 1850 source = "registry+https://github.com/rust-lang/crates.io-index" 1851 - checksum = "cc2790cd301dec6cd3b7a025e4815cf825724a51c98dccfe6a3e55f05ffb6511" 1852 dependencies = [ 1853 "cfg-if", 1854 "concurrent-queue", ··· 1879 1880 [[package]] 1881 name = "proc-macro2" 1882 - version = "1.0.89" 1883 source = "registry+https://github.com/rust-lang/crates.io-index" 1884 - checksum = "f139b0662de085916d1fb67d2b4169d1addddda1919e696f3252b740b629986e" 1885 dependencies = [ 1886 "unicode-ident", 1887 ] 1888 1889 [[package]] 1890 name = "quote" 1891 version = "1.0.37" 1892 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1896 ] 1897 1898 [[package]] 1899 name = "rand" 1900 version = "0.8.5" 1901 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1926 ] 1927 1928 [[package]] 1929 name = "recordbox" 1930 - version = "0.8.3" 1931 dependencies = [ 1932 "ashpd", 1933 - "async-channel", 1934 "async-lock", 1935 "color-thief", 1936 "common-path", 1937 "flexi_logger", 1938 - "formatx", 1939 "futures", 1940 "gettext-rs", 1941 "gstreamer", 1942 "gstreamer-audio", 1943 "gstreamer-base", 1944 "gtk4", 1945 - "intersection", 1946 "json", 1947 "lazy_static", 1948 "libadwaita", 1949 "lofty", 1950 "log", 1951 "mime_guess", 1952 "mpris-server", 1953 "notify-debouncer-full", 1954 "rand", 1955 "rusqlite", 1956 "rusqlite_migration", 1957 "search-provider", 1958 - "similar", 1959 "walkdir", 1960 ] 1961 1962 [[package]] 1963 name = "redox_syscall" 1964 - version = "0.5.7" 1965 source = "registry+https://github.com/rust-lang/crates.io-index" 1966 - checksum = "9b6dfecf2c74bce2466cabf93f6664d6998a69eb21e39f4207930065b27b771f" 1967 dependencies = [ 1968 "bitflags 2.6.0", 1969 ] 1970 1971 [[package]] 1972 name = "regex" 1973 version = "1.11.1" 1974 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1982 1983 [[package]] 1984 name = "regex-automata" 1985 - version = "0.4.8" 1986 source = "registry+https://github.com/rust-lang/crates.io-index" 1987 - checksum = "368758f23274712b504848e9d5a6f010445cc8b87a7cdb4d7cbee666c1288da3" 1988 dependencies = [ 1989 "aho-corasick", 1990 "memchr", ··· 2041 2042 [[package]] 2043 name = "rustix" 2044 - version = "0.38.39" 2045 source = "registry+https://github.com/rust-lang/crates.io-index" 2046 - checksum = "375116bee2be9ed569afe2154ea6a99dfdffd257f533f187498c2a8f5feaf4ee" 2047 dependencies = [ 2048 "bitflags 2.6.0", 2049 "errno", 2050 "libc", 2051 "linux-raw-sys", 2052 - "windows-sys 0.52.0", 2053 ] 2054 2055 [[package]] 2056 name = "same-file" 2057 version = "1.0.6" 2058 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2062 ] 2063 2064 [[package]] 2065 name = "scopeguard" 2066 version = "1.2.0" 2067 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2076 "futures-channel", 2077 "futures-util", 2078 "serde", 2079 - "zbus", 2080 ] 2081 2082 [[package]] 2083 name = "semver" 2084 - version = "1.0.23" 2085 source = "registry+https://github.com/rust-lang/crates.io-index" 2086 - checksum = "61697e0a1c7e512e84a621326239844a24d8207b4669b41bc18b32ea5cbf988b" 2087 2088 [[package]] 2089 name = "serde" 2090 - version = "1.0.214" 2091 source = "registry+https://github.com/rust-lang/crates.io-index" 2092 - checksum = "f55c3193aca71c12ad7890f1785d2b73e1b9f63a0bbc353c08ef26fe03fc56b5" 2093 dependencies = [ 2094 "serde_derive", 2095 ] 2096 2097 [[package]] 2098 name = "serde_derive" 2099 - version = "1.0.214" 2100 source = "registry+https://github.com/rust-lang/crates.io-index" 2101 - checksum = "de523f781f095e28fa605cdce0f8307e451cc0fd14e2eb4cd2e98a355b147766" 2102 dependencies = [ 2103 "proc-macro2", 2104 "quote", ··· 2106 ] 2107 2108 [[package]] 2109 name = "serde_repr" 2110 version = "0.1.19" 2111 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2126 ] 2127 2128 [[package]] 2129 name = "sha1" 2130 version = "0.10.6" 2131 source = "registry+https://github.com/rust-lang/crates.io-index" 2132 checksum = "e3bf829a2d51ab4a5ddf1352d8470c140cadc8301b2ae1789db023f01cedd6ba" 2133 dependencies = [ 2134 "cfg-if", 2135 "cpufeatures", ··· 2150 dependencies = [ 2151 "libc", 2152 ] 2153 - 2154 - [[package]] 2155 - name = "similar" 2156 - version = "2.6.0" 2157 - source = "registry+https://github.com/rust-lang/crates.io-index" 2158 - checksum = "1de1d4f81173b03af4c0cbed3c898f6bff5b870e4a7f5d6f4057d62a7a4b686e" 2159 2160 [[package]] 2161 name = "slab" ··· 2173 checksum = "3c5e1a9a646d36c3599cd173a41282daf47c44583ad367b8e6837255952e5c67" 2174 2175 [[package]] 2176 name = "stable_deref_trait" 2177 version = "1.2.0" 2178 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2185 checksum = "a2eb9349b6444b326872e140eb1cf5e7c522154d69e7a0ffb0fb81c06b37543f" 2186 2187 [[package]] 2188 name = "syn" 2189 - version = "2.0.87" 2190 source = "registry+https://github.com/rust-lang/crates.io-index" 2191 - checksum = "25aa4ce346d03a6dcd68dd8b4010bcb74e54e62c90c573f394c46eae99aba32d" 2192 dependencies = [ 2193 "proc-macro2", 2194 "quote", ··· 2220 ] 2221 2222 [[package]] 2223 name = "target-lexicon" 2224 version = "0.12.16" 2225 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2233 2234 [[package]] 2235 name = "tempfile" 2236 - version = "3.13.0" 2237 source = "registry+https://github.com/rust-lang/crates.io-index" 2238 - checksum = "f0f2c9fc62d0beef6951ccffd757e241266a2c833136efbe35af6cd2567dca5b" 2239 dependencies = [ 2240 "cfg-if", 2241 "fastrand", ··· 2246 2247 [[package]] 2248 name = "thiserror" 2249 - version = "1.0.68" 2250 source = "registry+https://github.com/rust-lang/crates.io-index" 2251 - checksum = "02dd99dc800bbb97186339685293e1cc5d9df1f8fae2d0aecd9ff1c77efea892" 2252 dependencies = [ 2253 - "thiserror-impl", 2254 ] 2255 2256 [[package]] 2257 name = "thiserror-impl" 2258 - version = "1.0.68" 2259 source = "registry+https://github.com/rust-lang/crates.io-index" 2260 - checksum = "a7c61ec9a6f64d2793d8a45faba21efbe3ced62a886d44c36a009b2b519b4c7e" 2261 dependencies = [ 2262 "proc-macro2", 2263 "quote", ··· 2265 ] 2266 2267 [[package]] 2268 name = "tinystr" 2269 version = "0.7.6" 2270 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2309 ] 2310 2311 [[package]] 2312 name = "tracing" 2313 - version = "0.1.40" 2314 source = "registry+https://github.com/rust-lang/crates.io-index" 2315 - checksum = "c3523ab5a71916ccf420eebdf5521fcef02141234bbc0b8a49f2fdc4544364ef" 2316 dependencies = [ 2317 "pin-project-lite", 2318 "tracing-attributes", ··· 2321 2322 [[package]] 2323 name = "tracing-attributes" 2324 - version = "0.1.27" 2325 source = "registry+https://github.com/rust-lang/crates.io-index" 2326 - checksum = "34704c8d6ebcbc939824180af020566b01a7c01f80641264eba0999f6c2b6be7" 2327 dependencies = [ 2328 "proc-macro2", 2329 "quote", ··· 2332 2333 [[package]] 2334 name = "tracing-core" 2335 - version = "0.1.32" 2336 source = "registry+https://github.com/rust-lang/crates.io-index" 2337 - checksum = "c06d3da6113f116aaee68e4d601191614c9053067f9ab7f6edbcb161237daa54" 2338 dependencies = [ 2339 "once_cell", 2340 ] ··· 2349 "quote", 2350 "syn", 2351 ] 2352 2353 [[package]] 2354 name = "typenum" ··· 2375 2376 [[package]] 2377 name = "unicode-ident" 2378 - version = "1.0.13" 2379 source = "registry+https://github.com/rust-lang/crates.io-index" 2380 - checksum = "e91b56cd4cadaeb79bbf1a5645f6b4f8dc5bde8834ad5894a8db35fda9efa1fe" 2381 2382 [[package]] 2383 name = "url" 2384 - version = "2.5.3" 2385 source = "registry+https://github.com/rust-lang/crates.io-index" 2386 - checksum = "8d157f1b96d14500ffdc1f10ba712e780825526c03d9a49b4d0324b0d9113ada" 2387 dependencies = [ 2388 "form_urlencoded", 2389 "idna", ··· 2392 ] 2393 2394 [[package]] 2395 name = "utf16_iter" 2396 version = "1.0.5" 2397 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2404 checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" 2405 2406 [[package]] 2407 name = "vcpkg" 2408 version = "0.2.15" 2409 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2439 2440 [[package]] 2441 name = "wasm-bindgen" 2442 - version = "0.2.95" 2443 source = "registry+https://github.com/rust-lang/crates.io-index" 2444 - checksum = "128d1e363af62632b8eb57219c8fd7877144af57558fb2ef0368d0087bddeb2e" 2445 dependencies = [ 2446 "cfg-if", 2447 "once_cell", ··· 2450 2451 [[package]] 2452 name = "wasm-bindgen-backend" 2453 - version = "0.2.95" 2454 source = "registry+https://github.com/rust-lang/crates.io-index" 2455 - checksum = "cb6dd4d3ca0ddffd1dd1c9c04f94b868c37ff5fac97c30b97cff2d74fce3a358" 2456 dependencies = [ 2457 "bumpalo", 2458 "log", 2459 - "once_cell", 2460 "proc-macro2", 2461 "quote", 2462 "syn", ··· 2464 ] 2465 2466 [[package]] 2467 name = "wasm-bindgen-macro" 2468 - version = "0.2.95" 2469 source = "registry+https://github.com/rust-lang/crates.io-index" 2470 - checksum = "e79384be7f8f5a9dd5d7167216f022090cf1f9ec128e6e6a482a2cb5c5422c56" 2471 dependencies = [ 2472 "quote", 2473 "wasm-bindgen-macro-support", ··· 2475 2476 [[package]] 2477 name = "wasm-bindgen-macro-support" 2478 - version = "0.2.95" 2479 source = "registry+https://github.com/rust-lang/crates.io-index" 2480 - checksum = "26c6ab57572f7a24a4985830b120de1594465e5d500f24afe89e16b4e833ef68" 2481 dependencies = [ 2482 "proc-macro2", 2483 "quote", ··· 2488 2489 [[package]] 2490 name = "wasm-bindgen-shared" 2491 - version = "0.2.95" 2492 source = "registry+https://github.com/rust-lang/crates.io-index" 2493 - checksum = "65fc09f10666a9f147042251e0dda9c18f166ff7de300607007e96bdebc1068d" 2494 2495 [[package]] 2496 name = "winapi" ··· 2524 checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" 2525 2526 [[package]] 2527 name = "windows-core" 2528 version = "0.52.0" 2529 source = "registry+https://github.com/rust-lang/crates.io-index" 2530 checksum = "33ab640c8d7e35bf8ba19b884ba838ceb4fba93a4e8c65a9059d08afcfc683d9" 2531 dependencies = [ 2532 - "windows-targets 0.52.6", 2533 ] 2534 2535 [[package]] 2536 - name = "windows-sys" 2537 - version = "0.48.0" 2538 source = "registry+https://github.com/rust-lang/crates.io-index" 2539 - checksum = "677d2418bec65e3338edb076e806bc1ec15693c5d0104683f2efe857f61056a9" 2540 dependencies = [ 2541 - "windows-targets 0.48.5", 2542 ] 2543 2544 [[package]] 2545 - name = "windows-sys" 2546 - version = "0.52.0" 2547 source = "registry+https://github.com/rust-lang/crates.io-index" 2548 - checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" 2549 dependencies = [ 2550 - "windows-targets 0.52.6", 2551 ] 2552 2553 [[package]] 2554 name = "windows-sys" 2555 - version = "0.59.0" 2556 source = "registry+https://github.com/rust-lang/crates.io-index" 2557 - checksum = "1e38bc4d79ed67fd075bcc251a1c39b32a1776bbe92e5bef1f0bf1f8c531853b" 2558 dependencies = [ 2559 - "windows-targets 0.52.6", 2560 ] 2561 2562 [[package]] 2563 - name = "windows-targets" 2564 - version = "0.48.5" 2565 source = "registry+https://github.com/rust-lang/crates.io-index" 2566 - checksum = "9a2fa6e2155d7247be68c096456083145c183cbbbc2764150dda45a87197940c" 2567 dependencies = [ 2568 - "windows_aarch64_gnullvm 0.48.5", 2569 - "windows_aarch64_msvc 0.48.5", 2570 - "windows_i686_gnu 0.48.5", 2571 - "windows_i686_msvc 0.48.5", 2572 - "windows_x86_64_gnu 0.48.5", 2573 - "windows_x86_64_gnullvm 0.48.5", 2574 - "windows_x86_64_msvc 0.48.5", 2575 ] 2576 2577 [[package]] ··· 2580 source = "registry+https://github.com/rust-lang/crates.io-index" 2581 checksum = "9b724f72796e036ab90c1021d4780d4d3d648aca59e491e6b98e725b84e99973" 2582 dependencies = [ 2583 - "windows_aarch64_gnullvm 0.52.6", 2584 - "windows_aarch64_msvc 0.52.6", 2585 - "windows_i686_gnu 0.52.6", 2586 "windows_i686_gnullvm", 2587 - "windows_i686_msvc 0.52.6", 2588 - "windows_x86_64_gnu 0.52.6", 2589 - "windows_x86_64_gnullvm 0.52.6", 2590 - "windows_x86_64_msvc 0.52.6", 2591 ] 2592 2593 [[package]] 2594 name = "windows_aarch64_gnullvm" 2595 - version = "0.48.5" 2596 - source = "registry+https://github.com/rust-lang/crates.io-index" 2597 - checksum = "2b38e32f0abccf9987a4e3079dfb67dcd799fb61361e53e2882c3cbaf0d905d8" 2598 - 2599 - [[package]] 2600 - name = "windows_aarch64_gnullvm" 2601 version = "0.52.6" 2602 source = "registry+https://github.com/rust-lang/crates.io-index" 2603 checksum = "32a4622180e7a0ec044bb555404c800bc9fd9ec262ec147edd5989ccd0c02cd3" 2604 2605 [[package]] 2606 name = "windows_aarch64_msvc" 2607 - version = "0.48.5" 2608 - source = "registry+https://github.com/rust-lang/crates.io-index" 2609 - checksum = "dc35310971f3b2dbbf3f0690a219f40e2d9afcf64f9ab7cc1be722937c26b4bc" 2610 - 2611 - [[package]] 2612 - name = "windows_aarch64_msvc" 2613 version = "0.52.6" 2614 source = "registry+https://github.com/rust-lang/crates.io-index" 2615 checksum = "09ec2a7bb152e2252b53fa7803150007879548bc709c039df7627cabbd05d469" 2616 - 2617 - [[package]] 2618 - name = "windows_i686_gnu" 2619 - version = "0.48.5" 2620 - source = "registry+https://github.com/rust-lang/crates.io-index" 2621 - checksum = "a75915e7def60c94dcef72200b9a8e58e5091744960da64ec734a6c6e9b3743e" 2622 2623 [[package]] 2624 name = "windows_i686_gnu" ··· 2634 2635 [[package]] 2636 name = "windows_i686_msvc" 2637 - version = "0.48.5" 2638 - source = "registry+https://github.com/rust-lang/crates.io-index" 2639 - checksum = "8f55c233f70c4b27f66c523580f78f1004e8b5a8b659e05a4eb49d4166cca406" 2640 - 2641 - [[package]] 2642 - name = "windows_i686_msvc" 2643 version = "0.52.6" 2644 source = "registry+https://github.com/rust-lang/crates.io-index" 2645 checksum = "240948bc05c5e7c6dabba28bf89d89ffce3e303022809e73deaefe4f6ec56c66" 2646 2647 [[package]] 2648 name = "windows_x86_64_gnu" 2649 - version = "0.48.5" 2650 - source = "registry+https://github.com/rust-lang/crates.io-index" 2651 - checksum = "53d40abd2583d23e4718fddf1ebec84dbff8381c07cae67ff7768bbf19c6718e" 2652 - 2653 - [[package]] 2654 - name = "windows_x86_64_gnu" 2655 version = "0.52.6" 2656 source = "registry+https://github.com/rust-lang/crates.io-index" 2657 checksum = "147a5c80aabfbf0c7d901cb5895d1de30ef2907eb21fbbab29ca94c5b08b1a78" 2658 2659 [[package]] 2660 name = "windows_x86_64_gnullvm" 2661 - version = "0.48.5" 2662 - source = "registry+https://github.com/rust-lang/crates.io-index" 2663 - checksum = "0b7b52767868a23d5bab768e390dc5f5c55825b6d30b86c844ff2dc7414044cc" 2664 - 2665 - [[package]] 2666 - name = "windows_x86_64_gnullvm" 2667 version = "0.52.6" 2668 source = "registry+https://github.com/rust-lang/crates.io-index" 2669 checksum = "24d5b23dc417412679681396f2b49f3de8c1473deb516bd34410872eff51ed0d" 2670 2671 [[package]] 2672 name = "windows_x86_64_msvc" 2673 - version = "0.48.5" 2674 - source = "registry+https://github.com/rust-lang/crates.io-index" 2675 - checksum = "ed94fce61571a4006852b7389a063ab983c02eb1bb37b47f8272ce92d06d9538" 2676 - 2677 - [[package]] 2678 - name = "windows_x86_64_msvc" 2679 version = "0.52.6" 2680 source = "registry+https://github.com/rust-lang/crates.io-index" 2681 checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" ··· 2712 ] 2713 2714 [[package]] 2715 name = "yoke" 2716 - version = "0.7.4" 2717 source = "registry+https://github.com/rust-lang/crates.io-index" 2718 - checksum = "6c5b1314b079b0930c31e3af543d8ee1757b1951ae1e1565ec704403a7240ca5" 2719 dependencies = [ 2720 "serde", 2721 "stable_deref_trait", ··· 2725 2726 [[package]] 2727 name = "yoke-derive" 2728 - version = "0.7.4" 2729 source = "registry+https://github.com/rust-lang/crates.io-index" 2730 - checksum = "28cc31741b18cb6f1d5ff12f5b7523e3d6eb0852bbbad19d73905511d9849b95" 2731 dependencies = [ 2732 "proc-macro2", 2733 "quote", ··· 2752 "async-trait", 2753 "blocking", 2754 "enumflags2", 2755 - "event-listener", 2756 "futures-core", 2757 "futures-sink", 2758 "futures-util", ··· 2768 "uds_windows", 2769 "windows-sys 0.52.0", 2770 "xdg-home", 2771 - "zbus_macros", 2772 - "zbus_names", 2773 - "zvariant", 2774 ] 2775 2776 [[package]] ··· 2783 "proc-macro2", 2784 "quote", 2785 "syn", 2786 - "zvariant_utils", 2787 ] 2788 2789 [[package]] ··· 2794 dependencies = [ 2795 "serde", 2796 "static_assertions", 2797 - "zvariant", 2798 ] 2799 2800 [[package]] ··· 2820 2821 [[package]] 2822 name = "zerofrom" 2823 - version = "0.1.4" 2824 source = "registry+https://github.com/rust-lang/crates.io-index" 2825 - checksum = "91ec111ce797d0e0784a1116d0ddcdbea84322cd79e5d5ad173daeba4f93ab55" 2826 dependencies = [ 2827 "zerofrom-derive", 2828 ] 2829 2830 [[package]] 2831 name = "zerofrom-derive" 2832 - version = "0.1.4" 2833 source = "registry+https://github.com/rust-lang/crates.io-index" 2834 - checksum = "0ea7b4a3637ea8669cedf0f1fd5c286a17f3de97b8dd5a70a6c167a1730e63a5" 2835 dependencies = [ 2836 "proc-macro2", 2837 "quote", ··· 2871 "enumflags2", 2872 "serde", 2873 "static_assertions", 2874 "url", 2875 - "zvariant_derive", 2876 ] 2877 2878 [[package]] ··· 2885 "proc-macro2", 2886 "quote", 2887 "syn", 2888 - "zvariant_utils", 2889 ] 2890 2891 [[package]] ··· 2898 "quote", 2899 "syn", 2900 ]
··· 1 # This file is automatically @generated by Cargo. 2 # It is not intended for manual editing. 3 + version = 4 4 5 [[package]] 6 name = "adler2" ··· 46 47 [[package]] 48 name = "ashpd" 49 + version = "0.10.2" 50 source = "registry+https://github.com/rust-lang/crates.io-index" 51 + checksum = "e9c39d707614dbcc6bed00015539f488d8e3fe3e66ed60961efc0c90f4b380b3" 52 dependencies = [ 53 "async-fs", 54 "async-net", ··· 59 "serde", 60 "serde_repr", 61 "url", 62 + "zbus 5.2.0", 63 ] 64 65 [[package]] 66 name = "async-broadcast" 67 + version = "0.7.2" 68 source = "registry+https://github.com/rust-lang/crates.io-index" 69 + checksum = "435a87a52755b8f27fcf321ac4f04b2802e337c8c4872923137471ec39c37532" 70 dependencies = [ 71 + "event-listener 5.3.1", 72 "event-listener-strategy", 73 "futures-core", 74 "pin-project-lite", ··· 76 77 [[package]] 78 name = "async-channel" 79 + version = "1.9.0" 80 + source = "registry+https://github.com/rust-lang/crates.io-index" 81 + checksum = "81953c529336010edd6d8e358f886d9581267795c61b19475b71314bffa46d35" 82 + dependencies = [ 83 + "concurrent-queue", 84 + "event-listener 2.5.3", 85 + "futures-core", 86 + ] 87 + 88 + [[package]] 89 + name = "async-channel" 90 version = "2.3.1" 91 source = "registry+https://github.com/rust-lang/crates.io-index" 92 checksum = "89b47800b0be77592da0afd425cc03468052844aff33b84e33cc696f64e77b6a" ··· 122 ] 123 124 [[package]] 125 + name = "async-global-executor" 126 + version = "2.4.1" 127 + source = "registry+https://github.com/rust-lang/crates.io-index" 128 + checksum = "05b1b633a2115cd122d73b955eadd9916c18c8f510ec9cd1686404c60ad1c29c" 129 + dependencies = [ 130 + "async-channel 2.3.1", 131 + "async-executor", 132 + "async-io", 133 + "async-lock", 134 + "blocking", 135 + "futures-lite", 136 + "once_cell", 137 + ] 138 + 139 + [[package]] 140 name = "async-io" 141 + version = "2.4.0" 142 source = "registry+https://github.com/rust-lang/crates.io-index" 143 + checksum = "43a2b323ccce0a1d90b449fd71f2a06ca7faa7c54c2751f06c9bd851fc061059" 144 dependencies = [ 145 "async-lock", 146 "cfg-if", ··· 161 source = "registry+https://github.com/rust-lang/crates.io-index" 162 checksum = "ff6e472cdea888a4bd64f342f09b3f50e1886d32afe8df3d663c01140b811b18" 163 dependencies = [ 164 + "event-listener 5.3.1", 165 "event-listener-strategy", 166 "pin-project-lite", 167 ] ··· 183 source = "registry+https://github.com/rust-lang/crates.io-index" 184 checksum = "63255f1dc2381611000436537bbedfe83183faa303a5a0edaf191edef06526bb" 185 dependencies = [ 186 + "async-channel 2.3.1", 187 "async-io", 188 "async-lock", 189 "async-signal", 190 "async-task", 191 "blocking", 192 "cfg-if", 193 + "event-listener 5.3.1", 194 "futures-lite", 195 "rustix", 196 "tracing", ··· 226 ] 227 228 [[package]] 229 + name = "async-std" 230 + version = "1.13.0" 231 + source = "registry+https://github.com/rust-lang/crates.io-index" 232 + checksum = "c634475f29802fde2b8f0b505b1bd00dfe4df7d4a000f0b36f7671197d5c3615" 233 + dependencies = [ 234 + "async-channel 1.9.0", 235 + "async-global-executor", 236 + "async-io", 237 + "async-lock", 238 + "async-process", 239 + "crossbeam-utils", 240 + "futures-channel", 241 + "futures-core", 242 + "futures-io", 243 + "futures-lite", 244 + "gloo-timers", 245 + "kv-log-macro", 246 + "log", 247 + "memchr", 248 + "once_cell", 249 + "pin-project-lite", 250 + "pin-utils", 251 + "slab", 252 + "wasm-bindgen-futures", 253 + ] 254 + 255 + [[package]] 256 name = "async-task" 257 version = "4.7.1" 258 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 288 checksum = "ace50bade8e6234aa140d9a2f552bbee1db4d353f69b8217bc503490fc1a9f26" 289 290 [[package]] 291 + name = "base64" 292 + version = "0.21.7" 293 + source = "registry+https://github.com/rust-lang/crates.io-index" 294 + checksum = "9d297deb1925b89f2ccc13d7635fa0714f12c87adce1c75356b39ca9b7178567" 295 + 296 + [[package]] 297 name = "bitflags" 298 version = "1.3.2" 299 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 326 source = "registry+https://github.com/rust-lang/crates.io-index" 327 checksum = "703f41c54fc768e63e091340b424302bb1c29ef4aa0c7f10fe849dfb114d29ea" 328 dependencies = [ 329 + "async-channel 2.3.1", 330 "async-task", 331 "futures-io", 332 "futures-lite", ··· 341 342 [[package]] 343 name = "bytemuck" 344 + version = "1.21.0" 345 source = "registry+https://github.com/rust-lang/crates.io-index" 346 + checksum = "ef657dfab802224e671f5818e9a4935f9b1957ed18e58292690cc39e7a4092a3" 347 348 [[package]] 349 name = "byteorder" ··· 352 checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" 353 354 [[package]] 355 + name = "cacache" 356 + version = "13.1.0" 357 + source = "registry+https://github.com/rust-lang/crates.io-index" 358 + checksum = "5c5063741c7b2e260bbede781cf4679632dd90e2718e99f7715e46824b65670b" 359 + dependencies = [ 360 + "async-std", 361 + "digest", 362 + "either", 363 + "futures", 364 + "hex", 365 + "libc", 366 + "memmap2", 367 + "miette", 368 + "reflink-copy", 369 + "serde", 370 + "serde_derive", 371 + "serde_json", 372 + "sha1", 373 + "sha2", 374 + "ssri", 375 + "tempfile", 376 + "thiserror 1.0.69", 377 + "walkdir", 378 + ] 379 + 380 + [[package]] 381 name = "cairo-rs" 382 + version = "0.20.7" 383 source = "registry+https://github.com/rust-lang/crates.io-index" 384 + checksum = "ae50b5510d86cf96ac2370e66d8dc960882f3df179d6a5a1e52bd94a1416c0f7" 385 dependencies = [ 386 "bitflags 2.6.0", 387 "cairo-sys-rs", ··· 391 392 [[package]] 393 name = "cairo-sys-rs" 394 + version = "0.20.7" 395 source = "registry+https://github.com/rust-lang/crates.io-index" 396 + checksum = "f18b6bb8e43c7eb0f2aac7976afe0c61b6f5fc2ab7bc4c139537ea56c92290df" 397 dependencies = [ 398 "glib-sys", 399 "libc", ··· 402 403 [[package]] 404 name = "cc" 405 + version = "1.2.5" 406 source = "registry+https://github.com/rust-lang/crates.io-index" 407 + checksum = "c31a0499c1dc64f458ad13872de75c0eb7e3fdb0e67964610c914b034fc5956e" 408 dependencies = [ 409 "shlex", 410 ] 411 412 [[package]] 413 name = "cfg-expr" 414 + version = "0.17.2" 415 source = "registry+https://github.com/rust-lang/crates.io-index" 416 + checksum = "8d4ba6e40bd1184518716a6e1a781bf9160e286d219ccdb8ab2612e74cfe4789" 417 dependencies = [ 418 "smallvec", 419 "target-lexicon", ··· 433 434 [[package]] 435 name = "chrono" 436 + version = "0.4.39" 437 source = "registry+https://github.com/rust-lang/crates.io-index" 438 + checksum = "7e36cc9d416881d2e24f9a963be5fb1cd90966419ac844274161d10488b3e825" 439 dependencies = [ 440 "android-tzdata", 441 "iana-time-zone", 442 "num-traits", 443 + "windows-targets", 444 ] 445 446 [[package]] ··· 475 476 [[package]] 477 name = "cpufeatures" 478 + version = "0.2.16" 479 source = "registry+https://github.com/rust-lang/crates.io-index" 480 + checksum = "16b80225097f2e5ae4e7179dd2266824648f3e2f49d9134d584b76389d31c4c3" 481 dependencies = [ 482 "libc", 483 ] ··· 493 494 [[package]] 495 name = "crossbeam-channel" 496 + version = "0.5.14" 497 + source = "registry+https://github.com/rust-lang/crates.io-index" 498 + checksum = "06ba6d68e24814cb8de6bb986db8222d3a027d15872cabc0d18817bc3c0e4471" 499 + dependencies = [ 500 + "crossbeam-utils", 501 + ] 502 + 503 + [[package]] 504 + name = "crossbeam-epoch" 505 + version = "0.9.18" 506 source = "registry+https://github.com/rust-lang/crates.io-index" 507 + checksum = "5b82ac4a3c2ca9c3460964f020e1402edd5753411d7737aa39c3714ad1b5420e" 508 dependencies = [ 509 "crossbeam-utils", 510 ] 511 512 [[package]] 513 name = "crossbeam-utils" 514 + version = "0.8.21" 515 source = "registry+https://github.com/rust-lang/crates.io-index" 516 + checksum = "d0a5c400df2834b80a4c3327b3aad3a4c4cd4de0629063962b03235697506a28" 517 518 [[package]] 519 name = "crypto-common" ··· 593 594 [[package]] 595 name = "errno" 596 + version = "0.3.10" 597 source = "registry+https://github.com/rust-lang/crates.io-index" 598 + checksum = "33d852cb9b869c2a9b3df2f71a3074817f01e1844f839a144f5fcef059a4eb5d" 599 dependencies = [ 600 "libc", 601 + "windows-sys 0.59.0", 602 ] 603 604 [[package]] 605 name = "event-listener" 606 + version = "2.5.3" 607 + source = "registry+https://github.com/rust-lang/crates.io-index" 608 + checksum = "0206175f82b8d6bf6652ff7d71a1e27fd2e4efde587fd368662814d6ec1d9ce0" 609 + 610 + [[package]] 611 + name = "event-listener" 612 version = "5.3.1" 613 source = "registry+https://github.com/rust-lang/crates.io-index" 614 checksum = "6032be9bd27023a771701cc49f9f053c751055f71efb2e0ae5c15809093675ba" ··· 620 621 [[package]] 622 name = "event-listener-strategy" 623 + version = "0.5.3" 624 source = "registry+https://github.com/rust-lang/crates.io-index" 625 + checksum = "3c3e4e0dd3673c1139bf041f3008816d9cf2946bbfac2945c09e523b8d7b05b2" 626 dependencies = [ 627 + "event-listener 5.3.1", 628 "pin-project-lite", 629 ] 630 ··· 642 643 [[package]] 644 name = "fastrand" 645 + version = "2.3.0" 646 source = "registry+https://github.com/rust-lang/crates.io-index" 647 + checksum = "37909eebbb50d72f9059c3b6d82c0463f2ff062c9e95845c43a6c9c0355411be" 648 649 [[package]] 650 name = "field-offset" ··· 679 680 [[package]] 681 name = "flate2" 682 + version = "1.0.35" 683 source = "registry+https://github.com/rust-lang/crates.io-index" 684 + checksum = "c936bfdafb507ebbf50b8074c54fa31c5be9a1e7e5f467dd659697041407d07c" 685 dependencies = [ 686 "crc32fast", 687 "miniz_oxide", ··· 689 690 [[package]] 691 name = "flexi_logger" 692 + version = "0.29.8" 693 source = "registry+https://github.com/rust-lang/crates.io-index" 694 + checksum = "88a5a6882b2e137c4f2664562995865084eb5a00611fba30c582ef10354c4ad8" 695 dependencies = [ 696 "chrono", 697 "log", 698 "nu-ansi-term", 699 "regex", 700 + "thiserror 2.0.9", 701 ] 702 703 [[package]] ··· 708 dependencies = [ 709 "percent-encoding", 710 ] 711 712 [[package]] 713 name = "fsevent-sys" ··· 768 769 [[package]] 770 name = "futures-lite" 771 + version = "2.5.0" 772 source = "registry+https://github.com/rust-lang/crates.io-index" 773 + checksum = "cef40d21ae2c515b51041df9ed313ed21e572df340ea58a922a0aefe7e8891a1" 774 dependencies = [ 775 "fastrand", 776 "futures-core", ··· 821 ] 822 823 [[package]] 824 + name = "fuzzy-matcher" 825 + version = "0.3.7" 826 + source = "registry+https://github.com/rust-lang/crates.io-index" 827 + checksum = "54614a3312934d066701a80f20f15fa3b56d67ac7722b39eea5b4c9dd1d66c94" 828 + dependencies = [ 829 + "thread_local", 830 + ] 831 + 832 + [[package]] 833 name = "gdk-pixbuf" 834 + version = "0.20.7" 835 source = "registry+https://github.com/rust-lang/crates.io-index" 836 + checksum = "b6efc7705f7863d37b12ad6974cbb310d35d054f5108cdc1e69037742f573c4c" 837 dependencies = [ 838 "gdk-pixbuf-sys", 839 "gio", ··· 843 844 [[package]] 845 name = "gdk-pixbuf-sys" 846 + version = "0.20.7" 847 source = "registry+https://github.com/rust-lang/crates.io-index" 848 + checksum = "67f2587c9202bf997476bbba6aaed4f78a11538a2567df002a5f57f5331d0b5c" 849 dependencies = [ 850 "gio-sys", 851 "glib-sys", ··· 856 857 [[package]] 858 name = "gdk4" 859 + version = "0.9.5" 860 source = "registry+https://github.com/rust-lang/crates.io-index" 861 + checksum = "d0196720118f880f71fe7da971eff58cc43a89c9cf73f46076b7cb1e60889b15" 862 dependencies = [ 863 "cairo-rs", 864 "gdk-pixbuf", ··· 871 872 [[package]] 873 name = "gdk4-sys" 874 + version = "0.9.5" 875 source = "registry+https://github.com/rust-lang/crates.io-index" 876 + checksum = "60b0e1340bd15e7a78810cf39fed9e5d85f0a8f80b1d999d384ca17dcc452b60" 877 dependencies = [ 878 "cairo-sys-rs", 879 "gdk-pixbuf-sys", ··· 929 930 [[package]] 931 name = "gio" 932 + version = "0.20.7" 933 source = "registry+https://github.com/rust-lang/crates.io-index" 934 + checksum = "a517657589a174be9f60c667f1fec8b7ac82ed5db4ebf56cf073a3b5955d8e2e" 935 dependencies = [ 936 "futures-channel", 937 "futures-core", ··· 946 947 [[package]] 948 name = "gio-sys" 949 + version = "0.20.8" 950 source = "registry+https://github.com/rust-lang/crates.io-index" 951 + checksum = "8446d9b475730ebef81802c1738d972db42fde1c5a36a627ebc4d665fc87db04" 952 dependencies = [ 953 "glib-sys", 954 "gobject-sys", 955 "libc", 956 "system-deps", 957 + "windows-sys 0.59.0", 958 ] 959 960 [[package]] 961 name = "glib" 962 + version = "0.20.7" 963 source = "registry+https://github.com/rust-lang/crates.io-index" 964 + checksum = "f969edf089188d821a30cde713b6f9eb08b20c63fc2e584aba2892a7984a8cc0" 965 dependencies = [ 966 "bitflags 2.6.0", 967 "futures-channel", ··· 980 981 [[package]] 982 name = "glib-macros" 983 + version = "0.20.7" 984 source = "registry+https://github.com/rust-lang/crates.io-index" 985 + checksum = "715601f8f02e71baef9c1f94a657a9a77c192aea6097cf9ae7e5e177cd8cde68" 986 dependencies = [ 987 "heck", 988 "proc-macro-crate", ··· 993 994 [[package]] 995 name = "glib-sys" 996 + version = "0.20.7" 997 source = "registry+https://github.com/rust-lang/crates.io-index" 998 + checksum = "b360ff0f90d71de99095f79c526a5888c9c92fc9ee1b19da06c6f5e75f0c2a53" 999 dependencies = [ 1000 "libc", 1001 "system-deps", 1002 ] 1003 1004 [[package]] 1005 + name = "gloo-timers" 1006 + version = "0.3.0" 1007 + source = "registry+https://github.com/rust-lang/crates.io-index" 1008 + checksum = "bbb143cf96099802033e0d4f4963b19fd2e0b728bcf076cd9cf7f6634f092994" 1009 + dependencies = [ 1010 + "futures-channel", 1011 + "futures-core", 1012 + "js-sys", 1013 + "wasm-bindgen", 1014 + ] 1015 + 1016 + [[package]] 1017 name = "gobject-sys" 1018 + version = "0.20.7" 1019 source = "registry+https://github.com/rust-lang/crates.io-index" 1020 + checksum = "67a56235e971a63bfd75abb13ef70064e1346388723422a68580d8a6fbac6423" 1021 dependencies = [ 1022 "glib-sys", 1023 "libc", ··· 1026 1027 [[package]] 1028 name = "graphene-rs" 1029 + version = "0.20.7" 1030 source = "registry+https://github.com/rust-lang/crates.io-index" 1031 + checksum = "f39d3bcd2e24fd9c2874a56f277b72c03e728de9bdc95a8d4ef4c962f10ced98" 1032 dependencies = [ 1033 "glib", 1034 "graphene-sys", ··· 1037 1038 [[package]] 1039 name = "graphene-sys" 1040 + version = "0.20.7" 1041 source = "registry+https://github.com/rust-lang/crates.io-index" 1042 + checksum = "11a68d39515bf340e879b72cecd4a25c1332557757ada6e8aba8654b4b81d23a" 1043 dependencies = [ 1044 "glib-sys", 1045 "libc", ··· 1049 1050 [[package]] 1051 name = "gsk4" 1052 + version = "0.9.5" 1053 source = "registry+https://github.com/rust-lang/crates.io-index" 1054 + checksum = "32b9188db0a6219e708b6b6e7225718e459def664023dbddb8395ca1486d8102" 1055 dependencies = [ 1056 "cairo-rs", 1057 "gdk4", ··· 1064 1065 [[package]] 1066 name = "gsk4-sys" 1067 + version = "0.9.5" 1068 source = "registry+https://github.com/rust-lang/crates.io-index" 1069 + checksum = "bca10fc65d68528a548efa3d8747934adcbe7058b73695c9a7f43a25352fce14" 1070 dependencies = [ 1071 "cairo-sys-rs", 1072 "gdk4-sys", ··· 1080 1081 [[package]] 1082 name = "gstreamer" 1083 + version = "0.23.4" 1084 source = "registry+https://github.com/rust-lang/crates.io-index" 1085 + checksum = "700cb1b2e86dda424f85eb728102a111602317e40b4dd71cf1c0dc04e0cc5d95" 1086 dependencies = [ 1087 "cfg-if", 1088 "futures-channel", ··· 1100 "paste", 1101 "pin-project-lite", 1102 "smallvec", 1103 + "thiserror 2.0.9", 1104 ] 1105 1106 [[package]] 1107 name = "gstreamer-audio" 1108 + version = "0.23.4" 1109 source = "registry+https://github.com/rust-lang/crates.io-index" 1110 + checksum = "52a6009b5c9c942cab1089956a501bd63778e65a3e69310949d173e90e2cdda2" 1111 dependencies = [ 1112 "cfg-if", 1113 "glib", ··· 1121 1122 [[package]] 1123 name = "gstreamer-audio-sys" 1124 + version = "0.23.4" 1125 source = "registry+https://github.com/rust-lang/crates.io-index" 1126 + checksum = "ef70a3d80e51ef9a45749a844cb8579d4cabe5ff59cb43a65d6f3a377943262f" 1127 dependencies = [ 1128 "glib-sys", 1129 "gobject-sys", ··· 1135 1136 [[package]] 1137 name = "gstreamer-base" 1138 + version = "0.23.4" 1139 source = "registry+https://github.com/rust-lang/crates.io-index" 1140 + checksum = "d152db7983f98d5950cf64e53805286548063475fb61a5e5450fba4cec05899b" 1141 dependencies = [ 1142 "atomic_refcell", 1143 "cfg-if", ··· 1149 1150 [[package]] 1151 name = "gstreamer-base-sys" 1152 + version = "0.23.4" 1153 source = "registry+https://github.com/rust-lang/crates.io-index" 1154 + checksum = "d47cc2d15f2a3d5eb129e5dacbbeec9600432b706805c15dff57b6aa11b2791c" 1155 dependencies = [ 1156 "glib-sys", 1157 "gobject-sys", ··· 1161 ] 1162 1163 [[package]] 1164 + name = "gstreamer-play" 1165 + version = "0.23.4" 1166 + source = "registry+https://github.com/rust-lang/crates.io-index" 1167 + checksum = "2d7a815750a28ac838bfd745d6da07cfd142bb2fa471397cd9992c8b6f235665" 1168 + dependencies = [ 1169 + "glib", 1170 + "gstreamer", 1171 + "gstreamer-play-sys", 1172 + "gstreamer-video", 1173 + "libc", 1174 + ] 1175 + 1176 + [[package]] 1177 + name = "gstreamer-play-sys" 1178 + version = "0.23.4" 1179 + source = "registry+https://github.com/rust-lang/crates.io-index" 1180 + checksum = "a1f8ef790b8a697c759a9bbbaa7b0c061f529c4581e0cc72839ae753af533591" 1181 + dependencies = [ 1182 + "glib-sys", 1183 + "gobject-sys", 1184 + "gstreamer-sys", 1185 + "gstreamer-video-sys", 1186 + "libc", 1187 + "system-deps", 1188 + ] 1189 + 1190 + [[package]] 1191 name = "gstreamer-sys" 1192 + version = "0.23.4" 1193 + source = "registry+https://github.com/rust-lang/crates.io-index" 1194 + checksum = "16cf1ae0a869aa7066ce3c685b76053b4b4f48f364a5b18c4b1f36ef57469719" 1195 + dependencies = [ 1196 + "glib-sys", 1197 + "gobject-sys", 1198 + "libc", 1199 + "system-deps", 1200 + ] 1201 + 1202 + [[package]] 1203 + name = "gstreamer-video" 1204 + version = "0.23.4" 1205 + source = "registry+https://github.com/rust-lang/crates.io-index" 1206 + checksum = "8fa41e40319e923236e96f0b691711d1504746ab9c89607d77d22aa84777f33f" 1207 + dependencies = [ 1208 + "cfg-if", 1209 + "futures-channel", 1210 + "glib", 1211 + "gstreamer", 1212 + "gstreamer-base", 1213 + "gstreamer-video-sys", 1214 + "libc", 1215 + "once_cell", 1216 + "thiserror 2.0.9", 1217 + ] 1218 + 1219 + [[package]] 1220 + name = "gstreamer-video-sys" 1221 + version = "0.23.4" 1222 source = "registry+https://github.com/rust-lang/crates.io-index" 1223 + checksum = "31dc0f49c117f4867b0f98c712aa55ebf25580151d794be8f9179ec2d877fd14" 1224 dependencies = [ 1225 "glib-sys", 1226 "gobject-sys", 1227 + "gstreamer-base-sys", 1228 + "gstreamer-sys", 1229 "libc", 1230 "system-deps", 1231 ] 1232 1233 [[package]] 1234 name = "gtk4" 1235 + version = "0.9.5" 1236 source = "registry+https://github.com/rust-lang/crates.io-index" 1237 + checksum = "b697ff938136625f6acf75f01951220f47a45adcf0060ee55b4671cf734dac44" 1238 dependencies = [ 1239 "cairo-rs", 1240 "field-offset", ··· 1253 1254 [[package]] 1255 name = "gtk4-macros" 1256 + version = "0.9.5" 1257 source = "registry+https://github.com/rust-lang/crates.io-index" 1258 + checksum = "0ed1786c4703dd196baf7e103525ce0cf579b3a63a0570fe653b7ee6bac33999" 1259 dependencies = [ 1260 "proc-macro-crate", 1261 "proc-macro2", ··· 1265 1266 [[package]] 1267 name = "gtk4-sys" 1268 + version = "0.9.5" 1269 source = "registry+https://github.com/rust-lang/crates.io-index" 1270 + checksum = "3af4b680cee5d2f786a2f91f1c77e95ecf2254522f0ca4edf3a2dce6cb35cecf" 1271 dependencies = [ 1272 "cairo-sys-rs", 1273 "gdk-pixbuf-sys", ··· 1293 1294 [[package]] 1295 name = "hashbrown" 1296 + version = "0.15.2" 1297 source = "registry+https://github.com/rust-lang/crates.io-index" 1298 + checksum = "bf151400ff0baff5465007dd2f3e717f3fe502074ca563069ce3a6629d07b289" 1299 1300 [[package]] 1301 name = "hashlink" ··· 1335 "iana-time-zone-haiku", 1336 "js-sys", 1337 "wasm-bindgen", 1338 + "windows-core 0.52.0", 1339 ] 1340 1341 [[package]] ··· 1488 1489 [[package]] 1490 name = "indexmap" 1491 + version = "2.7.0" 1492 source = "registry+https://github.com/rust-lang/crates.io-index" 1493 + checksum = "62f822373a4fe84d4bb149bf54e584a7f4abec90e072ed49cda0edea5b95471f" 1494 dependencies = [ 1495 "equivalent", 1496 + "hashbrown 0.15.2", 1497 ] 1498 1499 [[package]] 1500 name = "inotify" 1501 + version = "0.10.2" 1502 source = "registry+https://github.com/rust-lang/crates.io-index" 1503 + checksum = "fdd168d97690d0b8c412d6b6c10360277f4d7ee495c5d0d5d5fe0854923255cc" 1504 dependencies = [ 1505 "bitflags 1.3.2", 1506 "inotify-sys", ··· 1517 ] 1518 1519 [[package]] 1520 + name = "instant" 1521 + version = "0.1.13" 1522 source = "registry+https://github.com/rust-lang/crates.io-index" 1523 + checksum = "e0242819d153cba4b4b05a5a8f2a7e9bbf97b6055b2a002b395c96b5ff3c0222" 1524 + dependencies = [ 1525 + "cfg-if", 1526 + ] 1527 1528 [[package]] 1529 name = "itertools" ··· 1535 ] 1536 1537 [[package]] 1538 + name = "itoa" 1539 + version = "1.0.14" 1540 + source = "registry+https://github.com/rust-lang/crates.io-index" 1541 + checksum = "d75a2a4b1b190afb6f5425f10f6a8f959d2ea0b9c2b1d79553551850539e4674" 1542 + 1543 + [[package]] 1544 name = "js-sys" 1545 + version = "0.3.76" 1546 source = "registry+https://github.com/rust-lang/crates.io-index" 1547 + checksum = "6717b6b5b077764fb5966237269cb3c64edddde4b14ce42647430a78ced9e7b7" 1548 dependencies = [ 1549 + "once_cell", 1550 "wasm-bindgen", 1551 ] 1552 ··· 1577 ] 1578 1579 [[package]] 1580 + name = "kv-log-macro" 1581 + version = "1.0.7" 1582 + source = "registry+https://github.com/rust-lang/crates.io-index" 1583 + checksum = "0de8b303297635ad57c9f5059fd9cee7a47f8e8daa09df0fcd07dd39fb22977f" 1584 + dependencies = [ 1585 + "log", 1586 + ] 1587 + 1588 + [[package]] 1589 name = "lazy_static" 1590 version = "1.5.0" 1591 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1624 1625 [[package]] 1626 name = "libc" 1627 + version = "0.2.169" 1628 source = "registry+https://github.com/rust-lang/crates.io-index" 1629 + checksum = "b5aba8db14291edd000dfcc4d620c7ebfb122c613afb886ca8803fa4e128a20a" 1630 1631 [[package]] 1632 name = "libredox" ··· 1657 1658 [[package]] 1659 name = "litemap" 1660 + version = "0.7.4" 1661 source = "registry+https://github.com/rust-lang/crates.io-index" 1662 + checksum = "4ee93343901ab17bd981295f2cf0026d4ad018c7c31ba84549a4ddbb47a45104" 1663 1664 [[package]] 1665 name = "locale_config" ··· 1715 version = "0.4.22" 1716 source = "registry+https://github.com/rust-lang/crates.io-index" 1717 checksum = "a7a70ba024b9dc04c27ea2f0c0548feb474ec5c54bba33a7f72f873a39d07b24" 1718 + dependencies = [ 1719 + "value-bag", 1720 + ] 1721 1722 [[package]] 1723 name = "malloc_buf" ··· 1735 checksum = "78ca9ab1a0babb1e7d5695e3530886289c18cf2f87ec19a575a0abdce112e3a3" 1736 1737 [[package]] 1738 + name = "memmap2" 1739 + version = "0.5.10" 1740 + source = "registry+https://github.com/rust-lang/crates.io-index" 1741 + checksum = "83faa42c0a078c393f6b29d5db232d8be22776a891f8f56e5284faee4a20b327" 1742 + dependencies = [ 1743 + "libc", 1744 + ] 1745 + 1746 + [[package]] 1747 name = "memoffset" 1748 version = "0.9.1" 1749 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1753 ] 1754 1755 [[package]] 1756 + name = "miette" 1757 + version = "5.10.0" 1758 + source = "registry+https://github.com/rust-lang/crates.io-index" 1759 + checksum = "59bb584eaeeab6bd0226ccf3509a69d7936d148cf3d036ad350abe35e8c6856e" 1760 + dependencies = [ 1761 + "miette-derive", 1762 + "once_cell", 1763 + "thiserror 1.0.69", 1764 + "unicode-width", 1765 + ] 1766 + 1767 + [[package]] 1768 + name = "miette-derive" 1769 + version = "5.10.0" 1770 + source = "registry+https://github.com/rust-lang/crates.io-index" 1771 + checksum = "49e7bc1560b95a3c4a25d03de42fe76ca718ab92d1a22a55b9b4cf67b3ae635c" 1772 + dependencies = [ 1773 + "proc-macro2", 1774 + "quote", 1775 + "syn", 1776 + ] 1777 + 1778 + [[package]] 1779 name = "mime" 1780 version = "0.3.17" 1781 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1793 1794 [[package]] 1795 name = "miniz_oxide" 1796 + version = "0.8.2" 1797 source = "registry+https://github.com/rust-lang/crates.io-index" 1798 + checksum = "4ffbe83022cedc1d264172192511ae958937694cd57ce297164951b8b3568394" 1799 dependencies = [ 1800 "adler2", 1801 ] 1802 1803 [[package]] 1804 name = "mio" 1805 + version = "1.0.3" 1806 source = "registry+https://github.com/rust-lang/crates.io-index" 1807 + checksum = "2886843bf800fba2e3377cff24abf6379b4c4d5c6681eaf9ea5b0d15090450bd" 1808 dependencies = [ 1809 "libc", 1810 "log", 1811 "wasi", 1812 + "windows-sys 0.52.0", 1813 + ] 1814 + 1815 + [[package]] 1816 + name = "moka" 1817 + version = "0.12.8" 1818 + source = "registry+https://github.com/rust-lang/crates.io-index" 1819 + checksum = "32cf62eb4dd975d2dde76432fb1075c49e3ee2331cf36f1f8fd4b66550d32b6f" 1820 + dependencies = [ 1821 + "async-lock", 1822 + "async-trait", 1823 + "crossbeam-channel", 1824 + "crossbeam-epoch", 1825 + "crossbeam-utils", 1826 + "event-listener 5.3.1", 1827 + "futures-util", 1828 + "once_cell", 1829 + "parking_lot", 1830 + "quanta", 1831 + "rustc_version", 1832 + "smallvec", 1833 + "tagptr", 1834 + "thiserror 1.0.69", 1835 + "triomphe", 1836 + "uuid", 1837 ] 1838 1839 [[package]] ··· 1842 source = "registry+https://github.com/rust-lang/crates.io-index" 1843 checksum = "058bc2227727af394f34aa51da3e36aeecf2c808f39315d35f754872660750ae" 1844 dependencies = [ 1845 + "async-channel 2.3.1", 1846 "futures-channel", 1847 "serde", 1848 "trait-variant", 1849 + "zbus 4.4.0", 1850 ] 1851 1852 [[package]] ··· 1870 1871 [[package]] 1872 name = "notify" 1873 + version = "7.0.0" 1874 source = "registry+https://github.com/rust-lang/crates.io-index" 1875 + checksum = "c533b4c39709f9ba5005d8002048266593c1cfaf3c5f0739d5b8ab0c6c504009" 1876 dependencies = [ 1877 "bitflags 2.6.0", 1878 "filetime", 1879 "fsevent-sys", 1880 "inotify", ··· 1882 "libc", 1883 "log", 1884 "mio", 1885 + "notify-types", 1886 "walkdir", 1887 + "windows-sys 0.52.0", 1888 ] 1889 1890 [[package]] 1891 name = "notify-debouncer-full" 1892 + version = "0.4.0" 1893 source = "registry+https://github.com/rust-lang/crates.io-index" 1894 + checksum = "9dcf855483228259b2353f89e99df35fc639b2b2510d1166e4858e3f67ec1afb" 1895 dependencies = [ 1896 "file-id", 1897 "log", 1898 "notify", 1899 + "notify-types", 1900 "walkdir", 1901 ] 1902 1903 [[package]] 1904 + name = "notify-types" 1905 + version = "1.0.1" 1906 + source = "registry+https://github.com/rust-lang/crates.io-index" 1907 + checksum = "585d3cb5e12e01aed9e8a1f70d5c6b5e86fe2a6e48fc8cd0b3e0b8df6f6eb174" 1908 + dependencies = [ 1909 + "instant", 1910 + ] 1911 + 1912 + [[package]] 1913 name = "nu-ansi-term" 1914 version = "0.50.1" 1915 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2011 2012 [[package]] 2013 name = "pango" 2014 + version = "0.20.7" 2015 source = "registry+https://github.com/rust-lang/crates.io-index" 2016 + checksum = "9e89bd74250a03a05cec047b43465469102af803be2bf5e5a1088f8b8455e087" 2017 dependencies = [ 2018 "gio", 2019 "glib", ··· 2023 2024 [[package]] 2025 name = "pango-sys" 2026 + version = "0.20.7" 2027 source = "registry+https://github.com/rust-lang/crates.io-index" 2028 + checksum = "71787e0019b499a5eda889279e4adb455a4f3fdd6870cd5ab7f4a5aa25df6699" 2029 dependencies = [ 2030 "glib-sys", 2031 "gobject-sys", ··· 2059 "libc", 2060 "redox_syscall", 2061 "smallvec", 2062 + "windows-targets", 2063 ] 2064 2065 [[package]] ··· 2105 2106 [[package]] 2107 name = "polling" 2108 + version = "3.7.4" 2109 source = "registry+https://github.com/rust-lang/crates.io-index" 2110 + checksum = "a604568c3202727d1507653cb121dbd627a58684eb09a820fd746bee38b4442f" 2111 dependencies = [ 2112 "cfg-if", 2113 "concurrent-queue", ··· 2138 2139 [[package]] 2140 name = "proc-macro2" 2141 + version = "1.0.92" 2142 source = "registry+https://github.com/rust-lang/crates.io-index" 2143 + checksum = "37d3544b3f2748c54e147655edb5025752e2303145b5aefb3c3ea2c78b973bb0" 2144 dependencies = [ 2145 "unicode-ident", 2146 ] 2147 2148 [[package]] 2149 + name = "quanta" 2150 + version = "0.12.4" 2151 + source = "registry+https://github.com/rust-lang/crates.io-index" 2152 + checksum = "773ce68d0bb9bc7ef20be3536ffe94e223e1f365bd374108b2659fac0c65cfe6" 2153 + dependencies = [ 2154 + "crossbeam-utils", 2155 + "libc", 2156 + "once_cell", 2157 + "raw-cpuid", 2158 + "wasi", 2159 + "web-sys", 2160 + "winapi", 2161 + ] 2162 + 2163 + [[package]] 2164 name = "quote" 2165 version = "1.0.37" 2166 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2170 ] 2171 2172 [[package]] 2173 + name = "r2d2" 2174 + version = "0.8.10" 2175 + source = "registry+https://github.com/rust-lang/crates.io-index" 2176 + checksum = "51de85fb3fb6524929c8a2eb85e6b6d363de4e8c48f9e2c2eac4944abc181c93" 2177 + dependencies = [ 2178 + "log", 2179 + "parking_lot", 2180 + "scheduled-thread-pool", 2181 + ] 2182 + 2183 + [[package]] 2184 + name = "r2d2_sqlite" 2185 + version = "0.25.0" 2186 + source = "registry+https://github.com/rust-lang/crates.io-index" 2187 + checksum = "eb14dba8247a6a15b7fdbc7d389e2e6f03ee9f184f87117706d509c092dfe846" 2188 + dependencies = [ 2189 + "r2d2", 2190 + "rusqlite", 2191 + "uuid", 2192 + ] 2193 + 2194 + [[package]] 2195 name = "rand" 2196 version = "0.8.5" 2197 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2222 ] 2223 2224 [[package]] 2225 + name = "raw-cpuid" 2226 + version = "11.2.0" 2227 + source = "registry+https://github.com/rust-lang/crates.io-index" 2228 + checksum = "1ab240315c661615f2ee9f0f2cd32d5a7343a84d5ebcccb99d46e6637565e7b0" 2229 + dependencies = [ 2230 + "bitflags 2.6.0", 2231 + ] 2232 + 2233 + [[package]] 2234 name = "recordbox" 2235 + version = "0.9.0" 2236 dependencies = [ 2237 "ashpd", 2238 + "async-channel 2.3.1", 2239 "async-lock", 2240 + "cacache", 2241 "color-thief", 2242 "common-path", 2243 "flexi_logger", 2244 "futures", 2245 + "fuzzy-matcher", 2246 "gettext-rs", 2247 "gstreamer", 2248 "gstreamer-audio", 2249 "gstreamer-base", 2250 + "gstreamer-play", 2251 "gtk4", 2252 "json", 2253 "lazy_static", 2254 "libadwaita", 2255 "lofty", 2256 "log", 2257 "mime_guess", 2258 + "moka", 2259 "mpris-server", 2260 "notify-debouncer-full", 2261 + "r2d2", 2262 + "r2d2_sqlite", 2263 "rand", 2264 "rusqlite", 2265 "rusqlite_migration", 2266 "search-provider", 2267 + "strum", 2268 + "strum_macros", 2269 + "tr", 2270 + "urlencoding", 2271 "walkdir", 2272 ] 2273 2274 [[package]] 2275 name = "redox_syscall" 2276 + version = "0.5.8" 2277 source = "registry+https://github.com/rust-lang/crates.io-index" 2278 + checksum = "03a862b389f93e68874fbf580b9de08dd02facb9a788ebadaf4a3fd33cf58834" 2279 dependencies = [ 2280 "bitflags 2.6.0", 2281 ] 2282 2283 [[package]] 2284 + name = "reflink-copy" 2285 + version = "0.1.20" 2286 + source = "registry+https://github.com/rust-lang/crates.io-index" 2287 + checksum = "17400ed684c3a0615932f00c271ae3eea13e47056a1455821995122348ab6438" 2288 + dependencies = [ 2289 + "cfg-if", 2290 + "rustix", 2291 + "windows", 2292 + ] 2293 + 2294 + [[package]] 2295 name = "regex" 2296 version = "1.11.1" 2297 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2305 2306 [[package]] 2307 name = "regex-automata" 2308 + version = "0.4.9" 2309 source = "registry+https://github.com/rust-lang/crates.io-index" 2310 + checksum = "809e8dc61f6de73b46c85f4c96486310fe304c434cfa43669d7b40f711150908" 2311 dependencies = [ 2312 "aho-corasick", 2313 "memchr", ··· 2364 2365 [[package]] 2366 name = "rustix" 2367 + version = "0.38.42" 2368 source = "registry+https://github.com/rust-lang/crates.io-index" 2369 + checksum = "f93dc38ecbab2eb790ff964bb77fa94faf256fd3e73285fd7ba0903b76bedb85" 2370 dependencies = [ 2371 "bitflags 2.6.0", 2372 "errno", 2373 "libc", 2374 "linux-raw-sys", 2375 + "windows-sys 0.59.0", 2376 ] 2377 2378 [[package]] 2379 + name = "rustversion" 2380 + version = "1.0.18" 2381 + source = "registry+https://github.com/rust-lang/crates.io-index" 2382 + checksum = "0e819f2bc632f285be6d7cd36e25940d45b2391dd6d9b939e79de557f7014248" 2383 + 2384 + [[package]] 2385 + name = "ryu" 2386 + version = "1.0.18" 2387 + source = "registry+https://github.com/rust-lang/crates.io-index" 2388 + checksum = "f3cb5ba0dc43242ce17de99c180e96db90b235b8a9fdc9543c96d2209116bd9f" 2389 + 2390 + [[package]] 2391 name = "same-file" 2392 version = "1.0.6" 2393 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2397 ] 2398 2399 [[package]] 2400 + name = "scheduled-thread-pool" 2401 + version = "0.2.7" 2402 + source = "registry+https://github.com/rust-lang/crates.io-index" 2403 + checksum = "3cbc66816425a074528352f5789333ecff06ca41b36b0b0efdfbb29edc391a19" 2404 + dependencies = [ 2405 + "parking_lot", 2406 + ] 2407 + 2408 + [[package]] 2409 name = "scopeguard" 2410 version = "1.2.0" 2411 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2420 "futures-channel", 2421 "futures-util", 2422 "serde", 2423 + "zbus 4.4.0", 2424 ] 2425 2426 [[package]] 2427 name = "semver" 2428 + version = "1.0.24" 2429 source = "registry+https://github.com/rust-lang/crates.io-index" 2430 + checksum = "3cb6eb87a131f756572d7fb904f6e7b68633f09cca868c5df1c4b8d1a694bbba" 2431 2432 [[package]] 2433 name = "serde" 2434 + version = "1.0.216" 2435 source = "registry+https://github.com/rust-lang/crates.io-index" 2436 + checksum = "0b9781016e935a97e8beecf0c933758c97a5520d32930e460142b4cd80c6338e" 2437 dependencies = [ 2438 "serde_derive", 2439 ] 2440 2441 [[package]] 2442 name = "serde_derive" 2443 + version = "1.0.216" 2444 source = "registry+https://github.com/rust-lang/crates.io-index" 2445 + checksum = "46f859dbbf73865c6627ed570e78961cd3ac92407a2d117204c49232485da55e" 2446 dependencies = [ 2447 "proc-macro2", 2448 "quote", ··· 2450 ] 2451 2452 [[package]] 2453 + name = "serde_json" 2454 + version = "1.0.134" 2455 + source = "registry+https://github.com/rust-lang/crates.io-index" 2456 + checksum = "d00f4175c42ee48b15416f6193a959ba3a0d67fc699a0db9ad12df9f83991c7d" 2457 + dependencies = [ 2458 + "itoa", 2459 + "memchr", 2460 + "ryu", 2461 + "serde", 2462 + ] 2463 + 2464 + [[package]] 2465 name = "serde_repr" 2466 version = "0.1.19" 2467 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2482 ] 2483 2484 [[package]] 2485 + name = "sha-1" 2486 + version = "0.10.1" 2487 + source = "registry+https://github.com/rust-lang/crates.io-index" 2488 + checksum = "f5058ada175748e33390e40e872bd0fe59a19f265d0158daa551c5a88a76009c" 2489 + dependencies = [ 2490 + "cfg-if", 2491 + "cpufeatures", 2492 + "digest", 2493 + ] 2494 + 2495 + [[package]] 2496 name = "sha1" 2497 version = "0.10.6" 2498 source = "registry+https://github.com/rust-lang/crates.io-index" 2499 checksum = "e3bf829a2d51ab4a5ddf1352d8470c140cadc8301b2ae1789db023f01cedd6ba" 2500 + dependencies = [ 2501 + "cfg-if", 2502 + "cpufeatures", 2503 + "digest", 2504 + ] 2505 + 2506 + [[package]] 2507 + name = "sha2" 2508 + version = "0.10.8" 2509 + source = "registry+https://github.com/rust-lang/crates.io-index" 2510 + checksum = "793db75ad2bcafc3ffa7c68b215fee268f537982cd901d132f89c6343f3a3dc8" 2511 dependencies = [ 2512 "cfg-if", 2513 "cpufeatures", ··· 2528 dependencies = [ 2529 "libc", 2530 ] 2531 2532 [[package]] 2533 name = "slab" ··· 2545 checksum = "3c5e1a9a646d36c3599cd173a41282daf47c44583ad367b8e6837255952e5c67" 2546 2547 [[package]] 2548 + name = "ssri" 2549 + version = "9.2.0" 2550 + source = "registry+https://github.com/rust-lang/crates.io-index" 2551 + checksum = "da7a2b3c2bc9693bcb40870c4e9b5bf0d79f9cb46273321bf855ec513e919082" 2552 + dependencies = [ 2553 + "base64", 2554 + "digest", 2555 + "hex", 2556 + "miette", 2557 + "serde", 2558 + "sha-1", 2559 + "sha2", 2560 + "thiserror 1.0.69", 2561 + "xxhash-rust", 2562 + ] 2563 + 2564 + [[package]] 2565 name = "stable_deref_trait" 2566 version = "1.2.0" 2567 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2574 checksum = "a2eb9349b6444b326872e140eb1cf5e7c522154d69e7a0ffb0fb81c06b37543f" 2575 2576 [[package]] 2577 + name = "strum" 2578 + version = "0.26.3" 2579 + source = "registry+https://github.com/rust-lang/crates.io-index" 2580 + checksum = "8fec0f0aef304996cf250b31b5a10dee7980c85da9d759361292b8bca5a18f06" 2581 + 2582 + [[package]] 2583 + name = "strum_macros" 2584 + version = "0.26.4" 2585 + source = "registry+https://github.com/rust-lang/crates.io-index" 2586 + checksum = "4c6bee85a5a24955dc440386795aa378cd9cf82acd5f764469152d2270e581be" 2587 + dependencies = [ 2588 + "heck", 2589 + "proc-macro2", 2590 + "quote", 2591 + "rustversion", 2592 + "syn", 2593 + ] 2594 + 2595 + [[package]] 2596 name = "syn" 2597 + version = "2.0.91" 2598 source = "registry+https://github.com/rust-lang/crates.io-index" 2599 + checksum = "d53cbcb5a243bd33b7858b1d7f4aca2153490815872d86d955d6ea29f743c035" 2600 dependencies = [ 2601 "proc-macro2", 2602 "quote", ··· 2628 ] 2629 2630 [[package]] 2631 + name = "tagptr" 2632 + version = "0.2.0" 2633 + source = "registry+https://github.com/rust-lang/crates.io-index" 2634 + checksum = "7b2093cf4c8eb1e67749a6762251bc9cd836b6fc171623bd0a9d324d37af2417" 2635 + 2636 + [[package]] 2637 name = "target-lexicon" 2638 version = "0.12.16" 2639 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2647 2648 [[package]] 2649 name = "tempfile" 2650 + version = "3.14.0" 2651 source = "registry+https://github.com/rust-lang/crates.io-index" 2652 + checksum = "28cce251fcbc87fac86a866eeb0d6c2d536fc16d06f184bb61aeae11aa4cee0c" 2653 dependencies = [ 2654 "cfg-if", 2655 "fastrand", ··· 2660 2661 [[package]] 2662 name = "thiserror" 2663 + version = "1.0.69" 2664 + source = "registry+https://github.com/rust-lang/crates.io-index" 2665 + checksum = "b6aaf5339b578ea85b50e080feb250a3e8ae8cfcdff9a461c9ec2904bc923f52" 2666 + dependencies = [ 2667 + "thiserror-impl 1.0.69", 2668 + ] 2669 + 2670 + [[package]] 2671 + name = "thiserror" 2672 + version = "2.0.9" 2673 source = "registry+https://github.com/rust-lang/crates.io-index" 2674 + checksum = "f072643fd0190df67a8bab670c20ef5d8737177d6ac6b2e9a236cb096206b2cc" 2675 dependencies = [ 2676 + "thiserror-impl 2.0.9", 2677 ] 2678 2679 [[package]] 2680 name = "thiserror-impl" 2681 + version = "1.0.69" 2682 source = "registry+https://github.com/rust-lang/crates.io-index" 2683 + checksum = "4fee6c4efc90059e10f81e6d42c60a18f76588c3d74cb83a0b242a2b6c7504c1" 2684 dependencies = [ 2685 "proc-macro2", 2686 "quote", ··· 2688 ] 2689 2690 [[package]] 2691 + name = "thiserror-impl" 2692 + version = "2.0.9" 2693 + source = "registry+https://github.com/rust-lang/crates.io-index" 2694 + checksum = "7b50fa271071aae2e6ee85f842e2e28ba8cd2c5fb67f11fcb1fd70b276f9e7d4" 2695 + dependencies = [ 2696 + "proc-macro2", 2697 + "quote", 2698 + "syn", 2699 + ] 2700 + 2701 + [[package]] 2702 + name = "thread_local" 2703 + version = "1.1.8" 2704 + source = "registry+https://github.com/rust-lang/crates.io-index" 2705 + checksum = "8b9ef9bad013ada3808854ceac7b46812a6465ba368859a37e2100283d2d719c" 2706 + dependencies = [ 2707 + "cfg-if", 2708 + "once_cell", 2709 + ] 2710 + 2711 + [[package]] 2712 name = "tinystr" 2713 version = "0.7.6" 2714 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2753 ] 2754 2755 [[package]] 2756 + name = "tr" 2757 + version = "0.1.10" 2758 + source = "registry+https://github.com/rust-lang/crates.io-index" 2759 + checksum = "a592877f7cb2e5a6327b8c908fa6d51098482b1c87d478abdd783e61218f8151" 2760 + dependencies = [ 2761 + "gettext-rs", 2762 + "lazy_static", 2763 + ] 2764 + 2765 + [[package]] 2766 name = "tracing" 2767 + version = "0.1.41" 2768 source = "registry+https://github.com/rust-lang/crates.io-index" 2769 + checksum = "784e0ac535deb450455cbfa28a6f0df145ea1bb7ae51b821cf5e7927fdcfbdd0" 2770 dependencies = [ 2771 "pin-project-lite", 2772 "tracing-attributes", ··· 2775 2776 [[package]] 2777 name = "tracing-attributes" 2778 + version = "0.1.28" 2779 source = "registry+https://github.com/rust-lang/crates.io-index" 2780 + checksum = "395ae124c09f9e6918a2310af6038fba074bcf474ac352496d5910dd59a2226d" 2781 dependencies = [ 2782 "proc-macro2", 2783 "quote", ··· 2786 2787 [[package]] 2788 name = "tracing-core" 2789 + version = "0.1.33" 2790 source = "registry+https://github.com/rust-lang/crates.io-index" 2791 + checksum = "e672c95779cf947c5311f83787af4fa8fffd12fb27e4993211a84bdfd9610f9c" 2792 dependencies = [ 2793 "once_cell", 2794 ] ··· 2803 "quote", 2804 "syn", 2805 ] 2806 + 2807 + [[package]] 2808 + name = "triomphe" 2809 + version = "0.1.11" 2810 + source = "registry+https://github.com/rust-lang/crates.io-index" 2811 + checksum = "859eb650cfee7434994602c3a68b25d77ad9e68c8a6cd491616ef86661382eb3" 2812 2813 [[package]] 2814 name = "typenum" ··· 2835 2836 [[package]] 2837 name = "unicode-ident" 2838 + version = "1.0.14" 2839 + source = "registry+https://github.com/rust-lang/crates.io-index" 2840 + checksum = "adb9e6ca4f869e1180728b7950e35922a7fc6397f7b641499e8f3ef06e50dc83" 2841 + 2842 + [[package]] 2843 + name = "unicode-width" 2844 + version = "0.1.14" 2845 source = "registry+https://github.com/rust-lang/crates.io-index" 2846 + checksum = "7dd6e30e90baa6f72411720665d41d89b9a3d039dc45b8faea1ddd07f617f6af" 2847 2848 [[package]] 2849 name = "url" 2850 + version = "2.5.4" 2851 source = "registry+https://github.com/rust-lang/crates.io-index" 2852 + checksum = "32f8b686cadd1473f4bd0117a5d28d36b1ade384ea9b5069a1c40aefed7fda60" 2853 dependencies = [ 2854 "form_urlencoded", 2855 "idna", ··· 2858 ] 2859 2860 [[package]] 2861 + name = "urlencoding" 2862 + version = "2.1.3" 2863 + source = "registry+https://github.com/rust-lang/crates.io-index" 2864 + checksum = "daf8dba3b7eb870caf1ddeed7bc9d2a049f3cfdfae7cb521b087cc33ae4c49da" 2865 + 2866 + [[package]] 2867 name = "utf16_iter" 2868 version = "1.0.5" 2869 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2876 checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" 2877 2878 [[package]] 2879 + name = "uuid" 2880 + version = "1.11.0" 2881 + source = "registry+https://github.com/rust-lang/crates.io-index" 2882 + checksum = "f8c5f0a0af699448548ad1a2fbf920fb4bee257eae39953ba95cb84891a0446a" 2883 + dependencies = [ 2884 + "getrandom", 2885 + "rand", 2886 + ] 2887 + 2888 + [[package]] 2889 + name = "value-bag" 2890 + version = "1.10.0" 2891 + source = "registry+https://github.com/rust-lang/crates.io-index" 2892 + checksum = "3ef4c4aa54d5d05a279399bfa921ec387b7aba77caf7a682ae8d86785b8fdad2" 2893 + 2894 + [[package]] 2895 name = "vcpkg" 2896 version = "0.2.15" 2897 source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2927 2928 [[package]] 2929 name = "wasm-bindgen" 2930 + version = "0.2.99" 2931 source = "registry+https://github.com/rust-lang/crates.io-index" 2932 + checksum = "a474f6281d1d70c17ae7aa6a613c87fce69a127e2624002df63dcb39d6cf6396" 2933 dependencies = [ 2934 "cfg-if", 2935 "once_cell", ··· 2938 2939 [[package]] 2940 name = "wasm-bindgen-backend" 2941 + version = "0.2.99" 2942 source = "registry+https://github.com/rust-lang/crates.io-index" 2943 + checksum = "5f89bb38646b4f81674e8f5c3fb81b562be1fd936d84320f3264486418519c79" 2944 dependencies = [ 2945 "bumpalo", 2946 "log", 2947 "proc-macro2", 2948 "quote", 2949 "syn", ··· 2951 ] 2952 2953 [[package]] 2954 + name = "wasm-bindgen-futures" 2955 + version = "0.4.49" 2956 + source = "registry+https://github.com/rust-lang/crates.io-index" 2957 + checksum = "38176d9b44ea84e9184eff0bc34cc167ed044f816accfe5922e54d84cf48eca2" 2958 + dependencies = [ 2959 + "cfg-if", 2960 + "js-sys", 2961 + "once_cell", 2962 + "wasm-bindgen", 2963 + "web-sys", 2964 + ] 2965 + 2966 + [[package]] 2967 name = "wasm-bindgen-macro" 2968 + version = "0.2.99" 2969 source = "registry+https://github.com/rust-lang/crates.io-index" 2970 + checksum = "2cc6181fd9a7492eef6fef1f33961e3695e4579b9872a6f7c83aee556666d4fe" 2971 dependencies = [ 2972 "quote", 2973 "wasm-bindgen-macro-support", ··· 2975 2976 [[package]] 2977 name = "wasm-bindgen-macro-support" 2978 + version = "0.2.99" 2979 source = "registry+https://github.com/rust-lang/crates.io-index" 2980 + checksum = "30d7a95b763d3c45903ed6c81f156801839e5ee968bb07e534c44df0fcd330c2" 2981 dependencies = [ 2982 "proc-macro2", 2983 "quote", ··· 2988 2989 [[package]] 2990 name = "wasm-bindgen-shared" 2991 + version = "0.2.99" 2992 + source = "registry+https://github.com/rust-lang/crates.io-index" 2993 + checksum = "943aab3fdaaa029a6e0271b35ea10b72b943135afe9bffca82384098ad0e06a6" 2994 + 2995 + [[package]] 2996 + name = "web-sys" 2997 + version = "0.3.76" 2998 source = "registry+https://github.com/rust-lang/crates.io-index" 2999 + checksum = "04dd7223427d52553d3702c004d3b2fe07c148165faa56313cb00211e31c12bc" 3000 + dependencies = [ 3001 + "js-sys", 3002 + "wasm-bindgen", 3003 + ] 3004 3005 [[package]] 3006 name = "winapi" ··· 3034 checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" 3035 3036 [[package]] 3037 + name = "windows" 3038 + version = "0.58.0" 3039 + source = "registry+https://github.com/rust-lang/crates.io-index" 3040 + checksum = "dd04d41d93c4992d421894c18c8b43496aa748dd4c081bac0dc93eb0489272b6" 3041 + dependencies = [ 3042 + "windows-core 0.58.0", 3043 + "windows-targets", 3044 + ] 3045 + 3046 + [[package]] 3047 name = "windows-core" 3048 version = "0.52.0" 3049 source = "registry+https://github.com/rust-lang/crates.io-index" 3050 checksum = "33ab640c8d7e35bf8ba19b884ba838ceb4fba93a4e8c65a9059d08afcfc683d9" 3051 dependencies = [ 3052 + "windows-targets", 3053 ] 3054 3055 [[package]] 3056 + name = "windows-core" 3057 + version = "0.58.0" 3058 source = "registry+https://github.com/rust-lang/crates.io-index" 3059 + checksum = "6ba6d44ec8c2591c134257ce647b7ea6b20335bf6379a27dac5f1641fcf59f99" 3060 dependencies = [ 3061 + "windows-implement", 3062 + "windows-interface", 3063 + "windows-result", 3064 + "windows-strings", 3065 + "windows-targets", 3066 ] 3067 3068 [[package]] 3069 + name = "windows-implement" 3070 + version = "0.58.0" 3071 + source = "registry+https://github.com/rust-lang/crates.io-index" 3072 + checksum = "2bbd5b46c938e506ecbce286b6628a02171d56153ba733b6c741fc627ec9579b" 3073 + dependencies = [ 3074 + "proc-macro2", 3075 + "quote", 3076 + "syn", 3077 + ] 3078 + 3079 + [[package]] 3080 + name = "windows-interface" 3081 + version = "0.58.0" 3082 + source = "registry+https://github.com/rust-lang/crates.io-index" 3083 + checksum = "053c4c462dc91d3b1504c6fe5a726dd15e216ba718e84a0e46a88fbe5ded3515" 3084 + dependencies = [ 3085 + "proc-macro2", 3086 + "quote", 3087 + "syn", 3088 + ] 3089 + 3090 + [[package]] 3091 + name = "windows-result" 3092 + version = "0.2.0" 3093 source = "registry+https://github.com/rust-lang/crates.io-index" 3094 + checksum = "1d1043d8214f791817bab27572aaa8af63732e11bf84aa21a45a78d6c317ae0e" 3095 dependencies = [ 3096 + "windows-targets", 3097 + ] 3098 + 3099 + [[package]] 3100 + name = "windows-strings" 3101 + version = "0.1.0" 3102 + source = "registry+https://github.com/rust-lang/crates.io-index" 3103 + checksum = "4cd9b125c486025df0eabcb585e62173c6c9eddcec5d117d3b6e8c30e2ee4d10" 3104 + dependencies = [ 3105 + "windows-result", 3106 + "windows-targets", 3107 ] 3108 3109 [[package]] 3110 name = "windows-sys" 3111 + version = "0.52.0" 3112 source = "registry+https://github.com/rust-lang/crates.io-index" 3113 + checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" 3114 dependencies = [ 3115 + "windows-targets", 3116 ] 3117 3118 [[package]] 3119 + name = "windows-sys" 3120 + version = "0.59.0" 3121 source = "registry+https://github.com/rust-lang/crates.io-index" 3122 + checksum = "1e38bc4d79ed67fd075bcc251a1c39b32a1776bbe92e5bef1f0bf1f8c531853b" 3123 dependencies = [ 3124 + "windows-targets", 3125 ] 3126 3127 [[package]] ··· 3130 source = "registry+https://github.com/rust-lang/crates.io-index" 3131 checksum = "9b724f72796e036ab90c1021d4780d4d3d648aca59e491e6b98e725b84e99973" 3132 dependencies = [ 3133 + "windows_aarch64_gnullvm", 3134 + "windows_aarch64_msvc", 3135 + "windows_i686_gnu", 3136 "windows_i686_gnullvm", 3137 + "windows_i686_msvc", 3138 + "windows_x86_64_gnu", 3139 + "windows_x86_64_gnullvm", 3140 + "windows_x86_64_msvc", 3141 ] 3142 3143 [[package]] 3144 name = "windows_aarch64_gnullvm" 3145 version = "0.52.6" 3146 source = "registry+https://github.com/rust-lang/crates.io-index" 3147 checksum = "32a4622180e7a0ec044bb555404c800bc9fd9ec262ec147edd5989ccd0c02cd3" 3148 3149 [[package]] 3150 name = "windows_aarch64_msvc" 3151 version = "0.52.6" 3152 source = "registry+https://github.com/rust-lang/crates.io-index" 3153 checksum = "09ec2a7bb152e2252b53fa7803150007879548bc709c039df7627cabbd05d469" 3154 3155 [[package]] 3156 name = "windows_i686_gnu" ··· 3166 3167 [[package]] 3168 name = "windows_i686_msvc" 3169 version = "0.52.6" 3170 source = "registry+https://github.com/rust-lang/crates.io-index" 3171 checksum = "240948bc05c5e7c6dabba28bf89d89ffce3e303022809e73deaefe4f6ec56c66" 3172 3173 [[package]] 3174 name = "windows_x86_64_gnu" 3175 version = "0.52.6" 3176 source = "registry+https://github.com/rust-lang/crates.io-index" 3177 checksum = "147a5c80aabfbf0c7d901cb5895d1de30ef2907eb21fbbab29ca94c5b08b1a78" 3178 3179 [[package]] 3180 name = "windows_x86_64_gnullvm" 3181 version = "0.52.6" 3182 source = "registry+https://github.com/rust-lang/crates.io-index" 3183 checksum = "24d5b23dc417412679681396f2b49f3de8c1473deb516bd34410872eff51ed0d" 3184 3185 [[package]] 3186 name = "windows_x86_64_msvc" 3187 version = "0.52.6" 3188 source = "registry+https://github.com/rust-lang/crates.io-index" 3189 checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" ··· 3220 ] 3221 3222 [[package]] 3223 + name = "xxhash-rust" 3224 + version = "0.8.14" 3225 + source = "registry+https://github.com/rust-lang/crates.io-index" 3226 + checksum = "d7d48f1b18be023c95e7b75f481cac649d74be7c507ff4a407c55cfb957f7934" 3227 + 3228 + [[package]] 3229 name = "yoke" 3230 + version = "0.7.5" 3231 source = "registry+https://github.com/rust-lang/crates.io-index" 3232 + checksum = "120e6aef9aa629e3d4f52dc8cc43a015c7724194c97dfaf45180d2daf2b77f40" 3233 dependencies = [ 3234 "serde", 3235 "stable_deref_trait", ··· 3239 3240 [[package]] 3241 name = "yoke-derive" 3242 + version = "0.7.5" 3243 source = "registry+https://github.com/rust-lang/crates.io-index" 3244 + checksum = "2380878cad4ac9aac1e2435f3eb4020e8374b5f13c296cb75b4620ff8e229154" 3245 dependencies = [ 3246 "proc-macro2", 3247 "quote", ··· 3266 "async-trait", 3267 "blocking", 3268 "enumflags2", 3269 + "event-listener 5.3.1", 3270 "futures-core", 3271 "futures-sink", 3272 "futures-util", ··· 3282 "uds_windows", 3283 "windows-sys 0.52.0", 3284 "xdg-home", 3285 + "zbus_macros 4.4.0", 3286 + "zbus_names 3.0.0", 3287 + "zvariant 4.2.0", 3288 + ] 3289 + 3290 + [[package]] 3291 + name = "zbus" 3292 + version = "5.2.0" 3293 + source = "registry+https://github.com/rust-lang/crates.io-index" 3294 + checksum = "fb67eadba43784b6fb14857eba0d8fc518686d3ee537066eb6086dc318e2c8a1" 3295 + dependencies = [ 3296 + "async-broadcast", 3297 + "async-executor", 3298 + "async-fs", 3299 + "async-io", 3300 + "async-lock", 3301 + "async-process", 3302 + "async-recursion", 3303 + "async-task", 3304 + "async-trait", 3305 + "blocking", 3306 + "enumflags2", 3307 + "event-listener 5.3.1", 3308 + "futures-core", 3309 + "futures-util", 3310 + "hex", 3311 + "nix", 3312 + "ordered-stream", 3313 + "serde", 3314 + "serde_repr", 3315 + "static_assertions", 3316 + "tracing", 3317 + "uds_windows", 3318 + "windows-sys 0.59.0", 3319 + "winnow", 3320 + "xdg-home", 3321 + "zbus_macros 5.2.0", 3322 + "zbus_names 4.1.0", 3323 + "zvariant 5.1.0", 3324 ] 3325 3326 [[package]] ··· 3333 "proc-macro2", 3334 "quote", 3335 "syn", 3336 + "zvariant_utils 2.1.0", 3337 + ] 3338 + 3339 + [[package]] 3340 + name = "zbus_macros" 3341 + version = "5.2.0" 3342 + source = "registry+https://github.com/rust-lang/crates.io-index" 3343 + checksum = "2c9d49ebc960ceb660f2abe40a5904da975de6986f2af0d7884b39eec6528c57" 3344 + dependencies = [ 3345 + "proc-macro-crate", 3346 + "proc-macro2", 3347 + "quote", 3348 + "syn", 3349 + "zbus_names 4.1.0", 3350 + "zvariant 5.1.0", 3351 + "zvariant_utils 3.0.2", 3352 ] 3353 3354 [[package]] ··· 3359 dependencies = [ 3360 "serde", 3361 "static_assertions", 3362 + "zvariant 4.2.0", 3363 + ] 3364 + 3365 + [[package]] 3366 + name = "zbus_names" 3367 + version = "4.1.0" 3368 + source = "registry+https://github.com/rust-lang/crates.io-index" 3369 + checksum = "856b7a38811f71846fd47856ceee8bccaec8399ff53fb370247e66081ace647b" 3370 + dependencies = [ 3371 + "serde", 3372 + "static_assertions", 3373 + "winnow", 3374 + "zvariant 5.1.0", 3375 ] 3376 3377 [[package]] ··· 3397 3398 [[package]] 3399 name = "zerofrom" 3400 + version = "0.1.5" 3401 source = "registry+https://github.com/rust-lang/crates.io-index" 3402 + checksum = "cff3ee08c995dee1859d998dea82f7374f2826091dd9cd47def953cae446cd2e" 3403 dependencies = [ 3404 "zerofrom-derive", 3405 ] 3406 3407 [[package]] 3408 name = "zerofrom-derive" 3409 + version = "0.1.5" 3410 source = "registry+https://github.com/rust-lang/crates.io-index" 3411 + checksum = "595eed982f7d355beb85837f651fa22e90b3c044842dc7f2c2842c086f295808" 3412 dependencies = [ 3413 "proc-macro2", 3414 "quote", ··· 3448 "enumflags2", 3449 "serde", 3450 "static_assertions", 3451 + "zvariant_derive 4.2.0", 3452 + ] 3453 + 3454 + [[package]] 3455 + name = "zvariant" 3456 + version = "5.1.0" 3457 + source = "registry+https://github.com/rust-lang/crates.io-index" 3458 + checksum = "a1200ee6ac32f1e5a312e455a949a4794855515d34f9909f4a3e082d14e1a56f" 3459 + dependencies = [ 3460 + "endi", 3461 + "enumflags2", 3462 + "serde", 3463 + "static_assertions", 3464 "url", 3465 + "winnow", 3466 + "zvariant_derive 5.1.0", 3467 + "zvariant_utils 3.0.2", 3468 ] 3469 3470 [[package]] ··· 3477 "proc-macro2", 3478 "quote", 3479 "syn", 3480 + "zvariant_utils 2.1.0", 3481 + ] 3482 + 3483 + [[package]] 3484 + name = "zvariant_derive" 3485 + version = "5.1.0" 3486 + source = "registry+https://github.com/rust-lang/crates.io-index" 3487 + checksum = "687e3b97fae6c9104fbbd36c73d27d149abf04fb874e2efbd84838763daa8916" 3488 + dependencies = [ 3489 + "proc-macro-crate", 3490 + "proc-macro2", 3491 + "quote", 3492 + "syn", 3493 + "zvariant_utils 3.0.2", 3494 ] 3495 3496 [[package]] ··· 3503 "quote", 3504 "syn", 3505 ] 3506 + 3507 + [[package]] 3508 + name = "zvariant_utils" 3509 + version = "3.0.2" 3510 + source = "registry+https://github.com/rust-lang/crates.io-index" 3511 + checksum = "20d1d011a38f12360e5fcccceeff5e2c42a8eb7f27f0dcba97a0862ede05c9c6" 3512 + dependencies = [ 3513 + "proc-macro2", 3514 + "quote", 3515 + "serde", 3516 + "static_assertions", 3517 + "syn", 3518 + "winnow", 3519 + ]
+2 -2
pkgs/by-name/re/recordbox/package.nix
··· 24 25 stdenv.mkDerivation (finalAttrs: { 26 pname = "recordbox"; 27 - version = "0.8.3"; 28 29 src = fetchFromGitea { 30 domain = "codeberg.org"; 31 owner = "edestcroix"; 32 repo = "Recordbox"; 33 rev = "refs/tags/v${finalAttrs.version}"; 34 - hash = "sha256-/yg/75LswCj3HhsUhMXgIDpx2tlNkdTuImkqMwU6uio="; 35 }; 36 37 # Patch in our Cargo.lock and ensure AppStream tests don't use the network
··· 24 25 stdenv.mkDerivation (finalAttrs: { 26 pname = "recordbox"; 27 + version = "0.9.0"; 28 29 src = fetchFromGitea { 30 domain = "codeberg.org"; 31 owner = "edestcroix"; 32 repo = "Recordbox"; 33 rev = "refs/tags/v${finalAttrs.version}"; 34 + hash = "sha256-KfIlh9ORqjJ5V8mNOx7Q9jsYg4OJDX6q+ht+eckxMRU="; 35 }; 36 37 # Patch in our Cargo.lock and ensure AppStream tests don't use the network
+9
pkgs/by-name/se/seafile-server/package.nix
··· 2 stdenv, 3 lib, 4 fetchFromGitHub, 5 pkg-config, 6 python3, 7 autoreconfHook, ··· 67 vala 68 libevhtp 69 oniguruma 70 ]; 71 72 postInstall = ''
··· 2 stdenv, 3 lib, 4 fetchFromGitHub, 5 + fetchpatch, 6 pkg-config, 7 python3, 8 autoreconfHook, ··· 68 vala 69 libevhtp 70 oniguruma 71 + ]; 72 + 73 + patches = [ 74 + # https://github.com/haiwen/seafile-server/pull/658 75 + (fetchpatch { 76 + url = "https://github.com/haiwen/seafile-server/commit/8029a11a731bfe142af43f230f47b93811ebaaaa.patch"; 77 + hash = "sha256-AWNDXIyrKXgqgq3p0m8+s3YH8dKxWnf7uEMYzSsjmX4="; 78 + }) 79 ]; 80 81 postInstall = ''
+2 -2
pkgs/by-name/si/simdutf/package.nix
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "simdutf"; 11 - version = "5.7.2"; 12 13 src = fetchFromGitHub { 14 owner = "simdutf"; 15 repo = "simdutf"; 16 rev = "v${finalAttrs.version}"; 17 - hash = "sha256-rSEl5g9FZiOrYRoHkBAUbMWE1kZvl3pbhkskzoMbIb0="; 18 }; 19 20 # Fix build on darwin
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "simdutf"; 11 + version = "6.0.3"; 12 13 src = fetchFromGitHub { 14 owner = "simdutf"; 15 repo = "simdutf"; 16 rev = "v${finalAttrs.version}"; 17 + hash = "sha256-BTnj7SUKgbJ2LM2gzw+8bSJ4+Zd6Z/KZy9B46fxIvsg="; 18 }; 19 20 # Fix build on darwin
+2 -2
pkgs/by-name/sw/swiftlint/package.nix
··· 8 }: 9 stdenvNoCC.mkDerivation rec { 10 pname = "swiftlint"; 11 - version = "0.57.1"; 12 13 src = fetchurl { 14 url = "https://github.com/realm/SwiftLint/releases/download/${version}/portable_swiftlint.zip"; 15 - hash = "sha256-qi4Pj4JyVF5Vk+vt14cttREy/OxOrXbQAbvhevaceuU="; 16 }; 17 18 dontPatch = true;
··· 8 }: 9 stdenvNoCC.mkDerivation rec { 10 pname = "swiftlint"; 11 + version = "0.58.0"; 12 13 src = fetchurl { 14 url = "https://github.com/realm/SwiftLint/releases/download/${version}/portable_swiftlint.zip"; 15 + hash = "sha256-Mp8S0f/xn3XHF4/doLF5s/kvhE+X6KiswY+3lZ/J4wc="; 16 }; 17 18 dontPatch = true;
+7 -6
pkgs/by-name/te/tempo/package.nix
··· 1 { 2 lib, 3 - buildGo122Module, 4 fetchFromGitHub, 5 }: 6 7 - # Does not build with Go 1.23 8 - # FIXME: check again for next release 9 - buildGo122Module rec { 10 pname = "tempo"; 11 - version = "2.6.0"; 12 13 src = fetchFromGitHub { 14 owner = "grafana"; 15 repo = "tempo"; 16 rev = "v${version}"; 17 fetchSubmodules = true; 18 - hash = "sha256-jWoGKY+kC9VAK7jPFaGMJQkC/JeAiUjzqKhE2XjuJio="; 19 }; 20 21 vendorHash = null; ··· 38 39 # tests use docker 40 doCheck = false; 41 42 meta = with lib; { 43 description = "High volume, minimal dependency trace storage";
··· 1 { 2 lib, 3 + buildGoModule, 4 fetchFromGitHub, 5 + nix-update-script, 6 }: 7 8 + buildGoModule rec { 9 pname = "tempo"; 10 + version = "2.7.0"; 11 12 src = fetchFromGitHub { 13 owner = "grafana"; 14 repo = "tempo"; 15 rev = "v${version}"; 16 fetchSubmodules = true; 17 + hash = "sha256-aCtITq5qT0a1DuoSDK3F46cPvfVsvXOPkZELEuRYi5w="; 18 }; 19 20 vendorHash = null; ··· 37 38 # tests use docker 39 doCheck = false; 40 + 41 + passthru.updateScript = nix-update-script { }; 42 43 meta = with lib; { 44 description = "High volume, minimal dependency trace storage";
+2 -2
pkgs/by-name/ti/ticktick/package.nix
··· 16 }: 17 stdenv.mkDerivation (finalAttrs: { 18 pname = "ticktick"; 19 - version = "6.0.10"; 20 21 src = fetchurl { 22 url = "https://d2atcrkye2ik4e.cloudfront.net/download/linux/linux_deb_x64/ticktick-${finalAttrs.version}-amd64.deb"; 23 - hash = "sha256-/SaQJFaz8quuFk4bLmRrvfYpqyDNTV/dJBrAJpOT4S4="; 24 }; 25 26 nativeBuildInputs = [
··· 16 }: 17 stdenv.mkDerivation (finalAttrs: { 18 pname = "ticktick"; 19 + version = "6.0.20"; 20 21 src = fetchurl { 22 url = "https://d2atcrkye2ik4e.cloudfront.net/download/linux/linux_deb_x64/ticktick-${finalAttrs.version}-amd64.deb"; 23 + hash = "sha256-aKUK0/9Y/ac9ISYJnWDUdwmvN8UYKzTY0f94nd8ofGw="; 24 }; 25 26 nativeBuildInputs = [
+2 -2
pkgs/by-name/tr/traccar/package.nix
··· 6 }: 7 stdenvNoCC.mkDerivation rec { 8 pname = "traccar"; 9 - version = "6.5"; 10 nativeBuildInputs = [ pkgs.makeWrapper ]; 11 12 src = fetchzip { 13 stripRoot = false; 14 url = "https://github.com/traccar/traccar/releases/download/v${version}/traccar-other-${version}.zip"; 15 - hash = "sha256-XCG3G24oe/qR6LiMJASb9STOnyTCtw+2HigaPawcQvU="; 16 }; 17 18 installPhase = ''
··· 6 }: 7 stdenvNoCC.mkDerivation rec { 8 pname = "traccar"; 9 + version = "6.6"; 10 nativeBuildInputs = [ pkgs.makeWrapper ]; 11 12 src = fetchzip { 13 stripRoot = false; 14 url = "https://github.com/traccar/traccar/releases/download/v${version}/traccar-other-${version}.zip"; 15 + hash = "sha256-NhsIp6u9XIMZC5PMTYBPAqpW4iNJWC0J4zxbG3c12cs="; 16 }; 17 18 installPhase = ''
+2 -2
pkgs/by-name/vo/vokoscreen-ng/package.nix
··· 13 14 stdenv.mkDerivation rec { 15 pname = "vokoscreen-ng"; 16 - version = "4.3.0"; 17 18 src = fetchFromGitHub { 19 owner = "vkohaupt"; 20 repo = "vokoscreenNG"; 21 tag = version; 22 - hash = "sha256-efgvq/jl/ecjtINy5BdqtYRp2gxEvOsMzQVyCZ3ig+Q="; 23 }; 24 25 qmakeFlags = [ "src/vokoscreenNG.pro" ];
··· 13 14 stdenv.mkDerivation rec { 15 pname = "vokoscreen-ng"; 16 + version = "4.4.0"; 17 18 src = fetchFromGitHub { 19 owner = "vkohaupt"; 20 repo = "vokoscreenNG"; 21 tag = version; 22 + hash = "sha256-5rESTLIvjc/Jztc7LAPl74fxgDsam9SfBa6B5yTXb8E="; 23 }; 24 25 qmakeFlags = [ "src/vokoscreenNG.pro" ];
+6 -6
pkgs/by-name/we/webdav/package.nix
··· 2 3 buildGo123Module rec { 4 pname = "webdav"; 5 - version = "5.7.0"; 6 7 src = fetchFromGitHub { 8 owner = "hacdias"; 9 repo = "webdav"; 10 - rev = "v${version}"; 11 - sha256 = "sha256-vQLYg7qqNO3b/93fO6/zydsakfvyfYSsCUGwNPF6PXY="; 12 }; 13 14 vendorHash = "sha256-x5CUy46c4SunzMw/v2DWpdahuXFZnJdGInQ0lSho/es="; 15 16 __darwinAllowLocalNetworking = true; 17 18 - meta = with lib; { 19 description = "Simple WebDAV server"; 20 homepage = "https://github.com/hacdias/webdav"; 21 - license = licenses.mit; 22 - maintainers = with maintainers; [ 23 pmy 24 pbsds 25 ];
··· 2 3 buildGo123Module rec { 4 pname = "webdav"; 5 + version = "5.7.1"; 6 7 src = fetchFromGitHub { 8 owner = "hacdias"; 9 repo = "webdav"; 10 + tag = "v${version}"; 11 + hash = "sha256-nLQ77RuOGYaL+U3X3yb4Kq47NA1A3SSUMKBbFnRP6o4="; 12 }; 13 14 vendorHash = "sha256-x5CUy46c4SunzMw/v2DWpdahuXFZnJdGInQ0lSho/es="; 15 16 __darwinAllowLocalNetworking = true; 17 18 + meta = { 19 description = "Simple WebDAV server"; 20 homepage = "https://github.com/hacdias/webdav"; 21 + license = lib.licenses.mit; 22 + maintainers = with lib.maintainers; [ 23 pmy 24 pbsds 25 ];
+4 -3
pkgs/by-name/wl/wluma/package.nix
··· 17 18 rustPlatform.buildRustPackage rec { 19 pname = "wluma"; 20 - version = "4.5.1"; 21 22 src = fetchFromGitHub { 23 owner = "maximbaz"; 24 repo = "wluma"; 25 rev = version; 26 - sha256 = "sha256-5uSExmh1a88kZDly4VrHzI8YwfTDB8wm2mMGZyvKsk4="; 27 }; 28 29 postPatch = '' ··· 39 'ExecStart=/usr/bin/wluma' 'ExecStart=${placeholder "out"}/bin/wluma' 40 ''; 41 42 - cargoHash = "sha256-hKxKEs88tB05AiWC/LuC/0jJ1RxeUnpp35A6UTQK4xw="; 43 44 nativeBuildInputs = [ 45 makeWrapper ··· 77 yshym 78 jmc-figueira 79 atemu 80 ]; 81 platforms = platforms.linux; 82 mainProgram = "wluma";
··· 17 18 rustPlatform.buildRustPackage rec { 19 pname = "wluma"; 20 + version = "4.6.0"; 21 22 src = fetchFromGitHub { 23 owner = "maximbaz"; 24 repo = "wluma"; 25 rev = version; 26 + sha256 = "sha256-Z4sd2v6Ukr0bLGMiG/oBi0uic87Y1Ag9C3ZgyrR4VmI="; 27 }; 28 29 postPatch = '' ··· 39 'ExecStart=/usr/bin/wluma' 'ExecStart=${placeholder "out"}/bin/wluma' 40 ''; 41 42 + cargoHash = "sha256-QyRGKhKsCVt6ykzzr+WJdiLpIZHVvL5sRzNucg/3llk="; 43 44 nativeBuildInputs = [ 45 makeWrapper ··· 77 yshym 78 jmc-figueira 79 atemu 80 + Rishik-Y 81 ]; 82 platforms = platforms.linux; 83 mainProgram = "wluma";
+2 -2
pkgs/by-name/xs/xssproxy/package.nix
··· 10 11 stdenv.mkDerivation rec { 12 pname = "xssproxy"; 13 - version = "1.1.0"; 14 15 src = fetchFromGitHub { 16 owner = "vincentbernat"; 17 repo = "xssproxy"; 18 rev = "v${version}"; 19 - sha256 = "sha256-BE/v1CJAwKwxlK3Xg3ezD+IXyT7ZFGz3bQzGxFQfEnU="; 20 }; 21 22 nativeBuildInputs = [ pkg-config ];
··· 10 11 stdenv.mkDerivation rec { 12 pname = "xssproxy"; 13 + version = "1.1.1"; 14 15 src = fetchFromGitHub { 16 owner = "vincentbernat"; 17 repo = "xssproxy"; 18 rev = "v${version}"; 19 + sha256 = "sha256-OPzFI1ifbV/DJo0hC2xybHKaWTprictN0muKtuq1JaY="; 20 }; 21 22 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/desktops/gnome/extensions/guillotine/default.nix
··· 9 # https://gitlab.com/ente76/guillotine/-/issues/17 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "gnome-shell-extension-guillotine"; 12 - version = "24"; 13 14 src = fetchFromGitLab { 15 owner = "ente76"; 16 repo = "guillotine"; 17 rev = "v${finalAttrs.version}"; 18 - hash = "sha256-eNhK3h9luPGXHR3lPkfu/mUN9+ixma64rbCk0cjF4Fc="; 19 }; 20 21 nativeBuildInputs = [ glib ];
··· 9 # https://gitlab.com/ente76/guillotine/-/issues/17 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "gnome-shell-extension-guillotine"; 12 + version = "25"; 13 14 src = fetchFromGitLab { 15 owner = "ente76"; 16 repo = "guillotine"; 17 rev = "v${finalAttrs.version}"; 18 + hash = "sha256-HEk1owolLIea4kymoVVeviZ1Ms0kSuHWUda+u+uIh0A="; 19 }; 20 21 nativeBuildInputs = [ glib ];
+1 -1
pkgs/development/libraries/opencolorio/default.nix
··· 49 --replace 'OCIO_ADD_TEST(Config, virtual_display_with_active_displays)' 'static void _skip_virtual_display_with_active_displays()' 50 ''; 51 52 - nativeBuildInputs = [ cmake ]; 53 buildInputs = 54 [ 55 expat
··· 49 --replace 'OCIO_ADD_TEST(Config, virtual_display_with_active_displays)' 'static void _skip_virtual_display_with_active_displays()' 50 ''; 51 52 + nativeBuildInputs = [ cmake ] ++ lib.optionals pythonBindings [ python3Packages.python ]; 53 buildInputs = 54 [ 55 expat
+7
pkgs/development/python-modules/pyrender/default.nix
··· 39 url = "https://github.com/mmatl/pyrender/commit/7c613e8aed7142df9ff40767a8f10b7a19b6255c.patch"; 40 hash = "sha256-SXRV9RC3PfQGjjIQ+n97HZrSDPae3rAHnTBiHXSFLaY="; 41 }) 42 ]; 43 44 # trimesh too new
··· 39 url = "https://github.com/mmatl/pyrender/commit/7c613e8aed7142df9ff40767a8f10b7a19b6255c.patch"; 40 hash = "sha256-SXRV9RC3PfQGjjIQ+n97HZrSDPae3rAHnTBiHXSFLaY="; 41 }) 42 + # fix on numpy 2.0 (np.infty -> np.inf) 43 + # https://github.com/mmatl/pyrender/pull/292 44 + (fetchpatch { 45 + name = "fix-numpy2.patch"; 46 + url = "https://github.com/mmatl/pyrender/commit/5408c7b45261473511d2399ab625efe11f0b6991.patch"; 47 + hash = "sha256-RIv6lMpxMmops5Tb1itzYdT7GkhPScVWslBXITR3IBM="; 48 + }) 49 ]; 50 51 # trimesh too new
+5
pkgs/development/python-modules/pyunpack/default.nix
··· 45 46 pythonImportsCheck = [ "pyunpack" ]; 47 48 disabledTestPaths = [ 49 # unfree 50 "tests/test_rar.py"
··· 45 46 pythonImportsCheck = [ "pyunpack" ]; 47 48 + disabledTests = [ 49 + # pinning test of `--help` sensitive to python version 50 + "test_help" 51 + ]; 52 + 53 disabledTestPaths = [ 54 # unfree 55 "tests/test_rar.py"
+9 -3
pkgs/development/python-modules/remi/default.nix
··· 2 lib, 3 buildPythonPackage, 4 fetchFromGitHub, 5 setuptools, 6 pytestCheckHook, 7 matplotlib, 8 python-snap7, 9 opencv4, 10 }: ··· 43 44 build-system = [ setuptools ]; 45 46 - dependencies = [ 47 - setuptools # pkg_resources is referenced at runtime 48 - ]; 49 50 nativeCheckInputs = [ 51 pytestCheckHook
··· 2 lib, 3 buildPythonPackage, 4 fetchFromGitHub, 5 + pythonOlder, 6 setuptools, 7 pytestCheckHook, 8 matplotlib, 9 + legacy-cgi, 10 python-snap7, 11 opencv4, 12 }: ··· 45 46 build-system = [ setuptools ]; 47 48 + dependencies = 49 + [ 50 + setuptools # pkg_resources is referenced at runtime 51 + ] 52 + ++ lib.optionals (!pythonOlder "3.13") [ 53 + legacy-cgi 54 + ]; 55 56 nativeCheckInputs = [ 57 pytestCheckHook
+8
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
··· 17 freefont_ttf, 18 wrapQtAppsHook, 19 qtwayland, 20 }: 21 22 stdenv.mkDerivation (finalAttrs: { ··· 27 url = "https://git.kernel.org/pub/scm/utils/trace-cmd/kernel-shark.git/snapshot/kernelshark-v${finalAttrs.version}.tar.gz"; 28 hash = "sha256-KV8ahV2koX7OL1C42H5If14e7m54jv0DlZ1dNsVRUWE="; 29 }; 30 31 outputs = [ "out" ]; 32
··· 17 freefont_ttf, 18 wrapQtAppsHook, 19 qtwayland, 20 + fetchpatch, 21 }: 22 23 stdenv.mkDerivation (finalAttrs: { ··· 28 url = "https://git.kernel.org/pub/scm/utils/trace-cmd/kernel-shark.git/snapshot/kernelshark-v${finalAttrs.version}.tar.gz"; 29 hash = "sha256-KV8ahV2koX7OL1C42H5If14e7m54jv0DlZ1dNsVRUWE="; 30 }; 31 + 32 + patches = [ 33 + (fetchpatch { 34 + url = "https://git.kernel.org/pub/scm/utils/trace-cmd/kernel-shark.git/patch/?id=9e33324644fff49b7aa15d34f836e72af8b32c78"; 35 + hash = "sha256-2XtEQ4WscLlUiEQYG2HiHuysMzVzlG05PVreLRVM8Lc="; 36 + }) 37 + ]; 38 39 outputs = [ "out" ]; 40
-30
pkgs/os-specific/linux/zfs/2_1.nix
··· 1 - { callPackage 2 - , kernel ? null 3 - , stdenv 4 - , lib 5 - , nixosTests 6 - , ... 7 - } @ args: 8 - 9 - let 10 - stdenv' = if kernel == null then stdenv else kernel.stdenv; 11 - in 12 - callPackage ./generic.nix args { 13 - # You have to ensure that in `pkgs/top-level/linux-kernels.nix` 14 - # this attribute is the correct one for this package. 15 - kernelModuleAttribute = "zfs_2_1"; 16 - # check the release notes for compatible kernels 17 - kernelCompatible = kernel: kernel.kernelOlder "6.8"; 18 - 19 - # This is a fixed version to the 2.1.x series, move only 20 - # if the 2.1.x series moves. 21 - version = "2.1.16"; 22 - 23 - hash = "sha256-egs7paAOdbRAJH4QwIjlK3jAL/le51kDQrdW4deHfAI="; 24 - 25 - tests = { 26 - inherit (nixosTests.zfs) series_2_1; 27 - }; 28 - 29 - maintainers = [ lib.maintainers.raitobezarius ]; 30 - }
···
+33
pkgs/os-specific/linux/zfs/2_3.nix
···
··· 1 + { 2 + callPackage, 3 + kernel ? null, 4 + stdenv, 5 + lib, 6 + nixosTests, 7 + ... 8 + }@args: 9 + 10 + let 11 + stdenv' = if kernel == null then stdenv else kernel.stdenv; 12 + in 13 + callPackage ./generic.nix args { 14 + # You have to ensure that in `pkgs/top-level/linux-kernels.nix` 15 + # this attribute is the correct one for this package. 16 + kernelModuleAttribute = "zfs_2_3"; 17 + # check the release notes for compatible kernels 18 + kernelCompatible = kernel: kernel.kernelOlder "6.13"; 19 + 20 + # this package should point to the latest release. 21 + version = "2.3.0"; 22 + 23 + tests = { 24 + inherit (nixosTests.zfs) installer series_2_3; 25 + }; 26 + 27 + maintainers = with lib.maintainers; [ 28 + adamcstephens 29 + amarshall 30 + ]; 31 + 32 + hash = "sha256-ZWWrVwMP/DSSIxuXp6GuHCD0wiRekHbRXFGaclqd/ns="; 33 + }
+2 -2
pkgs/os-specific/linux/zfs/unstable.nix
··· 21 # IMPORTANT: Always use a tagged release candidate or commits from the 22 # zfs-<version>-staging branch, because this is tested by the OpenZFS 23 # maintainers. 24 - version = "2.3.0-rc5"; 25 # rev = ""; 26 27 tests = { 28 inherit (nixosTests.zfs) unstable; 29 }; 30 31 - hash = "sha256-gTpj1hYEkx+f/VvvfgeZeqwUhBVQyOIMKic8AaiwYzg="; 32 33 extraLongDescription = '' 34 This is "unstable" ZFS, and will usually be a pre-release version of ZFS.
··· 21 # IMPORTANT: Always use a tagged release candidate or commits from the 22 # zfs-<version>-staging branch, because this is tested by the OpenZFS 23 # maintainers. 24 + version = "2.3.0"; 25 # rev = ""; 26 27 tests = { 28 inherit (nixosTests.zfs) unstable; 29 }; 30 31 + hash = "sha256-ZWWrVwMP/DSSIxuXp6GuHCD0wiRekHbRXFGaclqd/ns="; 32 33 extraLongDescription = '' 34 This is "unstable" ZFS, and will usually be a pre-release version of ZFS.
+2 -2
pkgs/servers/home-assistant/custom-lovelace-modules/bubble-card/package.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "bubble-card"; 9 - version = "2.3.3"; 10 11 dontBuild = true; 12 ··· 14 owner = "Clooos"; 15 repo = "Bubble-Card"; 16 rev = "v${version}"; 17 - hash = "sha256-fBkiOhUwXa7Fy8Q7n2DBrTek7SQF37exQkvBREWx0Zk="; 18 }; 19 20 installPhase = ''
··· 6 7 stdenv.mkDerivation rec { 8 pname = "bubble-card"; 9 + version = "2.3.4"; 10 11 dontBuild = true; 12 ··· 14 owner = "Clooos"; 15 repo = "Bubble-Card"; 16 rev = "v${version}"; 17 + hash = "sha256-90If8QKlxacJZoEG3+IFHPd9cuFJS5Ki9XMdTaq67IA="; 18 }; 19 20 installPhase = ''
+3 -3
pkgs/servers/spicedb/zed.nix
··· 6 7 buildGoModule rec { 8 pname = "zed"; 9 - version = "0.21.2"; 10 11 src = fetchFromGitHub { 12 owner = "authzed"; 13 repo = "zed"; 14 rev = "v${version}"; 15 - hash = "sha256-nSvWNelmqzgwf7M+9drqahwwo+YoQLgEscnigsBUwdI="; 16 }; 17 18 - vendorHash = "sha256-uTuI8rYmRUkbRf46+hZm1xHflFDcro6hVG8aI2C4eWs="; 19 20 ldflags = [ 21 "-X 'github.com/jzelinskie/cobrautil/v2.Version=${src.rev}'"
··· 6 7 buildGoModule rec { 8 pname = "zed"; 9 + version = "0.24.0"; 10 11 src = fetchFromGitHub { 12 owner = "authzed"; 13 repo = "zed"; 14 rev = "v${version}"; 15 + hash = "sha256-gaTTHkJkKO3MY5tAVJNHEq6ZkcS1iSBSEh1eyPzsXQY="; 16 }; 17 18 + vendorHash = "sha256-7UwpkmFwYT8XP00pTlOK25WDweaalQfA4zX7yvlFWow="; 19 20 ldflags = [ 21 "-X 'github.com/jzelinskie/cobrautil/v2.Version=${src.rev}'"
+2
pkgs/test/default.nix
··· 155 156 nixos-functions = callPackage ./nixos-functions { }; 157 158 overriding = callPackage ./overriding.nix { }; 159 160 texlive = callPackage ./texlive { };
··· 155 156 nixos-functions = callPackage ./nixos-functions { }; 157 158 + nixosOptionsDoc = callPackage ../../nixos/lib/make-options-doc/tests.nix { }; 159 + 160 overriding = callPackage ./overriding.nix { }; 161 162 texlive = callPackage ./texlive { };
+166 -118
pkgs/test/overriding.nix
··· 1 - { lib, pkgs, stdenvNoCC }: 2 3 let 4 - tests = 5 let 6 - p = pkgs.python3Packages.xpybutil.overridePythonAttrs (_: { dontWrapPythonPrograms = true; }); 7 in 8 { 9 - overridePythonAttrs = { 10 - expr = !lib.hasInfix "wrapPythonPrograms" p.postFixup; 11 - expected = true; 12 - }; 13 repeatedOverrides-pname = { 14 expr = repeatedOverrides.pname == "a-better-hello-with-blackjack"; 15 expected = true; ··· 24 }; 25 overriding-using-only-attrset-no-final-attrs = { 26 name = "overriding-using-only-attrset-no-final-attrs"; 27 - expr = ((stdenvNoCC.mkDerivation { pname = "hello-no-final-attrs"; }).overrideAttrs { pname = "hello-no-final-attrs-overridden"; }).pname == "hello-no-final-attrs-overridden"; 28 - expected = true; 29 - }; 30 - buildGoModule-overrideAttrs = { 31 - expr = lib.all ( 32 - attrPath: 33 - let 34 - attrPathPretty = lib.concatStringsSep "." attrPath; 35 - valueNative = lib.getAttrFromPath attrPath pet_0_4_0; 36 - valueOverridden = lib.getAttrFromPath attrPath pet_0_4_0-overridden; 37 - in 38 - lib.warnIfNot 39 - (valueNative == valueOverridden) 40 - "pet_0_4_0.${attrPathPretty} (${valueNative}) does not equal pet_0_4_0-overridden.${attrPathPretty} (${valueOverridden})" 41 - true 42 - ) [ 43 - [ "drvPath" ] 44 - [ "name" ] 45 - [ "pname" ] 46 - [ "version" ] 47 - [ "vendorHash" ] 48 - [ "goModules" "drvPath" ] 49 - [ "goModules" "name" ] 50 - [ "goModules" "outputHash" ] 51 - ]; 52 - expected = true; 53 - }; 54 - buildGoModule-goModules-overrideAttrs = { 55 - expr = pet-foo.goModules.FOO == "foo"; 56 - expected = true; 57 - }; 58 - buildGoModule-goModules-overrideAttrs-vendored = { 59 - expr = lib.isString pet-vendored.drvPath; 60 expected = true; 61 }; 62 }; 63 64 - addEntangled = origOverrideAttrs: f: 65 - origOverrideAttrs ( 66 - lib.composeExtensions f (self: super: { 67 - passthru = super.passthru // { 68 - entangled = super.passthru.entangled.overrideAttrs f; 69 - overrideAttrs = addEntangled self.overrideAttrs; 70 }; 71 - }) 72 - ); 73 74 - entangle = pkg1: pkg2: pkg1.overrideAttrs (self: super: { 75 - passthru = super.passthru // { 76 - entangled = pkg2; 77 - overrideAttrs = addEntangled self.overrideAttrs; 78 - }; 79 - }); 80 81 - example = entangle pkgs.hello pkgs.figlet; 82 83 - overrides1 = example.overrideAttrs (_: super: { pname = "a-better-${super.pname}"; }); 84 85 - repeatedOverrides = overrides1.overrideAttrs (_: super: { pname = "${super.pname}-with-blackjack"; }); 86 87 - pet_0_3_4 = pkgs.buildGoModule rec { 88 - pname = "pet"; 89 - version = "0.3.4"; 90 91 - src = pkgs.fetchFromGitHub { 92 - owner = "knqyf263"; 93 - repo = "pet"; 94 - rev = "v${version}"; 95 - hash = "sha256-Gjw1dRrgM8D3G7v6WIM2+50r4HmTXvx0Xxme2fH9TlQ="; 96 - }; 97 - 98 - vendorHash = "sha256-ciBIR+a1oaYH+H1PcC8cD8ncfJczk1IiJ8iYNM+R6aA="; 99 100 - meta = { 101 - description = "Simple command-line snippet manager, written in Go"; 102 - homepage = "https://github.com/knqyf263/pet"; 103 - license = lib.licenses.mit; 104 - maintainers = with lib.maintainers; [ kalbasit ]; 105 - }; 106 - }; 107 108 - pet_0_4_0 = pkgs.buildGoModule rec { 109 - pname = "pet"; 110 - version = "0.4.0"; 111 112 - src = pkgs.fetchFromGitHub { 113 - owner = "knqyf263"; 114 - repo = "pet"; 115 - rev = "v${version}"; 116 - hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 117 - }; 118 119 - vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 120 121 - meta = { 122 - description = "Simple command-line snippet manager, written in Go"; 123 - homepage = "https://github.com/knqyf263/pet"; 124 - license = lib.licenses.mit; 125 - maintainers = with lib.maintainers; [ kalbasit ]; 126 }; 127 - }; 128 129 - pet_0_4_0-overridden = pet_0_3_4.overrideAttrs (finalAttrs: previousAttrs: { 130 - version = "0.4.0"; 131 - 132 - src = pkgs.fetchFromGitHub { 133 - inherit (previousAttrs.src) owner repo; 134 - rev = "v${finalAttrs.version}"; 135 - hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 136 - }; 137 - 138 - vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 139 - }); 140 - 141 - pet-foo = pet_0_3_4.overrideAttrs ( 142 - finalAttrs: previousAttrs: { 143 - passthru = previousAttrs.passthru // { 144 - overrideModAttrs = lib.composeExtensions previousAttrs.passthru.overrideModAttrs ( 145 - finalModAttrs: previousModAttrs: { 146 - FOO = "foo"; 147 - } 148 - ); 149 }; 150 - } 151 - ); 152 - 153 - pet-vendored = pet-foo.overrideAttrs { vendorHash = null; }; 154 in 155 156 stdenvNoCC.mkDerivation { 157 name = "test-overriding"; 158 passthru = { inherit tests; }; 159 - buildCommand = '' 160 - touch $out 161 - '' + lib.concatMapAttrsStringSep "\n" (name: t: "([[ ${lib.boolToString t.expr} == ${lib.boolToString t.expected} ]] && echo '${name} success') || (echo '${name} fail' && exit 1)") tests; 162 }
··· 1 + { 2 + lib, 3 + pkgs, 4 + stdenvNoCC, 5 + }: 6 7 let 8 + tests = tests-stdenv // tests-go // tests-python; 9 + 10 + tests-stdenv = 11 let 12 + addEntangled = 13 + origOverrideAttrs: f: 14 + origOverrideAttrs ( 15 + lib.composeExtensions f ( 16 + self: super: { 17 + passthru = super.passthru // { 18 + entangled = super.passthru.entangled.overrideAttrs f; 19 + overrideAttrs = addEntangled self.overrideAttrs; 20 + }; 21 + } 22 + ) 23 + ); 24 + 25 + entangle = 26 + pkg1: pkg2: 27 + pkg1.overrideAttrs ( 28 + self: super: { 29 + passthru = super.passthru // { 30 + entangled = pkg2; 31 + overrideAttrs = addEntangled self.overrideAttrs; 32 + }; 33 + } 34 + ); 35 + 36 + example = entangle pkgs.hello pkgs.figlet; 37 + 38 + overrides1 = example.overrideAttrs (_: super: { pname = "a-better-${super.pname}"; }); 39 + 40 + repeatedOverrides = overrides1.overrideAttrs ( 41 + _: super: { pname = "${super.pname}-with-blackjack"; } 42 + ); 43 in 44 { 45 repeatedOverrides-pname = { 46 expr = repeatedOverrides.pname == "a-better-hello-with-blackjack"; 47 expected = true; ··· 56 }; 57 overriding-using-only-attrset-no-final-attrs = { 58 name = "overriding-using-only-attrset-no-final-attrs"; 59 + expr = 60 + ((stdenvNoCC.mkDerivation { pname = "hello-no-final-attrs"; }).overrideAttrs { 61 + pname = "hello-no-final-attrs-overridden"; 62 + }).pname == "hello-no-final-attrs-overridden"; 63 expected = true; 64 }; 65 }; 66 67 + tests-go = 68 + let 69 + pet_0_3_4 = pkgs.buildGoModule rec { 70 + pname = "pet"; 71 + version = "0.3.4"; 72 + 73 + src = pkgs.fetchFromGitHub { 74 + owner = "knqyf263"; 75 + repo = "pet"; 76 + rev = "v${version}"; 77 + hash = "sha256-Gjw1dRrgM8D3G7v6WIM2+50r4HmTXvx0Xxme2fH9TlQ="; 78 }; 79 80 + vendorHash = "sha256-ciBIR+a1oaYH+H1PcC8cD8ncfJczk1IiJ8iYNM+R6aA="; 81 82 + meta = { 83 + description = "Simple command-line snippet manager, written in Go"; 84 + homepage = "https://github.com/knqyf263/pet"; 85 + license = lib.licenses.mit; 86 + maintainers = with lib.maintainers; [ kalbasit ]; 87 + }; 88 + }; 89 90 + pet_0_4_0 = pkgs.buildGoModule rec { 91 + pname = "pet"; 92 + version = "0.4.0"; 93 94 + src = pkgs.fetchFromGitHub { 95 + owner = "knqyf263"; 96 + repo = "pet"; 97 + rev = "v${version}"; 98 + hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 99 + }; 100 101 + vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 102 103 + meta = { 104 + description = "Simple command-line snippet manager, written in Go"; 105 + homepage = "https://github.com/knqyf263/pet"; 106 + license = lib.licenses.mit; 107 + maintainers = with lib.maintainers; [ kalbasit ]; 108 + }; 109 + }; 110 111 + pet_0_4_0-overridden = pet_0_3_4.overrideAttrs ( 112 + finalAttrs: previousAttrs: { 113 + version = "0.4.0"; 114 115 + src = pkgs.fetchFromGitHub { 116 + inherit (previousAttrs.src) owner repo; 117 + rev = "v${finalAttrs.version}"; 118 + hash = "sha256-gVTpzmXekQxGMucDKskGi+e+34nJwwsXwvQTjRO6Gdg="; 119 + }; 120 121 + vendorHash = "sha256-dUvp7FEW09V0xMuhewPGw3TuAic/sD7xyXEYviZ2Ivs="; 122 + } 123 + ); 124 125 + pet-foo = pet_0_3_4.overrideAttrs ( 126 + finalAttrs: previousAttrs: { 127 + passthru = previousAttrs.passthru // { 128 + overrideModAttrs = lib.composeExtensions previousAttrs.passthru.overrideModAttrs ( 129 + finalModAttrs: previousModAttrs: { 130 + FOO = "foo"; 131 + } 132 + ); 133 + }; 134 + } 135 + ); 136 137 + pet-vendored = pet-foo.overrideAttrs { vendorHash = null; }; 138 + in 139 + { 140 + buildGoModule-overrideAttrs = { 141 + expr = 142 + lib.all 143 + ( 144 + attrPath: 145 + let 146 + attrPathPretty = lib.concatStringsSep "." attrPath; 147 + valueNative = lib.getAttrFromPath attrPath pet_0_4_0; 148 + valueOverridden = lib.getAttrFromPath attrPath pet_0_4_0-overridden; 149 + in 150 + lib.warnIfNot (valueNative == valueOverridden) 151 + "pet_0_4_0.${attrPathPretty} (${valueNative}) does not equal pet_0_4_0-overridden.${attrPathPretty} (${valueOverridden})" 152 + true 153 + ) 154 + [ 155 + [ "drvPath" ] 156 + [ "name" ] 157 + [ "pname" ] 158 + [ "version" ] 159 + [ "vendorHash" ] 160 + [ 161 + "goModules" 162 + "drvPath" 163 + ] 164 + [ 165 + "goModules" 166 + "name" 167 + ] 168 + [ 169 + "goModules" 170 + "outputHash" 171 + ] 172 + ]; 173 + expected = true; 174 + }; 175 + buildGoModule-goModules-overrideAttrs = { 176 + expr = pet-foo.goModules.FOO == "foo"; 177 + expected = true; 178 + }; 179 + buildGoModule-goModules-overrideAttrs-vendored = { 180 + expr = lib.isString pet-vendored.drvPath; 181 + expected = true; 182 + }; 183 }; 184 185 + tests-python = 186 + let 187 + p = pkgs.python3Packages.xpybutil.overridePythonAttrs (_: { 188 + dontWrapPythonPrograms = true; 189 + }); 190 + in 191 + { 192 + overridePythonAttrs = { 193 + expr = !lib.hasInfix "wrapPythonPrograms" p.postFixup; 194 + expected = true; 195 }; 196 + }; 197 in 198 199 stdenvNoCC.mkDerivation { 200 name = "test-overriding"; 201 passthru = { inherit tests; }; 202 + buildCommand = 203 + '' 204 + touch $out 205 + '' 206 + + lib.concatMapAttrsStringSep "\n" ( 207 + name: t: 208 + "([[ ${lib.boolToString t.expr} == ${lib.boolToString t.expected} ]] && echo '${name} success') || (echo '${name} fail' && exit 1)" 209 + ) tests; 210 }
+7
pkgs/tools/networking/openvpn/openvpn-auth-ldap.nix
··· 31 }) 32 ]; 33 34 nativeBuildInputs = [ 35 autoreconfHook 36 gnustep.base
··· 31 }) 32 ]; 33 34 + # clang > 17 dropped support for `-export-dynamic` but `-rdynamic` does the 35 + # same thing 36 + postPatch = '' 37 + substituteInPlace platform.m4 \ 38 + --replace-fail -export-dynamic -rdynamic 39 + ''; 40 + 41 nativeBuildInputs = [ 42 autoreconfHook 43 gnustep.base
+2
pkgs/top-level/aliases.nix
··· 1228 SP800-90B_EntropyAssessment = sp800-90b-entropyassessment; # Added on 2024-06-12 1229 SPAdes = spades; # Added 2024-06-12 1230 spark2014 = gnatprove; # Added 2024-02-25 1231 1232 # Added 2020-02-10 1233 sourceHanSansPackages = { ··· 1496 zeromq4 = zeromq; # Added 2024-11-03 1497 zfsStable = zfs; # Added 2024-02-26 1498 zfsUnstable = zfs_unstable; # Added 2024-02-26 1499 zinc = zincsearch; # Added 2023-05-28 1500 zk-shell = throw "zk-shell has been removed as it was broken and unmaintained"; # Added 2024-08-10 1501 zkg = throw "'zkg' has been replaced by 'zeek'";
··· 1228 SP800-90B_EntropyAssessment = sp800-90b-entropyassessment; # Added on 2024-06-12 1229 SPAdes = spades; # Added 2024-06-12 1230 spark2014 = gnatprove; # Added 2024-02-25 1231 + spatialite_gui = throw "spatialite_gui has been renamed to spatialite-gui"; # Added 2025-01-12 1232 1233 # Added 2020-02-10 1234 sourceHanSansPackages = { ··· 1497 zeromq4 = zeromq; # Added 2024-11-03 1498 zfsStable = zfs; # Added 2024-02-26 1499 zfsUnstable = zfs_unstable; # Added 2024-02-26 1500 + zfs_2_1 = throw "zfs 2.1 has been removed as it is EOL. Please upgrade to a newer version"; # Added 2024-12-25 1501 zinc = zincsearch; # Added 2023-05-28 1502 zk-shell = throw "zk-shell has been removed as it was broken and unmaintained"; # Added 2024-08-10 1503 zkg = throw "'zkg' has been replaced by 'zeek'";
+5 -6
pkgs/top-level/all-packages.nix
··· 4539 openvpn_learnaddress = callPackage ../tools/networking/openvpn/openvpn_learnaddress.nix { }; 4540 4541 openvpn-auth-ldap = callPackage ../tools/networking/openvpn/openvpn-auth-ldap.nix { 4542 - inherit (llvmPackages_17) stdenv; 4543 }; 4544 4545 namespaced-openvpn = python3Packages.callPackage ../tools/networking/namespaced-openvpn { }; ··· 12545 12546 inherit 12547 ({ 12548 - zfs_2_1 = callPackage ../os-specific/linux/zfs/2_1.nix { 12549 configFile = "user"; 12550 }; 12551 - zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 12552 configFile = "user"; 12553 }; 12554 zfs_unstable = callPackage ../os-specific/linux/zfs/unstable.nix { 12555 configFile = "user"; 12556 }; 12557 }) 12558 - zfs_2_1 12559 zfs_2_2 12560 zfs_unstable; 12561 zfs = zfs_2_2; 12562 ··· 12855 12856 qmapshack = libsForQt5.callPackage ../applications/gis/qmapshack { }; 12857 12858 - spatialite_gui = callPackage ../applications/gis/spatialite-gui { 12859 - inherit (darwin.apple_sdk.frameworks) Carbon Cocoa IOKit; 12860 wxGTK = wxGTK32; 12861 }; 12862
··· 4539 openvpn_learnaddress = callPackage ../tools/networking/openvpn/openvpn_learnaddress.nix { }; 4540 4541 openvpn-auth-ldap = callPackage ../tools/networking/openvpn/openvpn-auth-ldap.nix { 4542 + inherit (llvmPackages) stdenv; 4543 }; 4544 4545 namespaced-openvpn = python3Packages.callPackage ../tools/networking/namespaced-openvpn { }; ··· 12545 12546 inherit 12547 ({ 12548 + zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 12549 configFile = "user"; 12550 }; 12551 + zfs_2_3 = callPackage ../os-specific/linux/zfs/2_3.nix { 12552 configFile = "user"; 12553 }; 12554 zfs_unstable = callPackage ../os-specific/linux/zfs/unstable.nix { 12555 configFile = "user"; 12556 }; 12557 }) 12558 zfs_2_2 12559 + zfs_2_3 12560 zfs_unstable; 12561 zfs = zfs_2_2; 12562 ··· 12855 12856 qmapshack = libsForQt5.callPackage ../applications/gis/qmapshack { }; 12857 12858 + spatialite-gui = callPackage ../by-name/sp/spatialite-gui/package.nix { 12859 wxGTK = wxGTK32; 12860 }; 12861
+3 -2
pkgs/top-level/linux-kernels.nix
··· 585 586 zenpower = callPackage ../os-specific/linux/zenpower { }; 587 588 - zfs_2_1 = callPackage ../os-specific/linux/zfs/2_1.nix { 589 configFile = "kernel"; 590 inherit pkgs kernel; 591 }; 592 - zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 593 configFile = "kernel"; 594 inherit pkgs kernel; 595 }; ··· 620 tsme-test = callPackage ../os-specific/linux/tsme-test { }; 621 622 } // lib.optionalAttrs config.allowAliases { 623 ati_drivers_x11 = throw "ati drivers are no longer supported by any kernel >=4.1"; # added 2021-05-18; 624 hid-nintendo = throw "hid-nintendo was added in mainline kernel version 5.16"; # Added 2023-07-30 625 sch_cake = throw "sch_cake was added in mainline kernel version 4.19"; # Added 2023-06-14
··· 585 586 zenpower = callPackage ../os-specific/linux/zenpower { }; 587 588 + zfs_2_2 = callPackage ../os-specific/linux/zfs/2_2.nix { 589 configFile = "kernel"; 590 inherit pkgs kernel; 591 }; 592 + zfs_2_3 = callPackage ../os-specific/linux/zfs/2_3.nix { 593 configFile = "kernel"; 594 inherit pkgs kernel; 595 }; ··· 620 tsme-test = callPackage ../os-specific/linux/tsme-test { }; 621 622 } // lib.optionalAttrs config.allowAliases { 623 + zfs_2_1 = throw "zfs_2_1 has been removed"; # added 2024-12-25; 624 ati_drivers_x11 = throw "ati drivers are no longer supported by any kernel >=4.1"; # added 2021-05-18; 625 hid-nintendo = throw "hid-nintendo was added in mainline kernel version 5.16"; # Added 2023-07-30 626 sch_cake = throw "sch_cake was added in mainline kernel version 4.19"; # Added 2023-06-14