Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 9819563c a04ddbe3

+205 -120
+6
maintainers/maintainer-list.nix
··· 11718 11718 githubId = 1780588; 11719 11719 name = "Malte Poll"; 11720 11720 }; 11721 + maltejanz = { 11722 + email = "service.malte.j@protonmail.com"; 11723 + github = "MalteJanz"; 11724 + githubId = 18661391; 11725 + name = "Malte Janz"; 11726 + }; 11721 11727 malte-v = { 11722 11728 email = "nixpkgs@mal.tc"; 11723 11729 github = "malte-v";
+21 -1
nixos/lib/testing/nodes.nix
··· 14 14 types 15 15 ; 16 16 17 + inherit (hostPkgs) hostPlatform; 18 + 19 + guestSystem = 20 + if hostPlatform.isLinux 21 + then hostPlatform.system 22 + else 23 + let 24 + hostToGuest = { 25 + "x86_64-darwin" = "x86_64-linux"; 26 + "aarch64-darwin" = "aarch64-linux"; 27 + }; 28 + 29 + supportedHosts = lib.concatStringsSep ", " (lib.attrNames hostToGuest); 30 + 31 + message = 32 + "NixOS Test: don't know which VM guest system to pair with VM host system: ${hostPlatform.system}. Perhaps you intended to run the tests on a Linux host, or one of the following systems that may run NixOS tests: ${supportedHosts}"; 33 + in 34 + hostToGuest.${hostPlatform.system} or (throw message); 35 + 17 36 baseOS = 18 37 import ../eval-config.nix { 19 38 inherit lib; ··· 27 46 ({ config, ... }: 28 47 { 29 48 virtualisation.qemu.package = testModuleArgs.config.qemu.package; 49 + virtualisation.host.pkgs = hostPkgs; 30 50 }) 31 51 ({ options, ... }: { 32 52 key = "nodes.nix-pkgs"; 33 53 config = optionalAttrs (!config.node.pkgsReadOnly) ( 34 54 mkIf (!options.nixpkgs.pkgs.isDefined) { 35 55 # TODO: switch to nixpkgs.hostPlatform and make sure containers-imperative test still evaluates. 36 - nixpkgs.system = hostPkgs.stdenv.hostPlatform.system; 56 + nixpkgs.system = guestSystem; 37 57 } 38 58 ); 39 59 })
+5 -1
nixos/lib/testing/pkgs.nix
··· 2 2 { 3 3 config = { 4 4 # default pkgs for use in VMs 5 - _module.args.pkgs = hostPkgs; 5 + _module.args.pkgs = 6 + # TODO: deprecate it everywhere; not just on darwin. Throw on darwin? 7 + lib.warnIf hostPkgs.stdenv.hostPlatform.isDarwin 8 + "Do not use the `pkgs` module argument in tests you want to run on darwin. It is ambiguous, and many tests are broken because of it. If you need to use a package on the VM host, use `hostPkgs`. Otherwise, use `config.node.pkgs`, or `config.nodes.<name>.nixpkgs.pkgs`." 9 + hostPkgs; 6 10 7 11 defaults = { 8 12 # TODO: a module to set a shared pkgs, if options.nixpkgs.* is untouched by user (highestPrio) */
+3 -1
nixos/lib/testing/run.nix
··· 41 41 rawTestDerivation = hostPkgs.stdenv.mkDerivation { 42 42 name = "vm-test-run-${config.name}"; 43 43 44 - requiredSystemFeatures = [ "kvm" "nixos-test" ]; 44 + requiredSystemFeatures = [ "nixos-test" ] 45 + ++ lib.optionals hostPkgs.stdenv.hostPlatform.isLinux [ "kvm" ] 46 + ++ lib.optionals hostPkgs.stdenv.hostPlatform.isDarwin [ "apple-virt" ]; 45 47 46 48 buildCommand = '' 47 49 mkdir -p $out
+4 -1
nixos/tests/acme.nix
··· 1 - { pkgs, lib, ... }: let 1 + { config, lib, ... }: let 2 + 3 + pkgs = config.node.pkgs; 4 + 2 5 commonConfig = ./common/acme/client; 3 6 4 7 dnsServerIP = nodes: nodes.dnsserver.networking.primaryIPAddress;
+2 -1
nixos/tests/all-tests.nix
··· 78 78 # it with `allowAliases = false`? 79 79 # warnIf pkgs.config.allowAliases "nixosTests: pkgs includes aliases." 80 80 { 81 + _file = "${__curPos.file} readOnlyPkgs"; 81 82 _class = "nixosTest"; 82 - node.pkgs = pkgs; 83 + node.pkgs = pkgs.pkgsLinux; 83 84 }; 84 85 85 86 in {
+7 -25
pkgs/applications/audio/surge-XT/default.nix
··· 2 2 , lib 3 3 , fetchFromGitHub 4 4 , cmake 5 + , gitMinimal 5 6 , pkg-config 6 7 , alsa-lib 7 8 , freetype ··· 14 15 , libXrandr 15 16 }: 16 17 17 - let 18 - juce-lv2 = stdenv.mkDerivation { 19 - pname = "juce-lv2"; 20 - version = "unstable-2023-03-04"; 21 - 22 - # lv2 branch 23 - src = fetchFromGitHub { 24 - owner = "lv2-porting-project"; 25 - repo = "JUCE"; 26 - rev = "e825ad977cf4499a7bfa05b97b208236f8fd253b"; 27 - sha256 = "sha256-Fqp1y9BN0E9p/12ukG1oh3COhXNRWBAlFRSl0LPyiFc="; 28 - }; 29 - 30 - dontConfigure = true; 31 - dontBuild = true; 32 - 33 - installPhase = '' 34 - cp -r . $out 35 - ''; 36 - }; 37 - in 38 18 stdenv.mkDerivation rec { 39 19 pname = "surge-XT"; 40 - version = "1.2.3"; 20 + version = "1.3.1"; 41 21 42 22 src = fetchFromGitHub { 43 23 owner = "surge-synthesizer"; 44 24 repo = "surge"; 45 25 rev = "release_xt_${version}"; 26 + branchName = "release-xt/${version}"; 46 27 fetchSubmodules = true; 47 - sha256 = "sha256-DGzdzoCjMGEDltEwlPvLk2tyMVRH1Ql2Iq1ypogw/m0="; 28 + leaveDotGit = true; 29 + sha256 = "sha256-q6qs/OhIakF+Gc8Da3pnfkUGYDUoJbvee0o8dfrRI2U="; 48 30 }; 49 31 50 32 nativeBuildInputs = [ 51 33 cmake 34 + gitMinimal 52 35 pkg-config 53 36 ]; 54 37 ··· 67 50 enableParallelBuilding = true; 68 51 69 52 cmakeFlags = [ 70 - "-DJUCE_SUPPORTS_LV2=ON" 71 - "-DSURGE_JUCE_PATH=${juce-lv2}" 53 + "-DSURGE_BUILD_LV2=TRUE" 72 54 ]; 73 55 74 56 CXXFLAGS = [
+18
pkgs/applications/blockchains/stellar-core/default.nix
··· 2 2 , automake 3 3 , bison 4 4 , fetchFromGitHub 5 + , fetchpatch 5 6 , flex 6 7 , git 7 8 , lib ··· 24 25 hash = "sha256-lxBn/T01Tsa7tid3mRJUigUwv9d3BAPZhV9Mp1lywBU="; 25 26 fetchSubmodules = true; 26 27 }; 28 + 29 + patches = [ 30 + # Fix gcc-13 build failure due to missing <stdexcept> include 31 + # https://github.com/stellar/medida/pull/34 32 + (fetchpatch { 33 + name = "gcc-13-p1.patch"; 34 + url = "https://github.com/stellar/medida/commit/f91354b0055de939779d392999975d611b1b1ad5.patch"; 35 + stripLen = 1; 36 + extraPrefix = "lib/libmedida/"; 37 + hash = "sha256-iVeSUY5Rcy62apIKJdbcHGgxAxpQCkygf85oSjbTTXU="; 38 + }) 39 + (fetchpatch { 40 + name = "gcc-13-p2.patch"; 41 + url = "https://github.com/stellar/stellar-core/commit/477b3135281b629554cabaeacfcdbcdc170aa335.patch"; 42 + hash = "sha256-UVRcAIA5LEaCn16lWfhg19UU7b/apigzTsfPROLZtYg="; 43 + }) 44 + ]; 27 45 28 46 nativeBuildInputs = [ 29 47 automake
+17 -4
pkgs/applications/misc/evtest-qt/default.nix
··· 1 - { mkDerivation, lib, qtbase, cmake, fetchFromGitHub }: 1 + { mkDerivation, lib, qtbase, cmake, fetchFromGitHub, fetchpatch, unstableGitUpdater }: 2 2 3 3 mkDerivation rec { 4 4 pname = "evtest-qt"; 5 - version = "0.2.0"; 5 + version = "0.2.0-unstable-2023-09-13"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Grumbel"; 9 9 repo = pname; 10 - rev = "v${version}"; 11 - sha256 = "1wfzkgq81764qzxgk0y5vvpxcrb3icvrr4dd4mj8njrqgbwmn0mw"; 10 + rev = "fb087f4d3d51377790f1ff30681c48031bf23145"; 11 + hash = "sha256-gE47x1J13YZUVyB0b4VRyESIVCm3GbOXp2bX0TP97UU="; 12 + fetchSubmodules = true; 12 13 }; 13 14 15 + patches = [ 16 + # Fix build against gcc-13: 17 + # https://github.com/Grumbel/evtest-qt/pull/14 18 + (fetchpatch { 19 + name = "gcc-13.patch"; 20 + url = "https://github.com/Grumbel/evtest-qt/commit/975dedcfd60853bd329f34d48ce4740add8866eb.patch"; 21 + hash = "sha256-gR/9oVhO4G9i7dn+CjvDAQN0KLXoX/fatpE0W3gXDc0="; 22 + }) 23 + ]; 24 + 14 25 nativeBuildInputs = [ cmake ]; 15 26 16 27 buildInputs = [ qtbase ]; 28 + 29 + passthru.updateScript = unstableGitUpdater {}; 17 30 18 31 meta = with lib; { 19 32 description = "Simple input device tester for linux with Qt GUI";
+6 -2
pkgs/applications/misc/qlcplus/default.nix
··· 29 29 30 30 qmakeFlags = [ "INSTALLROOT=$(out)" ]; 31 31 32 - env.NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; 33 - 34 32 postPatch = '' 35 33 patchShebangs . 36 34 sed -i -e '/unix:!macx:INSTALLROOT += \/usr/d' \ 37 35 -e "s@\$\$LIBSDIR/qt4/plugins@''${qtPluginPrefix}@" \ 38 36 -e "s@/etc/udev/rules.d@''${out}/lib/udev/rules.d@" \ 39 37 variables.pri 38 + 39 + # Fix gcc-13 build failure by removing blanket -Werror. 40 + fgrep Werror variables.pri 41 + substituteInPlace variables.pri --replace-fail "QMAKE_CXXFLAGS += -Werror" "" 40 42 ''; 43 + 44 + enableParallelBuilding = true; 41 45 42 46 postInstall = '' 43 47 ln -sf $out/lib/*/libqlcplus* $out/lib
+8
pkgs/applications/networking/browsers/gmni/default.nix
··· 14 14 nativeBuildInputs = [ scdoc ]; 15 15 buildInputs = [ bearssl ]; 16 16 17 + # Fix build on `gcc-13`: 18 + # inlined from 'xt_end_chain' at src/tofu.c:82:3, 19 + # ...-glibc-2.38-27-dev/include/bits/stdio2.h:54:10: error: '__builtin___snprintf_chk' specified bound 4 exceeds destination size 3 [-Werror=stringop-overflow] 20 + # 21 + # The overflow will not happen in practice, but `snprintf()` gets 22 + # passed one more byte than available. 23 + hardeningDisable = [ "fortify3" ]; 24 + 17 25 meta = with lib; { 18 26 description = "A Gemini client"; 19 27 homepage = "https://git.sr.ht/~sircmpwn/gmni";
+3 -3
pkgs/applications/networking/cluster/acorn/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "acorn"; 5 - version = "0.10.0"; 5 + version = "0.10.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "acorn-io"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-U4VQ8PsmJxeMYj7TlsQQOEPckECDK+ENBQLjq5VFyJ4="; 11 + hash = "sha256-Zw/OqN4d5iukh9oUXjczMvNKYkcGSUoDEwfti7uzZXQ="; 12 12 }; 13 13 14 - vendorHash = "sha256-FZJqE7BWGvXsFsfxnnaKUFLInBzz+bUwURq4KvSMrus="; 14 + vendorHash = "sha256-d/1Rqh00THUwcMBWloevfKbScaWhVG5r/32Q4zYUaJg="; 15 15 16 16 ldflags = [ 17 17 "-s"
+3 -3
pkgs/applications/networking/cluster/clusterctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "clusterctl"; 5 - version = "1.6.1"; 5 + version = "1.6.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kubernetes-sigs"; 9 9 repo = "cluster-api"; 10 10 rev = "v${version}"; 11 - hash = "sha256-v87QxDx+DA5pJHmu6jNwLcs4dNEsa5fUoRcVAhMnh24="; 11 + hash = "sha256-OTOM83dsf6Fk+CYkACQOmguDTYfZvN9qes3S/cFEq/8="; 12 12 }; 13 13 14 - vendorHash = "sha256-1W+nkhbJRHd4AaOzO01ZUu6wFvFIG0SOCzc4dg0Zopk="; 14 + vendorHash = "sha256-SwJx3KPdOugDYLLymPyrPam0uMyRWIDpQn79Sd9fhJ4="; 15 15 16 16 subPackages = [ "cmd/clusterctl" ]; 17 17
+3 -3
pkgs/applications/networking/cluster/kubebuilder/default.nix
··· 12 12 13 13 buildGoModule rec { 14 14 pname = "kubebuilder"; 15 - version = "3.13.0"; 15 + version = "3.14.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "kubernetes-sigs"; 19 19 repo = "kubebuilder"; 20 20 rev = "v${version}"; 21 - hash = "sha256-JXI3hQVChM7czCwan1yswsrUSse/IbMzwXw0tnaBiek="; 21 + hash = "sha256-em+I2YICcqljaaNQ+zOAnOZ552elmV6Ywbfla8buwaY="; 22 22 }; 23 23 24 - vendorHash = "sha256-yiRxSJIIYJbkV3QAFclrDDnsBoX1t4cSRvGmwVgz/w8="; 24 + vendorHash = "sha256-iBwhpVs9u5AQAvmzb69SaewdYHmmaV19Bstd0Tux9CA="; 25 25 26 26 subPackages = ["cmd"]; 27 27
+3 -3
pkgs/applications/networking/cluster/kubectl-gadget/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kubectl-gadget"; 5 - version = "0.24.0"; 5 + version = "0.25.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "inspektor-gadget"; 9 9 repo = "inspektor-gadget"; 10 10 rev = "v${version}"; 11 - hash = "sha256-JC6+6PADTfxpVRowh09fXC8EO/qIsUTTba2uYxxxJ/A="; 11 + hash = "sha256-RbLc8c2F2Jy9jHwcd1FgqxhC5cl82oOauo/hsZ5zaG0="; 12 12 }; 13 13 14 - vendorHash = "sha256-7pwEQ1O3i4SmVSTTmOX9KPR0ePdDpf2dQgD4e6fDyzQ="; 14 + vendorHash = "sha256-/1dDAcICf7+g8hxaIAUsUwR9FNqatMhgAsvXrOuvGyk="; 15 15 16 16 CGO_ENABLED = 0; 17 17
+15 -14
pkgs/applications/science/misc/graphia/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , cmake 4 + , git 4 5 , fetchFromGitHub 5 6 , fetchpatch 6 7 , wrapQtAppsHook 7 8 , qtbase 8 - , qtquickcontrols2 9 - , qtgraphicaleffects 9 + , qtdeclarative 10 + , qtsvg 11 + , qtwebengine 10 12 }: 11 13 12 14 stdenv.mkDerivation rec { 13 15 pname = "graphia"; 14 - version = "3.2"; 16 + version = "4.2"; 15 17 16 18 src = fetchFromGitHub { 17 19 owner = "graphia-app"; 18 20 repo = "graphia"; 19 21 rev = version; 20 - sha256 = "sha256-9kohXLXF4F/qoHm8qmvPM1y9ak0Thb4xvgKJlVuOPTg="; 22 + sha256 = "sha256-8+tlQbTr6BGx+/gjviuNrQQWcxC/j6dJ+PxwB4fYmqQ="; 21 23 }; 22 24 23 25 patches = [ 24 - # Fix for a breakpad incompatibility with glibc>2.33 25 - # https://github.com/pytorch/pytorch/issues/70297 26 - # https://github.com/google/breakpad/commit/605c51ed96ad44b34c457bbca320e74e194c317e 27 - ./breakpad-sigstksz.patch 28 - 29 - # FIXME: backport patch fixing build with Qt 5.15, remove for next release 26 + # Fix gcc-13 build: 30 27 (fetchpatch { 31 - url = "https://github.com/graphia-app/graphia/commit/4b51bb8d465afa7ed0b2b30cb1c5e1c6af95976f.patch"; 32 - hash = "sha256-GDJAFLxQlRWKvcOgqqPYV/aVTRM7+KDjW7Zp9l7SuyM="; 28 + name = "gcc-13.patch"; 29 + url = "https://github.com/graphia-app/graphia/commit/78fb55a4d73f96e9a182de433c7da60330bd5b5e.patch"; 30 + hash = "sha256-waI2ur3gOKMQvqB2Qnyz7oMOMConl3jLMVKKmOmTpJs="; 33 31 }) 34 32 ]; 35 33 36 34 nativeBuildInputs = [ 37 35 cmake 36 + git # needs to define some hash as a version 38 37 wrapQtAppsHook 39 38 ]; 40 39 41 40 buildInputs = [ 42 41 qtbase 43 - qtquickcontrols2 44 - qtgraphicaleffects 42 + qtdeclarative 43 + qtsvg 44 + qtwebengine 45 45 ]; 46 46 47 47 meta = with lib; { ··· 50 50 description = "A visualisation tool for the creation and analysis of graphs."; 51 51 homepage = "https://graphia.app"; 52 52 license = licenses.gpl3Only; 53 + mainProgram = "Graphia"; 53 54 maintainers = [ maintainers.bgamari ]; 54 55 platforms = platforms.all; 55 56 };
+3 -3
pkgs/applications/version-management/git-lfs/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "git-lfs"; 5 - version = "3.4.1"; 5 + version = "3.5.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "git-lfs"; 9 9 repo = "git-lfs"; 10 10 rev = "v${version}"; 11 - hash = "sha256-XqxkNCC2yzUTVOi/1iDsnxtLkw4jfQuBh9UsjtZ1zVc="; 11 + hash = "sha256-iBv9kUaoyH9yEoCZYGYm+gmdjb797hWftzwkRNDNu3k="; 12 12 }; 13 13 14 - vendorHash = "sha256-VmPeQYWOHFqFLHKcKH3WHz50yx7GMHVIDPzqiVwwjSg="; 14 + vendorHash = "sha256-N8HB2qwBxjzfNucftHxmX2W9srCx62pjmkCWzwiCj/I="; 15 15 16 16 nativeBuildInputs = [ asciidoctor installShellFiles ]; 17 17
+3 -3
pkgs/build-support/testers/default.nix
··· 1 - { pkgs, buildPackages, lib, callPackage, runCommand, stdenv, substituteAll, testers }: 1 + { pkgs, pkgsLinux, buildPackages, lib, callPackage, runCommand, stdenv, substituteAll, testers }: 2 2 # Documentation is in doc/builders/testers.chapter.md 3 3 { 4 4 # See https://nixos.org/manual/nixpkgs/unstable/#tester-testBuildFailure ··· 107 107 (lib.setDefaultModuleLocation "the argument that was passed to pkgs.runNixOSTest" testModule) 108 108 ]; 109 109 hostPkgs = pkgs; 110 - node.pkgs = pkgs; 110 + node.pkgs = pkgsLinux; 111 111 }; 112 112 113 113 # See doc/builders/testers.chapter.md or ··· 123 123 inherit pkgs; 124 124 extraConfigurations = [( 125 125 { lib, ... }: { 126 - config.nixpkgs.pkgs = lib.mkDefault pkgs; 126 + config.nixpkgs.pkgs = lib.mkDefault pkgsLinux; 127 127 } 128 128 )]; 129 129 });
+2 -2
pkgs/build-support/testers/test/default.nix
··· 27 27 28 28 # Check that the wiring of nixosTest is correct. 29 29 # Correct operation of the NixOS test driver should be asserted elsewhere. 30 - nixosTest-example = pkgs-with-overlay.testers.nixosTest ({ lib, pkgs, figlet, ... }: { 30 + nixosTest-example = pkgs-with-overlay.testers.nixosTest ({ lib, ... }: { 31 31 name = "nixosTest-test"; 32 32 nodes.machine = { pkgs, ... }: { 33 33 system.nixos = dummyVersioning; 34 - environment.systemPackages = [ pkgs.proof-of-overlay-hello figlet ]; 34 + environment.systemPackages = [ pkgs.proof-of-overlay-hello pkgs.figlet ]; 35 35 }; 36 36 testScript = '' 37 37 machine.succeed("hello | figlet >/dev/console")
+9 -8
pkgs/by-name/la/labwc/package.nix
··· 1 1 { lib 2 - , stdenv 2 + , cairo 3 3 , fetchFromGitHub 4 - , cairo 5 4 , gettext 6 5 , glib 7 6 , libdrm ··· 16 15 , pango 17 16 , pkg-config 18 17 , scdoc 18 + , stdenv 19 19 , wayland 20 20 , wayland-protocols 21 21 , wayland-scanner ··· 26 26 27 27 stdenv.mkDerivation (finalAttrs: { 28 28 pname = "labwc"; 29 - version = "0.7.0"; 29 + version = "0.7.1"; 30 30 31 31 src = fetchFromGitHub { 32 32 owner = "labwc"; 33 33 repo = "labwc"; 34 34 rev = finalAttrs.version; 35 - hash = "sha256-/z2Wo9zhuEVIpk8jHYwg2JbBqkX7tfDP2KTZ9yzj454="; 35 + hash = "sha256-6l+pYEMFQT8P0j40IcujSzlKgXzR5GIyuxkAJi65RiY="; 36 36 }; 37 37 38 + outputs = [ "out" "man" ]; 39 + 38 40 nativeBuildInputs = [ 39 41 gettext 40 42 meson ··· 62 64 xwayland 63 65 ]; 64 66 65 - outputs = [ "out" "man" ]; 66 - 67 67 strictDeps = true; 68 68 69 69 mesonFlags = [ ··· 77 77 meta = { 78 78 homepage = "https://github.com/labwc/labwc"; 79 79 description = "A Wayland stacking compositor, inspired by Openbox"; 80 - changelog = "https://raw.githubusercontent.com/labwc/labwc/${finalAttrs.version}/NEWS.md"; 81 - license = lib.licenses.gpl2Plus; 80 + changelog = "https://github.com/labwc/labwc/blob/${finalAttrs.src.rev}/NEWS.md"; 81 + license = with lib.licenses; [ gpl2Plus ]; 82 + mainProgram = "labwc"; 82 83 maintainers = with lib.maintainers; [ AndersonTorres ]; 83 84 inherit (wayland.meta) platforms; 84 85 };
+2 -2
pkgs/by-name/li/live555/package.nix
··· 9 9 10 10 stdenv.mkDerivation (finalAttrs: { 11 11 pname = "live555"; 12 - version = "2024.02.23"; 12 + version = "2024.02.28"; 13 13 14 14 src = fetchurl { 15 15 urls = [ ··· 18 18 "https://download.videolan.org/contrib/live555/live.${finalAttrs.version}.tar.gz" 19 19 "mirror://sourceforge/slackbuildsdirectlinks/live.${finalAttrs.version}.tar.gz" 20 20 ]; 21 - hash = "sha256-85JWXfsPAvocX5PiKXw9Xkd4zm2akzxMeETsZ3xm2wg="; 21 + hash = "sha256-5WjtkdqoofZIijunfomcEeWj6l4CUK9HRoYAle2jSx8="; 22 22 }; 23 23 24 24 patches = [
+6 -5
pkgs/by-name/lu/ludtwig/package.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "ludtwig"; 5 - version = "0.8.0"; 5 + version = "0.8.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "MalteJanz"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-WF3tEf3SuXiH35Ny4RGLzvEW7yMsFcnVTX52e5qvK5g="; 11 + hash = "sha256-nNr0iis+wBd+xKJYQL7OWlQnU1DhKztsPHCq3+tX79w="; 12 12 }; 13 13 14 14 checkType = "debug"; 15 15 16 - cargoHash = "sha256-AbT8Jv6v7EVPX5mIplKaBkGrVonA8YWlMvo46coFMzk="; 16 + cargoHash = "sha256-Utho/foZOPz5K3WrOZjAkxvw7+J0RtbW0xvw/Txu/xk="; 17 17 18 18 meta = with lib; { 19 - description = "Linter / Formatter for Twig template files which respects HTML and your time."; 19 + description = "Linter / Formatter for Twig template files which respects HTML and your time"; 20 20 homepage = "https://github.com/MalteJanz/ludtwig"; 21 21 license = licenses.mit; 22 - maintainers = with maintainers; [ shyim ]; 22 + maintainers = with maintainers; [ shyim maltejanz ]; 23 + mainProgram = "ludtwig"; 23 24 }; 24 25 }
+2 -2
pkgs/by-name/vi/virtio-win/package.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "virtio-win"; 5 - version = "0.1.240-1"; 5 + version = "0.1.248-1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/archive-virtio/virtio-win-${version}/virtio-win.iso"; 9 - hash = "sha256-69SCWGaPf3jgJu0nbCip0Z2D4CD/oICtaZENyGu8vMY="; 9 + hash = "sha256-1bVznPKX8FONJj4wZ41aCbukcKfGvL2N/3TkQVPxZUk="; 10 10 }; 11 11 12 12 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/unixODBCDrivers/default.nix
··· 43 43 44 44 mariadb = stdenv.mkDerivation rec { 45 45 pname = "mariadb-connector-odbc"; 46 - version = "3.1.14"; 46 + version = "3.1.20"; 47 47 48 48 src = fetchFromGitHub { 49 49 owner = "mariadb-corporation"; 50 50 repo = "mariadb-connector-odbc"; 51 51 rev = version; 52 - sha256 = "0wvy6m9qfvjii3kanf2d1rhfaww32kg0d7m57643f79qb05gd6vg"; 52 + hash = "sha256-l+HlS7/A0shwsEXYKDhi+QCmwHaMTeKrtcvo9yYpYws="; 53 53 # this driver only seems to build correctly when built against the mariadb-connect-c subrepo 54 54 # (see https://github.com/NixOS/nixpkgs/issues/73258) 55 55 fetchSubmodules = true;
+2 -2
pkgs/development/tools/devpod/default.nix
··· 23 23 24 24 let 25 25 pname = "devpod"; 26 - version = "0.5.2"; 26 + version = "0.5.4"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "loft-sh"; 30 30 repo = pname; 31 31 rev = "v${version}"; 32 - sha256 = "sha256-xvZ9I8VL50yS6tEQizp7bebyZVTCW6y2VOSyVZDJy6M="; 32 + sha256 = "sha256-BXr+2uia5skNRpdo8T+0uOVdh6WmWeC42PGNSURJhas="; 33 33 }; 34 34 35 35 meta = with lib; {
+3 -3
pkgs/development/tools/gauge/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "gauge"; 5 - version = "1.6.2"; 5 + version = "1.6.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "getgauge"; 9 9 repo = "gauge"; 10 10 rev = "v${version}"; 11 - hash = "sha256-dCRuF1AYTcF2fKD7w7Gze2lE1hZYzpRz9u5p9uxqML0="; 11 + hash = "sha256-ymnyoQRMr3s74PnDSmXCoWGSMBhxy/CRDpRvEZHOrFU="; 12 12 }; 13 13 14 - vendorHash = "sha256-j3FpQ48LjIVteN80zvz88FF3z+pYD2aHJW4VxT0z0vI="; 14 + vendorHash = "sha256-5kBjxhmBrC5ZzD7CSzRvIzQrJYRRU/X+n9L9JPvyJkY="; 15 15 16 16 excludedPackages = [ "build" "man" ]; 17 17
+3 -3
pkgs/development/tools/misc/rsonpath/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "rsonpath"; 8 - version = "0.8.6"; 8 + version = "0.8.7"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "v0ldek"; 12 12 repo = "rsonpath"; 13 13 rev = "v${version}"; 14 - hash = "sha256-p1cbxEvnV5vR1fznNbglHfKa53DboIFJqEWAXBLoQ+s="; 14 + hash = "sha256-AMnUErmufHc05MxHru/b4mFHH+HF9jfhoNi8yIejc64="; 15 15 }; 16 16 17 - cargoHash = "sha256-rVJbrHsbSF8ZF44gmCUFxlGGhloC/kLBT5vSJjglxHE="; 17 + cargoHash = "sha256-flMzNxA1NWGy4ea7/dmPiEKspBmVuy82VPe5r8jaEGg="; 18 18 19 19 cargoBuildFlags = [ "-p=rsonpath" ]; 20 20 cargoTestFlags = cargoBuildFlags;
+3 -3
pkgs/development/tools/rust/cargo-bloat/default.nix pkgs/by-name/ca/cargo-bloat/package.nix
··· 8 8 owner = "RazrFalcon"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-lCA7C1G2xu65jn3/wzj6prWSrjQz3EqqJyMlPR/HRFs="; 11 + hash = "sha256-lCA7C1G2xu65jn3/wzj6prWSrjQz3EqqJyMlPR/HRFs="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-fOenXn5gagFss9DRDXXsGxQlDqVXZ5LZcdM4WsXAyUU="; 14 + cargoHash = "sha256-fOenXn5gagFss9DRDXXsGxQlDqVXZ5LZcdM4WsXAyUU="; 15 15 16 16 meta = with lib; { 17 17 description = "A tool and Cargo subcommand that helps you find out what takes most of the space in your executable"; ··· 19 19 license = licenses.mit; 20 20 platforms = platforms.unix; 21 21 maintainers = with maintainers; [ xrelkd matthiasbeyer ]; 22 + mainProgram = "cargo-bloat"; 22 23 }; 23 24 } 24 -
+2 -2
pkgs/os-specific/linux/tuxedo-keyboard/default.nix
··· 2 2 3 3 stdenv.mkDerivation (finalAttrs: { 4 4 pname = "tuxedo-keyboard-${kernel.version}"; 5 - version = "3.2.7"; 5 + version = "3.2.14"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tuxedocomputers"; 9 9 repo = "tuxedo-keyboard"; 10 10 rev = "v${finalAttrs.version}"; 11 - hash = "sha256-Q0wnejeLGLSDS0GPxQuYUKCAdzbYA66KT0DuWsEKIRs="; 11 + hash = "sha256-L3NsUUKA/snUcRWwlZidsBiTznhfulNldidEDDmNOkw="; 12 12 }; 13 13 14 14 buildInputs = [
+12 -1
pkgs/servers/rippled/default.nix
··· 1 - { lib, stdenv, fetchgit, fetchurl, git, cmake, pkg-config 1 + { lib, stdenv, fetchgit, fetchurl, fetchpatch, git, cmake, pkg-config 2 2 , openssl, boost, grpc, protobuf, libnsl, rocksdb_6_23, snappy }: 3 3 4 4 let ··· 99 99 fetchSubmodules = true; 100 100 hash = "sha256-VW/VmnhtF2xyHfEud3D6b3n8uTE0a/nDW1GISs5QfwM="; 101 101 }; 102 + 103 + patches = [ 104 + # Fix gcc-13 build due to missing <cstdint> includes: 105 + # https://github.com/XRPLF/rippled/pull/4555 106 + (fetchpatch { 107 + name = "gcc-13.patch"; 108 + url = "https://github.com/XRPLF/rippled/commit/c9a586c2437bc8ffd22e946c82e1cbe906e1fc40.patch"; 109 + hash = "sha256-+4BDTMFoQWUHljgwGB1gtczVPQH/U5MA0ojbnBykceg="; 110 + excludes = [ "src/ripple/basics/StringUtilities.h" ]; 111 + }) 112 + ]; 102 113 103 114 hardeningDisable = ["format"]; 104 115 cmakeFlags = ["-Dstatic=OFF" "-DBoost_NO_BOOST_CMAKE=ON" "-DSNAPPY_INCLUDE_DIR=${snappy}/include" ];
+3 -3
pkgs/tools/admin/syft/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "syft"; 5 - version = "0.105.1"; 5 + version = "1.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "anchore"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-laseVMbgzKuVyF6PWpthtt3Wgv+WW5ccTjp0jj15nB0="; 11 + hash = "sha256-JDPHAFLs1o2dH72CRSglRbpmF+/xcSjvBqyYJUU3Ta8="; 12 12 # populate values that require us to use git. By doing this in postFetch we 13 13 # can delete .git afterwards and maintain better reproducibility of the src. 14 14 leaveDotGit = true; ··· 22 22 }; 23 23 # hash mismatch with darwin 24 24 proxyVendor = true; 25 - vendorHash = "sha256-u5leq9K9c31No6saMO5cK9futt4Wl4f/d6V2djC8T1w="; 25 + vendorHash = "sha256-tgptjaW9yu8Vk98YY+nX/lZU+ys/VuFKrwS8QIG8mXE="; 26 26 27 27 nativeBuildInputs = [ installShellFiles ]; 28 28
+2 -2
pkgs/tools/misc/moreutils/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "moreutils"; 17 - version = "0.68"; 17 + version = "0.69"; 18 18 19 19 src = fetchgit { 20 20 url = "git://git.joeyh.name/moreutils"; 21 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-kOY12oejH0xKaaPrKem+l0PACqyPqD4P1jEjOYfNntM="; 22 + hash = "sha256-hVvRAIXlG8+pAD2v/Ma9Z6EUL/1xIRz7Gx1fOxoQyi0="; 23 23 }; 24 24 25 25 preBuild = ''
+3 -3
pkgs/tools/text/vale/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vale"; 5 - version = "3.2.0"; 5 + version = "3.2.1"; 6 6 7 7 subPackages = [ "cmd/vale" ]; 8 8 outputs = [ "out" "data" ]; ··· 11 11 owner = "errata-ai"; 12 12 repo = "vale"; 13 13 rev = "v${version}"; 14 - hash = "sha256-emAwoOFjB/zXkCLL8txs1OiMZ9DKm58eeenYFKctpzQ="; 14 + hash = "sha256-e3cxUO05OU1RYINX24E8XXkxPADWpaIYTUgbcQIys7w="; 15 15 }; 16 16 17 - vendorHash = "sha256-cGWWjfkwgM1dAVKCl/Ao2ILyLyk0oPvqjLEZL0Clvyw="; 17 + vendorHash = "sha256-KxIQZViUYT4cgRlOuKBwen6pqQjGiAofkeBztmjnKdQ="; 18 18 19 19 postInstall = '' 20 20 mkdir -p $data/share/vale
+8 -9
pkgs/top-level/all-packages.nix
··· 8722 8722 8723 8723 google-guest-oslogin = callPackage ../tools/virtualization/google-guest-oslogin { }; 8724 8724 8725 - google-cloud-cpp = disable-warnings-if-gcc13 (callPackage ../development/libraries/google-cloud-cpp { }); 8725 + google-cloud-cpp = callPackage ../development/libraries/google-cloud-cpp { }; 8726 8726 8727 8727 google-java-format = callPackage ../development/tools/google-java-format { }; 8728 8728 ··· 16912 16912 inherit (darwin.apple_sdk.frameworks) Security; 16913 16913 }; 16914 16914 cargo-binutils = callPackage ../development/tools/rust/cargo-binutils { }; 16915 - cargo-bloat = callPackage ../development/tools/rust/cargo-bloat { }; 16916 16915 cargo-bolero = callPackage ../development/tools/rust/cargo-bolero { }; 16917 16916 cargo-bundle = callPackage ../development/tools/rust/cargo-bundle { }; 16918 16917 cargo-bundle-licenses = callPackage ../development/tools/rust/cargo-bundle-licenses { }; ··· 21328 21327 stdenv = if stdenv.isDarwin then darwin.apple_sdk_11_0.stdenv else stdenv; 21329 21328 }; 21330 21329 21331 - graphia = libsForQt5.callPackage ../applications/science/misc/graphia { }; 21330 + graphia = qt6Packages.callPackage ../applications/science/misc/graphia { }; 21332 21331 21333 21332 graphinder = callPackage ../tools/security/graphinder { }; 21334 21333 ··· 24290 24289 24291 24290 primesieve = callPackage ../applications/science/math/primesieve { }; 24292 24291 24293 - proj = disable-warnings-if-gcc13 (callPackage ../development/libraries/proj { 24292 + proj = callPackage ../development/libraries/proj { 24294 24293 stdenv = if stdenv.cc.isClang then overrideLibcxx llvmPackages_13.stdenv else stdenv; 24295 - }); 24294 + }; 24296 24295 24297 24296 proj_7 = callPackage ../development/libraries/proj/7.nix { }; 24298 24297 ··· 27623 27622 inherit (darwin.apple_sdk.frameworks) AppKit; 27624 27623 }; 27625 27624 27626 - btop = disable-warnings-if-gcc13 (darwin.apple_sdk_11_0.callPackage ../tools/system/btop { }); 27625 + btop = darwin.apple_sdk_11_0.callPackage ../tools/system/btop { }; 27627 27626 27628 27627 nmon = callPackage ../os-specific/linux/nmon { }; 27629 27628 ··· 33902 33901 33903 33902 rep-gtk = callPackage ../development/libraries/rep-gtk { }; 33904 33903 33905 - reproc = disable-warnings-if-gcc13 (callPackage ../development/libraries/reproc { }); 33904 + reproc = callPackage ../development/libraries/reproc { }; 33906 33905 33907 33906 sawfish = callPackage ../applications/window-managers/sawfish { }; 33908 33907 ··· 36848 36847 vertcoin = libsForQt5.callPackage ../applications/blockchains/vertcoin { 36849 36848 withGui = true; 36850 36849 }; 36851 - vertcoind = disable-warnings-if-gcc13 (callPackage ../applications/blockchains/vertcoin { 36850 + vertcoind = callPackage ../applications/blockchains/vertcoin { 36852 36851 withGui = false; 36853 - }); 36852 + }; 36854 36853 36855 36854 wasabiwallet = callPackage ../applications/blockchains/wasabiwallet { }; 36856 36855
+1
pkgs/top-level/release-attrpaths-superset.nix
··· 53 53 pkgsStatic = true; 54 54 pkgsCross = true; 55 55 pkgsi686Linux = true; 56 + pkgsLinux = true; 56 57 pkgsExtraHardening = true; 57 58 }; 58 59
+10
pkgs/top-level/stage.nix
··· 243 243 }; 244 244 } else throw "x86_64 Darwin package set can only be used on Darwin systems."; 245 245 246 + # If already linux: the same package set unaltered 247 + # Otherwise, return a natively built linux package set for the current cpu architecture string. 248 + # (ABI and other details will be set to the default for the cpu/os pair) 249 + pkgsLinux = 250 + if stdenv.hostPlatform.isLinux 251 + then self 252 + else nixpkgsFun { 253 + localSystem = lib.systems.elaborate "${stdenv.hostPlatform.parsed.cpu.name}-linux"; 254 + }; 255 + 246 256 # Extend the package set with zero or more overlays. This preserves 247 257 # preexisting overlays. Prefer to initialize with the right overlays 248 258 # in one go when calling Nixpkgs, for performance and simplicity.