Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 9819563c a04ddbe3

+205 -120
+6
maintainers/maintainer-list.nix
··· 11718 githubId = 1780588; 11719 name = "Malte Poll"; 11720 }; 11721 malte-v = { 11722 email = "nixpkgs@mal.tc"; 11723 github = "malte-v";
··· 11718 githubId = 1780588; 11719 name = "Malte Poll"; 11720 }; 11721 + maltejanz = { 11722 + email = "service.malte.j@protonmail.com"; 11723 + github = "MalteJanz"; 11724 + githubId = 18661391; 11725 + name = "Malte Janz"; 11726 + }; 11727 malte-v = { 11728 email = "nixpkgs@mal.tc"; 11729 github = "malte-v";
+21 -1
nixos/lib/testing/nodes.nix
··· 14 types 15 ; 16 17 baseOS = 18 import ../eval-config.nix { 19 inherit lib; ··· 27 ({ config, ... }: 28 { 29 virtualisation.qemu.package = testModuleArgs.config.qemu.package; 30 }) 31 ({ options, ... }: { 32 key = "nodes.nix-pkgs"; 33 config = optionalAttrs (!config.node.pkgsReadOnly) ( 34 mkIf (!options.nixpkgs.pkgs.isDefined) { 35 # TODO: switch to nixpkgs.hostPlatform and make sure containers-imperative test still evaluates. 36 - nixpkgs.system = hostPkgs.stdenv.hostPlatform.system; 37 } 38 ); 39 })
··· 14 types 15 ; 16 17 + inherit (hostPkgs) hostPlatform; 18 + 19 + guestSystem = 20 + if hostPlatform.isLinux 21 + then hostPlatform.system 22 + else 23 + let 24 + hostToGuest = { 25 + "x86_64-darwin" = "x86_64-linux"; 26 + "aarch64-darwin" = "aarch64-linux"; 27 + }; 28 + 29 + supportedHosts = lib.concatStringsSep ", " (lib.attrNames hostToGuest); 30 + 31 + message = 32 + "NixOS Test: don't know which VM guest system to pair with VM host system: ${hostPlatform.system}. Perhaps you intended to run the tests on a Linux host, or one of the following systems that may run NixOS tests: ${supportedHosts}"; 33 + in 34 + hostToGuest.${hostPlatform.system} or (throw message); 35 + 36 baseOS = 37 import ../eval-config.nix { 38 inherit lib; ··· 46 ({ config, ... }: 47 { 48 virtualisation.qemu.package = testModuleArgs.config.qemu.package; 49 + virtualisation.host.pkgs = hostPkgs; 50 }) 51 ({ options, ... }: { 52 key = "nodes.nix-pkgs"; 53 config = optionalAttrs (!config.node.pkgsReadOnly) ( 54 mkIf (!options.nixpkgs.pkgs.isDefined) { 55 # TODO: switch to nixpkgs.hostPlatform and make sure containers-imperative test still evaluates. 56 + nixpkgs.system = guestSystem; 57 } 58 ); 59 })
+5 -1
nixos/lib/testing/pkgs.nix
··· 2 { 3 config = { 4 # default pkgs for use in VMs 5 - _module.args.pkgs = hostPkgs; 6 7 defaults = { 8 # TODO: a module to set a shared pkgs, if options.nixpkgs.* is untouched by user (highestPrio) */
··· 2 { 3 config = { 4 # default pkgs for use in VMs 5 + _module.args.pkgs = 6 + # TODO: deprecate it everywhere; not just on darwin. Throw on darwin? 7 + lib.warnIf hostPkgs.stdenv.hostPlatform.isDarwin 8 + "Do not use the `pkgs` module argument in tests you want to run on darwin. It is ambiguous, and many tests are broken because of it. If you need to use a package on the VM host, use `hostPkgs`. Otherwise, use `config.node.pkgs`, or `config.nodes.<name>.nixpkgs.pkgs`." 9 + hostPkgs; 10 11 defaults = { 12 # TODO: a module to set a shared pkgs, if options.nixpkgs.* is untouched by user (highestPrio) */
+3 -1
nixos/lib/testing/run.nix
··· 41 rawTestDerivation = hostPkgs.stdenv.mkDerivation { 42 name = "vm-test-run-${config.name}"; 43 44 - requiredSystemFeatures = [ "kvm" "nixos-test" ]; 45 46 buildCommand = '' 47 mkdir -p $out
··· 41 rawTestDerivation = hostPkgs.stdenv.mkDerivation { 42 name = "vm-test-run-${config.name}"; 43 44 + requiredSystemFeatures = [ "nixos-test" ] 45 + ++ lib.optionals hostPkgs.stdenv.hostPlatform.isLinux [ "kvm" ] 46 + ++ lib.optionals hostPkgs.stdenv.hostPlatform.isDarwin [ "apple-virt" ]; 47 48 buildCommand = '' 49 mkdir -p $out
+4 -1
nixos/tests/acme.nix
··· 1 - { pkgs, lib, ... }: let 2 commonConfig = ./common/acme/client; 3 4 dnsServerIP = nodes: nodes.dnsserver.networking.primaryIPAddress;
··· 1 + { config, lib, ... }: let 2 + 3 + pkgs = config.node.pkgs; 4 + 5 commonConfig = ./common/acme/client; 6 7 dnsServerIP = nodes: nodes.dnsserver.networking.primaryIPAddress;
+2 -1
nixos/tests/all-tests.nix
··· 78 # it with `allowAliases = false`? 79 # warnIf pkgs.config.allowAliases "nixosTests: pkgs includes aliases." 80 { 81 _class = "nixosTest"; 82 - node.pkgs = pkgs; 83 }; 84 85 in {
··· 78 # it with `allowAliases = false`? 79 # warnIf pkgs.config.allowAliases "nixosTests: pkgs includes aliases." 80 { 81 + _file = "${__curPos.file} readOnlyPkgs"; 82 _class = "nixosTest"; 83 + node.pkgs = pkgs.pkgsLinux; 84 }; 85 86 in {
+7 -25
pkgs/applications/audio/surge-XT/default.nix
··· 2 , lib 3 , fetchFromGitHub 4 , cmake 5 , pkg-config 6 , alsa-lib 7 , freetype ··· 14 , libXrandr 15 }: 16 17 - let 18 - juce-lv2 = stdenv.mkDerivation { 19 - pname = "juce-lv2"; 20 - version = "unstable-2023-03-04"; 21 - 22 - # lv2 branch 23 - src = fetchFromGitHub { 24 - owner = "lv2-porting-project"; 25 - repo = "JUCE"; 26 - rev = "e825ad977cf4499a7bfa05b97b208236f8fd253b"; 27 - sha256 = "sha256-Fqp1y9BN0E9p/12ukG1oh3COhXNRWBAlFRSl0LPyiFc="; 28 - }; 29 - 30 - dontConfigure = true; 31 - dontBuild = true; 32 - 33 - installPhase = '' 34 - cp -r . $out 35 - ''; 36 - }; 37 - in 38 stdenv.mkDerivation rec { 39 pname = "surge-XT"; 40 - version = "1.2.3"; 41 42 src = fetchFromGitHub { 43 owner = "surge-synthesizer"; 44 repo = "surge"; 45 rev = "release_xt_${version}"; 46 fetchSubmodules = true; 47 - sha256 = "sha256-DGzdzoCjMGEDltEwlPvLk2tyMVRH1Ql2Iq1ypogw/m0="; 48 }; 49 50 nativeBuildInputs = [ 51 cmake 52 pkg-config 53 ]; 54 ··· 67 enableParallelBuilding = true; 68 69 cmakeFlags = [ 70 - "-DJUCE_SUPPORTS_LV2=ON" 71 - "-DSURGE_JUCE_PATH=${juce-lv2}" 72 ]; 73 74 CXXFLAGS = [
··· 2 , lib 3 , fetchFromGitHub 4 , cmake 5 + , gitMinimal 6 , pkg-config 7 , alsa-lib 8 , freetype ··· 15 , libXrandr 16 }: 17 18 stdenv.mkDerivation rec { 19 pname = "surge-XT"; 20 + version = "1.3.1"; 21 22 src = fetchFromGitHub { 23 owner = "surge-synthesizer"; 24 repo = "surge"; 25 rev = "release_xt_${version}"; 26 + branchName = "release-xt/${version}"; 27 fetchSubmodules = true; 28 + leaveDotGit = true; 29 + sha256 = "sha256-q6qs/OhIakF+Gc8Da3pnfkUGYDUoJbvee0o8dfrRI2U="; 30 }; 31 32 nativeBuildInputs = [ 33 cmake 34 + gitMinimal 35 pkg-config 36 ]; 37 ··· 50 enableParallelBuilding = true; 51 52 cmakeFlags = [ 53 + "-DSURGE_BUILD_LV2=TRUE" 54 ]; 55 56 CXXFLAGS = [
+18
pkgs/applications/blockchains/stellar-core/default.nix
··· 2 , automake 3 , bison 4 , fetchFromGitHub 5 , flex 6 , git 7 , lib ··· 24 hash = "sha256-lxBn/T01Tsa7tid3mRJUigUwv9d3BAPZhV9Mp1lywBU="; 25 fetchSubmodules = true; 26 }; 27 28 nativeBuildInputs = [ 29 automake
··· 2 , automake 3 , bison 4 , fetchFromGitHub 5 + , fetchpatch 6 , flex 7 , git 8 , lib ··· 25 hash = "sha256-lxBn/T01Tsa7tid3mRJUigUwv9d3BAPZhV9Mp1lywBU="; 26 fetchSubmodules = true; 27 }; 28 + 29 + patches = [ 30 + # Fix gcc-13 build failure due to missing <stdexcept> include 31 + # https://github.com/stellar/medida/pull/34 32 + (fetchpatch { 33 + name = "gcc-13-p1.patch"; 34 + url = "https://github.com/stellar/medida/commit/f91354b0055de939779d392999975d611b1b1ad5.patch"; 35 + stripLen = 1; 36 + extraPrefix = "lib/libmedida/"; 37 + hash = "sha256-iVeSUY5Rcy62apIKJdbcHGgxAxpQCkygf85oSjbTTXU="; 38 + }) 39 + (fetchpatch { 40 + name = "gcc-13-p2.patch"; 41 + url = "https://github.com/stellar/stellar-core/commit/477b3135281b629554cabaeacfcdbcdc170aa335.patch"; 42 + hash = "sha256-UVRcAIA5LEaCn16lWfhg19UU7b/apigzTsfPROLZtYg="; 43 + }) 44 + ]; 45 46 nativeBuildInputs = [ 47 automake
+17 -4
pkgs/applications/misc/evtest-qt/default.nix
··· 1 - { mkDerivation, lib, qtbase, cmake, fetchFromGitHub }: 2 3 mkDerivation rec { 4 pname = "evtest-qt"; 5 - version = "0.2.0"; 6 7 src = fetchFromGitHub { 8 owner = "Grumbel"; 9 repo = pname; 10 - rev = "v${version}"; 11 - sha256 = "1wfzkgq81764qzxgk0y5vvpxcrb3icvrr4dd4mj8njrqgbwmn0mw"; 12 }; 13 14 nativeBuildInputs = [ cmake ]; 15 16 buildInputs = [ qtbase ]; 17 18 meta = with lib; { 19 description = "Simple input device tester for linux with Qt GUI";
··· 1 + { mkDerivation, lib, qtbase, cmake, fetchFromGitHub, fetchpatch, unstableGitUpdater }: 2 3 mkDerivation rec { 4 pname = "evtest-qt"; 5 + version = "0.2.0-unstable-2023-09-13"; 6 7 src = fetchFromGitHub { 8 owner = "Grumbel"; 9 repo = pname; 10 + rev = "fb087f4d3d51377790f1ff30681c48031bf23145"; 11 + hash = "sha256-gE47x1J13YZUVyB0b4VRyESIVCm3GbOXp2bX0TP97UU="; 12 + fetchSubmodules = true; 13 }; 14 15 + patches = [ 16 + # Fix build against gcc-13: 17 + # https://github.com/Grumbel/evtest-qt/pull/14 18 + (fetchpatch { 19 + name = "gcc-13.patch"; 20 + url = "https://github.com/Grumbel/evtest-qt/commit/975dedcfd60853bd329f34d48ce4740add8866eb.patch"; 21 + hash = "sha256-gR/9oVhO4G9i7dn+CjvDAQN0KLXoX/fatpE0W3gXDc0="; 22 + }) 23 + ]; 24 + 25 nativeBuildInputs = [ cmake ]; 26 27 buildInputs = [ qtbase ]; 28 + 29 + passthru.updateScript = unstableGitUpdater {}; 30 31 meta = with lib; { 32 description = "Simple input device tester for linux with Qt GUI";
+6 -2
pkgs/applications/misc/qlcplus/default.nix
··· 29 30 qmakeFlags = [ "INSTALLROOT=$(out)" ]; 31 32 - env.NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; 33 - 34 postPatch = '' 35 patchShebangs . 36 sed -i -e '/unix:!macx:INSTALLROOT += \/usr/d' \ 37 -e "s@\$\$LIBSDIR/qt4/plugins@''${qtPluginPrefix}@" \ 38 -e "s@/etc/udev/rules.d@''${out}/lib/udev/rules.d@" \ 39 variables.pri 40 ''; 41 42 postInstall = '' 43 ln -sf $out/lib/*/libqlcplus* $out/lib
··· 29 30 qmakeFlags = [ "INSTALLROOT=$(out)" ]; 31 32 postPatch = '' 33 patchShebangs . 34 sed -i -e '/unix:!macx:INSTALLROOT += \/usr/d' \ 35 -e "s@\$\$LIBSDIR/qt4/plugins@''${qtPluginPrefix}@" \ 36 -e "s@/etc/udev/rules.d@''${out}/lib/udev/rules.d@" \ 37 variables.pri 38 + 39 + # Fix gcc-13 build failure by removing blanket -Werror. 40 + fgrep Werror variables.pri 41 + substituteInPlace variables.pri --replace-fail "QMAKE_CXXFLAGS += -Werror" "" 42 ''; 43 + 44 + enableParallelBuilding = true; 45 46 postInstall = '' 47 ln -sf $out/lib/*/libqlcplus* $out/lib
+8
pkgs/applications/networking/browsers/gmni/default.nix
··· 14 nativeBuildInputs = [ scdoc ]; 15 buildInputs = [ bearssl ]; 16 17 meta = with lib; { 18 description = "A Gemini client"; 19 homepage = "https://git.sr.ht/~sircmpwn/gmni";
··· 14 nativeBuildInputs = [ scdoc ]; 15 buildInputs = [ bearssl ]; 16 17 + # Fix build on `gcc-13`: 18 + # inlined from 'xt_end_chain' at src/tofu.c:82:3, 19 + # ...-glibc-2.38-27-dev/include/bits/stdio2.h:54:10: error: '__builtin___snprintf_chk' specified bound 4 exceeds destination size 3 [-Werror=stringop-overflow] 20 + # 21 + # The overflow will not happen in practice, but `snprintf()` gets 22 + # passed one more byte than available. 23 + hardeningDisable = [ "fortify3" ]; 24 + 25 meta = with lib; { 26 description = "A Gemini client"; 27 homepage = "https://git.sr.ht/~sircmpwn/gmni";
+3 -3
pkgs/applications/networking/cluster/acorn/default.nix
··· 2 3 buildGoModule rec { 4 pname = "acorn"; 5 - version = "0.10.0"; 6 7 src = fetchFromGitHub { 8 owner = "acorn-io"; 9 repo = pname; 10 rev = "v${version}"; 11 - hash = "sha256-U4VQ8PsmJxeMYj7TlsQQOEPckECDK+ENBQLjq5VFyJ4="; 12 }; 13 14 - vendorHash = "sha256-FZJqE7BWGvXsFsfxnnaKUFLInBzz+bUwURq4KvSMrus="; 15 16 ldflags = [ 17 "-s"
··· 2 3 buildGoModule rec { 4 pname = "acorn"; 5 + version = "0.10.1"; 6 7 src = fetchFromGitHub { 8 owner = "acorn-io"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-Zw/OqN4d5iukh9oUXjczMvNKYkcGSUoDEwfti7uzZXQ="; 12 }; 13 14 + vendorHash = "sha256-d/1Rqh00THUwcMBWloevfKbScaWhVG5r/32Q4zYUaJg="; 15 16 ldflags = [ 17 "-s"
+3 -3
pkgs/applications/networking/cluster/clusterctl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "clusterctl"; 5 - version = "1.6.1"; 6 7 src = fetchFromGitHub { 8 owner = "kubernetes-sigs"; 9 repo = "cluster-api"; 10 rev = "v${version}"; 11 - hash = "sha256-v87QxDx+DA5pJHmu6jNwLcs4dNEsa5fUoRcVAhMnh24="; 12 }; 13 14 - vendorHash = "sha256-1W+nkhbJRHd4AaOzO01ZUu6wFvFIG0SOCzc4dg0Zopk="; 15 16 subPackages = [ "cmd/clusterctl" ]; 17
··· 2 3 buildGoModule rec { 4 pname = "clusterctl"; 5 + version = "1.6.2"; 6 7 src = fetchFromGitHub { 8 owner = "kubernetes-sigs"; 9 repo = "cluster-api"; 10 rev = "v${version}"; 11 + hash = "sha256-OTOM83dsf6Fk+CYkACQOmguDTYfZvN9qes3S/cFEq/8="; 12 }; 13 14 + vendorHash = "sha256-SwJx3KPdOugDYLLymPyrPam0uMyRWIDpQn79Sd9fhJ4="; 15 16 subPackages = [ "cmd/clusterctl" ]; 17
+3 -3
pkgs/applications/networking/cluster/kubebuilder/default.nix
··· 12 13 buildGoModule rec { 14 pname = "kubebuilder"; 15 - version = "3.13.0"; 16 17 src = fetchFromGitHub { 18 owner = "kubernetes-sigs"; 19 repo = "kubebuilder"; 20 rev = "v${version}"; 21 - hash = "sha256-JXI3hQVChM7czCwan1yswsrUSse/IbMzwXw0tnaBiek="; 22 }; 23 24 - vendorHash = "sha256-yiRxSJIIYJbkV3QAFclrDDnsBoX1t4cSRvGmwVgz/w8="; 25 26 subPackages = ["cmd"]; 27
··· 12 13 buildGoModule rec { 14 pname = "kubebuilder"; 15 + version = "3.14.0"; 16 17 src = fetchFromGitHub { 18 owner = "kubernetes-sigs"; 19 repo = "kubebuilder"; 20 rev = "v${version}"; 21 + hash = "sha256-em+I2YICcqljaaNQ+zOAnOZ552elmV6Ywbfla8buwaY="; 22 }; 23 24 + vendorHash = "sha256-iBwhpVs9u5AQAvmzb69SaewdYHmmaV19Bstd0Tux9CA="; 25 26 subPackages = ["cmd"]; 27
+3 -3
pkgs/applications/networking/cluster/kubectl-gadget/default.nix
··· 2 3 buildGoModule rec { 4 pname = "kubectl-gadget"; 5 - version = "0.24.0"; 6 7 src = fetchFromGitHub { 8 owner = "inspektor-gadget"; 9 repo = "inspektor-gadget"; 10 rev = "v${version}"; 11 - hash = "sha256-JC6+6PADTfxpVRowh09fXC8EO/qIsUTTba2uYxxxJ/A="; 12 }; 13 14 - vendorHash = "sha256-7pwEQ1O3i4SmVSTTmOX9KPR0ePdDpf2dQgD4e6fDyzQ="; 15 16 CGO_ENABLED = 0; 17
··· 2 3 buildGoModule rec { 4 pname = "kubectl-gadget"; 5 + version = "0.25.1"; 6 7 src = fetchFromGitHub { 8 owner = "inspektor-gadget"; 9 repo = "inspektor-gadget"; 10 rev = "v${version}"; 11 + hash = "sha256-RbLc8c2F2Jy9jHwcd1FgqxhC5cl82oOauo/hsZ5zaG0="; 12 }; 13 14 + vendorHash = "sha256-/1dDAcICf7+g8hxaIAUsUwR9FNqatMhgAsvXrOuvGyk="; 15 16 CGO_ENABLED = 0; 17
+15 -14
pkgs/applications/science/misc/graphia/default.nix
··· 1 { stdenv 2 , lib 3 , cmake 4 , fetchFromGitHub 5 , fetchpatch 6 , wrapQtAppsHook 7 , qtbase 8 - , qtquickcontrols2 9 - , qtgraphicaleffects 10 }: 11 12 stdenv.mkDerivation rec { 13 pname = "graphia"; 14 - version = "3.2"; 15 16 src = fetchFromGitHub { 17 owner = "graphia-app"; 18 repo = "graphia"; 19 rev = version; 20 - sha256 = "sha256-9kohXLXF4F/qoHm8qmvPM1y9ak0Thb4xvgKJlVuOPTg="; 21 }; 22 23 patches = [ 24 - # Fix for a breakpad incompatibility with glibc>2.33 25 - # https://github.com/pytorch/pytorch/issues/70297 26 - # https://github.com/google/breakpad/commit/605c51ed96ad44b34c457bbca320e74e194c317e 27 - ./breakpad-sigstksz.patch 28 - 29 - # FIXME: backport patch fixing build with Qt 5.15, remove for next release 30 (fetchpatch { 31 - url = "https://github.com/graphia-app/graphia/commit/4b51bb8d465afa7ed0b2b30cb1c5e1c6af95976f.patch"; 32 - hash = "sha256-GDJAFLxQlRWKvcOgqqPYV/aVTRM7+KDjW7Zp9l7SuyM="; 33 }) 34 ]; 35 36 nativeBuildInputs = [ 37 cmake 38 wrapQtAppsHook 39 ]; 40 41 buildInputs = [ 42 qtbase 43 - qtquickcontrols2 44 - qtgraphicaleffects 45 ]; 46 47 meta = with lib; { ··· 50 description = "A visualisation tool for the creation and analysis of graphs."; 51 homepage = "https://graphia.app"; 52 license = licenses.gpl3Only; 53 maintainers = [ maintainers.bgamari ]; 54 platforms = platforms.all; 55 };
··· 1 { stdenv 2 , lib 3 , cmake 4 + , git 5 , fetchFromGitHub 6 , fetchpatch 7 , wrapQtAppsHook 8 , qtbase 9 + , qtdeclarative 10 + , qtsvg 11 + , qtwebengine 12 }: 13 14 stdenv.mkDerivation rec { 15 pname = "graphia"; 16 + version = "4.2"; 17 18 src = fetchFromGitHub { 19 owner = "graphia-app"; 20 repo = "graphia"; 21 rev = version; 22 + sha256 = "sha256-8+tlQbTr6BGx+/gjviuNrQQWcxC/j6dJ+PxwB4fYmqQ="; 23 }; 24 25 patches = [ 26 + # Fix gcc-13 build: 27 (fetchpatch { 28 + name = "gcc-13.patch"; 29 + url = "https://github.com/graphia-app/graphia/commit/78fb55a4d73f96e9a182de433c7da60330bd5b5e.patch"; 30 + hash = "sha256-waI2ur3gOKMQvqB2Qnyz7oMOMConl3jLMVKKmOmTpJs="; 31 }) 32 ]; 33 34 nativeBuildInputs = [ 35 cmake 36 + git # needs to define some hash as a version 37 wrapQtAppsHook 38 ]; 39 40 buildInputs = [ 41 qtbase 42 + qtdeclarative 43 + qtsvg 44 + qtwebengine 45 ]; 46 47 meta = with lib; { ··· 50 description = "A visualisation tool for the creation and analysis of graphs."; 51 homepage = "https://graphia.app"; 52 license = licenses.gpl3Only; 53 + mainProgram = "Graphia"; 54 maintainers = [ maintainers.bgamari ]; 55 platforms = platforms.all; 56 };
+3 -3
pkgs/applications/version-management/git-lfs/default.nix
··· 2 3 buildGoModule rec { 4 pname = "git-lfs"; 5 - version = "3.4.1"; 6 7 src = fetchFromGitHub { 8 owner = "git-lfs"; 9 repo = "git-lfs"; 10 rev = "v${version}"; 11 - hash = "sha256-XqxkNCC2yzUTVOi/1iDsnxtLkw4jfQuBh9UsjtZ1zVc="; 12 }; 13 14 - vendorHash = "sha256-VmPeQYWOHFqFLHKcKH3WHz50yx7GMHVIDPzqiVwwjSg="; 15 16 nativeBuildInputs = [ asciidoctor installShellFiles ]; 17
··· 2 3 buildGoModule rec { 4 pname = "git-lfs"; 5 + version = "3.5.0"; 6 7 src = fetchFromGitHub { 8 owner = "git-lfs"; 9 repo = "git-lfs"; 10 rev = "v${version}"; 11 + hash = "sha256-iBv9kUaoyH9yEoCZYGYm+gmdjb797hWftzwkRNDNu3k="; 12 }; 13 14 + vendorHash = "sha256-N8HB2qwBxjzfNucftHxmX2W9srCx62pjmkCWzwiCj/I="; 15 16 nativeBuildInputs = [ asciidoctor installShellFiles ]; 17
+3 -3
pkgs/build-support/testers/default.nix
··· 1 - { pkgs, buildPackages, lib, callPackage, runCommand, stdenv, substituteAll, testers }: 2 # Documentation is in doc/builders/testers.chapter.md 3 { 4 # See https://nixos.org/manual/nixpkgs/unstable/#tester-testBuildFailure ··· 107 (lib.setDefaultModuleLocation "the argument that was passed to pkgs.runNixOSTest" testModule) 108 ]; 109 hostPkgs = pkgs; 110 - node.pkgs = pkgs; 111 }; 112 113 # See doc/builders/testers.chapter.md or ··· 123 inherit pkgs; 124 extraConfigurations = [( 125 { lib, ... }: { 126 - config.nixpkgs.pkgs = lib.mkDefault pkgs; 127 } 128 )]; 129 });
··· 1 + { pkgs, pkgsLinux, buildPackages, lib, callPackage, runCommand, stdenv, substituteAll, testers }: 2 # Documentation is in doc/builders/testers.chapter.md 3 { 4 # See https://nixos.org/manual/nixpkgs/unstable/#tester-testBuildFailure ··· 107 (lib.setDefaultModuleLocation "the argument that was passed to pkgs.runNixOSTest" testModule) 108 ]; 109 hostPkgs = pkgs; 110 + node.pkgs = pkgsLinux; 111 }; 112 113 # See doc/builders/testers.chapter.md or ··· 123 inherit pkgs; 124 extraConfigurations = [( 125 { lib, ... }: { 126 + config.nixpkgs.pkgs = lib.mkDefault pkgsLinux; 127 } 128 )]; 129 });
+2 -2
pkgs/build-support/testers/test/default.nix
··· 27 28 # Check that the wiring of nixosTest is correct. 29 # Correct operation of the NixOS test driver should be asserted elsewhere. 30 - nixosTest-example = pkgs-with-overlay.testers.nixosTest ({ lib, pkgs, figlet, ... }: { 31 name = "nixosTest-test"; 32 nodes.machine = { pkgs, ... }: { 33 system.nixos = dummyVersioning; 34 - environment.systemPackages = [ pkgs.proof-of-overlay-hello figlet ]; 35 }; 36 testScript = '' 37 machine.succeed("hello | figlet >/dev/console")
··· 27 28 # Check that the wiring of nixosTest is correct. 29 # Correct operation of the NixOS test driver should be asserted elsewhere. 30 + nixosTest-example = pkgs-with-overlay.testers.nixosTest ({ lib, ... }: { 31 name = "nixosTest-test"; 32 nodes.machine = { pkgs, ... }: { 33 system.nixos = dummyVersioning; 34 + environment.systemPackages = [ pkgs.proof-of-overlay-hello pkgs.figlet ]; 35 }; 36 testScript = '' 37 machine.succeed("hello | figlet >/dev/console")
+9 -8
pkgs/by-name/la/labwc/package.nix
··· 1 { lib 2 - , stdenv 3 , fetchFromGitHub 4 - , cairo 5 , gettext 6 , glib 7 , libdrm ··· 16 , pango 17 , pkg-config 18 , scdoc 19 , wayland 20 , wayland-protocols 21 , wayland-scanner ··· 26 27 stdenv.mkDerivation (finalAttrs: { 28 pname = "labwc"; 29 - version = "0.7.0"; 30 31 src = fetchFromGitHub { 32 owner = "labwc"; 33 repo = "labwc"; 34 rev = finalAttrs.version; 35 - hash = "sha256-/z2Wo9zhuEVIpk8jHYwg2JbBqkX7tfDP2KTZ9yzj454="; 36 }; 37 38 nativeBuildInputs = [ 39 gettext 40 meson ··· 62 xwayland 63 ]; 64 65 - outputs = [ "out" "man" ]; 66 - 67 strictDeps = true; 68 69 mesonFlags = [ ··· 77 meta = { 78 homepage = "https://github.com/labwc/labwc"; 79 description = "A Wayland stacking compositor, inspired by Openbox"; 80 - changelog = "https://raw.githubusercontent.com/labwc/labwc/${finalAttrs.version}/NEWS.md"; 81 - license = lib.licenses.gpl2Plus; 82 maintainers = with lib.maintainers; [ AndersonTorres ]; 83 inherit (wayland.meta) platforms; 84 };
··· 1 { lib 2 + , cairo 3 , fetchFromGitHub 4 , gettext 5 , glib 6 , libdrm ··· 15 , pango 16 , pkg-config 17 , scdoc 18 + , stdenv 19 , wayland 20 , wayland-protocols 21 , wayland-scanner ··· 26 27 stdenv.mkDerivation (finalAttrs: { 28 pname = "labwc"; 29 + version = "0.7.1"; 30 31 src = fetchFromGitHub { 32 owner = "labwc"; 33 repo = "labwc"; 34 rev = finalAttrs.version; 35 + hash = "sha256-6l+pYEMFQT8P0j40IcujSzlKgXzR5GIyuxkAJi65RiY="; 36 }; 37 38 + outputs = [ "out" "man" ]; 39 + 40 nativeBuildInputs = [ 41 gettext 42 meson ··· 64 xwayland 65 ]; 66 67 strictDeps = true; 68 69 mesonFlags = [ ··· 77 meta = { 78 homepage = "https://github.com/labwc/labwc"; 79 description = "A Wayland stacking compositor, inspired by Openbox"; 80 + changelog = "https://github.com/labwc/labwc/blob/${finalAttrs.src.rev}/NEWS.md"; 81 + license = with lib.licenses; [ gpl2Plus ]; 82 + mainProgram = "labwc"; 83 maintainers = with lib.maintainers; [ AndersonTorres ]; 84 inherit (wayland.meta) platforms; 85 };
+2 -2
pkgs/by-name/li/live555/package.nix
··· 9 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "live555"; 12 - version = "2024.02.23"; 13 14 src = fetchurl { 15 urls = [ ··· 18 "https://download.videolan.org/contrib/live555/live.${finalAttrs.version}.tar.gz" 19 "mirror://sourceforge/slackbuildsdirectlinks/live.${finalAttrs.version}.tar.gz" 20 ]; 21 - hash = "sha256-85JWXfsPAvocX5PiKXw9Xkd4zm2akzxMeETsZ3xm2wg="; 22 }; 23 24 patches = [
··· 9 10 stdenv.mkDerivation (finalAttrs: { 11 pname = "live555"; 12 + version = "2024.02.28"; 13 14 src = fetchurl { 15 urls = [ ··· 18 "https://download.videolan.org/contrib/live555/live.${finalAttrs.version}.tar.gz" 19 "mirror://sourceforge/slackbuildsdirectlinks/live.${finalAttrs.version}.tar.gz" 20 ]; 21 + hash = "sha256-5WjtkdqoofZIijunfomcEeWj6l4CUK9HRoYAle2jSx8="; 22 }; 23 24 patches = [
+6 -5
pkgs/by-name/lu/ludtwig/package.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "ludtwig"; 5 - version = "0.8.0"; 6 7 src = fetchFromGitHub { 8 owner = "MalteJanz"; 9 repo = pname; 10 rev = "v${version}"; 11 - hash = "sha256-WF3tEf3SuXiH35Ny4RGLzvEW7yMsFcnVTX52e5qvK5g="; 12 }; 13 14 checkType = "debug"; 15 16 - cargoHash = "sha256-AbT8Jv6v7EVPX5mIplKaBkGrVonA8YWlMvo46coFMzk="; 17 18 meta = with lib; { 19 - description = "Linter / Formatter for Twig template files which respects HTML and your time."; 20 homepage = "https://github.com/MalteJanz/ludtwig"; 21 license = licenses.mit; 22 - maintainers = with maintainers; [ shyim ]; 23 }; 24 }
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "ludtwig"; 5 + version = "0.8.2"; 6 7 src = fetchFromGitHub { 8 owner = "MalteJanz"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-nNr0iis+wBd+xKJYQL7OWlQnU1DhKztsPHCq3+tX79w="; 12 }; 13 14 checkType = "debug"; 15 16 + cargoHash = "sha256-Utho/foZOPz5K3WrOZjAkxvw7+J0RtbW0xvw/Txu/xk="; 17 18 meta = with lib; { 19 + description = "Linter / Formatter for Twig template files which respects HTML and your time"; 20 homepage = "https://github.com/MalteJanz/ludtwig"; 21 license = licenses.mit; 22 + maintainers = with maintainers; [ shyim maltejanz ]; 23 + mainProgram = "ludtwig"; 24 }; 25 }
+2 -2
pkgs/by-name/vi/virtio-win/package.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "virtio-win"; 5 - version = "0.1.240-1"; 6 7 src = fetchurl { 8 url = "https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/archive-virtio/virtio-win-${version}/virtio-win.iso"; 9 - hash = "sha256-69SCWGaPf3jgJu0nbCip0Z2D4CD/oICtaZENyGu8vMY="; 10 }; 11 12 nativeBuildInputs = [
··· 2 3 stdenv.mkDerivation rec { 4 pname = "virtio-win"; 5 + version = "0.1.248-1"; 6 7 src = fetchurl { 8 url = "https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/archive-virtio/virtio-win-${version}/virtio-win.iso"; 9 + hash = "sha256-1bVznPKX8FONJj4wZ41aCbukcKfGvL2N/3TkQVPxZUk="; 10 }; 11 12 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/unixODBCDrivers/default.nix
··· 43 44 mariadb = stdenv.mkDerivation rec { 45 pname = "mariadb-connector-odbc"; 46 - version = "3.1.14"; 47 48 src = fetchFromGitHub { 49 owner = "mariadb-corporation"; 50 repo = "mariadb-connector-odbc"; 51 rev = version; 52 - sha256 = "0wvy6m9qfvjii3kanf2d1rhfaww32kg0d7m57643f79qb05gd6vg"; 53 # this driver only seems to build correctly when built against the mariadb-connect-c subrepo 54 # (see https://github.com/NixOS/nixpkgs/issues/73258) 55 fetchSubmodules = true;
··· 43 44 mariadb = stdenv.mkDerivation rec { 45 pname = "mariadb-connector-odbc"; 46 + version = "3.1.20"; 47 48 src = fetchFromGitHub { 49 owner = "mariadb-corporation"; 50 repo = "mariadb-connector-odbc"; 51 rev = version; 52 + hash = "sha256-l+HlS7/A0shwsEXYKDhi+QCmwHaMTeKrtcvo9yYpYws="; 53 # this driver only seems to build correctly when built against the mariadb-connect-c subrepo 54 # (see https://github.com/NixOS/nixpkgs/issues/73258) 55 fetchSubmodules = true;
+2 -2
pkgs/development/tools/devpod/default.nix
··· 23 24 let 25 pname = "devpod"; 26 - version = "0.5.2"; 27 28 src = fetchFromGitHub { 29 owner = "loft-sh"; 30 repo = pname; 31 rev = "v${version}"; 32 - sha256 = "sha256-xvZ9I8VL50yS6tEQizp7bebyZVTCW6y2VOSyVZDJy6M="; 33 }; 34 35 meta = with lib; {
··· 23 24 let 25 pname = "devpod"; 26 + version = "0.5.4"; 27 28 src = fetchFromGitHub { 29 owner = "loft-sh"; 30 repo = pname; 31 rev = "v${version}"; 32 + sha256 = "sha256-BXr+2uia5skNRpdo8T+0uOVdh6WmWeC42PGNSURJhas="; 33 }; 34 35 meta = with lib; {
+3 -3
pkgs/development/tools/gauge/default.nix
··· 2 3 buildGoModule rec { 4 pname = "gauge"; 5 - version = "1.6.2"; 6 7 src = fetchFromGitHub { 8 owner = "getgauge"; 9 repo = "gauge"; 10 rev = "v${version}"; 11 - hash = "sha256-dCRuF1AYTcF2fKD7w7Gze2lE1hZYzpRz9u5p9uxqML0="; 12 }; 13 14 - vendorHash = "sha256-j3FpQ48LjIVteN80zvz88FF3z+pYD2aHJW4VxT0z0vI="; 15 16 excludedPackages = [ "build" "man" ]; 17
··· 2 3 buildGoModule rec { 4 pname = "gauge"; 5 + version = "1.6.3"; 6 7 src = fetchFromGitHub { 8 owner = "getgauge"; 9 repo = "gauge"; 10 rev = "v${version}"; 11 + hash = "sha256-ymnyoQRMr3s74PnDSmXCoWGSMBhxy/CRDpRvEZHOrFU="; 12 }; 13 14 + vendorHash = "sha256-5kBjxhmBrC5ZzD7CSzRvIzQrJYRRU/X+n9L9JPvyJkY="; 15 16 excludedPackages = [ "build" "man" ]; 17
+3 -3
pkgs/development/tools/misc/rsonpath/default.nix
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "rsonpath"; 8 - version = "0.8.6"; 9 10 src = fetchFromGitHub { 11 owner = "v0ldek"; 12 repo = "rsonpath"; 13 rev = "v${version}"; 14 - hash = "sha256-p1cbxEvnV5vR1fznNbglHfKa53DboIFJqEWAXBLoQ+s="; 15 }; 16 17 - cargoHash = "sha256-rVJbrHsbSF8ZF44gmCUFxlGGhloC/kLBT5vSJjglxHE="; 18 19 cargoBuildFlags = [ "-p=rsonpath" ]; 20 cargoTestFlags = cargoBuildFlags;
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "rsonpath"; 8 + version = "0.8.7"; 9 10 src = fetchFromGitHub { 11 owner = "v0ldek"; 12 repo = "rsonpath"; 13 rev = "v${version}"; 14 + hash = "sha256-AMnUErmufHc05MxHru/b4mFHH+HF9jfhoNi8yIejc64="; 15 }; 16 17 + cargoHash = "sha256-flMzNxA1NWGy4ea7/dmPiEKspBmVuy82VPe5r8jaEGg="; 18 19 cargoBuildFlags = [ "-p=rsonpath" ]; 20 cargoTestFlags = cargoBuildFlags;
+3 -3
pkgs/development/tools/rust/cargo-bloat/default.nix pkgs/by-name/ca/cargo-bloat/package.nix
··· 8 owner = "RazrFalcon"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-lCA7C1G2xu65jn3/wzj6prWSrjQz3EqqJyMlPR/HRFs="; 12 }; 13 14 - cargoSha256 = "sha256-fOenXn5gagFss9DRDXXsGxQlDqVXZ5LZcdM4WsXAyUU="; 15 16 meta = with lib; { 17 description = "A tool and Cargo subcommand that helps you find out what takes most of the space in your executable"; ··· 19 license = licenses.mit; 20 platforms = platforms.unix; 21 maintainers = with maintainers; [ xrelkd matthiasbeyer ]; 22 }; 23 } 24 -
··· 8 owner = "RazrFalcon"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-lCA7C1G2xu65jn3/wzj6prWSrjQz3EqqJyMlPR/HRFs="; 12 }; 13 14 + cargoHash = "sha256-fOenXn5gagFss9DRDXXsGxQlDqVXZ5LZcdM4WsXAyUU="; 15 16 meta = with lib; { 17 description = "A tool and Cargo subcommand that helps you find out what takes most of the space in your executable"; ··· 19 license = licenses.mit; 20 platforms = platforms.unix; 21 maintainers = with maintainers; [ xrelkd matthiasbeyer ]; 22 + mainProgram = "cargo-bloat"; 23 }; 24 }
+2 -2
pkgs/os-specific/linux/tuxedo-keyboard/default.nix
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "tuxedo-keyboard-${kernel.version}"; 5 - version = "3.2.7"; 6 7 src = fetchFromGitHub { 8 owner = "tuxedocomputers"; 9 repo = "tuxedo-keyboard"; 10 rev = "v${finalAttrs.version}"; 11 - hash = "sha256-Q0wnejeLGLSDS0GPxQuYUKCAdzbYA66KT0DuWsEKIRs="; 12 }; 13 14 buildInputs = [
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "tuxedo-keyboard-${kernel.version}"; 5 + version = "3.2.14"; 6 7 src = fetchFromGitHub { 8 owner = "tuxedocomputers"; 9 repo = "tuxedo-keyboard"; 10 rev = "v${finalAttrs.version}"; 11 + hash = "sha256-L3NsUUKA/snUcRWwlZidsBiTznhfulNldidEDDmNOkw="; 12 }; 13 14 buildInputs = [
+12 -1
pkgs/servers/rippled/default.nix
··· 1 - { lib, stdenv, fetchgit, fetchurl, git, cmake, pkg-config 2 , openssl, boost, grpc, protobuf, libnsl, rocksdb_6_23, snappy }: 3 4 let ··· 99 fetchSubmodules = true; 100 hash = "sha256-VW/VmnhtF2xyHfEud3D6b3n8uTE0a/nDW1GISs5QfwM="; 101 }; 102 103 hardeningDisable = ["format"]; 104 cmakeFlags = ["-Dstatic=OFF" "-DBoost_NO_BOOST_CMAKE=ON" "-DSNAPPY_INCLUDE_DIR=${snappy}/include" ];
··· 1 + { lib, stdenv, fetchgit, fetchurl, fetchpatch, git, cmake, pkg-config 2 , openssl, boost, grpc, protobuf, libnsl, rocksdb_6_23, snappy }: 3 4 let ··· 99 fetchSubmodules = true; 100 hash = "sha256-VW/VmnhtF2xyHfEud3D6b3n8uTE0a/nDW1GISs5QfwM="; 101 }; 102 + 103 + patches = [ 104 + # Fix gcc-13 build due to missing <cstdint> includes: 105 + # https://github.com/XRPLF/rippled/pull/4555 106 + (fetchpatch { 107 + name = "gcc-13.patch"; 108 + url = "https://github.com/XRPLF/rippled/commit/c9a586c2437bc8ffd22e946c82e1cbe906e1fc40.patch"; 109 + hash = "sha256-+4BDTMFoQWUHljgwGB1gtczVPQH/U5MA0ojbnBykceg="; 110 + excludes = [ "src/ripple/basics/StringUtilities.h" ]; 111 + }) 112 + ]; 113 114 hardeningDisable = ["format"]; 115 cmakeFlags = ["-Dstatic=OFF" "-DBoost_NO_BOOST_CMAKE=ON" "-DSNAPPY_INCLUDE_DIR=${snappy}/include" ];
+3 -3
pkgs/tools/admin/syft/default.nix
··· 2 3 buildGoModule rec { 4 pname = "syft"; 5 - version = "0.105.1"; 6 7 src = fetchFromGitHub { 8 owner = "anchore"; 9 repo = pname; 10 rev = "v${version}"; 11 - hash = "sha256-laseVMbgzKuVyF6PWpthtt3Wgv+WW5ccTjp0jj15nB0="; 12 # populate values that require us to use git. By doing this in postFetch we 13 # can delete .git afterwards and maintain better reproducibility of the src. 14 leaveDotGit = true; ··· 22 }; 23 # hash mismatch with darwin 24 proxyVendor = true; 25 - vendorHash = "sha256-u5leq9K9c31No6saMO5cK9futt4Wl4f/d6V2djC8T1w="; 26 27 nativeBuildInputs = [ installShellFiles ]; 28
··· 2 3 buildGoModule rec { 4 pname = "syft"; 5 + version = "1.0.0"; 6 7 src = fetchFromGitHub { 8 owner = "anchore"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-JDPHAFLs1o2dH72CRSglRbpmF+/xcSjvBqyYJUU3Ta8="; 12 # populate values that require us to use git. By doing this in postFetch we 13 # can delete .git afterwards and maintain better reproducibility of the src. 14 leaveDotGit = true; ··· 22 }; 23 # hash mismatch with darwin 24 proxyVendor = true; 25 + vendorHash = "sha256-tgptjaW9yu8Vk98YY+nX/lZU+ys/VuFKrwS8QIG8mXE="; 26 27 nativeBuildInputs = [ installShellFiles ]; 28
+2 -2
pkgs/tools/misc/moreutils/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "moreutils"; 17 - version = "0.68"; 18 19 src = fetchgit { 20 url = "git://git.joeyh.name/moreutils"; 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-kOY12oejH0xKaaPrKem+l0PACqyPqD4P1jEjOYfNntM="; 23 }; 24 25 preBuild = ''
··· 14 15 stdenv.mkDerivation rec { 16 pname = "moreutils"; 17 + version = "0.69"; 18 19 src = fetchgit { 20 url = "git://git.joeyh.name/moreutils"; 21 rev = "refs/tags/${version}"; 22 + hash = "sha256-hVvRAIXlG8+pAD2v/Ma9Z6EUL/1xIRz7Gx1fOxoQyi0="; 23 }; 24 25 preBuild = ''
+3 -3
pkgs/tools/text/vale/default.nix
··· 2 3 buildGoModule rec { 4 pname = "vale"; 5 - version = "3.2.0"; 6 7 subPackages = [ "cmd/vale" ]; 8 outputs = [ "out" "data" ]; ··· 11 owner = "errata-ai"; 12 repo = "vale"; 13 rev = "v${version}"; 14 - hash = "sha256-emAwoOFjB/zXkCLL8txs1OiMZ9DKm58eeenYFKctpzQ="; 15 }; 16 17 - vendorHash = "sha256-cGWWjfkwgM1dAVKCl/Ao2ILyLyk0oPvqjLEZL0Clvyw="; 18 19 postInstall = '' 20 mkdir -p $data/share/vale
··· 2 3 buildGoModule rec { 4 pname = "vale"; 5 + version = "3.2.1"; 6 7 subPackages = [ "cmd/vale" ]; 8 outputs = [ "out" "data" ]; ··· 11 owner = "errata-ai"; 12 repo = "vale"; 13 rev = "v${version}"; 14 + hash = "sha256-e3cxUO05OU1RYINX24E8XXkxPADWpaIYTUgbcQIys7w="; 15 }; 16 17 + vendorHash = "sha256-KxIQZViUYT4cgRlOuKBwen6pqQjGiAofkeBztmjnKdQ="; 18 19 postInstall = '' 20 mkdir -p $data/share/vale
+8 -9
pkgs/top-level/all-packages.nix
··· 8722 8723 google-guest-oslogin = callPackage ../tools/virtualization/google-guest-oslogin { }; 8724 8725 - google-cloud-cpp = disable-warnings-if-gcc13 (callPackage ../development/libraries/google-cloud-cpp { }); 8726 8727 google-java-format = callPackage ../development/tools/google-java-format { }; 8728 ··· 16912 inherit (darwin.apple_sdk.frameworks) Security; 16913 }; 16914 cargo-binutils = callPackage ../development/tools/rust/cargo-binutils { }; 16915 - cargo-bloat = callPackage ../development/tools/rust/cargo-bloat { }; 16916 cargo-bolero = callPackage ../development/tools/rust/cargo-bolero { }; 16917 cargo-bundle = callPackage ../development/tools/rust/cargo-bundle { }; 16918 cargo-bundle-licenses = callPackage ../development/tools/rust/cargo-bundle-licenses { }; ··· 21328 stdenv = if stdenv.isDarwin then darwin.apple_sdk_11_0.stdenv else stdenv; 21329 }; 21330 21331 - graphia = libsForQt5.callPackage ../applications/science/misc/graphia { }; 21332 21333 graphinder = callPackage ../tools/security/graphinder { }; 21334 ··· 24290 24291 primesieve = callPackage ../applications/science/math/primesieve { }; 24292 24293 - proj = disable-warnings-if-gcc13 (callPackage ../development/libraries/proj { 24294 stdenv = if stdenv.cc.isClang then overrideLibcxx llvmPackages_13.stdenv else stdenv; 24295 - }); 24296 24297 proj_7 = callPackage ../development/libraries/proj/7.nix { }; 24298 ··· 27623 inherit (darwin.apple_sdk.frameworks) AppKit; 27624 }; 27625 27626 - btop = disable-warnings-if-gcc13 (darwin.apple_sdk_11_0.callPackage ../tools/system/btop { }); 27627 27628 nmon = callPackage ../os-specific/linux/nmon { }; 27629 ··· 33902 33903 rep-gtk = callPackage ../development/libraries/rep-gtk { }; 33904 33905 - reproc = disable-warnings-if-gcc13 (callPackage ../development/libraries/reproc { }); 33906 33907 sawfish = callPackage ../applications/window-managers/sawfish { }; 33908 ··· 36848 vertcoin = libsForQt5.callPackage ../applications/blockchains/vertcoin { 36849 withGui = true; 36850 }; 36851 - vertcoind = disable-warnings-if-gcc13 (callPackage ../applications/blockchains/vertcoin { 36852 withGui = false; 36853 - }); 36854 36855 wasabiwallet = callPackage ../applications/blockchains/wasabiwallet { }; 36856
··· 8722 8723 google-guest-oslogin = callPackage ../tools/virtualization/google-guest-oslogin { }; 8724 8725 + google-cloud-cpp = callPackage ../development/libraries/google-cloud-cpp { }; 8726 8727 google-java-format = callPackage ../development/tools/google-java-format { }; 8728 ··· 16912 inherit (darwin.apple_sdk.frameworks) Security; 16913 }; 16914 cargo-binutils = callPackage ../development/tools/rust/cargo-binutils { }; 16915 cargo-bolero = callPackage ../development/tools/rust/cargo-bolero { }; 16916 cargo-bundle = callPackage ../development/tools/rust/cargo-bundle { }; 16917 cargo-bundle-licenses = callPackage ../development/tools/rust/cargo-bundle-licenses { }; ··· 21327 stdenv = if stdenv.isDarwin then darwin.apple_sdk_11_0.stdenv else stdenv; 21328 }; 21329 21330 + graphia = qt6Packages.callPackage ../applications/science/misc/graphia { }; 21331 21332 graphinder = callPackage ../tools/security/graphinder { }; 21333 ··· 24289 24290 primesieve = callPackage ../applications/science/math/primesieve { }; 24291 24292 + proj = callPackage ../development/libraries/proj { 24293 stdenv = if stdenv.cc.isClang then overrideLibcxx llvmPackages_13.stdenv else stdenv; 24294 + }; 24295 24296 proj_7 = callPackage ../development/libraries/proj/7.nix { }; 24297 ··· 27622 inherit (darwin.apple_sdk.frameworks) AppKit; 27623 }; 27624 27625 + btop = darwin.apple_sdk_11_0.callPackage ../tools/system/btop { }; 27626 27627 nmon = callPackage ../os-specific/linux/nmon { }; 27628 ··· 33901 33902 rep-gtk = callPackage ../development/libraries/rep-gtk { }; 33903 33904 + reproc = callPackage ../development/libraries/reproc { }; 33905 33906 sawfish = callPackage ../applications/window-managers/sawfish { }; 33907 ··· 36847 vertcoin = libsForQt5.callPackage ../applications/blockchains/vertcoin { 36848 withGui = true; 36849 }; 36850 + vertcoind = callPackage ../applications/blockchains/vertcoin { 36851 withGui = false; 36852 + }; 36853 36854 wasabiwallet = callPackage ../applications/blockchains/wasabiwallet { }; 36855
+1
pkgs/top-level/release-attrpaths-superset.nix
··· 53 pkgsStatic = true; 54 pkgsCross = true; 55 pkgsi686Linux = true; 56 pkgsExtraHardening = true; 57 }; 58
··· 53 pkgsStatic = true; 54 pkgsCross = true; 55 pkgsi686Linux = true; 56 + pkgsLinux = true; 57 pkgsExtraHardening = true; 58 }; 59
+10
pkgs/top-level/stage.nix
··· 243 }; 244 } else throw "x86_64 Darwin package set can only be used on Darwin systems."; 245 246 # Extend the package set with zero or more overlays. This preserves 247 # preexisting overlays. Prefer to initialize with the right overlays 248 # in one go when calling Nixpkgs, for performance and simplicity.
··· 243 }; 244 } else throw "x86_64 Darwin package set can only be used on Darwin systems."; 245 246 + # If already linux: the same package set unaltered 247 + # Otherwise, return a natively built linux package set for the current cpu architecture string. 248 + # (ABI and other details will be set to the default for the cpu/os pair) 249 + pkgsLinux = 250 + if stdenv.hostPlatform.isLinux 251 + then self 252 + else nixpkgsFun { 253 + localSystem = lib.systems.elaborate "${stdenv.hostPlatform.parsed.cpu.name}-linux"; 254 + }; 255 + 256 # Extend the package set with zero or more overlays. This preserves 257 # preexisting overlays. Prefer to initialize with the right overlays 258 # in one go when calling Nixpkgs, for performance and simplicity.