Merge master into staging-next

authored by github-actions[bot] and committed by GitHub ad090ff8 357ae167

+653 -362
+3 -3
doc/languages-frameworks/go.section.md
··· 11 11 12 12 In the following is an example expression using `buildGoModule`, the following arguments are of special significance to the function: 13 13 14 - - `vendorSha256`: is the hash of the output of the intermediate fetcher derivation. `vendorSha256` can also take `null` as an input. When `null` is used as a value, rather than fetching the dependencies and vendoring them, we use the vendoring included within the source repo. If you'd like to not have to update this field on dependency changes, run `go mod vendor` in your source repo and set `vendorSha256 = null;` 15 - - `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform dependant `vendorSha256` checksums. 14 + - `vendorHash`: is the hash of the output of the intermediate fetcher derivation. `vendorHash` can also take `null` as an input. When `null` is used as a value, rather than fetching the dependencies and vendoring them, we use the vendoring included within the source repo. If you'd like to not have to update this field on dependency changes, run `go mod vendor` in your source repo and set `vendorHash = null;` 15 + - `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform dependant `vendorHash` checksums. 16 16 17 17 ```nix 18 18 pet = buildGoModule rec { ··· 26 26 sha256 = "0m2fzpqxk7hrbxsgqplkg7h2p7gv6s1miymv3gvw0cz039skag0s"; 27 27 }; 28 28 29 - vendorSha256 = "1879j77k96684wi554rkjxydrj8g3hpp0kvxz03sd8dmwr3lh83j"; 29 + vendorHash = "sha256-ciBIR+a1oaYH+H1PcC8cD8ncfJczk1IiJ8iYNM+R6aA="; 30 30 31 31 meta = with lib; { 32 32 description = "Simple command-line snippet manager, written in Go";
+8
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
··· 273 273 </listitem> 274 274 <listitem> 275 275 <para> 276 + xow package removed along with the 277 + <literal>hardware.xow</literal> module, due to the project 278 + being deprecated in favor of <literal>xone</literal>, which is 279 + available via the <literal>hardware.xone</literal> module. 280 + </para> 281 + </listitem> 282 + <listitem> 283 + <para> 276 284 The <literal>services.graphite.api</literal> and 277 285 <literal>services.graphite.beacon</literal> NixOS options, and 278 286 the <literal>python3.pkgs.graphite_api</literal>,
+2
nixos/doc/manual/release-notes/rl-2211.section.md
··· 105 105 106 106 - riak package removed along with `services.riak` module, due to lack of maintainer to update the package. 107 107 108 + - xow package removed along with the `hardware.xow` module, due to the project being deprecated in favor of `xone`, which is available via the `hardware.xone` module. 109 + 108 110 - The `services.graphite.api` and `services.graphite.beacon` NixOS options, and 109 111 the `python3.pkgs.graphite_api`, `python3.pkgs.graphite_beacon` and 110 112 `python3.pkgs.influxgraph` packages, have been removed due to lack of upstream
-1
nixos/modules/module-list.nix
··· 475 475 ./services/hardware/thermald.nix 476 476 ./services/hardware/undervolt.nix 477 477 ./services/hardware/vdr.nix 478 - ./services/hardware/xow.nix 479 478 ./services/home-automation/home-assistant.nix 480 479 ./services/home-automation/zigbee2mqtt.nix 481 480 ./services/logging/SystemdJournal2Gelf.nix
+4
nixos/modules/rename.nix
··· 30 30 udev rules from libu2f-host to the system. Udev gained native support 31 31 to handle FIDO security tokens, so this isn't necessary anymore. 32 32 '') 33 + (mkRemovedOptionModule [ "hardware" "xow" ] '' 34 + The xow package was removed from nixpkgs. Upstream has deprecated 35 + the project and users are urged to switch to xone. 36 + '') 33 37 (mkRemovedOptionModule [ "networking" "vpnc" ] "Use environment.etc.\"vpnc/service.conf\" instead.") 34 38 (mkRemovedOptionModule [ "networking" "wicd" ] "The corresponding package was removed from nixpkgs.") 35 39 (mkRemovedOptionModule [ "programs" "tilp2" ] "The corresponding package was removed from nixpkgs.")
-20
nixos/modules/services/hardware/xow.nix
··· 1 - { config, pkgs, lib, ... }: 2 - 3 - let 4 - cfg = config.services.hardware.xow; 5 - in { 6 - options.services.hardware.xow = { 7 - enable = lib.mkEnableOption "xow as a systemd service"; 8 - }; 9 - 10 - config = lib.mkIf cfg.enable { 11 - hardware.uinput.enable = true; 12 - 13 - boot.extraModprobeConfig = lib.readFile "${pkgs.xow}/lib/modprobe.d/xow-blacklist.conf"; 14 - 15 - systemd.packages = [ pkgs.xow ]; 16 - systemd.services.xow.wantedBy = [ "multi-user.target" ]; 17 - 18 - services.udev.packages = [ pkgs.xow ]; 19 - }; 20 - }
+66 -22
nixos/modules/services/misc/klipper.nix
··· 5 5 format = pkgs.formats.ini { 6 6 # https://github.com/NixOS/nixpkgs/pull/121613#issuecomment-885241996 7 7 listToValue = l: 8 - if builtins.length l == 1 then generators.mkValueStringDefault {} (head l) 8 + if builtins.length l == 1 then generators.mkValueStringDefault { } (head l) 9 9 else lib.concatMapStrings (s: "\n ${generators.mkValueStringDefault {} s}") l; 10 - mkKeyValue = generators.mkKeyValueDefault {} ":"; 10 + mkKeyValue = generators.mkKeyValueDefault { } ":"; 11 11 }; 12 12 in 13 13 { ··· 69 69 for supported values. 70 70 ''; 71 71 }; 72 + 73 + firmwares = mkOption { 74 + description = "Firmwares klipper should manage"; 75 + default = { }; 76 + type = with types; attrsOf 77 + (submodule { 78 + options = { 79 + enable = mkEnableOption '' 80 + building of firmware and addition of klipper-flash tools for manual flashing. 81 + This will add `klipper-flash-$mcu` scripts to your environment which can be called to flash the firmware. 82 + ''; 83 + configFile = mkOption { 84 + type = path; 85 + description = "Path to firmware config which is generated using `klipper-genconf`"; 86 + }; 87 + }; 88 + }); 89 + }; 72 90 }; 73 91 }; 74 92 ··· 83 101 assertion = cfg.user != null -> cfg.group != null; 84 102 message = "Option klipper.group is not set when a user is specified."; 85 103 } 104 + { 105 + assertion = foldl (a: b: a && b) true (mapAttrsToList (mcu: _: mcu != null -> (hasAttrByPath [ "${mcu}" "serial" ] cfg.settings)) cfg.firmwares); 106 + message = "Option klipper.settings.$mcu.serial must be set when klipper.firmware.$mcu is specified"; 107 + } 86 108 ]; 87 109 88 110 environment.etc."klipper.cfg".source = format.generate "klipper.cfg" cfg.settings; ··· 92 114 group = config.services.octoprint.group; 93 115 }; 94 116 95 - systemd.services.klipper = let 96 - klippyArgs = "--input-tty=${cfg.inputTTY}" 97 - + optionalString (cfg.apiSocket != null) " --api-server=${cfg.apiSocket}"; 98 - in { 99 - description = "Klipper 3D Printer Firmware"; 100 - wantedBy = [ "multi-user.target" ]; 101 - after = [ "network.target" ]; 117 + systemd.services.klipper = 118 + let 119 + klippyArgs = "--input-tty=${cfg.inputTTY}" 120 + + optionalString (cfg.apiSocket != null) " --api-server=${cfg.apiSocket}"; 121 + in 122 + { 123 + description = "Klipper 3D Printer Firmware"; 124 + wantedBy = [ "multi-user.target" ]; 125 + after = [ "network.target" ]; 102 126 103 - serviceConfig = { 104 - ExecStart = "${cfg.package}/lib/klipper/klippy.py ${klippyArgs} /etc/klipper.cfg"; 105 - RuntimeDirectory = "klipper"; 106 - SupplementaryGroups = [ "dialout" ]; 107 - WorkingDirectory = "${cfg.package}/lib"; 108 - } // (if cfg.user != null then { 109 - Group = cfg.group; 110 - User = cfg.user; 111 - } else { 112 - DynamicUser = true; 113 - User = "klipper"; 114 - }); 115 - }; 127 + serviceConfig = { 128 + ExecStart = "${cfg.package}/lib/klipper/klippy.py ${klippyArgs} /etc/klipper.cfg"; 129 + RuntimeDirectory = "klipper"; 130 + SupplementaryGroups = [ "dialout" ]; 131 + WorkingDirectory = "${cfg.package}/lib"; 132 + } // (if cfg.user != null then { 133 + Group = cfg.group; 134 + User = cfg.user; 135 + } else { 136 + DynamicUser = true; 137 + User = "klipper"; 138 + }); 139 + }; 140 + 141 + environment.systemPackages = 142 + with pkgs; 143 + let 144 + firmwares = filterAttrs (n: v: v!= null) (mapAttrs 145 + (mcu: { enable, configFile }: if enable then pkgs.klipper-firmware.override { 146 + mcu = lib.strings.sanitizeDerivationName mcu; 147 + firmwareConfig = configFile; 148 + } else null) 149 + cfg.firmwares); 150 + firmwareFlasher = mapAttrsToList 151 + (mcu: firmware: pkgs.klipper-flash.override { 152 + mcu = lib.strings.sanitizeDerivationName mcu; 153 + klipper-firmware = firmware; 154 + flashDevice = cfg.settings."${mcu}".serial; 155 + firmwareConfig = cfg.firmwares."${mcu}".configFile; 156 + }) 157 + firmwares; 158 + in 159 + [ klipper-genconf ] ++ firmwareFlasher ++ attrValues firmwares; 116 160 }; 117 161 }
+1 -1
pkgs/applications/audio/jellycli/default.nix
··· 11 11 sha256 = "1awzcxnf175a794rhzbmqxxjss77mfa1yrr0wgdxaivrlkibxjys"; 12 12 }; 13 13 14 - vendorSha256 = "02fwsnrhj09m0aa199plpqlsjrwpmrk4c80fszzm07s5vmjqvnfy"; 14 + vendorHash = "sha256-3tmNZd1FH1D/1w4gRmaul2epKb70phSUAjUBCbPV3Ak="; 15 15 16 16 patches = [ 17 17 # Fixes log file path for tests.
+1 -1
pkgs/applications/audio/noisetorch/default.nix
··· 12 12 fetchSubmodules = true; 13 13 }; 14 14 15 - vendorSha256 = null; 15 + vendorHash = null; 16 16 17 17 doCheck = false; 18 18
+3 -9
pkgs/applications/blockchains/exodus/default.nix
··· 1 - { stdenv, lib, fetchurl, unzip, glib, systemd, nss, nspr, gtk3-x11, pango, 1 + { stdenv, lib, fetchzip, glib, systemd, nss, nspr, gtk3-x11, pango, 2 2 atk, cairo, gdk-pixbuf, xorg, xorg_sys_opengl, util-linux, alsa-lib, dbus, at-spi2-atk, 3 3 cups, vivaldi-ffmpeg-codecs, libpulseaudio, at-spi2-core, libxkbcommon, mesa }: 4 4 ··· 6 6 pname = "exodus"; 7 7 version = "22.7.15"; 8 8 9 - src = fetchurl { 9 + src = fetchzip { 10 10 url = "https://downloads.exodus.io/releases/${pname}-linux-x64-${version}.zip"; 11 - sha256 = "sha256-tQwxzhy+d2hA7VvZB9qSF7uaYIffAyX9ovZYQ8HDEB8="; 11 + sha256 = "sha256-KAv+H6uJBDGzjg5Qmy54EtiVvV1OGJ6r3XnAQO7qjIg="; 12 12 }; 13 13 14 - sourceRoot = "."; 15 - unpackCmd = '' 16 - ${unzip}/bin/unzip "$src" -x "Exodus*/lib*so" 17 - ''; 18 - 19 14 installPhase = '' 20 15 mkdir -p $out/bin $out/share/applications 21 - cd Exodus-linux-x64 22 16 cp -r . $out 23 17 ln -s $out/Exodus $out/bin/Exodus 24 18 ln -s $out/bin/Exodus $out/bin/exodus
+3 -3
pkgs/applications/graphics/ImageMagick/default.nix
··· 46 46 47 47 stdenv.mkDerivation rec { 48 48 pname = "imagemagick"; 49 - version = "7.1.0-43"; 49 + version = "7.1.0-44"; 50 50 51 51 src = fetchFromGitHub { 52 52 owner = "ImageMagick"; 53 53 repo = "ImageMagick"; 54 - rev = builtins.replaceStrings [ "-" ] [ "." ] version; 55 - hash = "sha256-SOy7Ci1rzLB12ofSQBWmX86dfbr/ywsRPunHRswlAt4="; 54 + rev = version; 55 + hash = "sha256-vJGZ47l8nSRnINWHsw562zsQ14fSR5SObr/SO+/40yw="; 56 56 }; 57 57 58 58 outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
-94
pkgs/applications/misc/fbreader/default.nix
··· 1 - { lib 2 - , stdenv 3 - , fetchFromGitHub 4 - , fetchpatch 5 - , pkg-config 6 - , bzip2 7 - , curl 8 - , expat 9 - , fribidi 10 - , libunibreak 11 - , sqlite 12 - , zlib 13 - , uiTarget ? if !stdenv.isDarwin then "desktop" else "macosx" 14 - , uiType ? if !stdenv.isDarwin then "qt4" else "cocoa" 15 - , qt4 16 - , gtk2 17 - , AppKit 18 - , Cocoa 19 - }: 20 - 21 - with lib; 22 - 23 - assert elem uiTarget [ "desktop" "macosx" ]; 24 - assert elem uiType [ "qt4" "gtk" "cocoa" ]; 25 - assert uiTarget == "macosx" -> uiType == "cocoa"; 26 - 27 - # Note: "qt" uiType option mentioned in ${src}/README.build is qt3, 28 - # which is way to old and no longer in nixpkgs. 29 - 30 - stdenv.mkDerivation { 31 - pname = "fbreader-${uiType}"; 32 - version = "0.99.6"; 33 - 34 - src = fetchFromGitHub { 35 - owner = "geometer"; 36 - repo = "FBReader"; 37 - rev = "9e608db14372ae580beae4976eec7241fa069e75"; 38 - sha256 = "0lzafk02mv0cf2l2a61q5y4743zi913byik4bw1ix0gr1drnsa7y"; 39 - }; 40 - 41 - patches = [ 42 - ./typecheck.patch 43 - (fetchpatch { 44 - name = "curl-7_62.diff"; # see https://github.com/geometer/FBReader/pull/311 45 - url = "https://github.com/geometer/FBReader/commit/b7c78e965d06f780.diff"; 46 - sha256 = "1dgnx9wps7hcf8fkidc7037vcf92fr3ccnjx7bgxm9x02j0hngjg"; 47 - }) 48 - ]; 49 - 50 - postPatch = '' 51 - cat << EOF > makefiles/target.mk 52 - TARGET_ARCH = ${uiTarget} 53 - TARGET_STATUS = release 54 - UI_TYPE = ${uiType} 55 - EOF 56 - 57 - substituteInPlace makefiles/arch/desktop.mk \ 58 - --replace ccache "" \ 59 - --replace moc-qt4 moc 60 - 61 - # libunibreak supersedes liblinebreak 62 - substituteInPlace zlibrary/text/Makefile \ 63 - --replace -llinebreak -lunibreak 64 - ''; 65 - 66 - nativeBuildInputs = [ pkg-config ]; 67 - 68 - buildInputs = [ 69 - bzip2 70 - curl 71 - expat 72 - fribidi 73 - libunibreak 74 - sqlite 75 - zlib 76 - ] 77 - ++ optional (uiType == "qt4") qt4 78 - ++ optional (uiType == "gtk") gtk2 79 - ++ optionals (uiType == "cocoa") [ AppKit Cocoa ]; 80 - 81 - makeFlags = [ "INSTALLDIR=$(out)" ]; 82 - 83 - NIX_CFLAGS_COMPILE = "-Wno-error=narrowing"; 84 - 85 - meta = with lib; { 86 - description = "An e-book reader for Linux"; 87 - homepage = "http://www.fbreader.org/"; 88 - license = licenses.gpl3; 89 - broken = stdenv.isDarwin # untested, might work 90 - || uiType == "gtk"; # builds, but the result is unusable, hangs a lot 91 - platforms = platforms.unix; 92 - maintainers = [ maintainers.coroa ]; 93 - }; 94 - }
-11
pkgs/applications/misc/fbreader/typecheck.patch
··· 1 - diff --git a/fbreader/src/database/booksdb/BooksDB.cpp b/fbreader/src/database/booksdb/BooksDB.cpp 2 - index e33a22e76..1b6092800 100644 3 - --- a/fbreader/src/database/booksdb/BooksDB.cpp 4 - +++ b/fbreader/src/database/booksdb/BooksDB.cpp 5 - @@ -146,5 +146,5 @@ shared_ptr<Book> BooksDB::loadBook(const std::string &fileName) { 6 - myFindFileId->setFileName(fileName); 7 - if (!myFindFileId->run()) { 8 - - return false; 9 - + return 0; 10 - } 11 - ((DBIntValue&)*myLoadBook->parameter("@file_id").value()) = myFindFileId->fileId();
+8 -3
pkgs/applications/science/robotics/qgroundcontrol/default.nix
··· 6 6 7 7 mkDerivation rec { 8 8 pname = "qgroundcontrol"; 9 - version = "4.2.1"; 9 + version = "4.2.3"; 10 10 11 11 qtInputs = [ 12 12 qtbase qtcharts qtlocation qtserialport qtsvg qtquickcontrols2 ··· 14 14 ]; 15 15 16 16 gstInputs = with gst_all_1; [ 17 - gstreamer gst-plugins-base gst-plugins-good gst-plugins-bad wayland 17 + gstreamer 18 + gst-plugins-base 19 + (gst-plugins-good.override { qt5Support = true; }) 20 + gst-plugins-bad 21 + gst-libav 22 + wayland 18 23 ]; 19 24 20 25 buildInputs = [ SDL2 ] ++ gstInputs ++ qtInputs; ··· 64 69 owner = "mavlink"; 65 70 repo = pname; 66 71 rev = "v${version}"; 67 - sha256 = "sha256-7POrc6RUm3GVx3KuPUBNbKRUvUmA2UkEL7ezQVQt/yo="; 72 + sha256 = "sha256-xa4c0ggQKqt4OfwVehjkhXYXY1TYVEoubuRH3Zsv0Ac="; 68 73 fetchSubmodules = true; 69 74 }; 70 75
+16 -2
pkgs/applications/terminal-emulators/gnome-console/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchurl 4 + , fetchpatch 4 5 , gettext 5 6 , gnome 6 7 , libgtop ··· 28 29 url = "mirror://gnome/sources/gnome-console/${lib.versions.major version}/${pname}-${version}.tar.xz"; 29 30 sha256 = "fSbmwYdExXWnhykyY/YM7/YwEHCY6eWKd2WwCsdDcEk="; 30 31 }; 32 + 33 + patches = [ 34 + (fetchpatch { 35 + name = "fix-clang-build-issues.patch"; 36 + url = "https://gitlab.gnome.org/GNOME/console/-/commit/0e29a417d52e27da62f5cac461400be6a764dc65.patch"; 37 + sha256 = "sha256-5ORNZOxjC5dMk9VKaBcJu5OV1SEZo9SNUbN4Ob5hVJs="; 38 + }) 39 + ]; 31 40 32 41 buildInputs = [ 33 42 gettext 34 43 libgtop 35 - gnome.nautilus 36 44 gtk3 37 45 libhandy 38 46 pcre2 39 47 vte 48 + ] ++ lib.optionals stdenv.isLinux [ 49 + gnome.nautilus 40 50 ]; 41 51 42 52 nativeBuildInputs = [ ··· 51 61 wrapGAppsHook 52 62 ]; 53 63 64 + mesonFlags = lib.optionals (!stdenv.isLinux) [ 65 + "-Dnautilus=disabled" 66 + ]; 67 + 54 68 passthru = { 55 69 updateScript = gnome.updateScript { 56 70 packageName = pname; ··· 64 78 homepage = "https://gitlab.gnome.org/GNOME/console"; 65 79 license = licenses.gpl3Plus; 66 80 maintainers = teams.gnome.members ++ (with maintainers; [ zhaofengli ]); 67 - platforms = platforms.linux; 81 + platforms = platforms.unix; 68 82 }; 69 83 }
+2 -2
pkgs/applications/video/freetube/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "freetube"; 5 - version = "0.16.0"; 5 + version = "0.17.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/FreeTubeApp/FreeTube/releases/download/v${version}-beta/freetube_${version}_amd64.AppImage"; 9 - sha256 = "sha256-G4lZ1lbNN8X9ocWhcuuNZGTZm9AUzuWKVm23YgsJwig="; 9 + sha256 = "sha256-OlWNln62VouUJzzk0CtED+OdSM+aBc4NOu1TSaKVWnk="; 10 10 }; 11 11 12 12 appimageContents = appimageTools.extractType2 {
+7 -8
pkgs/applications/window-managers/weston/default.nix
··· 7 7 # beware of null defaults, as the parameters *are* supplied by callPackage by default 8 8 }: 9 9 10 - with lib; 11 10 stdenv.mkDerivation rec { 12 11 pname = "weston"; 13 12 version = "10.0.1"; ··· 34 33 ]; 35 34 36 35 mesonFlags= [ 37 - "-Dbackend-drm-screencast-vaapi=${boolToString (vaapi != null)}" 38 - "-Dbackend-rdp=${boolToString (freerdp != null)}" 39 - "-Dxwayland=${boolToString (xwayland != null)}" # Default is true! 36 + "-Dbackend-drm-screencast-vaapi=${lib.boolToString (vaapi != null)}" 37 + "-Dbackend-rdp=${lib.boolToString (freerdp != null)}" 38 + "-Dxwayland=${lib.boolToString (xwayland != null)}" # Default is true! 40 39 "-Dremoting=false" # TODO 41 - "-Dpipewire=${boolToString (pipewire != null)}" 42 - "-Dimage-webp=${boolToString (libwebp != null)}" 40 + "-Dpipewire=${lib.boolToString (pipewire != null)}" 41 + "-Dimage-webp=${lib.boolToString (libwebp != null)}" 43 42 "-Ddemo-clients=false" 44 43 "-Dsimple-clients=" 45 44 "-Dtest-junit-xml=false" 46 45 # TODO: 47 46 #"--enable-clients" 48 47 #"--disable-setuid-install" # prevent install target to chown root weston-launch, which fails 49 - ] ++ optionals (xwayland != null) [ 48 + ] ++ lib.optionals (xwayland != null) [ 50 49 "-Dxwayland-path=${xwayland.out}/bin/Xwayland" 51 50 ]; 52 51 53 52 passthru.providedSessions = [ "weston" ]; 54 53 55 - meta = { 54 + meta = with lib; { 56 55 description = "A lightweight and functional Wayland compositor"; 57 56 longDescription = '' 58 57 Weston is the reference implementation of a Wayland compositor, as well
+2 -2
pkgs/development/compilers/go/1.17.nix
··· 60 60 61 61 stdenv.mkDerivation rec { 62 62 pname = "go"; 63 - version = "1.17.12"; 63 + version = "1.17.13"; 64 64 65 65 src = fetchurl { 66 66 url = "https://dl.google.com/go/go${version}.src.tar.gz"; 67 - sha256 = "sha256-DVG1s/KAwPAfU0WYwCGdtYePM32mE3qe5ph3dBNgcgk="; 67 + sha256 = "sha256-oaSLI6+yBvlee7qpuJjZZfkIJvbx0fwMHXhK2gzTAP0="; 68 68 }; 69 69 70 70 strictDeps = true;
+30 -10
pkgs/development/go-modules/generic/default.nix
··· 19 19 # path to go.mod and go.sum directory 20 20 , modRoot ? "./" 21 21 22 - # vendorSha256 is the sha256 of the vendored dependencies 22 + # vendorHash is the SRI hash of the vendored dependencies 23 23 # 24 - # if vendorSha256 is null, then we won't fetch any dependencies and 24 + # if vendorHash is null, then we won't fetch any dependencies and 25 25 # rely on the vendor folder within the source. 26 - , vendorSha256 26 + , vendorHash ? "_unset" 27 + # same as vendorHash, but outputHashAlgo is hardcoded to sha256 28 + # so regular base32 sha256 hashes work 29 + , vendorSha256 ? "_unset" 27 30 # Whether to delete the vendor folder supplied with the source. 28 31 , deleteVendor ? false 29 32 # Whether to fetch (go mod download) and proxy the vendor directory. 30 33 # This is useful if your code depends on c code and go mod tidy does not 31 34 # include the needed sources to build or if any dependency has case-insensitive 32 - # conflicts which will produce platform dependant `vendorSha256` checksums. 35 + # conflicts which will produce platform dependant `vendorHash` checksums. 33 36 , proxyVendor ? false 34 37 35 38 # We want parallel builds by default ··· 55 58 with builtins; 56 59 57 60 assert goPackagePath != "" -> throw "`goPackagePath` is not needed with `buildGoModule`"; 61 + assert (vendorSha256 == "_unset" && vendorHash == "_unset") -> throw "either `vendorHash` or `vendorSha256` is required"; 62 + assert (vendorSha256 != "_unset" && vendorHash != "_unset") -> throw "both `vendorHash` and `vendorSha256` set. only one can be set."; 58 63 59 64 let 60 - args = removeAttrs args' [ "overrideModAttrs" "vendorSha256" ]; 65 + hasAnyVendorHash = (vendorSha256 != null && vendorSha256 != "_unset") || (vendorHash != null && vendorHash != "_unset"); 66 + vendorHashType = 67 + if hasAnyVendorHash then 68 + if vendorSha256 != null && vendorSha256 != "_unset" then 69 + "sha256" 70 + else 71 + "sri" 72 + else 73 + null; 61 74 62 - go-modules = if vendorSha256 != null then stdenv.mkDerivation (let modArgs = { 75 + args = removeAttrs args' [ "overrideModAttrs" "vendorSha256" "vendorHash" ]; 76 + 77 + go-modules = if hasAnyVendorHash then stdenv.mkDerivation (let modArgs = { 63 78 64 79 name = "${name}-go-modules"; 65 80 ··· 98 113 fi 99 114 '' + '' 100 115 if [ -d vendor ]; then 101 - echo "vendor folder exists, please set 'vendorSha256 = null;' in your expression" 116 + echo "vendor folder exists, please set 'vendorHash = null;' or 'vendorSha256 = null;' in your expression" 102 117 exit 10 103 118 fi 104 119 ··· 134 149 }; in modArgs // ( 135 150 { 136 151 outputHashMode = "recursive"; 152 + } // (if (vendorHashType == "sha256") then { 137 153 outputHashAlgo = "sha256"; 138 154 outputHash = vendorSha256; 139 - } 155 + } else { 156 + outputHash = vendorHash; 157 + }) // (lib.optionalAttrs (vendorHashType == "sri" && vendorHash == "") { 158 + outputHashAlgo = "sha256"; 159 + }) 140 160 ) // overrideModAttrs modArgs) else ""; 141 161 142 162 package = stdenv.mkDerivation (args // { ··· 156 176 export GOPROXY=off 157 177 export GOSUMDB=off 158 178 cd "$modRoot" 159 - '' + lib.optionalString (vendorSha256 != null) '' 179 + '' + lib.optionalString hasAnyVendorHash '' 160 180 ${if proxyVendor then '' 161 181 export GOPROXY=file://${go-modules} 162 182 '' else '' ··· 276 296 277 297 disallowedReferences = lib.optional (!allowGoReference) go; 278 298 279 - passthru = passthru // { inherit go go-modules vendorSha256 ; }; 299 + passthru = passthru // { inherit go go-modules vendorSha256 vendorHash; }; 280 300 281 301 enableParallelBuilding = enableParallelBuilding; 282 302
+3 -3
pkgs/development/interpreters/nickel/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "nickel"; 8 - version = "0.1.0"; 8 + version = "0.2.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "tweag"; 12 12 repo = pname; 13 13 rev = "refs/tags/${version}"; # because pure ${version} doesn't work 14 - hash = "sha256-St8oK9vP2cAhsNindkebtAMeRPwYggP9E4CciSZc7oA="; 14 + hash = "sha256-Bh83qn+ECZnlCH/A34G5G5MdcAHPow24RMCVQXR5Awg="; 15 15 }; 16 16 17 - cargoSha256 = "sha256-VsyK/api8acIpADpXQ8RdbRLiZwHFSDH0vwQrZQ8zp4="; 17 + cargoSha256 = "sha256-vI+SaVyRJjLNqenUsYtaSTyOZRT0zZJ1OZHekcb5LjY="; 18 18 19 19 meta = with lib; { 20 20 homepage = "https://nickel-lang.org/";
+25
pkgs/development/libraries/argparse/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "argparse"; 5 + version = "2.6"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "p-ranav"; 9 + repo = "argparse"; 10 + rev = "v${version}"; 11 + sha256 = "sha256-imLDuVbzkiE5hcQVarZGeNzNZE0/8LHMQqAiUYzPVks="; 12 + }; 13 + 14 + nativeBuildInputs = [ 15 + cmake 16 + ]; 17 + 18 + meta = with lib; { 19 + description = "Argument Parser for Modern C++"; 20 + homepage = "https://github.com/p-ranav/argparse"; 21 + maintainers = with maintainers; [ _2gn ]; 22 + platforms = platforms.unix; 23 + license = licenses.mit; 24 + }; 25 + }
+2 -2
pkgs/development/libraries/live555/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "live555"; 13 - version = "2022.06.16"; 13 + version = "2022.07.14"; 14 14 15 15 src = fetchurl { 16 16 urls = [ ··· 18 18 "https://download.videolan.org/contrib/live555/live.${version}.tar.gz" 19 19 "mirror://sourceforge/slackbuildsdirectlinks/live.${version}.tar.gz" 20 20 ]; 21 - sha256 = "sha256-84OUQw++RNqH3sAY4S6yXRJXZY+5T0VdTIUqELuVdV0="; 21 + sha256 = "sha256-VrWkBmLdP0MYfiFit3Mtkv7Ti8dWPmrndrbKo+BpRCA="; 22 22 }; 23 23 24 24 nativeBuildInputs = lib.optional stdenv.isDarwin darwin.cctools;
+3 -1
pkgs/development/libraries/vte/default.nix
··· 78 78 79 79 mesonFlags = lib.optionals (!systemdSupport) [ 80 80 "-D_systemd=false" 81 + ] ++ lib.optionals stdenv.isDarwin [ 82 + # -Bsymbolic-functions is not supported on darwin 83 + "-D_b_symbolic_functions=false" 81 84 ]; 82 85 83 86 postPatch = '' ··· 98 101 }; 99 102 100 103 meta = with lib; { 101 - broken = stdenv.isDarwin; 102 104 homepage = "https://www.gnome.org/"; 103 105 description = "A library implementing a terminal emulator widget for GTK"; 104 106 longDescription = ''
+62
pkgs/development/python-modules/adafruit-nrfutil/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , fetchpatch 5 + , pythonOlder 6 + , pyserial 7 + , click 8 + , ecdsa 9 + , behave 10 + , nose 11 + }: 12 + 13 + buildPythonPackage rec { 14 + pname = "adafruit-nrfutil"; 15 + version = "0.5.3.post17"; 16 + format = "setuptools"; 17 + 18 + disabled = pythonOlder "3.7"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "adafruit"; 22 + repo = "Adafruit_nRF52_nrfutil"; 23 + rev = version; 24 + sha256 = "sha256-mHHKOQE9AGBX8RAyaPOy+JS3fTs98+AFdq9qsVy7go4="; 25 + }; 26 + 27 + patches = [ 28 + # Pull a patch which fixes the tests, but is not yet released in a new version: 29 + # https://github.com/adafruit/Adafruit_nRF52_nrfutil/pull/38 30 + (fetchpatch { 31 + name = "fix-tests.patch"; 32 + url = "https://github.com/adafruit/Adafruit_nRF52_nrfutil/commit/e5fbcc8ee5958041db38c04139ba686bf7d1b845.patch"; 33 + sha256 = "sha256-0tbJldGtYcDdUzA3wZRv0lenXVn6dqV016U9nMpQ6/w="; 34 + }) 35 + ]; 36 + 37 + propagatedBuildInputs = [ 38 + pyserial 39 + click 40 + ecdsa 41 + ]; 42 + 43 + checkInputs = [ 44 + behave 45 + nose 46 + ]; 47 + 48 + preCheck = '' 49 + mkdir test-reports 50 + ''; 51 + 52 + pythonImportsCheck = [ 53 + "nordicsemi" 54 + ]; 55 + 56 + meta = with lib; { 57 + homepage = "https://github.com/adafruit/Adafruit_nRF52_nrfutil"; 58 + description = "Modified version of Nordic's nrfutil 0.5.x for use with the Adafruit Feather nRF52"; 59 + license = licenses.bsd3; 60 + maintainers = with maintainers; [ stargate01 ]; 61 + }; 62 + }
+2 -2
pkgs/development/python-modules/aioaladdinconnect/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "aioaladdinconnect"; 10 - version = "0.1.25"; 10 + version = "0.1.34"; 11 11 format = "setuptools"; 12 12 13 13 disabled = pythonOlder "3.7"; ··· 15 15 src = fetchPypi { 16 16 pname = "AIOAladdinConnect"; 17 17 inherit version; 18 - hash = "sha256-ruuiRhPPqsZxJgaKVtwQK8Zf7gG9r2NYnrBCosTtL/M="; 18 + hash = "sha256-p5O4tm+m0ThJS/VTqhMNs2bwA2S6kJ2reQ2BoTHmLz8="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/avro/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "avro"; 11 - version = "1.11.0"; 11 + version = "1.11.1"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.6"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "1206365cc30ad561493f735329857dd078533459cee4e928aec2505f341ce445"; 18 + sha256 = "sha256-8SNiPsxkjQ4gzhT47YUWIUDBPMSxCIZdGyUp+/oGwAg="; 19 19 }; 20 20 21 21 propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [
+2 -2
pkgs/development/python-modules/drf-yasg/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "drf-yasg"; 17 - version = "1.21.0"; 17 + version = "1.21.3"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "sha256-Lyh3plukEn1+7t+pp3oJbbLjdDvRIddFACmXtBfA2Go="; 21 + sha256 = "sha256-su67Q4+mQVA6CNrHkb4kGD6ibbz+NxqYJOqR9uOpiKo="; 22 22 }; 23 23 24 24 postPatch = ''
+2 -2
pkgs/development/python-modules/geoalchemy2/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "GeoAlchemy2"; 15 - version = "0.12.1"; 15 + version = "0.12.3"; 16 16 format = "setuptools"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "sha256-7566ebZ/9LxyCw4ZkUEIZvx9sBODewVaGyy2UYuZTYA="; 20 + sha256 = "sha256-MSgMZF3EoPkMHSmdL1x9WrZ8eENTW0ULTCq4ifAB4EI="; 21 21 }; 22 22 23 23 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/logilab/constraint.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "logilab-constraint"; 5 - version = "0.6.0"; 5 + version = "0.6.2"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "1n0xim4ij1n4yvyqqvyc0wllhjs22szglsd5av0j8k2qmck4njcg"; 9 + sha256 = "sha256-Jk6wvvcDEeHfy7dUcjbnzFIeGBYm5tXzCI26yy+t2qs="; 10 10 }; 11 11 12 12 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/mailsuite/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "mailsuite"; 18 - version = "1.9.2"; 18 + version = "1.9.4"; 19 19 format = "pyproject"; 20 20 21 21 disabled = pythonOlder "3.6"; 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - hash = "sha256-UV9cdWdUnUt4j1Puf1H0UxXsCHi3t4uNiKHwYNfTfa4="; 25 + hash = "sha256-wgutyXxo1z3GxO3xikRlA4Og+oz+7+PrY2Hs6gicO/o="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/peaqevcore/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "peaqevcore"; 9 - version = "4.0.0"; 9 + version = "4.0.1"; 10 10 format = "setuptools"; 11 11 12 12 disabled = pythonOlder "3.7"; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 - hash = "sha256-q1qxjrdDLTOprgunsq70oPFgSxSZ1jOfUY6qPud/d9o="; 16 + hash = "sha256-iCHXiGKg3ENqw4cX1iNpVZAA944siKbFGKooo+KswsY="; 17 17 }; 18 18 19 19 postPatch = ''
+59
pkgs/development/python-modules/trectools/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , beautifulsoup4 5 + , pythonOlder 6 + , pandas 7 + , python 8 + , numpy 9 + , scikit-learn 10 + , scipy 11 + , lxml 12 + , matplotlib 13 + , sarge 14 + }: 15 + 16 + buildPythonPackage rec { 17 + pname = "trectools"; 18 + version = "0.0.49"; 19 + 20 + disabled = pythonOlder "3.6"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "joaopalotti"; 24 + repo = pname; 25 + # https://github.com/joaopalotti/trectools/issues/41 26 + rev = "5c1d56e9cf955f45b5a1780ee6a82744d31e7a79"; 27 + sha256 = "sha256-Lh6sK2rxEdCsOUKHn1jgm+rsn8FK1f2po0UuZfZajBA="; 28 + }; 29 + 30 + postPatch = '' 31 + substituteInPlace setup.py \ 32 + --replace "bs4 >= 0.0.0.1" "beautifulsoup4 >= 4.11.1" 33 + ''; 34 + 35 + propagatedBuildInputs = [ 36 + pandas 37 + numpy 38 + scikit-learn 39 + scipy 40 + lxml 41 + beautifulsoup4 42 + matplotlib 43 + sarge 44 + ]; 45 + 46 + checkPhase = '' 47 + cd unittests 48 + ${python.interpreter} -m unittest runner 49 + ''; 50 + 51 + pythonImportsCheck = [ "trectools" ]; 52 + 53 + meta = with lib; { 54 + homepage = "https://github.com/joaopalotti/trectools"; 55 + description = "Library for assisting Information Retrieval (IR) practitioners with TREC-like campaigns"; 56 + license = licenses.bsdOriginal; 57 + maintainers = with maintainers; [ MoritzBoehme ]; 58 + }; 59 + }
-45
pkgs/misc/drivers/xow/default.nix
··· 1 - { lib, stdenv, cabextract, fetchurl, fetchFromGitHub, libusb1 }: 2 - 3 - stdenv.mkDerivation rec { 4 - pname = "xow"; 5 - version = "unstable-2022-04-24"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "medusalix"; 9 - repo = "xow"; 10 - rev = "d335d6024f8380f52767a7de67727d9b2f867871"; 11 - sha256 = "0q5nr21p4dlx2a99hiivwz6qj9anrqqsdhiz6xi375yqkxis4251"; 12 - }; 13 - 14 - firmware = fetchurl { 15 - url = "http://download.windowsupdate.com/c/msdownload/update/driver/drvs/2017/07/1cd6a87c-623f-4407-a52d-c31be49e925c_e19f60808bdcbfbd3c3df6be3e71ffc52e43261e.cab"; 16 - sha256 = "013g1zngxffavqrk5jy934q3bdhsv6z05ilfixdn8dj0zy26lwv5"; 17 - }; 18 - 19 - makeFlags = [ 20 - "BUILD=RELEASE" 21 - "VERSION=${version}-${src.rev}" 22 - "BINDIR=${placeholder "out"}/bin" 23 - "UDEVDIR=${placeholder "out"}/lib/udev/rules.d" 24 - "MODLDIR=${placeholder "out"}/lib/modules-load.d" 25 - "MODPDIR=${placeholder "out"}/lib/modprobe.d" 26 - "SYSDDIR=${placeholder "out"}/lib/systemd/system" 27 - ]; 28 - 29 - postUnpack = '' 30 - cabextract -F FW_ACC_00U.bin ${firmware} 31 - mv FW_ACC_00U.bin source/firmware.bin 32 - ''; 33 - 34 - enableParallelBuilding = true; 35 - nativeBuildInputs = [ cabextract ]; 36 - buildInputs = [ libusb1 ]; 37 - 38 - meta = with lib; { 39 - homepage = "https://github.com/medusalix/xow"; 40 - description = "Linux driver for the Xbox One wireless dongle"; 41 - license = licenses.gpl2Plus; 42 - maintainers = [ maintainers.jansol ]; 43 - platforms = platforms.linux; 44 - }; 45 - }
+50 -50
pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch
··· 1 1 diff --git a/data/meson.build b/data/meson.build 2 - index 9176aa34..1a0298a9 100644 2 + index d8494020d..7c896fa0d 100644 3 3 --- a/data/meson.build 4 4 +++ b/data/meson.build 5 5 @@ -26,7 +26,7 @@ endif 6 6 7 7 if build_standalone 8 8 install_data(['daemon.conf'], 9 - - install_dir : join_paths(sysconfdir, 'fwupd') 10 - + install_dir : join_paths(sysconfdir_install, 'fwupd') 9 + - install_dir: join_paths(sysconfdir, 'fwupd') 10 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 11 11 ) 12 - install_data(['power.quirk', 'cfi.quirk'], 13 - install_dir: join_paths(datadir, 'fwupd', 'quirks.d')) 12 + plugin_quirks += join_paths(meson.current_source_dir(), 'power.quirk') 13 + plugin_quirks += join_paths(meson.current_source_dir(), 'cfi.quirk') 14 14 diff --git a/data/pki/meson.build b/data/pki/meson.build 15 - index 499b7201..1be13607 100644 15 + index 3649fecea..c3462744b 100644 16 16 --- a/data/pki/meson.build 17 17 +++ b/data/pki/meson.build 18 18 @@ -12,13 +12,13 @@ install_data([ 19 19 'GPG-KEY-Linux-Foundation-Firmware', 20 20 'GPG-KEY-Linux-Vendor-Firmware-Service', 21 21 ], 22 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd') 23 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd') 22 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd') 23 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd') 24 24 ) 25 25 install_data([ 26 26 'GPG-KEY-Linux-Foundation-Metadata', 27 27 'GPG-KEY-Linux-Vendor-Firmware-Service', 28 28 ], 29 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd-metadata') 30 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 29 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd-metadata') 30 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 31 31 ) 32 32 endif 33 33 ··· 35 35 install_data([ 36 36 'LVFS-CA.pem', 37 37 ], 38 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd') 39 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd') 38 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd') 39 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd') 40 40 ) 41 41 install_data([ 42 42 'LVFS-CA.pem', 43 43 ], 44 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd-metadata') 45 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 44 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd-metadata') 45 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 46 46 ) 47 47 endif 48 48 diff --git a/data/remotes.d/meson.build b/data/remotes.d/meson.build 49 - index 87e794b1..ebeeeca7 100644 49 + index 1d1698a7e..5469d00a6 100644 50 50 --- a/data/remotes.d/meson.build 51 51 +++ b/data/remotes.d/meson.build 52 52 @@ -2,7 +2,7 @@ if build_standalone and get_option('lvfs') != 'false' 53 53 install_data([ 54 54 'lvfs-testing.conf', 55 55 ], 56 - - install_dir : join_paths(sysconfdir, 'fwupd', 'remotes.d') 57 - + install_dir : join_paths(sysconfdir_install, 'fwupd', 'remotes.d') 56 + - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d') 57 + + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d') 58 58 ) 59 59 con3 = configuration_data() 60 60 if get_option('lvfs') == 'disabled' 61 61 @@ -15,7 +15,7 @@ if build_standalone and get_option('lvfs') != 'false' 62 - output : 'lvfs.conf', 63 - configuration : con3, 62 + output: 'lvfs.conf', 63 + configuration: con3, 64 64 install: true, 65 65 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 66 66 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), ··· 68 68 i18n.merge_file( 69 69 input: 'lvfs.metainfo.xml', 70 70 @@ -49,12 +49,12 @@ configure_file( 71 - output : 'vendor.conf', 72 - configuration : con2, 71 + output: 'vendor.conf', 72 + configuration: con2, 73 73 install: true, 74 74 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 75 75 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 76 76 ) 77 77 configure_file( 78 - input : 'vendor-directory.conf', 79 - output : 'vendor-directory.conf', 80 - configuration : con2, 78 + input: 'vendor-directory.conf', 79 + output: 'vendor-directory.conf', 80 + configuration: con2, 81 81 install: true, 82 82 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 83 83 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 84 84 ) 85 85 diff --git a/meson.build b/meson.build 86 - index b91dd037..a8de7810 100644 86 + index e6b717078..f8a7a7455 100644 87 87 --- a/meson.build 88 88 +++ b/meson.build 89 89 @@ -195,6 +195,12 @@ endif ··· 97 97 +endif 98 98 + 99 99 diffcmd = find_program('diff') 100 - gio = dependency('gio-2.0', version : '>= 2.45.8') 101 - giounix = dependency('gio-unix-2.0', version : '>= 2.45.8', required: false) 100 + gio = dependency('gio-2.0', version: '>= 2.45.8') 101 + giounix = dependency('gio-unix-2.0', version: '>= 2.45.8', required: false) 102 102 diff --git a/meson_options.txt b/meson_options.txt 103 - index d00038db..c84652ca 100644 103 + index 06d242371..d9e517fc0 100644 104 104 --- a/meson_options.txt 105 105 +++ b/meson_options.txt 106 106 @@ -1,3 +1,4 @@ ··· 109 109 option('consolekit', type : 'feature', description : 'ConsoleKit support', deprecated: {'true': 'enabled', 'false': 'disabled'}) 110 110 option('static_analysis', type : 'boolean', value : false, description : 'enable GCC static analysis support') 111 111 diff --git a/plugins/dell-esrt/meson.build b/plugins/dell-esrt/meson.build 112 - index 00b7ecda..789f34ca 100644 112 + index 67bd3b9d9..ad04a91b6 100644 113 113 --- a/plugins/dell-esrt/meson.build 114 114 +++ b/plugins/dell-esrt/meson.build 115 115 @@ -38,6 +38,6 @@ configure_file( 116 - output : 'dell-esrt.conf', 117 - configuration : con2, 116 + output: 'dell-esrt.conf', 117 + configuration: con2, 118 118 install: true, 119 119 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 120 120 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 121 121 ) 122 122 endif 123 123 diff --git a/plugins/msr/meson.build b/plugins/msr/meson.build 124 - index 1a278375..f57ae530 100644 124 + index 13f03ccd4..9235ebe33 100644 125 125 --- a/plugins/msr/meson.build 126 126 +++ b/plugins/msr/meson.build 127 - @@ -12,7 +12,7 @@ install_data(['fwupd-msr.conf'], 127 + @@ -10,7 +10,7 @@ install_data(['fwupd-msr.conf'], 128 128 endif 129 129 130 130 install_data(['msr.conf'], 131 - - install_dir: join_paths(sysconfdir, 'fwupd') 132 - + install_dir: join_paths(sysconfdir_install, 'fwupd') 131 + - install_dir: join_paths(sysconfdir, 'fwupd') 132 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 133 133 ) 134 134 shared_module('fu_plugin_msr', 135 135 fu_hash, 136 136 diff --git a/plugins/redfish/meson.build b/plugins/redfish/meson.build 137 - index 8717d50f..9a703723 100644 137 + index 95606e478..e5355e520 100644 138 138 --- a/plugins/redfish/meson.build 139 139 +++ b/plugins/redfish/meson.build 140 - @@ -51,7 +51,7 @@ shared_module('fu_plugin_redfish', 140 + @@ -43,7 +43,7 @@ shared_module('fu_plugin_redfish', 141 141 ) 142 142 143 143 install_data(['redfish.conf'], 144 - - install_dir: join_paths(sysconfdir, 'fwupd'), 145 - + install_dir: join_paths(sysconfdir_install, 'fwupd'), 144 + - install_dir: join_paths(sysconfdir, 'fwupd'), 145 + + install_dir: join_paths(sysconfdir_install, 'fwupd'), 146 146 ) 147 147 148 148 if get_option('tests') 149 149 diff --git a/plugins/thunderbolt/meson.build b/plugins/thunderbolt/meson.build 150 - index aa6c8ce1..61734c4d 100644 150 + index 5f8ffbf90..9ba323e75 100644 151 151 --- a/plugins/thunderbolt/meson.build 152 152 +++ b/plugins/thunderbolt/meson.build 153 - @@ -35,7 +35,7 @@ fu_plugin_thunderbolt = shared_module('fu_plugin_thunderbolt', 153 + @@ -32,7 +32,7 @@ fu_plugin_thunderbolt = shared_module('fu_plugin_thunderbolt', 154 154 ) 155 155 156 156 install_data(['thunderbolt.conf'], 157 - - install_dir: join_paths(sysconfdir, 'fwupd') 158 - + install_dir: join_paths(sysconfdir_install, 'fwupd') 157 + - install_dir: join_paths(sysconfdir, 'fwupd') 158 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 159 159 ) 160 160 # we use functions from 2.52 in the tests 161 161 if get_option('tests') and run_sanitize_unsafe_tests and umockdev.found() and gio.version().version_compare('>= 2.52') 162 162 diff --git a/plugins/uefi-capsule/meson.build b/plugins/uefi-capsule/meson.build 163 - index 2d9ba819..0feb5f6b 100644 163 + index ef38dc03e..78ff65e1d 100644 164 164 --- a/plugins/uefi-capsule/meson.build 165 165 +++ b/plugins/uefi-capsule/meson.build 166 - @@ -21,7 +21,7 @@ if host_machine.system() == 'linux' 167 - output : '35_fwupd', 168 - configuration : con2, 166 + @@ -20,7 +20,7 @@ if host_machine.system() == 'linux' 167 + output: '35_fwupd', 168 + configuration: con2, 169 169 install: true, 170 170 - install_dir: join_paths(sysconfdir, 'grub.d') 171 171 + install_dir: join_paths(sysconfdir_install, 'grub.d') 172 172 ) 173 173 elif host_machine.system() == 'freebsd' 174 174 backend_srcs += 'fu-uefi-backend-freebsd.c' 175 - @@ -112,7 +112,7 @@ if get_option('compat_cli') and get_option('man') 175 + @@ -110,7 +110,7 @@ if get_option('compat_cli') and get_option('man') 176 176 endif 177 177 178 178 install_data(['uefi_capsule.conf'], 179 - - install_dir: join_paths(sysconfdir, 'fwupd') 180 - + install_dir: join_paths(sysconfdir_install, 'fwupd') 179 + - install_dir: join_paths(sysconfdir, 'fwupd') 180 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 181 181 ) 182 182 183 183 # add all the .po files as inputs to watch
+21 -12
pkgs/os-specific/linux/firmware/fwupd/default.nix
··· 4 4 , lib 5 5 , fetchurl 6 6 , fetchFromGitHub 7 - , gtk-doc 7 + , gi-docgen 8 8 , pkg-config 9 9 , gobject-introspection 10 10 , gettext ··· 17 17 , libarchive 18 18 , curl 19 19 , libjcat 20 - , libxslt 21 20 , elfutils 22 21 , libsmbios 23 22 , efivar ··· 25 24 , meson 26 25 , libuuid 27 26 , colord 28 - , docbook_xml_dtd_43 29 - , docbook-xsl-nons 30 27 , ninja 31 28 , gcab 32 29 , gnutls ··· 117 114 118 115 self = stdenv.mkDerivation rec { 119 116 pname = "fwupd"; 120 - version = "1.8.1"; 117 + version = "1.8.3"; 121 118 122 119 # libfwupd goes to lib 123 120 # daemon, plug-ins and libfwupdplugin go to out ··· 126 123 127 124 src = fetchurl { 128 125 url = "https://people.freedesktop.org/~hughsient/releases/fwupd-${version}.tar.xz"; 129 - sha256 = "sha256-V1ZGZELrkTT7QM3IpG+eAQAyR8jqyC+l2LFvZCA3W3k="; 126 + sha256 = "sha256-ciIpd86KhmJRH/o8CIFWb2xFjsjWHSUNlGYRfWEiOOw="; 130 127 }; 131 128 132 129 patches = [ ··· 152 149 nativeBuildInputs = [ 153 150 meson 154 151 ninja 155 - gtk-doc 152 + gi-docgen 156 153 pkg-config 157 154 gobject-introspection 158 155 gettext ··· 160 157 valgrind 161 158 gcab 162 159 gnutls 163 - docbook_xml_dtd_43 164 - docbook-xsl-nons 165 - libxslt 166 160 protobufc # for protoc 167 161 python 168 162 wrapGAppsHook ··· 201 195 ]; 202 196 203 197 mesonFlags = [ 204 - "-Ddocs=gtkdoc" 198 + "-Ddocs=enabled" 205 199 "-Dplugin_dummy=true" 206 200 # We are building the official releases. 207 201 "-Dsupported_build=enabled" ··· 216 210 "-Dsysconfdir_install=${placeholder "out"}/etc" 217 211 "-Defi_os_dir=nixos" 218 212 "-Dplugin_modem_manager=enabled" 213 + # Requires Meson 0.63 214 + "-Dgresource_quirks=disabled" 219 215 220 216 # We do not want to place the daemon into lib (cyclic reference) 221 217 "--libexecdir=${placeholder "out"}/libexec" ··· 261 257 meson_post_install.sh \ 262 258 po/test-deps 263 259 260 + # This checks a version of a dependency of gi-docgen but gi-docgen is self-contained in Nixpkgs. 261 + echo "Clearing docs/test-deps.py" 262 + test -f docs/test-deps.py 263 + echo > docs/test-deps.py 264 + 264 265 substituteInPlace data/installed-tests/fwupdmgr-p2p.sh \ 265 266 --replace "gdbus" ${glib.bin}/bin/gdbus 266 267 ''; 267 268 269 + preBuild = '' 270 + # jcat-tool at buildtime requires a home directory 271 + export HOME="$(mktemp -d)" 272 + ''; 273 + 268 274 preCheck = '' 269 275 addToSearchPath XDG_DATA_DIRS "${shared-mime-info}/share" 270 276 ''; ··· 298 304 ) 299 305 ''; 300 306 301 - # Since we had to disable wrapGAppsHook, we need to wrap the executables manually. 302 307 postFixup = '' 308 + # Since we had to disable wrapGAppsHook, we need to wrap the executables manually. 303 309 find -L "$out/bin" "$out/libexec" -type f -executable -print0 \ 304 310 | while IFS= read -r -d ''' file; do 305 311 if [[ "$file" != *.efi ]]; then ··· 307 313 wrapGApp "$file" 308 314 fi 309 315 done 316 + 317 + # Cannot be in postInstall, otherwise _multioutDocs hook in preFixup will move right back. 318 + moveToOutput "share/doc" "$devdoc" 310 319 ''; 311 320 312 321 separateDebugInfo = true;
+8 -8
pkgs/os-specific/linux/firmware/fwupd/install-fwupdplugin-to-out.patch
··· 4 4 +++ b/libfwupdplugin/meson.build 5 5 @@ -220,7 +220,8 @@ fwupdplugin = library( 6 6 ], 7 - link_args : cc.get_supported_link_arguments([vflag]), 8 - link_depends : fwupdplugin_mapfile, 9 - - install : true 10 - + install : true, 11 - + install_dir : bindir / '..' / 'lib', 7 + link_args: cc.get_supported_link_arguments([vflag]), 8 + link_depends: fwupdplugin_mapfile, 9 + - install: true 10 + + install: true, 11 + + install_dir: bindir / '..' / 'lib', 12 12 ) 13 13 14 14 fwupdplugin_pkgg = import('pkgconfig') ··· 16 16 girtargets, 17 17 fwupd_gir[0], 18 18 ], 19 - - install : true 20 - + install : true, 21 - + install_dir_typelib : bindir / '..' / 'lib' / 'girepository-1.0', 19 + - install: true 20 + + install: true, 21 + + install_dir_typelib: bindir / '..' / 'lib' / 'girepository-1.0', 22 22 ) 23 23 24 24 # Verify the map file is correct -- note we can't actually use the generated
+3 -5
pkgs/servers/endlessh-go/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "endlessh-go"; 8 - version = "20220710"; 8 + version = "20220731"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "shizunge"; 12 12 repo = "endlessh-go"; 13 13 rev = version; 14 - sha256 = "sha256-T8DLzHfITMLeHJtKuK4AjEzGGCIDJUPlqF2Lj56xPxY="; 14 + sha256 = "sha256-xV9VCbpd6JC/m3RXJt0v8WCCGs8UpZLvAv3bzPRrae4="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-hMCjYAqsI6h9B8iGVYQcNbKU5icalOHavvPKwOmvf/w="; 18 - 19 - proxyVendor = true; 17 + vendorSha256 = "sha256-YGVLntDnOX55IoIHIn0z1K7V/PhRLruEASfAGQsTUkk="; 20 18 21 19 ldflags = [ "-s" "-w" ]; 22 20
+61
pkgs/servers/klipper/klipper-firmware.nix
··· 1 + { stdenv 2 + , lib 3 + , pkg-config 4 + , pkgsCross 5 + , bintools-unwrapped 6 + , libffi 7 + , libusb1 8 + , wxGTK 9 + , python2 10 + , python3 11 + , gcc-arm-embedded 12 + , klipper 13 + , avrdude 14 + , stm32flash 15 + , mcu ? "mcu" 16 + , firmwareConfig ? ./simulator.cfg 17 + }: stdenv.mkDerivation rec { 18 + name = "klipper-firmware-${mcu}-${version}"; 19 + version = klipper.version; 20 + src = klipper.src; 21 + 22 + nativeBuildInputs = [ 23 + python2 24 + python3 25 + pkgsCross.avr.stdenv.cc 26 + gcc-arm-embedded 27 + bintools-unwrapped 28 + libffi 29 + libusb1 30 + avrdude 31 + stm32flash 32 + pkg-config 33 + wxGTK # Required for bossac 34 + ]; 35 + 36 + preBuild = "cp ${firmwareConfig} ./.config"; 37 + 38 + postPatch = '' 39 + patchShebangs . 40 + ''; 41 + 42 + makeFlags = [ 43 + "V=1" 44 + "KCONFIG_CONFIG=${firmwareConfig}" 45 + ]; 46 + 47 + installPhase = '' 48 + mkdir -p $out 49 + cp ./.config $out/config 50 + cp -r out/* $out 51 + ''; 52 + 53 + dontFixup = true; 54 + 55 + meta = with lib; { 56 + inherit (klipper.meta) homepage license; 57 + description = "Firmware part of Klipper"; 58 + maintainers = with maintainers; [ vtuan10 ]; 59 + platforms = platforms.linux; 60 + }; 61 + }
+38
pkgs/servers/klipper/klipper-flash.nix
··· 1 + { lib 2 + , writeShellApplication 3 + , gnumake 4 + , pkgsCross 5 + , klipper 6 + , klipper-firmware 7 + , python2 8 + , avrdude 9 + , stm32flash 10 + , mcu ? "mcu" 11 + , flashDevice ? "/dev/null" 12 + , firmwareConfig ? ./simulator.cfg 13 + }: 14 + let 15 + supportedArches = [ "avr" "stm32" "lpc176x" ]; 16 + matchBoard = with builtins; match ''^.*CONFIG_BOARD_DIRECTORY="([a-zA-Z0-9_]+)".*$'' (readFile firmwareConfig); 17 + boardArch = if matchBoard == null then null else builtins.head matchBoard; 18 + in 19 + writeShellApplication { 20 + name = "klipper-flash-${mcu}"; 21 + runtimeInputs = [ 22 + python2 23 + pkgsCross.avr.stdenv.cc 24 + gnumake 25 + ] ++ lib.optionals (boardArch == "avr") [ avrdude ] ++ lib.optionals (boardArch == "stm32") [ stm32flash ]; 26 + text = '' 27 + if ${lib.boolToString (!builtins.elem boardArch supportedArches)}; then 28 + printf "Flashing Klipper firmware to your board is not supported yet.\n" 29 + printf "Please use the compiled firmware at ${klipper-firmware} and flash it using the tools provided for your microcontroller." 30 + exit 1 31 + fi 32 + if ${lib.boolToString (boardArch == "stm32")}; then 33 + make -C ${klipper.src} FLASH_DEVICE="${toString flashDevice}" OUT="${klipper-firmware}/" KCONFIG_CONFIG="${klipper-firmware}/config" serialflash 34 + else 35 + make -C ${klipper.src} FLASH_DEVICE="${toString flashDevice}" OUT="${klipper-firmware}/" KCONFIG_CONFIG="${klipper-firmware}/config" flash 36 + fi 37 + ''; 38 + }
+21
pkgs/servers/klipper/klipper-genconf.nix
··· 1 + { writeShellApplication 2 + , klipper 3 + , python2 4 + , gnumake 5 + , pkgsCross 6 + }: writeShellApplication { 7 + name = "klipper-genconf"; 8 + runtimeInputs = [ 9 + python2 10 + pkgsCross.avr.stdenv.cc 11 + gnumake 12 + ]; 13 + text = '' 14 + CURRENT_DIR=$(pwd) 15 + TMP=$(mktemp -d) 16 + make -C ${klipper.src} OUT="$TMP" KCONFIG_CONFIG="$CURRENT_DIR/config" menuconfig 17 + rm -rf "$TMP" config.old 18 + printf "\nYour firmware configuration for klipper:\n\n" 19 + cat config 20 + ''; 21 + }
+23
pkgs/servers/klipper/simulator.cfg
··· 1 + # CONFIG_LOW_LEVEL_OPTIONS is not set 2 + # CONFIG_MACH_AVR is not set 3 + # CONFIG_MACH_ATSAM is not set 4 + # CONFIG_MACH_ATSAMD is not set 5 + # CONFIG_MACH_LPC176X is not set 6 + # CONFIG_MACH_STM32 is not set 7 + # CONFIG_MACH_RP2040 is not set 8 + # CONFIG_MACH_PRU is not set 9 + # CONFIG_MACH_LINUX is not set 10 + CONFIG_MACH_SIMU=y 11 + CONFIG_BOARD_DIRECTORY="simulator" 12 + CONFIG_CLOCK_FREQ=20000000 13 + CONFIG_SERIAL=y 14 + CONFIG_SIMULATOR_SELECT=y 15 + CONFIG_SERIAL_BAUD=250000 16 + CONFIG_USB_VENDOR_ID=0x1d50 17 + CONFIG_USB_DEVICE_ID=0x614e 18 + CONFIG_USB_SERIAL_NUMBER="12345" 19 + CONFIG_HAVE_GPIO=y 20 + CONFIG_HAVE_GPIO_ADC=y 21 + CONFIG_HAVE_GPIO_SPI=y 22 + CONFIG_HAVE_GPIO_HARD_PWM=y 23 + CONFIG_INLINE_STEPPER_HACK=y
+2 -2
pkgs/servers/monitoring/net-snmp/default.nix
··· 10 10 11 11 in stdenv.mkDerivation rec { 12 12 pname = "net-snmp"; 13 - version = "5.9.1"; 13 + version = "5.9.3"; 14 14 15 15 src = fetchurl { 16 16 url = "mirror://sourceforge/net-snmp/${pname}-${version}.tar.gz"; 17 - sha256 = "sha256-63/UpE3mzdv/2akqha0TCeXBBU+51afdkweciVP0jD8="; 17 + sha256 = "sha256-IJfym34b8/EwC0uuUvojCNC7jV05mNvgL5RipBOi7wo="; 18 18 }; 19 19 20 20 patches =
+47
pkgs/tools/admin/copilot-cli/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub, installShellFiles, testers, copilot-cli }: 2 + 3 + buildGoModule rec { 4 + pname = "copilot-cli"; 5 + version = "1.19.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "aws"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "sha256-2zF/cBc6TjAcFAI3zJ0yBQrVWDK5nkxYYkb04bjSjgY="; 12 + }; 13 + 14 + vendorSha256 = "sha256-1UFahXol1Lceccr/f24Mbhtk8bWyh4+Mb5VYZvF6VWs="; 15 + 16 + nativeBuildInputs = [ installShellFiles ]; 17 + 18 + # follow LINKER_FLAGS in Makefile 19 + ldflags = [ 20 + "-s" 21 + "-w" 22 + "-X github.com/aws/copilot-cli/internal/pkg/version.Version=${version}" 23 + "-X github.com/aws/copilot-cli/internal/pkg/cli.binaryS3BucketPath=https://ecs-cli-v2-release.s3.amazonaws.com" 24 + ]; 25 + 26 + subPackages = [ "./cmd/copilot" ]; 27 + 28 + postInstall = '' 29 + installShellCompletion --cmd copilot \ 30 + --bash <($out/bin/copilot completion bash) \ 31 + --fish <($out/bin/copilot completion fish) \ 32 + --zsh <($out/bin/copilot completion zsh) 33 + ''; 34 + 35 + passthru.tests.version = testers.testVersion { 36 + package = copilot-cli; 37 + command = "copilot version"; 38 + }; 39 + 40 + meta = with lib; { 41 + description = "Build, Release and Operate Containerized Applications on AWS."; 42 + homepage = "https://github.com/aws/copilot-cli"; 43 + changelog = "https://github.com/aws/copilot-cli/releases/tag/v${version}"; 44 + license = licenses.asl20; 45 + maintainers = with maintainers; [ jiegec ]; 46 + }; 47 + }
+3 -3
pkgs/tools/admin/wander/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "wander"; 5 - version = "0.5.1"; 5 + version = "0.7.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "robinovitch61"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-B+mMC5XGUTNTcxwKhvSSc7QbsLkg8qu7/jJf5U/q6s8="; 11 + sha256 = "sha256-aQqJDUDYHoUZ6ixnY3lmFOx29QpRRke5XHFIpsA+Bnw="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-gWQ8GbtghhCRq6tOU6qmWBuponmfUkUDAk3+dPtmMiE="; 14 + vendorSha256 = "sha256-T+URnRLumXFz48go9TN0Wha99T03OWGfDK7cQ+zKeRI="; 15 15 16 16 meta = with lib; { 17 17 description = "Terminal app/TUI for HashiCorp Nomad";
+23 -11
pkgs/tools/audio/volumeicon/default.nix
··· 1 - { pkgs, fetchurl, lib, stdenv, gtk3, pkg-config, intltool, alsa-lib }: 1 + { fetchFromGitHub, lib, stdenv 2 + , autoreconfHook, intltool, pkg-config 3 + , gtk3, alsa-lib 4 + }: 2 5 3 - stdenv.mkDerivation { 6 + stdenv.mkDerivation rec { 4 7 pname = "volumeicon"; 5 8 version = "0.5.1"; 6 9 7 - src = fetchurl { 8 - url = "http://softwarebakery.com/maato/files/volumeicon/volumeicon-0.5.1.tar.gz"; 9 - sha256 = "182xl2w8syv6ky2h2bc9imc6ap8pzh0p7rp63hh8nw0xm38c3f14"; 10 + src = fetchFromGitHub { 11 + owner = "Maato"; 12 + repo = "volumeicon"; 13 + rev = version; 14 + hash = "sha256-zYKC7rOoLf08rV4B43TrGNBcXfSBFxWZCe9bQD9JzaA"; 10 15 }; 11 16 12 - nativeBuildInputs = [ pkg-config ]; 13 - buildInputs = [ gtk3 intltool alsa-lib ]; 17 + nativeBuildInputs = [ 18 + autoreconfHook 19 + intltool 20 + pkg-config 21 + ]; 22 + 23 + buildInputs = [ 24 + gtk3 25 + alsa-lib 26 + ]; 14 27 15 28 meta = with lib; { 16 29 description = "A lightweight volume control that sits in your systray"; 17 - homepage = "http://softwarebakery.com/maato/volumeicon.html"; 18 - platforms = pkgs.lib.platforms.linux; 30 + homepage = "http://nullwise.com/volumeicon.html"; 31 + platforms = platforms.linux; 19 32 maintainers = with maintainers; [ bobvanderlinden ]; 20 - license = pkgs.lib.licenses.gpl3; 33 + license = licenses.gpl3; 21 34 }; 22 - 23 35 } 24 36
+3 -3
pkgs/tools/security/httpx/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "httpx"; 8 - version = "1.2.3"; 8 + version = "1.2.4"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "projectdiscovery"; 12 12 repo = "httpx"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-gBt1xllfzw8M+n+vgUmOQ3vgDxDuDaQ7YXfWdLWnpVk="; 14 + sha256 = "sha256-w4VELxmahqjfiMGXflSnhp5NKPi3HUucjxEUegljbVY="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-9ZwRbeZ1iSuJiIJDBauU1U9PpGn8QQPTd3MfrnSmF+w="; 17 + vendorSha256 = "sha256-9zLZyXrLvxwwkTwtpKxdGftzCZISZ/al98VnPiaMqGA="; 18 18 19 19 meta = with lib; { 20 20 description = "Fast and multi-purpose HTTP toolkit";
+2 -2
pkgs/tools/virtualization/linode-cli/default.nix
··· 11 11 }: 12 12 13 13 let 14 - sha256 = "1yglnmwspdncqmy5x0zc0g43bfm4597zfmwfvs7qkalv1pprf0s3"; 14 + sha256 = "1fv53wikx745kci86xrsq9kfsgv0a65srhywdw32cab1wywwpn2z"; 15 15 # specVersion taken from: https://www.linode.com/docs/api/openapi.yaml at `info.version`. 16 16 specVersion = "4.132.0"; 17 17 specSha256 = "0r0l23bvaj406xam7hglfx637cxja3g2vqdqx3x0ag7jfhg0s3k5"; ··· 24 24 25 25 buildPythonApplication rec { 26 26 pname = "linode-cli"; 27 - version = "5.21.0"; 27 + version = "5.22.0"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "linode";
+5
pkgs/top-level/aliases.nix
··· 408 408 facette = throw "facette has been removed"; # Added 2020-01-06 409 409 fast-neural-doodle = throw "fast-neural-doodle has been removed, as the upstream project has been abandoned"; # Added 2020-03-28 410 410 fastnlo = fastnlo_toolkit; # Added 2021-04-24 411 + fbreader = throw "fbreader has been removed, as the upstream project has been archived"; # Added 2022-05-26 411 412 fedora-coreos-config-transpiler = throw "fedora-coreos-config-transpiler has been renamed to 'butane'"; # Added 2021-04-13 412 413 feedreader = throw "feedreader is no longer activily maintained since 2019. The developer is working on a spiritual successor called NewsFlash."; # Added 2022-05-03 413 414 fetchFromGithub = throw "You meant fetchFromGitHub, with a capital H"; ··· 1523 1524 ''; 1524 1525 xf86_input_multitouch = throw "xf86_input_multitouch has been removed from nixpkgs"; # Added 2020-01-20 1525 1526 xlibs = throw "'xlibs' has been renamed to/replaced by 'xorg'"; # Converted to throw 2022-02-22 1527 + xow = throw ( 1528 + "Upstream has ended support for 'xow' and the package has been removed" + 1529 + "from nixpkgs. Users are urged to switch to 'xone'." 1530 + ); # Added 2022-08-02 1526 1531 xpraGtk3 = throw "'xpraGtk3' has been renamed to/replaced by 'xpra'"; # Converted to throw 2022-02-22 1527 1532 xv = xxv; # Added 2020-02-22 1528 1533 xvfb_run = xvfb-run; # Added 2021-05-07
+13 -7
pkgs/top-level/all-packages.nix
··· 386 386 387 387 coordgenlibs = callPackage ../development/libraries/coordgenlibs { }; 388 388 389 + copilot-cli = callPackage ../tools/admin/copilot-cli { }; 390 + 389 391 cp437 = callPackage ../tools/misc/cp437 { }; 390 392 391 393 cpm = callPackage ../development/tools/cpm { }; ··· 4043 4045 klaus = with python3Packages; toPythonApplication klaus; 4044 4046 4045 4047 klipper = callPackage ../servers/klipper { }; 4048 + 4049 + klipper-firmware = callPackage ../servers/klipper/klipper-firmware.nix { }; 4050 + 4051 + klipper-flash = callPackage ../servers/klipper/klipper-flash.nix { }; 4052 + 4053 + klipper-genconf = callPackage ../servers/klipper/klipper-genconf.nix { }; 4046 4054 4047 4055 klog = qt5.callPackage ../applications/radio/klog { }; 4048 4056 ··· 10499 10507 10500 10508 secp256k1 = callPackage ../tools/security/secp256k1 { }; 10501 10509 10502 - securefs = callPackage ../tools/filesystems/securefs { }; 10510 + securefs = callPackage ../tools/filesystems/securefs { 10511 + stdenv = clangStdenv; 10512 + }; 10503 10513 10504 10514 seehecht = callPackage ../tools/text/seehecht { }; 10505 10515 ··· 17005 17015 aravis = callPackage ../development/libraries/aravis { }; 17006 17016 17007 17017 arb = callPackage ../development/libraries/arb {}; 17018 + 17019 + argparse = callPackage ../development/libraries/argparse { }; 17008 17020 17009 17021 argp-standalone = callPackage ../development/libraries/argp-standalone {}; 17010 17022 ··· 26827 26839 26828 26840 fbpanel = callPackage ../applications/window-managers/fbpanel { }; 26829 26841 26830 - fbreader = callPackage ../applications/misc/fbreader { 26831 - inherit (darwin.apple_sdk.frameworks) AppKit Cocoa; 26832 - }; 26833 - 26834 26842 fdr = libsForQt5.callPackage ../applications/science/programming/fdr { }; 26835 26843 26836 26844 feedbackd = callPackage ../applications/misc/feedbackd { }; ··· 35760 35768 xortool = python3Packages.callPackage ../tools/security/xortool { }; 35761 35769 35762 35770 xorex = callPackage ../tools/security/xorex { }; 35763 - 35764 - xow = callPackage ../misc/drivers/xow { }; 35765 35771 35766 35772 xbps = callPackage ../tools/package-management/xbps { }; 35767 35773
+4
pkgs/top-level/python-packages.nix
··· 171 171 172 172 adafruit-io = callPackage ../development/python-modules/adafruit-io { }; 173 173 174 + adafruit-nrfutil = callPackage ../development/python-modules/adafruit-nrfutil { }; 175 + 174 176 adafruit-platformdetect = callPackage ../development/python-modules/adafruit-platformdetect { }; 175 177 176 178 adafruit-pureio = callPackage ../development/python-modules/adafruit-pureio { }; ··· 10768 10770 transmission-rpc = callPackage ../development/python-modules/transmission-rpc { }; 10769 10771 10770 10772 transmissionrpc = callPackage ../development/python-modules/transmissionrpc { }; 10773 + 10774 + trectools = callPackage ../development/python-modules/trectools { }; 10771 10775 10772 10776 treelog = callPackage ../development/python-modules/treelog { }; 10773 10777