Merge master into staging-next

authored by github-actions[bot] and committed by GitHub ad090ff8 357ae167

+653 -362
+3 -3
doc/languages-frameworks/go.section.md
··· 11 12 In the following is an example expression using `buildGoModule`, the following arguments are of special significance to the function: 13 14 - - `vendorSha256`: is the hash of the output of the intermediate fetcher derivation. `vendorSha256` can also take `null` as an input. When `null` is used as a value, rather than fetching the dependencies and vendoring them, we use the vendoring included within the source repo. If you'd like to not have to update this field on dependency changes, run `go mod vendor` in your source repo and set `vendorSha256 = null;` 15 - - `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform dependant `vendorSha256` checksums. 16 17 ```nix 18 pet = buildGoModule rec { ··· 26 sha256 = "0m2fzpqxk7hrbxsgqplkg7h2p7gv6s1miymv3gvw0cz039skag0s"; 27 }; 28 29 - vendorSha256 = "1879j77k96684wi554rkjxydrj8g3hpp0kvxz03sd8dmwr3lh83j"; 30 31 meta = with lib; { 32 description = "Simple command-line snippet manager, written in Go";
··· 11 12 In the following is an example expression using `buildGoModule`, the following arguments are of special significance to the function: 13 14 + - `vendorHash`: is the hash of the output of the intermediate fetcher derivation. `vendorHash` can also take `null` as an input. When `null` is used as a value, rather than fetching the dependencies and vendoring them, we use the vendoring included within the source repo. If you'd like to not have to update this field on dependency changes, run `go mod vendor` in your source repo and set `vendorHash = null;` 15 + - `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform dependant `vendorHash` checksums. 16 17 ```nix 18 pet = buildGoModule rec { ··· 26 sha256 = "0m2fzpqxk7hrbxsgqplkg7h2p7gv6s1miymv3gvw0cz039skag0s"; 27 }; 28 29 + vendorHash = "sha256-ciBIR+a1oaYH+H1PcC8cD8ncfJczk1IiJ8iYNM+R6aA="; 30 31 meta = with lib; { 32 description = "Simple command-line snippet manager, written in Go";
+8
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
··· 273 </listitem> 274 <listitem> 275 <para> 276 The <literal>services.graphite.api</literal> and 277 <literal>services.graphite.beacon</literal> NixOS options, and 278 the <literal>python3.pkgs.graphite_api</literal>,
··· 273 </listitem> 274 <listitem> 275 <para> 276 + xow package removed along with the 277 + <literal>hardware.xow</literal> module, due to the project 278 + being deprecated in favor of <literal>xone</literal>, which is 279 + available via the <literal>hardware.xone</literal> module. 280 + </para> 281 + </listitem> 282 + <listitem> 283 + <para> 284 The <literal>services.graphite.api</literal> and 285 <literal>services.graphite.beacon</literal> NixOS options, and 286 the <literal>python3.pkgs.graphite_api</literal>,
+2
nixos/doc/manual/release-notes/rl-2211.section.md
··· 105 106 - riak package removed along with `services.riak` module, due to lack of maintainer to update the package. 107 108 - The `services.graphite.api` and `services.graphite.beacon` NixOS options, and 109 the `python3.pkgs.graphite_api`, `python3.pkgs.graphite_beacon` and 110 `python3.pkgs.influxgraph` packages, have been removed due to lack of upstream
··· 105 106 - riak package removed along with `services.riak` module, due to lack of maintainer to update the package. 107 108 + - xow package removed along with the `hardware.xow` module, due to the project being deprecated in favor of `xone`, which is available via the `hardware.xone` module. 109 + 110 - The `services.graphite.api` and `services.graphite.beacon` NixOS options, and 111 the `python3.pkgs.graphite_api`, `python3.pkgs.graphite_beacon` and 112 `python3.pkgs.influxgraph` packages, have been removed due to lack of upstream
-1
nixos/modules/module-list.nix
··· 475 ./services/hardware/thermald.nix 476 ./services/hardware/undervolt.nix 477 ./services/hardware/vdr.nix 478 - ./services/hardware/xow.nix 479 ./services/home-automation/home-assistant.nix 480 ./services/home-automation/zigbee2mqtt.nix 481 ./services/logging/SystemdJournal2Gelf.nix
··· 475 ./services/hardware/thermald.nix 476 ./services/hardware/undervolt.nix 477 ./services/hardware/vdr.nix 478 ./services/home-automation/home-assistant.nix 479 ./services/home-automation/zigbee2mqtt.nix 480 ./services/logging/SystemdJournal2Gelf.nix
+4
nixos/modules/rename.nix
··· 30 udev rules from libu2f-host to the system. Udev gained native support 31 to handle FIDO security tokens, so this isn't necessary anymore. 32 '') 33 (mkRemovedOptionModule [ "networking" "vpnc" ] "Use environment.etc.\"vpnc/service.conf\" instead.") 34 (mkRemovedOptionModule [ "networking" "wicd" ] "The corresponding package was removed from nixpkgs.") 35 (mkRemovedOptionModule [ "programs" "tilp2" ] "The corresponding package was removed from nixpkgs.")
··· 30 udev rules from libu2f-host to the system. Udev gained native support 31 to handle FIDO security tokens, so this isn't necessary anymore. 32 '') 33 + (mkRemovedOptionModule [ "hardware" "xow" ] '' 34 + The xow package was removed from nixpkgs. Upstream has deprecated 35 + the project and users are urged to switch to xone. 36 + '') 37 (mkRemovedOptionModule [ "networking" "vpnc" ] "Use environment.etc.\"vpnc/service.conf\" instead.") 38 (mkRemovedOptionModule [ "networking" "wicd" ] "The corresponding package was removed from nixpkgs.") 39 (mkRemovedOptionModule [ "programs" "tilp2" ] "The corresponding package was removed from nixpkgs.")
-20
nixos/modules/services/hardware/xow.nix
··· 1 - { config, pkgs, lib, ... }: 2 - 3 - let 4 - cfg = config.services.hardware.xow; 5 - in { 6 - options.services.hardware.xow = { 7 - enable = lib.mkEnableOption "xow as a systemd service"; 8 - }; 9 - 10 - config = lib.mkIf cfg.enable { 11 - hardware.uinput.enable = true; 12 - 13 - boot.extraModprobeConfig = lib.readFile "${pkgs.xow}/lib/modprobe.d/xow-blacklist.conf"; 14 - 15 - systemd.packages = [ pkgs.xow ]; 16 - systemd.services.xow.wantedBy = [ "multi-user.target" ]; 17 - 18 - services.udev.packages = [ pkgs.xow ]; 19 - }; 20 - }
···
+66 -22
nixos/modules/services/misc/klipper.nix
··· 5 format = pkgs.formats.ini { 6 # https://github.com/NixOS/nixpkgs/pull/121613#issuecomment-885241996 7 listToValue = l: 8 - if builtins.length l == 1 then generators.mkValueStringDefault {} (head l) 9 else lib.concatMapStrings (s: "\n ${generators.mkValueStringDefault {} s}") l; 10 - mkKeyValue = generators.mkKeyValueDefault {} ":"; 11 }; 12 in 13 { ··· 69 for supported values. 70 ''; 71 }; 72 }; 73 }; 74 ··· 83 assertion = cfg.user != null -> cfg.group != null; 84 message = "Option klipper.group is not set when a user is specified."; 85 } 86 ]; 87 88 environment.etc."klipper.cfg".source = format.generate "klipper.cfg" cfg.settings; ··· 92 group = config.services.octoprint.group; 93 }; 94 95 - systemd.services.klipper = let 96 - klippyArgs = "--input-tty=${cfg.inputTTY}" 97 - + optionalString (cfg.apiSocket != null) " --api-server=${cfg.apiSocket}"; 98 - in { 99 - description = "Klipper 3D Printer Firmware"; 100 - wantedBy = [ "multi-user.target" ]; 101 - after = [ "network.target" ]; 102 103 - serviceConfig = { 104 - ExecStart = "${cfg.package}/lib/klipper/klippy.py ${klippyArgs} /etc/klipper.cfg"; 105 - RuntimeDirectory = "klipper"; 106 - SupplementaryGroups = [ "dialout" ]; 107 - WorkingDirectory = "${cfg.package}/lib"; 108 - } // (if cfg.user != null then { 109 - Group = cfg.group; 110 - User = cfg.user; 111 - } else { 112 - DynamicUser = true; 113 - User = "klipper"; 114 - }); 115 - }; 116 }; 117 }
··· 5 format = pkgs.formats.ini { 6 # https://github.com/NixOS/nixpkgs/pull/121613#issuecomment-885241996 7 listToValue = l: 8 + if builtins.length l == 1 then generators.mkValueStringDefault { } (head l) 9 else lib.concatMapStrings (s: "\n ${generators.mkValueStringDefault {} s}") l; 10 + mkKeyValue = generators.mkKeyValueDefault { } ":"; 11 }; 12 in 13 { ··· 69 for supported values. 70 ''; 71 }; 72 + 73 + firmwares = mkOption { 74 + description = "Firmwares klipper should manage"; 75 + default = { }; 76 + type = with types; attrsOf 77 + (submodule { 78 + options = { 79 + enable = mkEnableOption '' 80 + building of firmware and addition of klipper-flash tools for manual flashing. 81 + This will add `klipper-flash-$mcu` scripts to your environment which can be called to flash the firmware. 82 + ''; 83 + configFile = mkOption { 84 + type = path; 85 + description = "Path to firmware config which is generated using `klipper-genconf`"; 86 + }; 87 + }; 88 + }); 89 + }; 90 }; 91 }; 92 ··· 101 assertion = cfg.user != null -> cfg.group != null; 102 message = "Option klipper.group is not set when a user is specified."; 103 } 104 + { 105 + assertion = foldl (a: b: a && b) true (mapAttrsToList (mcu: _: mcu != null -> (hasAttrByPath [ "${mcu}" "serial" ] cfg.settings)) cfg.firmwares); 106 + message = "Option klipper.settings.$mcu.serial must be set when klipper.firmware.$mcu is specified"; 107 + } 108 ]; 109 110 environment.etc."klipper.cfg".source = format.generate "klipper.cfg" cfg.settings; ··· 114 group = config.services.octoprint.group; 115 }; 116 117 + systemd.services.klipper = 118 + let 119 + klippyArgs = "--input-tty=${cfg.inputTTY}" 120 + + optionalString (cfg.apiSocket != null) " --api-server=${cfg.apiSocket}"; 121 + in 122 + { 123 + description = "Klipper 3D Printer Firmware"; 124 + wantedBy = [ "multi-user.target" ]; 125 + after = [ "network.target" ]; 126 127 + serviceConfig = { 128 + ExecStart = "${cfg.package}/lib/klipper/klippy.py ${klippyArgs} /etc/klipper.cfg"; 129 + RuntimeDirectory = "klipper"; 130 + SupplementaryGroups = [ "dialout" ]; 131 + WorkingDirectory = "${cfg.package}/lib"; 132 + } // (if cfg.user != null then { 133 + Group = cfg.group; 134 + User = cfg.user; 135 + } else { 136 + DynamicUser = true; 137 + User = "klipper"; 138 + }); 139 + }; 140 + 141 + environment.systemPackages = 142 + with pkgs; 143 + let 144 + firmwares = filterAttrs (n: v: v!= null) (mapAttrs 145 + (mcu: { enable, configFile }: if enable then pkgs.klipper-firmware.override { 146 + mcu = lib.strings.sanitizeDerivationName mcu; 147 + firmwareConfig = configFile; 148 + } else null) 149 + cfg.firmwares); 150 + firmwareFlasher = mapAttrsToList 151 + (mcu: firmware: pkgs.klipper-flash.override { 152 + mcu = lib.strings.sanitizeDerivationName mcu; 153 + klipper-firmware = firmware; 154 + flashDevice = cfg.settings."${mcu}".serial; 155 + firmwareConfig = cfg.firmwares."${mcu}".configFile; 156 + }) 157 + firmwares; 158 + in 159 + [ klipper-genconf ] ++ firmwareFlasher ++ attrValues firmwares; 160 }; 161 }
+1 -1
pkgs/applications/audio/jellycli/default.nix
··· 11 sha256 = "1awzcxnf175a794rhzbmqxxjss77mfa1yrr0wgdxaivrlkibxjys"; 12 }; 13 14 - vendorSha256 = "02fwsnrhj09m0aa199plpqlsjrwpmrk4c80fszzm07s5vmjqvnfy"; 15 16 patches = [ 17 # Fixes log file path for tests.
··· 11 sha256 = "1awzcxnf175a794rhzbmqxxjss77mfa1yrr0wgdxaivrlkibxjys"; 12 }; 13 14 + vendorHash = "sha256-3tmNZd1FH1D/1w4gRmaul2epKb70phSUAjUBCbPV3Ak="; 15 16 patches = [ 17 # Fixes log file path for tests.
+1 -1
pkgs/applications/audio/noisetorch/default.nix
··· 12 fetchSubmodules = true; 13 }; 14 15 - vendorSha256 = null; 16 17 doCheck = false; 18
··· 12 fetchSubmodules = true; 13 }; 14 15 + vendorHash = null; 16 17 doCheck = false; 18
+3 -9
pkgs/applications/blockchains/exodus/default.nix
··· 1 - { stdenv, lib, fetchurl, unzip, glib, systemd, nss, nspr, gtk3-x11, pango, 2 atk, cairo, gdk-pixbuf, xorg, xorg_sys_opengl, util-linux, alsa-lib, dbus, at-spi2-atk, 3 cups, vivaldi-ffmpeg-codecs, libpulseaudio, at-spi2-core, libxkbcommon, mesa }: 4 ··· 6 pname = "exodus"; 7 version = "22.7.15"; 8 9 - src = fetchurl { 10 url = "https://downloads.exodus.io/releases/${pname}-linux-x64-${version}.zip"; 11 - sha256 = "sha256-tQwxzhy+d2hA7VvZB9qSF7uaYIffAyX9ovZYQ8HDEB8="; 12 }; 13 14 - sourceRoot = "."; 15 - unpackCmd = '' 16 - ${unzip}/bin/unzip "$src" -x "Exodus*/lib*so" 17 - ''; 18 - 19 installPhase = '' 20 mkdir -p $out/bin $out/share/applications 21 - cd Exodus-linux-x64 22 cp -r . $out 23 ln -s $out/Exodus $out/bin/Exodus 24 ln -s $out/bin/Exodus $out/bin/exodus
··· 1 + { stdenv, lib, fetchzip, glib, systemd, nss, nspr, gtk3-x11, pango, 2 atk, cairo, gdk-pixbuf, xorg, xorg_sys_opengl, util-linux, alsa-lib, dbus, at-spi2-atk, 3 cups, vivaldi-ffmpeg-codecs, libpulseaudio, at-spi2-core, libxkbcommon, mesa }: 4 ··· 6 pname = "exodus"; 7 version = "22.7.15"; 8 9 + src = fetchzip { 10 url = "https://downloads.exodus.io/releases/${pname}-linux-x64-${version}.zip"; 11 + sha256 = "sha256-KAv+H6uJBDGzjg5Qmy54EtiVvV1OGJ6r3XnAQO7qjIg="; 12 }; 13 14 installPhase = '' 15 mkdir -p $out/bin $out/share/applications 16 cp -r . $out 17 ln -s $out/Exodus $out/bin/Exodus 18 ln -s $out/bin/Exodus $out/bin/exodus
+3 -3
pkgs/applications/graphics/ImageMagick/default.nix
··· 46 47 stdenv.mkDerivation rec { 48 pname = "imagemagick"; 49 - version = "7.1.0-43"; 50 51 src = fetchFromGitHub { 52 owner = "ImageMagick"; 53 repo = "ImageMagick"; 54 - rev = builtins.replaceStrings [ "-" ] [ "." ] version; 55 - hash = "sha256-SOy7Ci1rzLB12ofSQBWmX86dfbr/ywsRPunHRswlAt4="; 56 }; 57 58 outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
··· 46 47 stdenv.mkDerivation rec { 48 pname = "imagemagick"; 49 + version = "7.1.0-44"; 50 51 src = fetchFromGitHub { 52 owner = "ImageMagick"; 53 repo = "ImageMagick"; 54 + rev = version; 55 + hash = "sha256-vJGZ47l8nSRnINWHsw562zsQ14fSR5SObr/SO+/40yw="; 56 }; 57 58 outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
-94
pkgs/applications/misc/fbreader/default.nix
··· 1 - { lib 2 - , stdenv 3 - , fetchFromGitHub 4 - , fetchpatch 5 - , pkg-config 6 - , bzip2 7 - , curl 8 - , expat 9 - , fribidi 10 - , libunibreak 11 - , sqlite 12 - , zlib 13 - , uiTarget ? if !stdenv.isDarwin then "desktop" else "macosx" 14 - , uiType ? if !stdenv.isDarwin then "qt4" else "cocoa" 15 - , qt4 16 - , gtk2 17 - , AppKit 18 - , Cocoa 19 - }: 20 - 21 - with lib; 22 - 23 - assert elem uiTarget [ "desktop" "macosx" ]; 24 - assert elem uiType [ "qt4" "gtk" "cocoa" ]; 25 - assert uiTarget == "macosx" -> uiType == "cocoa"; 26 - 27 - # Note: "qt" uiType option mentioned in ${src}/README.build is qt3, 28 - # which is way to old and no longer in nixpkgs. 29 - 30 - stdenv.mkDerivation { 31 - pname = "fbreader-${uiType}"; 32 - version = "0.99.6"; 33 - 34 - src = fetchFromGitHub { 35 - owner = "geometer"; 36 - repo = "FBReader"; 37 - rev = "9e608db14372ae580beae4976eec7241fa069e75"; 38 - sha256 = "0lzafk02mv0cf2l2a61q5y4743zi913byik4bw1ix0gr1drnsa7y"; 39 - }; 40 - 41 - patches = [ 42 - ./typecheck.patch 43 - (fetchpatch { 44 - name = "curl-7_62.diff"; # see https://github.com/geometer/FBReader/pull/311 45 - url = "https://github.com/geometer/FBReader/commit/b7c78e965d06f780.diff"; 46 - sha256 = "1dgnx9wps7hcf8fkidc7037vcf92fr3ccnjx7bgxm9x02j0hngjg"; 47 - }) 48 - ]; 49 - 50 - postPatch = '' 51 - cat << EOF > makefiles/target.mk 52 - TARGET_ARCH = ${uiTarget} 53 - TARGET_STATUS = release 54 - UI_TYPE = ${uiType} 55 - EOF 56 - 57 - substituteInPlace makefiles/arch/desktop.mk \ 58 - --replace ccache "" \ 59 - --replace moc-qt4 moc 60 - 61 - # libunibreak supersedes liblinebreak 62 - substituteInPlace zlibrary/text/Makefile \ 63 - --replace -llinebreak -lunibreak 64 - ''; 65 - 66 - nativeBuildInputs = [ pkg-config ]; 67 - 68 - buildInputs = [ 69 - bzip2 70 - curl 71 - expat 72 - fribidi 73 - libunibreak 74 - sqlite 75 - zlib 76 - ] 77 - ++ optional (uiType == "qt4") qt4 78 - ++ optional (uiType == "gtk") gtk2 79 - ++ optionals (uiType == "cocoa") [ AppKit Cocoa ]; 80 - 81 - makeFlags = [ "INSTALLDIR=$(out)" ]; 82 - 83 - NIX_CFLAGS_COMPILE = "-Wno-error=narrowing"; 84 - 85 - meta = with lib; { 86 - description = "An e-book reader for Linux"; 87 - homepage = "http://www.fbreader.org/"; 88 - license = licenses.gpl3; 89 - broken = stdenv.isDarwin # untested, might work 90 - || uiType == "gtk"; # builds, but the result is unusable, hangs a lot 91 - platforms = platforms.unix; 92 - maintainers = [ maintainers.coroa ]; 93 - }; 94 - }
···
-11
pkgs/applications/misc/fbreader/typecheck.patch
··· 1 - diff --git a/fbreader/src/database/booksdb/BooksDB.cpp b/fbreader/src/database/booksdb/BooksDB.cpp 2 - index e33a22e76..1b6092800 100644 3 - --- a/fbreader/src/database/booksdb/BooksDB.cpp 4 - +++ b/fbreader/src/database/booksdb/BooksDB.cpp 5 - @@ -146,5 +146,5 @@ shared_ptr<Book> BooksDB::loadBook(const std::string &fileName) { 6 - myFindFileId->setFileName(fileName); 7 - if (!myFindFileId->run()) { 8 - - return false; 9 - + return 0; 10 - } 11 - ((DBIntValue&)*myLoadBook->parameter("@file_id").value()) = myFindFileId->fileId();
···
+8 -3
pkgs/applications/science/robotics/qgroundcontrol/default.nix
··· 6 7 mkDerivation rec { 8 pname = "qgroundcontrol"; 9 - version = "4.2.1"; 10 11 qtInputs = [ 12 qtbase qtcharts qtlocation qtserialport qtsvg qtquickcontrols2 ··· 14 ]; 15 16 gstInputs = with gst_all_1; [ 17 - gstreamer gst-plugins-base gst-plugins-good gst-plugins-bad wayland 18 ]; 19 20 buildInputs = [ SDL2 ] ++ gstInputs ++ qtInputs; ··· 64 owner = "mavlink"; 65 repo = pname; 66 rev = "v${version}"; 67 - sha256 = "sha256-7POrc6RUm3GVx3KuPUBNbKRUvUmA2UkEL7ezQVQt/yo="; 68 fetchSubmodules = true; 69 }; 70
··· 6 7 mkDerivation rec { 8 pname = "qgroundcontrol"; 9 + version = "4.2.3"; 10 11 qtInputs = [ 12 qtbase qtcharts qtlocation qtserialport qtsvg qtquickcontrols2 ··· 14 ]; 15 16 gstInputs = with gst_all_1; [ 17 + gstreamer 18 + gst-plugins-base 19 + (gst-plugins-good.override { qt5Support = true; }) 20 + gst-plugins-bad 21 + gst-libav 22 + wayland 23 ]; 24 25 buildInputs = [ SDL2 ] ++ gstInputs ++ qtInputs; ··· 69 owner = "mavlink"; 70 repo = pname; 71 rev = "v${version}"; 72 + sha256 = "sha256-xa4c0ggQKqt4OfwVehjkhXYXY1TYVEoubuRH3Zsv0Ac="; 73 fetchSubmodules = true; 74 }; 75
+16 -2
pkgs/applications/terminal-emulators/gnome-console/default.nix
··· 1 { lib 2 , stdenv 3 , fetchurl 4 , gettext 5 , gnome 6 , libgtop ··· 28 url = "mirror://gnome/sources/gnome-console/${lib.versions.major version}/${pname}-${version}.tar.xz"; 29 sha256 = "fSbmwYdExXWnhykyY/YM7/YwEHCY6eWKd2WwCsdDcEk="; 30 }; 31 32 buildInputs = [ 33 gettext 34 libgtop 35 - gnome.nautilus 36 gtk3 37 libhandy 38 pcre2 39 vte 40 ]; 41 42 nativeBuildInputs = [ ··· 51 wrapGAppsHook 52 ]; 53 54 passthru = { 55 updateScript = gnome.updateScript { 56 packageName = pname; ··· 64 homepage = "https://gitlab.gnome.org/GNOME/console"; 65 license = licenses.gpl3Plus; 66 maintainers = teams.gnome.members ++ (with maintainers; [ zhaofengli ]); 67 - platforms = platforms.linux; 68 }; 69 }
··· 1 { lib 2 , stdenv 3 , fetchurl 4 + , fetchpatch 5 , gettext 6 , gnome 7 , libgtop ··· 29 url = "mirror://gnome/sources/gnome-console/${lib.versions.major version}/${pname}-${version}.tar.xz"; 30 sha256 = "fSbmwYdExXWnhykyY/YM7/YwEHCY6eWKd2WwCsdDcEk="; 31 }; 32 + 33 + patches = [ 34 + (fetchpatch { 35 + name = "fix-clang-build-issues.patch"; 36 + url = "https://gitlab.gnome.org/GNOME/console/-/commit/0e29a417d52e27da62f5cac461400be6a764dc65.patch"; 37 + sha256 = "sha256-5ORNZOxjC5dMk9VKaBcJu5OV1SEZo9SNUbN4Ob5hVJs="; 38 + }) 39 + ]; 40 41 buildInputs = [ 42 gettext 43 libgtop 44 gtk3 45 libhandy 46 pcre2 47 vte 48 + ] ++ lib.optionals stdenv.isLinux [ 49 + gnome.nautilus 50 ]; 51 52 nativeBuildInputs = [ ··· 61 wrapGAppsHook 62 ]; 63 64 + mesonFlags = lib.optionals (!stdenv.isLinux) [ 65 + "-Dnautilus=disabled" 66 + ]; 67 + 68 passthru = { 69 updateScript = gnome.updateScript { 70 packageName = pname; ··· 78 homepage = "https://gitlab.gnome.org/GNOME/console"; 79 license = licenses.gpl3Plus; 80 maintainers = teams.gnome.members ++ (with maintainers; [ zhaofengli ]); 81 + platforms = platforms.unix; 82 }; 83 }
+2 -2
pkgs/applications/video/freetube/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "freetube"; 5 - version = "0.16.0"; 6 7 src = fetchurl { 8 url = "https://github.com/FreeTubeApp/FreeTube/releases/download/v${version}-beta/freetube_${version}_amd64.AppImage"; 9 - sha256 = "sha256-G4lZ1lbNN8X9ocWhcuuNZGTZm9AUzuWKVm23YgsJwig="; 10 }; 11 12 appimageContents = appimageTools.extractType2 {
··· 2 3 stdenv.mkDerivation rec { 4 pname = "freetube"; 5 + version = "0.17.0"; 6 7 src = fetchurl { 8 url = "https://github.com/FreeTubeApp/FreeTube/releases/download/v${version}-beta/freetube_${version}_amd64.AppImage"; 9 + sha256 = "sha256-OlWNln62VouUJzzk0CtED+OdSM+aBc4NOu1TSaKVWnk="; 10 }; 11 12 appimageContents = appimageTools.extractType2 {
+7 -8
pkgs/applications/window-managers/weston/default.nix
··· 7 # beware of null defaults, as the parameters *are* supplied by callPackage by default 8 }: 9 10 - with lib; 11 stdenv.mkDerivation rec { 12 pname = "weston"; 13 version = "10.0.1"; ··· 34 ]; 35 36 mesonFlags= [ 37 - "-Dbackend-drm-screencast-vaapi=${boolToString (vaapi != null)}" 38 - "-Dbackend-rdp=${boolToString (freerdp != null)}" 39 - "-Dxwayland=${boolToString (xwayland != null)}" # Default is true! 40 "-Dremoting=false" # TODO 41 - "-Dpipewire=${boolToString (pipewire != null)}" 42 - "-Dimage-webp=${boolToString (libwebp != null)}" 43 "-Ddemo-clients=false" 44 "-Dsimple-clients=" 45 "-Dtest-junit-xml=false" 46 # TODO: 47 #"--enable-clients" 48 #"--disable-setuid-install" # prevent install target to chown root weston-launch, which fails 49 - ] ++ optionals (xwayland != null) [ 50 "-Dxwayland-path=${xwayland.out}/bin/Xwayland" 51 ]; 52 53 passthru.providedSessions = [ "weston" ]; 54 55 - meta = { 56 description = "A lightweight and functional Wayland compositor"; 57 longDescription = '' 58 Weston is the reference implementation of a Wayland compositor, as well
··· 7 # beware of null defaults, as the parameters *are* supplied by callPackage by default 8 }: 9 10 stdenv.mkDerivation rec { 11 pname = "weston"; 12 version = "10.0.1"; ··· 33 ]; 34 35 mesonFlags= [ 36 + "-Dbackend-drm-screencast-vaapi=${lib.boolToString (vaapi != null)}" 37 + "-Dbackend-rdp=${lib.boolToString (freerdp != null)}" 38 + "-Dxwayland=${lib.boolToString (xwayland != null)}" # Default is true! 39 "-Dremoting=false" # TODO 40 + "-Dpipewire=${lib.boolToString (pipewire != null)}" 41 + "-Dimage-webp=${lib.boolToString (libwebp != null)}" 42 "-Ddemo-clients=false" 43 "-Dsimple-clients=" 44 "-Dtest-junit-xml=false" 45 # TODO: 46 #"--enable-clients" 47 #"--disable-setuid-install" # prevent install target to chown root weston-launch, which fails 48 + ] ++ lib.optionals (xwayland != null) [ 49 "-Dxwayland-path=${xwayland.out}/bin/Xwayland" 50 ]; 51 52 passthru.providedSessions = [ "weston" ]; 53 54 + meta = with lib; { 55 description = "A lightweight and functional Wayland compositor"; 56 longDescription = '' 57 Weston is the reference implementation of a Wayland compositor, as well
+2 -2
pkgs/development/compilers/go/1.17.nix
··· 60 61 stdenv.mkDerivation rec { 62 pname = "go"; 63 - version = "1.17.12"; 64 65 src = fetchurl { 66 url = "https://dl.google.com/go/go${version}.src.tar.gz"; 67 - sha256 = "sha256-DVG1s/KAwPAfU0WYwCGdtYePM32mE3qe5ph3dBNgcgk="; 68 }; 69 70 strictDeps = true;
··· 60 61 stdenv.mkDerivation rec { 62 pname = "go"; 63 + version = "1.17.13"; 64 65 src = fetchurl { 66 url = "https://dl.google.com/go/go${version}.src.tar.gz"; 67 + sha256 = "sha256-oaSLI6+yBvlee7qpuJjZZfkIJvbx0fwMHXhK2gzTAP0="; 68 }; 69 70 strictDeps = true;
+30 -10
pkgs/development/go-modules/generic/default.nix
··· 19 # path to go.mod and go.sum directory 20 , modRoot ? "./" 21 22 - # vendorSha256 is the sha256 of the vendored dependencies 23 # 24 - # if vendorSha256 is null, then we won't fetch any dependencies and 25 # rely on the vendor folder within the source. 26 - , vendorSha256 27 # Whether to delete the vendor folder supplied with the source. 28 , deleteVendor ? false 29 # Whether to fetch (go mod download) and proxy the vendor directory. 30 # This is useful if your code depends on c code and go mod tidy does not 31 # include the needed sources to build or if any dependency has case-insensitive 32 - # conflicts which will produce platform dependant `vendorSha256` checksums. 33 , proxyVendor ? false 34 35 # We want parallel builds by default ··· 55 with builtins; 56 57 assert goPackagePath != "" -> throw "`goPackagePath` is not needed with `buildGoModule`"; 58 59 let 60 - args = removeAttrs args' [ "overrideModAttrs" "vendorSha256" ]; 61 62 - go-modules = if vendorSha256 != null then stdenv.mkDerivation (let modArgs = { 63 64 name = "${name}-go-modules"; 65 ··· 98 fi 99 '' + '' 100 if [ -d vendor ]; then 101 - echo "vendor folder exists, please set 'vendorSha256 = null;' in your expression" 102 exit 10 103 fi 104 ··· 134 }; in modArgs // ( 135 { 136 outputHashMode = "recursive"; 137 outputHashAlgo = "sha256"; 138 outputHash = vendorSha256; 139 - } 140 ) // overrideModAttrs modArgs) else ""; 141 142 package = stdenv.mkDerivation (args // { ··· 156 export GOPROXY=off 157 export GOSUMDB=off 158 cd "$modRoot" 159 - '' + lib.optionalString (vendorSha256 != null) '' 160 ${if proxyVendor then '' 161 export GOPROXY=file://${go-modules} 162 '' else '' ··· 276 277 disallowedReferences = lib.optional (!allowGoReference) go; 278 279 - passthru = passthru // { inherit go go-modules vendorSha256 ; }; 280 281 enableParallelBuilding = enableParallelBuilding; 282
··· 19 # path to go.mod and go.sum directory 20 , modRoot ? "./" 21 22 + # vendorHash is the SRI hash of the vendored dependencies 23 # 24 + # if vendorHash is null, then we won't fetch any dependencies and 25 # rely on the vendor folder within the source. 26 + , vendorHash ? "_unset" 27 + # same as vendorHash, but outputHashAlgo is hardcoded to sha256 28 + # so regular base32 sha256 hashes work 29 + , vendorSha256 ? "_unset" 30 # Whether to delete the vendor folder supplied with the source. 31 , deleteVendor ? false 32 # Whether to fetch (go mod download) and proxy the vendor directory. 33 # This is useful if your code depends on c code and go mod tidy does not 34 # include the needed sources to build or if any dependency has case-insensitive 35 + # conflicts which will produce platform dependant `vendorHash` checksums. 36 , proxyVendor ? false 37 38 # We want parallel builds by default ··· 58 with builtins; 59 60 assert goPackagePath != "" -> throw "`goPackagePath` is not needed with `buildGoModule`"; 61 + assert (vendorSha256 == "_unset" && vendorHash == "_unset") -> throw "either `vendorHash` or `vendorSha256` is required"; 62 + assert (vendorSha256 != "_unset" && vendorHash != "_unset") -> throw "both `vendorHash` and `vendorSha256` set. only one can be set."; 63 64 let 65 + hasAnyVendorHash = (vendorSha256 != null && vendorSha256 != "_unset") || (vendorHash != null && vendorHash != "_unset"); 66 + vendorHashType = 67 + if hasAnyVendorHash then 68 + if vendorSha256 != null && vendorSha256 != "_unset" then 69 + "sha256" 70 + else 71 + "sri" 72 + else 73 + null; 74 75 + args = removeAttrs args' [ "overrideModAttrs" "vendorSha256" "vendorHash" ]; 76 + 77 + go-modules = if hasAnyVendorHash then stdenv.mkDerivation (let modArgs = { 78 79 name = "${name}-go-modules"; 80 ··· 113 fi 114 '' + '' 115 if [ -d vendor ]; then 116 + echo "vendor folder exists, please set 'vendorHash = null;' or 'vendorSha256 = null;' in your expression" 117 exit 10 118 fi 119 ··· 149 }; in modArgs // ( 150 { 151 outputHashMode = "recursive"; 152 + } // (if (vendorHashType == "sha256") then { 153 outputHashAlgo = "sha256"; 154 outputHash = vendorSha256; 155 + } else { 156 + outputHash = vendorHash; 157 + }) // (lib.optionalAttrs (vendorHashType == "sri" && vendorHash == "") { 158 + outputHashAlgo = "sha256"; 159 + }) 160 ) // overrideModAttrs modArgs) else ""; 161 162 package = stdenv.mkDerivation (args // { ··· 176 export GOPROXY=off 177 export GOSUMDB=off 178 cd "$modRoot" 179 + '' + lib.optionalString hasAnyVendorHash '' 180 ${if proxyVendor then '' 181 export GOPROXY=file://${go-modules} 182 '' else '' ··· 296 297 disallowedReferences = lib.optional (!allowGoReference) go; 298 299 + passthru = passthru // { inherit go go-modules vendorSha256 vendorHash; }; 300 301 enableParallelBuilding = enableParallelBuilding; 302
+3 -3
pkgs/development/interpreters/nickel/default.nix
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "nickel"; 8 - version = "0.1.0"; 9 10 src = fetchFromGitHub { 11 owner = "tweag"; 12 repo = pname; 13 rev = "refs/tags/${version}"; # because pure ${version} doesn't work 14 - hash = "sha256-St8oK9vP2cAhsNindkebtAMeRPwYggP9E4CciSZc7oA="; 15 }; 16 17 - cargoSha256 = "sha256-VsyK/api8acIpADpXQ8RdbRLiZwHFSDH0vwQrZQ8zp4="; 18 19 meta = with lib; { 20 homepage = "https://nickel-lang.org/";
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "nickel"; 8 + version = "0.2.0"; 9 10 src = fetchFromGitHub { 11 owner = "tweag"; 12 repo = pname; 13 rev = "refs/tags/${version}"; # because pure ${version} doesn't work 14 + hash = "sha256-Bh83qn+ECZnlCH/A34G5G5MdcAHPow24RMCVQXR5Awg="; 15 }; 16 17 + cargoSha256 = "sha256-vI+SaVyRJjLNqenUsYtaSTyOZRT0zZJ1OZHekcb5LjY="; 18 19 meta = with lib; { 20 homepage = "https://nickel-lang.org/";
+25
pkgs/development/libraries/argparse/default.nix
···
··· 1 + { lib, stdenv, fetchFromGitHub, cmake }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "argparse"; 5 + version = "2.6"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "p-ranav"; 9 + repo = "argparse"; 10 + rev = "v${version}"; 11 + sha256 = "sha256-imLDuVbzkiE5hcQVarZGeNzNZE0/8LHMQqAiUYzPVks="; 12 + }; 13 + 14 + nativeBuildInputs = [ 15 + cmake 16 + ]; 17 + 18 + meta = with lib; { 19 + description = "Argument Parser for Modern C++"; 20 + homepage = "https://github.com/p-ranav/argparse"; 21 + maintainers = with maintainers; [ _2gn ]; 22 + platforms = platforms.unix; 23 + license = licenses.mit; 24 + }; 25 + }
+2 -2
pkgs/development/libraries/live555/default.nix
··· 10 11 stdenv.mkDerivation rec { 12 pname = "live555"; 13 - version = "2022.06.16"; 14 15 src = fetchurl { 16 urls = [ ··· 18 "https://download.videolan.org/contrib/live555/live.${version}.tar.gz" 19 "mirror://sourceforge/slackbuildsdirectlinks/live.${version}.tar.gz" 20 ]; 21 - sha256 = "sha256-84OUQw++RNqH3sAY4S6yXRJXZY+5T0VdTIUqELuVdV0="; 22 }; 23 24 nativeBuildInputs = lib.optional stdenv.isDarwin darwin.cctools;
··· 10 11 stdenv.mkDerivation rec { 12 pname = "live555"; 13 + version = "2022.07.14"; 14 15 src = fetchurl { 16 urls = [ ··· 18 "https://download.videolan.org/contrib/live555/live.${version}.tar.gz" 19 "mirror://sourceforge/slackbuildsdirectlinks/live.${version}.tar.gz" 20 ]; 21 + sha256 = "sha256-VrWkBmLdP0MYfiFit3Mtkv7Ti8dWPmrndrbKo+BpRCA="; 22 }; 23 24 nativeBuildInputs = lib.optional stdenv.isDarwin darwin.cctools;
+3 -1
pkgs/development/libraries/vte/default.nix
··· 78 79 mesonFlags = lib.optionals (!systemdSupport) [ 80 "-D_systemd=false" 81 ]; 82 83 postPatch = '' ··· 98 }; 99 100 meta = with lib; { 101 - broken = stdenv.isDarwin; 102 homepage = "https://www.gnome.org/"; 103 description = "A library implementing a terminal emulator widget for GTK"; 104 longDescription = ''
··· 78 79 mesonFlags = lib.optionals (!systemdSupport) [ 80 "-D_systemd=false" 81 + ] ++ lib.optionals stdenv.isDarwin [ 82 + # -Bsymbolic-functions is not supported on darwin 83 + "-D_b_symbolic_functions=false" 84 ]; 85 86 postPatch = '' ··· 101 }; 102 103 meta = with lib; { 104 homepage = "https://www.gnome.org/"; 105 description = "A library implementing a terminal emulator widget for GTK"; 106 longDescription = ''
+62
pkgs/development/python-modules/adafruit-nrfutil/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , fetchpatch 5 + , pythonOlder 6 + , pyserial 7 + , click 8 + , ecdsa 9 + , behave 10 + , nose 11 + }: 12 + 13 + buildPythonPackage rec { 14 + pname = "adafruit-nrfutil"; 15 + version = "0.5.3.post17"; 16 + format = "setuptools"; 17 + 18 + disabled = pythonOlder "3.7"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "adafruit"; 22 + repo = "Adafruit_nRF52_nrfutil"; 23 + rev = version; 24 + sha256 = "sha256-mHHKOQE9AGBX8RAyaPOy+JS3fTs98+AFdq9qsVy7go4="; 25 + }; 26 + 27 + patches = [ 28 + # Pull a patch which fixes the tests, but is not yet released in a new version: 29 + # https://github.com/adafruit/Adafruit_nRF52_nrfutil/pull/38 30 + (fetchpatch { 31 + name = "fix-tests.patch"; 32 + url = "https://github.com/adafruit/Adafruit_nRF52_nrfutil/commit/e5fbcc8ee5958041db38c04139ba686bf7d1b845.patch"; 33 + sha256 = "sha256-0tbJldGtYcDdUzA3wZRv0lenXVn6dqV016U9nMpQ6/w="; 34 + }) 35 + ]; 36 + 37 + propagatedBuildInputs = [ 38 + pyserial 39 + click 40 + ecdsa 41 + ]; 42 + 43 + checkInputs = [ 44 + behave 45 + nose 46 + ]; 47 + 48 + preCheck = '' 49 + mkdir test-reports 50 + ''; 51 + 52 + pythonImportsCheck = [ 53 + "nordicsemi" 54 + ]; 55 + 56 + meta = with lib; { 57 + homepage = "https://github.com/adafruit/Adafruit_nRF52_nrfutil"; 58 + description = "Modified version of Nordic's nrfutil 0.5.x for use with the Adafruit Feather nRF52"; 59 + license = licenses.bsd3; 60 + maintainers = with maintainers; [ stargate01 ]; 61 + }; 62 + }
+2 -2
pkgs/development/python-modules/aioaladdinconnect/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "aioaladdinconnect"; 10 - version = "0.1.25"; 11 format = "setuptools"; 12 13 disabled = pythonOlder "3.7"; ··· 15 src = fetchPypi { 16 pname = "AIOAladdinConnect"; 17 inherit version; 18 - hash = "sha256-ruuiRhPPqsZxJgaKVtwQK8Zf7gG9r2NYnrBCosTtL/M="; 19 }; 20 21 propagatedBuildInputs = [
··· 7 8 buildPythonPackage rec { 9 pname = "aioaladdinconnect"; 10 + version = "0.1.34"; 11 format = "setuptools"; 12 13 disabled = pythonOlder "3.7"; ··· 15 src = fetchPypi { 16 pname = "AIOAladdinConnect"; 17 inherit version; 18 + hash = "sha256-p5O4tm+m0ThJS/VTqhMNs2bwA2S6kJ2reQ2BoTHmLz8="; 19 }; 20 21 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/avro/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "avro"; 11 - version = "1.11.0"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "1206365cc30ad561493f735329857dd078533459cee4e928aec2505f341ce445"; 19 }; 20 21 propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [
··· 8 9 buildPythonPackage rec { 10 pname = "avro"; 11 + version = "1.11.1"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "sha256-8SNiPsxkjQ4gzhT47YUWIUDBPMSxCIZdGyUp+/oGwAg="; 19 }; 20 21 propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [
+2 -2
pkgs/development/python-modules/drf-yasg/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "drf-yasg"; 17 - version = "1.21.0"; 18 19 src = fetchPypi { 20 inherit pname version; 21 - sha256 = "sha256-Lyh3plukEn1+7t+pp3oJbbLjdDvRIddFACmXtBfA2Go="; 22 }; 23 24 postPatch = ''
··· 14 15 buildPythonPackage rec { 16 pname = "drf-yasg"; 17 + version = "1.21.3"; 18 19 src = fetchPypi { 20 inherit pname version; 21 + sha256 = "sha256-su67Q4+mQVA6CNrHkb4kGD6ibbz+NxqYJOqR9uOpiKo="; 22 }; 23 24 postPatch = ''
+2 -2
pkgs/development/python-modules/geoalchemy2/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "GeoAlchemy2"; 15 - version = "0.12.1"; 16 format = "setuptools"; 17 18 src = fetchPypi { 19 inherit pname version; 20 - sha256 = "sha256-7566ebZ/9LxyCw4ZkUEIZvx9sBODewVaGyy2UYuZTYA="; 21 }; 22 23 nativeBuildInputs = [
··· 12 13 buildPythonPackage rec { 14 pname = "GeoAlchemy2"; 15 + version = "0.12.3"; 16 format = "setuptools"; 17 18 src = fetchPypi { 19 inherit pname version; 20 + sha256 = "sha256-MSgMZF3EoPkMHSmdL1x9WrZ8eENTW0ULTCq4ifAB4EI="; 21 }; 22 23 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/logilab/constraint.nix
··· 2 3 buildPythonPackage rec { 4 pname = "logilab-constraint"; 5 - version = "0.6.0"; 6 7 src = fetchPypi { 8 inherit pname version; 9 - sha256 = "1n0xim4ij1n4yvyqqvyc0wllhjs22szglsd5av0j8k2qmck4njcg"; 10 }; 11 12 propagatedBuildInputs = [
··· 2 3 buildPythonPackage rec { 4 pname = "logilab-constraint"; 5 + version = "0.6.2"; 6 7 src = fetchPypi { 8 inherit pname version; 9 + sha256 = "sha256-Jk6wvvcDEeHfy7dUcjbnzFIeGBYm5tXzCI26yy+t2qs="; 10 }; 11 12 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/mailsuite/default.nix
··· 15 16 buildPythonPackage rec { 17 pname = "mailsuite"; 18 - version = "1.9.2"; 19 format = "pyproject"; 20 21 disabled = pythonOlder "3.6"; 22 23 src = fetchPypi { 24 inherit pname version; 25 - hash = "sha256-UV9cdWdUnUt4j1Puf1H0UxXsCHi3t4uNiKHwYNfTfa4="; 26 }; 27 28 nativeBuildInputs = [
··· 15 16 buildPythonPackage rec { 17 pname = "mailsuite"; 18 + version = "1.9.4"; 19 format = "pyproject"; 20 21 disabled = pythonOlder "3.6"; 22 23 src = fetchPypi { 24 inherit pname version; 25 + hash = "sha256-wgutyXxo1z3GxO3xikRlA4Og+oz+7+PrY2Hs6gicO/o="; 26 }; 27 28 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/peaqevcore/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "peaqevcore"; 9 - version = "4.0.0"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - hash = "sha256-q1qxjrdDLTOprgunsq70oPFgSxSZ1jOfUY6qPud/d9o="; 17 }; 18 19 postPatch = ''
··· 6 7 buildPythonPackage rec { 8 pname = "peaqevcore"; 9 + version = "4.0.1"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + hash = "sha256-iCHXiGKg3ENqw4cX1iNpVZAA944siKbFGKooo+KswsY="; 17 }; 18 19 postPatch = ''
+59
pkgs/development/python-modules/trectools/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , beautifulsoup4 5 + , pythonOlder 6 + , pandas 7 + , python 8 + , numpy 9 + , scikit-learn 10 + , scipy 11 + , lxml 12 + , matplotlib 13 + , sarge 14 + }: 15 + 16 + buildPythonPackage rec { 17 + pname = "trectools"; 18 + version = "0.0.49"; 19 + 20 + disabled = pythonOlder "3.6"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "joaopalotti"; 24 + repo = pname; 25 + # https://github.com/joaopalotti/trectools/issues/41 26 + rev = "5c1d56e9cf955f45b5a1780ee6a82744d31e7a79"; 27 + sha256 = "sha256-Lh6sK2rxEdCsOUKHn1jgm+rsn8FK1f2po0UuZfZajBA="; 28 + }; 29 + 30 + postPatch = '' 31 + substituteInPlace setup.py \ 32 + --replace "bs4 >= 0.0.0.1" "beautifulsoup4 >= 4.11.1" 33 + ''; 34 + 35 + propagatedBuildInputs = [ 36 + pandas 37 + numpy 38 + scikit-learn 39 + scipy 40 + lxml 41 + beautifulsoup4 42 + matplotlib 43 + sarge 44 + ]; 45 + 46 + checkPhase = '' 47 + cd unittests 48 + ${python.interpreter} -m unittest runner 49 + ''; 50 + 51 + pythonImportsCheck = [ "trectools" ]; 52 + 53 + meta = with lib; { 54 + homepage = "https://github.com/joaopalotti/trectools"; 55 + description = "Library for assisting Information Retrieval (IR) practitioners with TREC-like campaigns"; 56 + license = licenses.bsdOriginal; 57 + maintainers = with maintainers; [ MoritzBoehme ]; 58 + }; 59 + }
-45
pkgs/misc/drivers/xow/default.nix
··· 1 - { lib, stdenv, cabextract, fetchurl, fetchFromGitHub, libusb1 }: 2 - 3 - stdenv.mkDerivation rec { 4 - pname = "xow"; 5 - version = "unstable-2022-04-24"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "medusalix"; 9 - repo = "xow"; 10 - rev = "d335d6024f8380f52767a7de67727d9b2f867871"; 11 - sha256 = "0q5nr21p4dlx2a99hiivwz6qj9anrqqsdhiz6xi375yqkxis4251"; 12 - }; 13 - 14 - firmware = fetchurl { 15 - url = "http://download.windowsupdate.com/c/msdownload/update/driver/drvs/2017/07/1cd6a87c-623f-4407-a52d-c31be49e925c_e19f60808bdcbfbd3c3df6be3e71ffc52e43261e.cab"; 16 - sha256 = "013g1zngxffavqrk5jy934q3bdhsv6z05ilfixdn8dj0zy26lwv5"; 17 - }; 18 - 19 - makeFlags = [ 20 - "BUILD=RELEASE" 21 - "VERSION=${version}-${src.rev}" 22 - "BINDIR=${placeholder "out"}/bin" 23 - "UDEVDIR=${placeholder "out"}/lib/udev/rules.d" 24 - "MODLDIR=${placeholder "out"}/lib/modules-load.d" 25 - "MODPDIR=${placeholder "out"}/lib/modprobe.d" 26 - "SYSDDIR=${placeholder "out"}/lib/systemd/system" 27 - ]; 28 - 29 - postUnpack = '' 30 - cabextract -F FW_ACC_00U.bin ${firmware} 31 - mv FW_ACC_00U.bin source/firmware.bin 32 - ''; 33 - 34 - enableParallelBuilding = true; 35 - nativeBuildInputs = [ cabextract ]; 36 - buildInputs = [ libusb1 ]; 37 - 38 - meta = with lib; { 39 - homepage = "https://github.com/medusalix/xow"; 40 - description = "Linux driver for the Xbox One wireless dongle"; 41 - license = licenses.gpl2Plus; 42 - maintainers = [ maintainers.jansol ]; 43 - platforms = platforms.linux; 44 - }; 45 - }
···
+50 -50
pkgs/os-specific/linux/firmware/fwupd/add-option-for-installation-sysconfdir.patch
··· 1 diff --git a/data/meson.build b/data/meson.build 2 - index 9176aa34..1a0298a9 100644 3 --- a/data/meson.build 4 +++ b/data/meson.build 5 @@ -26,7 +26,7 @@ endif 6 7 if build_standalone 8 install_data(['daemon.conf'], 9 - - install_dir : join_paths(sysconfdir, 'fwupd') 10 - + install_dir : join_paths(sysconfdir_install, 'fwupd') 11 ) 12 - install_data(['power.quirk', 'cfi.quirk'], 13 - install_dir: join_paths(datadir, 'fwupd', 'quirks.d')) 14 diff --git a/data/pki/meson.build b/data/pki/meson.build 15 - index 499b7201..1be13607 100644 16 --- a/data/pki/meson.build 17 +++ b/data/pki/meson.build 18 @@ -12,13 +12,13 @@ install_data([ 19 'GPG-KEY-Linux-Foundation-Firmware', 20 'GPG-KEY-Linux-Vendor-Firmware-Service', 21 ], 22 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd') 23 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd') 24 ) 25 install_data([ 26 'GPG-KEY-Linux-Foundation-Metadata', 27 'GPG-KEY-Linux-Vendor-Firmware-Service', 28 ], 29 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd-metadata') 30 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 31 ) 32 endif 33 ··· 35 install_data([ 36 'LVFS-CA.pem', 37 ], 38 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd') 39 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd') 40 ) 41 install_data([ 42 'LVFS-CA.pem', 43 ], 44 - - install_dir : join_paths(sysconfdir, 'pki', 'fwupd-metadata') 45 - + install_dir : join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 46 ) 47 endif 48 diff --git a/data/remotes.d/meson.build b/data/remotes.d/meson.build 49 - index 87e794b1..ebeeeca7 100644 50 --- a/data/remotes.d/meson.build 51 +++ b/data/remotes.d/meson.build 52 @@ -2,7 +2,7 @@ if build_standalone and get_option('lvfs') != 'false' 53 install_data([ 54 'lvfs-testing.conf', 55 ], 56 - - install_dir : join_paths(sysconfdir, 'fwupd', 'remotes.d') 57 - + install_dir : join_paths(sysconfdir_install, 'fwupd', 'remotes.d') 58 ) 59 con3 = configuration_data() 60 if get_option('lvfs') == 'disabled' 61 @@ -15,7 +15,7 @@ if build_standalone and get_option('lvfs') != 'false' 62 - output : 'lvfs.conf', 63 - configuration : con3, 64 install: true, 65 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 66 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), ··· 68 i18n.merge_file( 69 input: 'lvfs.metainfo.xml', 70 @@ -49,12 +49,12 @@ configure_file( 71 - output : 'vendor.conf', 72 - configuration : con2, 73 install: true, 74 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 75 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 76 ) 77 configure_file( 78 - input : 'vendor-directory.conf', 79 - output : 'vendor-directory.conf', 80 - configuration : con2, 81 install: true, 82 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 83 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 84 ) 85 diff --git a/meson.build b/meson.build 86 - index b91dd037..a8de7810 100644 87 --- a/meson.build 88 +++ b/meson.build 89 @@ -195,6 +195,12 @@ endif ··· 97 +endif 98 + 99 diffcmd = find_program('diff') 100 - gio = dependency('gio-2.0', version : '>= 2.45.8') 101 - giounix = dependency('gio-unix-2.0', version : '>= 2.45.8', required: false) 102 diff --git a/meson_options.txt b/meson_options.txt 103 - index d00038db..c84652ca 100644 104 --- a/meson_options.txt 105 +++ b/meson_options.txt 106 @@ -1,3 +1,4 @@ ··· 109 option('consolekit', type : 'feature', description : 'ConsoleKit support', deprecated: {'true': 'enabled', 'false': 'disabled'}) 110 option('static_analysis', type : 'boolean', value : false, description : 'enable GCC static analysis support') 111 diff --git a/plugins/dell-esrt/meson.build b/plugins/dell-esrt/meson.build 112 - index 00b7ecda..789f34ca 100644 113 --- a/plugins/dell-esrt/meson.build 114 +++ b/plugins/dell-esrt/meson.build 115 @@ -38,6 +38,6 @@ configure_file( 116 - output : 'dell-esrt.conf', 117 - configuration : con2, 118 install: true, 119 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 120 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 121 ) 122 endif 123 diff --git a/plugins/msr/meson.build b/plugins/msr/meson.build 124 - index 1a278375..f57ae530 100644 125 --- a/plugins/msr/meson.build 126 +++ b/plugins/msr/meson.build 127 - @@ -12,7 +12,7 @@ install_data(['fwupd-msr.conf'], 128 endif 129 130 install_data(['msr.conf'], 131 - - install_dir: join_paths(sysconfdir, 'fwupd') 132 - + install_dir: join_paths(sysconfdir_install, 'fwupd') 133 ) 134 shared_module('fu_plugin_msr', 135 fu_hash, 136 diff --git a/plugins/redfish/meson.build b/plugins/redfish/meson.build 137 - index 8717d50f..9a703723 100644 138 --- a/plugins/redfish/meson.build 139 +++ b/plugins/redfish/meson.build 140 - @@ -51,7 +51,7 @@ shared_module('fu_plugin_redfish', 141 ) 142 143 install_data(['redfish.conf'], 144 - - install_dir: join_paths(sysconfdir, 'fwupd'), 145 - + install_dir: join_paths(sysconfdir_install, 'fwupd'), 146 ) 147 148 if get_option('tests') 149 diff --git a/plugins/thunderbolt/meson.build b/plugins/thunderbolt/meson.build 150 - index aa6c8ce1..61734c4d 100644 151 --- a/plugins/thunderbolt/meson.build 152 +++ b/plugins/thunderbolt/meson.build 153 - @@ -35,7 +35,7 @@ fu_plugin_thunderbolt = shared_module('fu_plugin_thunderbolt', 154 ) 155 156 install_data(['thunderbolt.conf'], 157 - - install_dir: join_paths(sysconfdir, 'fwupd') 158 - + install_dir: join_paths(sysconfdir_install, 'fwupd') 159 ) 160 # we use functions from 2.52 in the tests 161 if get_option('tests') and run_sanitize_unsafe_tests and umockdev.found() and gio.version().version_compare('>= 2.52') 162 diff --git a/plugins/uefi-capsule/meson.build b/plugins/uefi-capsule/meson.build 163 - index 2d9ba819..0feb5f6b 100644 164 --- a/plugins/uefi-capsule/meson.build 165 +++ b/plugins/uefi-capsule/meson.build 166 - @@ -21,7 +21,7 @@ if host_machine.system() == 'linux' 167 - output : '35_fwupd', 168 - configuration : con2, 169 install: true, 170 - install_dir: join_paths(sysconfdir, 'grub.d') 171 + install_dir: join_paths(sysconfdir_install, 'grub.d') 172 ) 173 elif host_machine.system() == 'freebsd' 174 backend_srcs += 'fu-uefi-backend-freebsd.c' 175 - @@ -112,7 +112,7 @@ if get_option('compat_cli') and get_option('man') 176 endif 177 178 install_data(['uefi_capsule.conf'], 179 - - install_dir: join_paths(sysconfdir, 'fwupd') 180 - + install_dir: join_paths(sysconfdir_install, 'fwupd') 181 ) 182 183 # add all the .po files as inputs to watch
··· 1 diff --git a/data/meson.build b/data/meson.build 2 + index d8494020d..7c896fa0d 100644 3 --- a/data/meson.build 4 +++ b/data/meson.build 5 @@ -26,7 +26,7 @@ endif 6 7 if build_standalone 8 install_data(['daemon.conf'], 9 + - install_dir: join_paths(sysconfdir, 'fwupd') 10 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 11 ) 12 + plugin_quirks += join_paths(meson.current_source_dir(), 'power.quirk') 13 + plugin_quirks += join_paths(meson.current_source_dir(), 'cfi.quirk') 14 diff --git a/data/pki/meson.build b/data/pki/meson.build 15 + index 3649fecea..c3462744b 100644 16 --- a/data/pki/meson.build 17 +++ b/data/pki/meson.build 18 @@ -12,13 +12,13 @@ install_data([ 19 'GPG-KEY-Linux-Foundation-Firmware', 20 'GPG-KEY-Linux-Vendor-Firmware-Service', 21 ], 22 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd') 23 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd') 24 ) 25 install_data([ 26 'GPG-KEY-Linux-Foundation-Metadata', 27 'GPG-KEY-Linux-Vendor-Firmware-Service', 28 ], 29 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd-metadata') 30 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 31 ) 32 endif 33 ··· 35 install_data([ 36 'LVFS-CA.pem', 37 ], 38 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd') 39 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd') 40 ) 41 install_data([ 42 'LVFS-CA.pem', 43 ], 44 + - install_dir: join_paths(sysconfdir, 'pki', 'fwupd-metadata') 45 + + install_dir: join_paths(sysconfdir_install, 'pki', 'fwupd-metadata') 46 ) 47 endif 48 diff --git a/data/remotes.d/meson.build b/data/remotes.d/meson.build 49 + index 1d1698a7e..5469d00a6 100644 50 --- a/data/remotes.d/meson.build 51 +++ b/data/remotes.d/meson.build 52 @@ -2,7 +2,7 @@ if build_standalone and get_option('lvfs') != 'false' 53 install_data([ 54 'lvfs-testing.conf', 55 ], 56 + - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d') 57 + + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d') 58 ) 59 con3 = configuration_data() 60 if get_option('lvfs') == 'disabled' 61 @@ -15,7 +15,7 @@ if build_standalone and get_option('lvfs') != 'false' 62 + output: 'lvfs.conf', 63 + configuration: con3, 64 install: true, 65 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 66 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), ··· 68 i18n.merge_file( 69 input: 'lvfs.metainfo.xml', 70 @@ -49,12 +49,12 @@ configure_file( 71 + output: 'vendor.conf', 72 + configuration: con2, 73 install: true, 74 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 75 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 76 ) 77 configure_file( 78 + input: 'vendor-directory.conf', 79 + output: 'vendor-directory.conf', 80 + configuration: con2, 81 install: true, 82 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 83 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 84 ) 85 diff --git a/meson.build b/meson.build 86 + index e6b717078..f8a7a7455 100644 87 --- a/meson.build 88 +++ b/meson.build 89 @@ -195,6 +195,12 @@ endif ··· 97 +endif 98 + 99 diffcmd = find_program('diff') 100 + gio = dependency('gio-2.0', version: '>= 2.45.8') 101 + giounix = dependency('gio-unix-2.0', version: '>= 2.45.8', required: false) 102 diff --git a/meson_options.txt b/meson_options.txt 103 + index 06d242371..d9e517fc0 100644 104 --- a/meson_options.txt 105 +++ b/meson_options.txt 106 @@ -1,3 +1,4 @@ ··· 109 option('consolekit', type : 'feature', description : 'ConsoleKit support', deprecated: {'true': 'enabled', 'false': 'disabled'}) 110 option('static_analysis', type : 'boolean', value : false, description : 'enable GCC static analysis support') 111 diff --git a/plugins/dell-esrt/meson.build b/plugins/dell-esrt/meson.build 112 + index 67bd3b9d9..ad04a91b6 100644 113 --- a/plugins/dell-esrt/meson.build 114 +++ b/plugins/dell-esrt/meson.build 115 @@ -38,6 +38,6 @@ configure_file( 116 + output: 'dell-esrt.conf', 117 + configuration: con2, 118 install: true, 119 - install_dir: join_paths(sysconfdir, 'fwupd', 'remotes.d'), 120 + install_dir: join_paths(sysconfdir_install, 'fwupd', 'remotes.d'), 121 ) 122 endif 123 diff --git a/plugins/msr/meson.build b/plugins/msr/meson.build 124 + index 13f03ccd4..9235ebe33 100644 125 --- a/plugins/msr/meson.build 126 +++ b/plugins/msr/meson.build 127 + @@ -10,7 +10,7 @@ install_data(['fwupd-msr.conf'], 128 endif 129 130 install_data(['msr.conf'], 131 + - install_dir: join_paths(sysconfdir, 'fwupd') 132 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 133 ) 134 shared_module('fu_plugin_msr', 135 fu_hash, 136 diff --git a/plugins/redfish/meson.build b/plugins/redfish/meson.build 137 + index 95606e478..e5355e520 100644 138 --- a/plugins/redfish/meson.build 139 +++ b/plugins/redfish/meson.build 140 + @@ -43,7 +43,7 @@ shared_module('fu_plugin_redfish', 141 ) 142 143 install_data(['redfish.conf'], 144 + - install_dir: join_paths(sysconfdir, 'fwupd'), 145 + + install_dir: join_paths(sysconfdir_install, 'fwupd'), 146 ) 147 148 if get_option('tests') 149 diff --git a/plugins/thunderbolt/meson.build b/plugins/thunderbolt/meson.build 150 + index 5f8ffbf90..9ba323e75 100644 151 --- a/plugins/thunderbolt/meson.build 152 +++ b/plugins/thunderbolt/meson.build 153 + @@ -32,7 +32,7 @@ fu_plugin_thunderbolt = shared_module('fu_plugin_thunderbolt', 154 ) 155 156 install_data(['thunderbolt.conf'], 157 + - install_dir: join_paths(sysconfdir, 'fwupd') 158 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 159 ) 160 # we use functions from 2.52 in the tests 161 if get_option('tests') and run_sanitize_unsafe_tests and umockdev.found() and gio.version().version_compare('>= 2.52') 162 diff --git a/plugins/uefi-capsule/meson.build b/plugins/uefi-capsule/meson.build 163 + index ef38dc03e..78ff65e1d 100644 164 --- a/plugins/uefi-capsule/meson.build 165 +++ b/plugins/uefi-capsule/meson.build 166 + @@ -20,7 +20,7 @@ if host_machine.system() == 'linux' 167 + output: '35_fwupd', 168 + configuration: con2, 169 install: true, 170 - install_dir: join_paths(sysconfdir, 'grub.d') 171 + install_dir: join_paths(sysconfdir_install, 'grub.d') 172 ) 173 elif host_machine.system() == 'freebsd' 174 backend_srcs += 'fu-uefi-backend-freebsd.c' 175 + @@ -110,7 +110,7 @@ if get_option('compat_cli') and get_option('man') 176 endif 177 178 install_data(['uefi_capsule.conf'], 179 + - install_dir: join_paths(sysconfdir, 'fwupd') 180 + + install_dir: join_paths(sysconfdir_install, 'fwupd') 181 ) 182 183 # add all the .po files as inputs to watch
+21 -12
pkgs/os-specific/linux/firmware/fwupd/default.nix
··· 4 , lib 5 , fetchurl 6 , fetchFromGitHub 7 - , gtk-doc 8 , pkg-config 9 , gobject-introspection 10 , gettext ··· 17 , libarchive 18 , curl 19 , libjcat 20 - , libxslt 21 , elfutils 22 , libsmbios 23 , efivar ··· 25 , meson 26 , libuuid 27 , colord 28 - , docbook_xml_dtd_43 29 - , docbook-xsl-nons 30 , ninja 31 , gcab 32 , gnutls ··· 117 118 self = stdenv.mkDerivation rec { 119 pname = "fwupd"; 120 - version = "1.8.1"; 121 122 # libfwupd goes to lib 123 # daemon, plug-ins and libfwupdplugin go to out ··· 126 127 src = fetchurl { 128 url = "https://people.freedesktop.org/~hughsient/releases/fwupd-${version}.tar.xz"; 129 - sha256 = "sha256-V1ZGZELrkTT7QM3IpG+eAQAyR8jqyC+l2LFvZCA3W3k="; 130 }; 131 132 patches = [ ··· 152 nativeBuildInputs = [ 153 meson 154 ninja 155 - gtk-doc 156 pkg-config 157 gobject-introspection 158 gettext ··· 160 valgrind 161 gcab 162 gnutls 163 - docbook_xml_dtd_43 164 - docbook-xsl-nons 165 - libxslt 166 protobufc # for protoc 167 python 168 wrapGAppsHook ··· 201 ]; 202 203 mesonFlags = [ 204 - "-Ddocs=gtkdoc" 205 "-Dplugin_dummy=true" 206 # We are building the official releases. 207 "-Dsupported_build=enabled" ··· 216 "-Dsysconfdir_install=${placeholder "out"}/etc" 217 "-Defi_os_dir=nixos" 218 "-Dplugin_modem_manager=enabled" 219 220 # We do not want to place the daemon into lib (cyclic reference) 221 "--libexecdir=${placeholder "out"}/libexec" ··· 261 meson_post_install.sh \ 262 po/test-deps 263 264 substituteInPlace data/installed-tests/fwupdmgr-p2p.sh \ 265 --replace "gdbus" ${glib.bin}/bin/gdbus 266 ''; 267 268 preCheck = '' 269 addToSearchPath XDG_DATA_DIRS "${shared-mime-info}/share" 270 ''; ··· 298 ) 299 ''; 300 301 - # Since we had to disable wrapGAppsHook, we need to wrap the executables manually. 302 postFixup = '' 303 find -L "$out/bin" "$out/libexec" -type f -executable -print0 \ 304 | while IFS= read -r -d ''' file; do 305 if [[ "$file" != *.efi ]]; then ··· 307 wrapGApp "$file" 308 fi 309 done 310 ''; 311 312 separateDebugInfo = true;
··· 4 , lib 5 , fetchurl 6 , fetchFromGitHub 7 + , gi-docgen 8 , pkg-config 9 , gobject-introspection 10 , gettext ··· 17 , libarchive 18 , curl 19 , libjcat 20 , elfutils 21 , libsmbios 22 , efivar ··· 24 , meson 25 , libuuid 26 , colord 27 , ninja 28 , gcab 29 , gnutls ··· 114 115 self = stdenv.mkDerivation rec { 116 pname = "fwupd"; 117 + version = "1.8.3"; 118 119 # libfwupd goes to lib 120 # daemon, plug-ins and libfwupdplugin go to out ··· 123 124 src = fetchurl { 125 url = "https://people.freedesktop.org/~hughsient/releases/fwupd-${version}.tar.xz"; 126 + sha256 = "sha256-ciIpd86KhmJRH/o8CIFWb2xFjsjWHSUNlGYRfWEiOOw="; 127 }; 128 129 patches = [ ··· 149 nativeBuildInputs = [ 150 meson 151 ninja 152 + gi-docgen 153 pkg-config 154 gobject-introspection 155 gettext ··· 157 valgrind 158 gcab 159 gnutls 160 protobufc # for protoc 161 python 162 wrapGAppsHook ··· 195 ]; 196 197 mesonFlags = [ 198 + "-Ddocs=enabled" 199 "-Dplugin_dummy=true" 200 # We are building the official releases. 201 "-Dsupported_build=enabled" ··· 210 "-Dsysconfdir_install=${placeholder "out"}/etc" 211 "-Defi_os_dir=nixos" 212 "-Dplugin_modem_manager=enabled" 213 + # Requires Meson 0.63 214 + "-Dgresource_quirks=disabled" 215 216 # We do not want to place the daemon into lib (cyclic reference) 217 "--libexecdir=${placeholder "out"}/libexec" ··· 257 meson_post_install.sh \ 258 po/test-deps 259 260 + # This checks a version of a dependency of gi-docgen but gi-docgen is self-contained in Nixpkgs. 261 + echo "Clearing docs/test-deps.py" 262 + test -f docs/test-deps.py 263 + echo > docs/test-deps.py 264 + 265 substituteInPlace data/installed-tests/fwupdmgr-p2p.sh \ 266 --replace "gdbus" ${glib.bin}/bin/gdbus 267 ''; 268 269 + preBuild = '' 270 + # jcat-tool at buildtime requires a home directory 271 + export HOME="$(mktemp -d)" 272 + ''; 273 + 274 preCheck = '' 275 addToSearchPath XDG_DATA_DIRS "${shared-mime-info}/share" 276 ''; ··· 304 ) 305 ''; 306 307 postFixup = '' 308 + # Since we had to disable wrapGAppsHook, we need to wrap the executables manually. 309 find -L "$out/bin" "$out/libexec" -type f -executable -print0 \ 310 | while IFS= read -r -d ''' file; do 311 if [[ "$file" != *.efi ]]; then ··· 313 wrapGApp "$file" 314 fi 315 done 316 + 317 + # Cannot be in postInstall, otherwise _multioutDocs hook in preFixup will move right back. 318 + moveToOutput "share/doc" "$devdoc" 319 ''; 320 321 separateDebugInfo = true;
+8 -8
pkgs/os-specific/linux/firmware/fwupd/install-fwupdplugin-to-out.patch
··· 4 +++ b/libfwupdplugin/meson.build 5 @@ -220,7 +220,8 @@ fwupdplugin = library( 6 ], 7 - link_args : cc.get_supported_link_arguments([vflag]), 8 - link_depends : fwupdplugin_mapfile, 9 - - install : true 10 - + install : true, 11 - + install_dir : bindir / '..' / 'lib', 12 ) 13 14 fwupdplugin_pkgg = import('pkgconfig') ··· 16 girtargets, 17 fwupd_gir[0], 18 ], 19 - - install : true 20 - + install : true, 21 - + install_dir_typelib : bindir / '..' / 'lib' / 'girepository-1.0', 22 ) 23 24 # Verify the map file is correct -- note we can't actually use the generated
··· 4 +++ b/libfwupdplugin/meson.build 5 @@ -220,7 +220,8 @@ fwupdplugin = library( 6 ], 7 + link_args: cc.get_supported_link_arguments([vflag]), 8 + link_depends: fwupdplugin_mapfile, 9 + - install: true 10 + + install: true, 11 + + install_dir: bindir / '..' / 'lib', 12 ) 13 14 fwupdplugin_pkgg = import('pkgconfig') ··· 16 girtargets, 17 fwupd_gir[0], 18 ], 19 + - install: true 20 + + install: true, 21 + + install_dir_typelib: bindir / '..' / 'lib' / 'girepository-1.0', 22 ) 23 24 # Verify the map file is correct -- note we can't actually use the generated
+3 -5
pkgs/servers/endlessh-go/default.nix
··· 5 6 buildGoModule rec { 7 pname = "endlessh-go"; 8 - version = "20220710"; 9 10 src = fetchFromGitHub { 11 owner = "shizunge"; 12 repo = "endlessh-go"; 13 rev = version; 14 - sha256 = "sha256-T8DLzHfITMLeHJtKuK4AjEzGGCIDJUPlqF2Lj56xPxY="; 15 }; 16 17 - vendorSha256 = "sha256-hMCjYAqsI6h9B8iGVYQcNbKU5icalOHavvPKwOmvf/w="; 18 - 19 - proxyVendor = true; 20 21 ldflags = [ "-s" "-w" ]; 22
··· 5 6 buildGoModule rec { 7 pname = "endlessh-go"; 8 + version = "20220731"; 9 10 src = fetchFromGitHub { 11 owner = "shizunge"; 12 repo = "endlessh-go"; 13 rev = version; 14 + sha256 = "sha256-xV9VCbpd6JC/m3RXJt0v8WCCGs8UpZLvAv3bzPRrae4="; 15 }; 16 17 + vendorSha256 = "sha256-YGVLntDnOX55IoIHIn0z1K7V/PhRLruEASfAGQsTUkk="; 18 19 ldflags = [ "-s" "-w" ]; 20
+61
pkgs/servers/klipper/klipper-firmware.nix
···
··· 1 + { stdenv 2 + , lib 3 + , pkg-config 4 + , pkgsCross 5 + , bintools-unwrapped 6 + , libffi 7 + , libusb1 8 + , wxGTK 9 + , python2 10 + , python3 11 + , gcc-arm-embedded 12 + , klipper 13 + , avrdude 14 + , stm32flash 15 + , mcu ? "mcu" 16 + , firmwareConfig ? ./simulator.cfg 17 + }: stdenv.mkDerivation rec { 18 + name = "klipper-firmware-${mcu}-${version}"; 19 + version = klipper.version; 20 + src = klipper.src; 21 + 22 + nativeBuildInputs = [ 23 + python2 24 + python3 25 + pkgsCross.avr.stdenv.cc 26 + gcc-arm-embedded 27 + bintools-unwrapped 28 + libffi 29 + libusb1 30 + avrdude 31 + stm32flash 32 + pkg-config 33 + wxGTK # Required for bossac 34 + ]; 35 + 36 + preBuild = "cp ${firmwareConfig} ./.config"; 37 + 38 + postPatch = '' 39 + patchShebangs . 40 + ''; 41 + 42 + makeFlags = [ 43 + "V=1" 44 + "KCONFIG_CONFIG=${firmwareConfig}" 45 + ]; 46 + 47 + installPhase = '' 48 + mkdir -p $out 49 + cp ./.config $out/config 50 + cp -r out/* $out 51 + ''; 52 + 53 + dontFixup = true; 54 + 55 + meta = with lib; { 56 + inherit (klipper.meta) homepage license; 57 + description = "Firmware part of Klipper"; 58 + maintainers = with maintainers; [ vtuan10 ]; 59 + platforms = platforms.linux; 60 + }; 61 + }
+38
pkgs/servers/klipper/klipper-flash.nix
···
··· 1 + { lib 2 + , writeShellApplication 3 + , gnumake 4 + , pkgsCross 5 + , klipper 6 + , klipper-firmware 7 + , python2 8 + , avrdude 9 + , stm32flash 10 + , mcu ? "mcu" 11 + , flashDevice ? "/dev/null" 12 + , firmwareConfig ? ./simulator.cfg 13 + }: 14 + let 15 + supportedArches = [ "avr" "stm32" "lpc176x" ]; 16 + matchBoard = with builtins; match ''^.*CONFIG_BOARD_DIRECTORY="([a-zA-Z0-9_]+)".*$'' (readFile firmwareConfig); 17 + boardArch = if matchBoard == null then null else builtins.head matchBoard; 18 + in 19 + writeShellApplication { 20 + name = "klipper-flash-${mcu}"; 21 + runtimeInputs = [ 22 + python2 23 + pkgsCross.avr.stdenv.cc 24 + gnumake 25 + ] ++ lib.optionals (boardArch == "avr") [ avrdude ] ++ lib.optionals (boardArch == "stm32") [ stm32flash ]; 26 + text = '' 27 + if ${lib.boolToString (!builtins.elem boardArch supportedArches)}; then 28 + printf "Flashing Klipper firmware to your board is not supported yet.\n" 29 + printf "Please use the compiled firmware at ${klipper-firmware} and flash it using the tools provided for your microcontroller." 30 + exit 1 31 + fi 32 + if ${lib.boolToString (boardArch == "stm32")}; then 33 + make -C ${klipper.src} FLASH_DEVICE="${toString flashDevice}" OUT="${klipper-firmware}/" KCONFIG_CONFIG="${klipper-firmware}/config" serialflash 34 + else 35 + make -C ${klipper.src} FLASH_DEVICE="${toString flashDevice}" OUT="${klipper-firmware}/" KCONFIG_CONFIG="${klipper-firmware}/config" flash 36 + fi 37 + ''; 38 + }
+21
pkgs/servers/klipper/klipper-genconf.nix
···
··· 1 + { writeShellApplication 2 + , klipper 3 + , python2 4 + , gnumake 5 + , pkgsCross 6 + }: writeShellApplication { 7 + name = "klipper-genconf"; 8 + runtimeInputs = [ 9 + python2 10 + pkgsCross.avr.stdenv.cc 11 + gnumake 12 + ]; 13 + text = '' 14 + CURRENT_DIR=$(pwd) 15 + TMP=$(mktemp -d) 16 + make -C ${klipper.src} OUT="$TMP" KCONFIG_CONFIG="$CURRENT_DIR/config" menuconfig 17 + rm -rf "$TMP" config.old 18 + printf "\nYour firmware configuration for klipper:\n\n" 19 + cat config 20 + ''; 21 + }
+23
pkgs/servers/klipper/simulator.cfg
···
··· 1 + # CONFIG_LOW_LEVEL_OPTIONS is not set 2 + # CONFIG_MACH_AVR is not set 3 + # CONFIG_MACH_ATSAM is not set 4 + # CONFIG_MACH_ATSAMD is not set 5 + # CONFIG_MACH_LPC176X is not set 6 + # CONFIG_MACH_STM32 is not set 7 + # CONFIG_MACH_RP2040 is not set 8 + # CONFIG_MACH_PRU is not set 9 + # CONFIG_MACH_LINUX is not set 10 + CONFIG_MACH_SIMU=y 11 + CONFIG_BOARD_DIRECTORY="simulator" 12 + CONFIG_CLOCK_FREQ=20000000 13 + CONFIG_SERIAL=y 14 + CONFIG_SIMULATOR_SELECT=y 15 + CONFIG_SERIAL_BAUD=250000 16 + CONFIG_USB_VENDOR_ID=0x1d50 17 + CONFIG_USB_DEVICE_ID=0x614e 18 + CONFIG_USB_SERIAL_NUMBER="12345" 19 + CONFIG_HAVE_GPIO=y 20 + CONFIG_HAVE_GPIO_ADC=y 21 + CONFIG_HAVE_GPIO_SPI=y 22 + CONFIG_HAVE_GPIO_HARD_PWM=y 23 + CONFIG_INLINE_STEPPER_HACK=y
+2 -2
pkgs/servers/monitoring/net-snmp/default.nix
··· 10 11 in stdenv.mkDerivation rec { 12 pname = "net-snmp"; 13 - version = "5.9.1"; 14 15 src = fetchurl { 16 url = "mirror://sourceforge/net-snmp/${pname}-${version}.tar.gz"; 17 - sha256 = "sha256-63/UpE3mzdv/2akqha0TCeXBBU+51afdkweciVP0jD8="; 18 }; 19 20 patches =
··· 10 11 in stdenv.mkDerivation rec { 12 pname = "net-snmp"; 13 + version = "5.9.3"; 14 15 src = fetchurl { 16 url = "mirror://sourceforge/net-snmp/${pname}-${version}.tar.gz"; 17 + sha256 = "sha256-IJfym34b8/EwC0uuUvojCNC7jV05mNvgL5RipBOi7wo="; 18 }; 19 20 patches =
+47
pkgs/tools/admin/copilot-cli/default.nix
···
··· 1 + { lib, buildGoModule, fetchFromGitHub, installShellFiles, testers, copilot-cli }: 2 + 3 + buildGoModule rec { 4 + pname = "copilot-cli"; 5 + version = "1.19.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "aws"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "sha256-2zF/cBc6TjAcFAI3zJ0yBQrVWDK5nkxYYkb04bjSjgY="; 12 + }; 13 + 14 + vendorSha256 = "sha256-1UFahXol1Lceccr/f24Mbhtk8bWyh4+Mb5VYZvF6VWs="; 15 + 16 + nativeBuildInputs = [ installShellFiles ]; 17 + 18 + # follow LINKER_FLAGS in Makefile 19 + ldflags = [ 20 + "-s" 21 + "-w" 22 + "-X github.com/aws/copilot-cli/internal/pkg/version.Version=${version}" 23 + "-X github.com/aws/copilot-cli/internal/pkg/cli.binaryS3BucketPath=https://ecs-cli-v2-release.s3.amazonaws.com" 24 + ]; 25 + 26 + subPackages = [ "./cmd/copilot" ]; 27 + 28 + postInstall = '' 29 + installShellCompletion --cmd copilot \ 30 + --bash <($out/bin/copilot completion bash) \ 31 + --fish <($out/bin/copilot completion fish) \ 32 + --zsh <($out/bin/copilot completion zsh) 33 + ''; 34 + 35 + passthru.tests.version = testers.testVersion { 36 + package = copilot-cli; 37 + command = "copilot version"; 38 + }; 39 + 40 + meta = with lib; { 41 + description = "Build, Release and Operate Containerized Applications on AWS."; 42 + homepage = "https://github.com/aws/copilot-cli"; 43 + changelog = "https://github.com/aws/copilot-cli/releases/tag/v${version}"; 44 + license = licenses.asl20; 45 + maintainers = with maintainers; [ jiegec ]; 46 + }; 47 + }
+3 -3
pkgs/tools/admin/wander/default.nix
··· 2 3 buildGoModule rec { 4 pname = "wander"; 5 - version = "0.5.1"; 6 7 src = fetchFromGitHub { 8 owner = "robinovitch61"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-B+mMC5XGUTNTcxwKhvSSc7QbsLkg8qu7/jJf5U/q6s8="; 12 }; 13 14 - vendorSha256 = "sha256-gWQ8GbtghhCRq6tOU6qmWBuponmfUkUDAk3+dPtmMiE="; 15 16 meta = with lib; { 17 description = "Terminal app/TUI for HashiCorp Nomad";
··· 2 3 buildGoModule rec { 4 pname = "wander"; 5 + version = "0.7.0"; 6 7 src = fetchFromGitHub { 8 owner = "robinovitch61"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-aQqJDUDYHoUZ6ixnY3lmFOx29QpRRke5XHFIpsA+Bnw="; 12 }; 13 14 + vendorSha256 = "sha256-T+URnRLumXFz48go9TN0Wha99T03OWGfDK7cQ+zKeRI="; 15 16 meta = with lib; { 17 description = "Terminal app/TUI for HashiCorp Nomad";
+23 -11
pkgs/tools/audio/volumeicon/default.nix
··· 1 - { pkgs, fetchurl, lib, stdenv, gtk3, pkg-config, intltool, alsa-lib }: 2 3 - stdenv.mkDerivation { 4 pname = "volumeicon"; 5 version = "0.5.1"; 6 7 - src = fetchurl { 8 - url = "http://softwarebakery.com/maato/files/volumeicon/volumeicon-0.5.1.tar.gz"; 9 - sha256 = "182xl2w8syv6ky2h2bc9imc6ap8pzh0p7rp63hh8nw0xm38c3f14"; 10 }; 11 12 - nativeBuildInputs = [ pkg-config ]; 13 - buildInputs = [ gtk3 intltool alsa-lib ]; 14 15 meta = with lib; { 16 description = "A lightweight volume control that sits in your systray"; 17 - homepage = "http://softwarebakery.com/maato/volumeicon.html"; 18 - platforms = pkgs.lib.platforms.linux; 19 maintainers = with maintainers; [ bobvanderlinden ]; 20 - license = pkgs.lib.licenses.gpl3; 21 }; 22 - 23 } 24
··· 1 + { fetchFromGitHub, lib, stdenv 2 + , autoreconfHook, intltool, pkg-config 3 + , gtk3, alsa-lib 4 + }: 5 6 + stdenv.mkDerivation rec { 7 pname = "volumeicon"; 8 version = "0.5.1"; 9 10 + src = fetchFromGitHub { 11 + owner = "Maato"; 12 + repo = "volumeicon"; 13 + rev = version; 14 + hash = "sha256-zYKC7rOoLf08rV4B43TrGNBcXfSBFxWZCe9bQD9JzaA"; 15 }; 16 17 + nativeBuildInputs = [ 18 + autoreconfHook 19 + intltool 20 + pkg-config 21 + ]; 22 + 23 + buildInputs = [ 24 + gtk3 25 + alsa-lib 26 + ]; 27 28 meta = with lib; { 29 description = "A lightweight volume control that sits in your systray"; 30 + homepage = "http://nullwise.com/volumeicon.html"; 31 + platforms = platforms.linux; 32 maintainers = with maintainers; [ bobvanderlinden ]; 33 + license = licenses.gpl3; 34 }; 35 } 36
+3 -3
pkgs/tools/security/httpx/default.nix
··· 5 6 buildGoModule rec { 7 pname = "httpx"; 8 - version = "1.2.3"; 9 10 src = fetchFromGitHub { 11 owner = "projectdiscovery"; 12 repo = "httpx"; 13 rev = "v${version}"; 14 - sha256 = "sha256-gBt1xllfzw8M+n+vgUmOQ3vgDxDuDaQ7YXfWdLWnpVk="; 15 }; 16 17 - vendorSha256 = "sha256-9ZwRbeZ1iSuJiIJDBauU1U9PpGn8QQPTd3MfrnSmF+w="; 18 19 meta = with lib; { 20 description = "Fast and multi-purpose HTTP toolkit";
··· 5 6 buildGoModule rec { 7 pname = "httpx"; 8 + version = "1.2.4"; 9 10 src = fetchFromGitHub { 11 owner = "projectdiscovery"; 12 repo = "httpx"; 13 rev = "v${version}"; 14 + sha256 = "sha256-w4VELxmahqjfiMGXflSnhp5NKPi3HUucjxEUegljbVY="; 15 }; 16 17 + vendorSha256 = "sha256-9zLZyXrLvxwwkTwtpKxdGftzCZISZ/al98VnPiaMqGA="; 18 19 meta = with lib; { 20 description = "Fast and multi-purpose HTTP toolkit";
+2 -2
pkgs/tools/virtualization/linode-cli/default.nix
··· 11 }: 12 13 let 14 - sha256 = "1yglnmwspdncqmy5x0zc0g43bfm4597zfmwfvs7qkalv1pprf0s3"; 15 # specVersion taken from: https://www.linode.com/docs/api/openapi.yaml at `info.version`. 16 specVersion = "4.132.0"; 17 specSha256 = "0r0l23bvaj406xam7hglfx637cxja3g2vqdqx3x0ag7jfhg0s3k5"; ··· 24 25 buildPythonApplication rec { 26 pname = "linode-cli"; 27 - version = "5.21.0"; 28 29 src = fetchFromGitHub { 30 owner = "linode";
··· 11 }: 12 13 let 14 + sha256 = "1fv53wikx745kci86xrsq9kfsgv0a65srhywdw32cab1wywwpn2z"; 15 # specVersion taken from: https://www.linode.com/docs/api/openapi.yaml at `info.version`. 16 specVersion = "4.132.0"; 17 specSha256 = "0r0l23bvaj406xam7hglfx637cxja3g2vqdqx3x0ag7jfhg0s3k5"; ··· 24 25 buildPythonApplication rec { 26 pname = "linode-cli"; 27 + version = "5.22.0"; 28 29 src = fetchFromGitHub { 30 owner = "linode";
+5
pkgs/top-level/aliases.nix
··· 408 facette = throw "facette has been removed"; # Added 2020-01-06 409 fast-neural-doodle = throw "fast-neural-doodle has been removed, as the upstream project has been abandoned"; # Added 2020-03-28 410 fastnlo = fastnlo_toolkit; # Added 2021-04-24 411 fedora-coreos-config-transpiler = throw "fedora-coreos-config-transpiler has been renamed to 'butane'"; # Added 2021-04-13 412 feedreader = throw "feedreader is no longer activily maintained since 2019. The developer is working on a spiritual successor called NewsFlash."; # Added 2022-05-03 413 fetchFromGithub = throw "You meant fetchFromGitHub, with a capital H"; ··· 1523 ''; 1524 xf86_input_multitouch = throw "xf86_input_multitouch has been removed from nixpkgs"; # Added 2020-01-20 1525 xlibs = throw "'xlibs' has been renamed to/replaced by 'xorg'"; # Converted to throw 2022-02-22 1526 xpraGtk3 = throw "'xpraGtk3' has been renamed to/replaced by 'xpra'"; # Converted to throw 2022-02-22 1527 xv = xxv; # Added 2020-02-22 1528 xvfb_run = xvfb-run; # Added 2021-05-07
··· 408 facette = throw "facette has been removed"; # Added 2020-01-06 409 fast-neural-doodle = throw "fast-neural-doodle has been removed, as the upstream project has been abandoned"; # Added 2020-03-28 410 fastnlo = fastnlo_toolkit; # Added 2021-04-24 411 + fbreader = throw "fbreader has been removed, as the upstream project has been archived"; # Added 2022-05-26 412 fedora-coreos-config-transpiler = throw "fedora-coreos-config-transpiler has been renamed to 'butane'"; # Added 2021-04-13 413 feedreader = throw "feedreader is no longer activily maintained since 2019. The developer is working on a spiritual successor called NewsFlash."; # Added 2022-05-03 414 fetchFromGithub = throw "You meant fetchFromGitHub, with a capital H"; ··· 1524 ''; 1525 xf86_input_multitouch = throw "xf86_input_multitouch has been removed from nixpkgs"; # Added 2020-01-20 1526 xlibs = throw "'xlibs' has been renamed to/replaced by 'xorg'"; # Converted to throw 2022-02-22 1527 + xow = throw ( 1528 + "Upstream has ended support for 'xow' and the package has been removed" + 1529 + "from nixpkgs. Users are urged to switch to 'xone'." 1530 + ); # Added 2022-08-02 1531 xpraGtk3 = throw "'xpraGtk3' has been renamed to/replaced by 'xpra'"; # Converted to throw 2022-02-22 1532 xv = xxv; # Added 2020-02-22 1533 xvfb_run = xvfb-run; # Added 2021-05-07
+13 -7
pkgs/top-level/all-packages.nix
··· 386 387 coordgenlibs = callPackage ../development/libraries/coordgenlibs { }; 388 389 cp437 = callPackage ../tools/misc/cp437 { }; 390 391 cpm = callPackage ../development/tools/cpm { }; ··· 4043 klaus = with python3Packages; toPythonApplication klaus; 4044 4045 klipper = callPackage ../servers/klipper { }; 4046 4047 klog = qt5.callPackage ../applications/radio/klog { }; 4048 ··· 10499 10500 secp256k1 = callPackage ../tools/security/secp256k1 { }; 10501 10502 - securefs = callPackage ../tools/filesystems/securefs { }; 10503 10504 seehecht = callPackage ../tools/text/seehecht { }; 10505 ··· 17005 aravis = callPackage ../development/libraries/aravis { }; 17006 17007 arb = callPackage ../development/libraries/arb {}; 17008 17009 argp-standalone = callPackage ../development/libraries/argp-standalone {}; 17010 ··· 26827 26828 fbpanel = callPackage ../applications/window-managers/fbpanel { }; 26829 26830 - fbreader = callPackage ../applications/misc/fbreader { 26831 - inherit (darwin.apple_sdk.frameworks) AppKit Cocoa; 26832 - }; 26833 - 26834 fdr = libsForQt5.callPackage ../applications/science/programming/fdr { }; 26835 26836 feedbackd = callPackage ../applications/misc/feedbackd { }; ··· 35760 xortool = python3Packages.callPackage ../tools/security/xortool { }; 35761 35762 xorex = callPackage ../tools/security/xorex { }; 35763 - 35764 - xow = callPackage ../misc/drivers/xow { }; 35765 35766 xbps = callPackage ../tools/package-management/xbps { }; 35767
··· 386 387 coordgenlibs = callPackage ../development/libraries/coordgenlibs { }; 388 389 + copilot-cli = callPackage ../tools/admin/copilot-cli { }; 390 + 391 cp437 = callPackage ../tools/misc/cp437 { }; 392 393 cpm = callPackage ../development/tools/cpm { }; ··· 4045 klaus = with python3Packages; toPythonApplication klaus; 4046 4047 klipper = callPackage ../servers/klipper { }; 4048 + 4049 + klipper-firmware = callPackage ../servers/klipper/klipper-firmware.nix { }; 4050 + 4051 + klipper-flash = callPackage ../servers/klipper/klipper-flash.nix { }; 4052 + 4053 + klipper-genconf = callPackage ../servers/klipper/klipper-genconf.nix { }; 4054 4055 klog = qt5.callPackage ../applications/radio/klog { }; 4056 ··· 10507 10508 secp256k1 = callPackage ../tools/security/secp256k1 { }; 10509 10510 + securefs = callPackage ../tools/filesystems/securefs { 10511 + stdenv = clangStdenv; 10512 + }; 10513 10514 seehecht = callPackage ../tools/text/seehecht { }; 10515 ··· 17015 aravis = callPackage ../development/libraries/aravis { }; 17016 17017 arb = callPackage ../development/libraries/arb {}; 17018 + 17019 + argparse = callPackage ../development/libraries/argparse { }; 17020 17021 argp-standalone = callPackage ../development/libraries/argp-standalone {}; 17022 ··· 26839 26840 fbpanel = callPackage ../applications/window-managers/fbpanel { }; 26841 26842 fdr = libsForQt5.callPackage ../applications/science/programming/fdr { }; 26843 26844 feedbackd = callPackage ../applications/misc/feedbackd { }; ··· 35768 xortool = python3Packages.callPackage ../tools/security/xortool { }; 35769 35770 xorex = callPackage ../tools/security/xorex { }; 35771 35772 xbps = callPackage ../tools/package-management/xbps { }; 35773
+4
pkgs/top-level/python-packages.nix
··· 171 172 adafruit-io = callPackage ../development/python-modules/adafruit-io { }; 173 174 adafruit-platformdetect = callPackage ../development/python-modules/adafruit-platformdetect { }; 175 176 adafruit-pureio = callPackage ../development/python-modules/adafruit-pureio { }; ··· 10768 transmission-rpc = callPackage ../development/python-modules/transmission-rpc { }; 10769 10770 transmissionrpc = callPackage ../development/python-modules/transmissionrpc { }; 10771 10772 treelog = callPackage ../development/python-modules/treelog { }; 10773
··· 171 172 adafruit-io = callPackage ../development/python-modules/adafruit-io { }; 173 174 + adafruit-nrfutil = callPackage ../development/python-modules/adafruit-nrfutil { }; 175 + 176 adafruit-platformdetect = callPackage ../development/python-modules/adafruit-platformdetect { }; 177 178 adafruit-pureio = callPackage ../development/python-modules/adafruit-pureio { }; ··· 10770 transmission-rpc = callPackage ../development/python-modules/transmission-rpc { }; 10771 10772 transmissionrpc = callPackage ../development/python-modules/transmissionrpc { }; 10773 + 10774 + trectools = callPackage ../development/python-modules/trectools { }; 10775 10776 treelog = callPackage ../development/python-modules/treelog { }; 10777