···15The following example shows a Nim program that depends only on Nim libraries:
1617```nix
18-{ lib, nimPackages, fetchurl }:
19-20-nimPackages.buildNimPackage rec {
21- pname = "hottext";
22- version = "1.4";
2300024 nimBinOnly = true;
2526- src = fetchurl {
27- url = "https://git.sr.ht/~ehmry/hottext/archive/v${version}.tar.gz";
28- hash = "sha256-hIUofi81zowSMbt1lUsxCnVzfJGN3FEiTtN8CEFpwzY=";
0029 };
3031- buildInputs = with nimPackages; [
32- bumpy
33- chroma
34- flatty
35- nimsimd
36- pixie
37- sdl2
38- typography
39- vmath
40- zippy
41- ];
42-}
43044```
4546## Nim library packages in Nixpkgs {#nim-library-packages-in-nixpkgs}
···60```nix
61{ lib, buildNimPackage, fetchNimble, SDL2 }:
6263-buildNimPackage rec {
64 pname = "sdl2";
65 version = "2.0.4";
66 src = fetchNimble {
67- inherit pname version;
68- hash = "sha256-qDtVSnf+7rTq36WAxgsUZ8XoUk4sKwHyt8EJcY5WP+o=";
69 };
70 propagatedBuildInputs = [ SDL2 ];
71-}
072```
7374## `buildNimPackage` parameters {#buildnimpackage-parameters}
···15The following example shows a Nim program that depends only on Nim libraries:
1617```nix
18+{ lib, nimPackages, fetchFromGitHub }:
00001920+nimPackages.buildNimPackage (finalAttrs: {
21+ pname = "ttop";
22+ version = "1.0.1";
23 nimBinOnly = true;
2425+ src = fetchFromGitHub {
26+ owner = "inv2004";
27+ repo = "ttop";
28+ rev = "v${finalAttrs.version}";
29+ hash = "sha256-x4Uczksh6p3XX/IMrOFtBxIleVHdAPX9e8n32VAUTC4=";
30 };
3132+ buildInputs = with nimPackages; [ asciigraph illwill parsetoml zippy ];
000000000003334+})
35```
3637## Nim library packages in Nixpkgs {#nim-library-packages-in-nixpkgs}
···51```nix
52{ lib, buildNimPackage, fetchNimble, SDL2 }:
5354+buildNimPackage (finalAttrs: {
55 pname = "sdl2";
56 version = "2.0.4";
57 src = fetchNimble {
58+ inherit (finalAttrs) pname version;
59+ hash = "sha256-Vtcj8goI4zZPQs2TbFoBFlcR5UqDtOldaXSH/+/xULk=";
60 };
61 propagatedBuildInputs = [ SDL2 ];
62+ doCheck = true;
63+})
64```
6566## `buildNimPackage` parameters {#buildnimpackage-parameters}
+1-1
nixos/doc/manual/release-notes/rl-2305.section.md
···553554- `buildDunePackage` now defaults to `strictDeps = true` which means that any library should go into `buildInputs` or `checkInputs`. Any executable that is run on the building machine should go into `nativeBuildInputs` or `nativeCheckInputs` respectively. Example of executables are `ocaml`, `findlib` and `menhir`. PPXs are libraries which are built by dune and should therefore not go into `nativeBuildInputs`.
555556-- `buildFHSUserEnv` is now called `buildFHSEnv` and uses FlatPak's Bubblewrap sandboxing tool rather than Nixpkgs' own chrootenv. The old chrootenv-based implemenation is still available via `buildFHSEnvChrootenv` but is considered deprecated and will be removed when the remaining uses inside Nixpkgs have been migrated. If your FHSEnv-wrapped application misbehaves when using the new bubblewrap implementation, please create an issue in Nixpkgs.
557558- Top-level `buildPlatform`, `hostPlatform`, `targetPlatform` have been deprecated, use `stdenv.X` instead.
559
···553554- `buildDunePackage` now defaults to `strictDeps = true` which means that any library should go into `buildInputs` or `checkInputs`. Any executable that is run on the building machine should go into `nativeBuildInputs` or `nativeCheckInputs` respectively. Example of executables are `ocaml`, `findlib` and `menhir`. PPXs are libraries which are built by dune and should therefore not go into `nativeBuildInputs`.
555556+- `buildFHSUserEnv` is now called `buildFHSEnv` and uses FlatPak's Bubblewrap sandboxing tool rather than Nixpkgs' own chrootenv. The old chrootenv-based implemenation is still available via `buildFHSEnvChroot` but is considered deprecated and will be removed when the remaining uses inside Nixpkgs have been migrated. If your FHSEnv-wrapped application misbehaves when using the new bubblewrap implementation, please create an issue in Nixpkgs.
557558- Top-level `buildPlatform`, `hostPlatform`, `targetPlatform` have been deprecated, use `stdenv.X` instead.
559
+2-1
nixos/modules/services/web-apps/nextcloud.nix
···381 type = types.str;
382 description = lib.mdDoc ''
383 The full path to a file that contains the admin's password. Must be
384- readable by user `nextcloud`.
0385 '';
386 };
387
···381 type = types.str;
382 description = lib.mdDoc ''
383 The full path to a file that contains the admin's password. Must be
384+ readable by user `nextcloud`. The password is set only in the initial
385+ setup of nextcloud by the systemd `nextcloud-setup.service`.
386 '';
387 };
388
+2-2
pkgs/applications/audio/ardour/default.nix
···58}:
59stdenv.mkDerivation rec {
60 pname = "ardour";
61- version = "7.3";
6263 # We can't use `fetchFromGitea` here, as attempting to fetch release archives from git.ardour.org
64 # result in an empty archive. See https://tracker.ardour.org/view.php?id=7328 for more info.
65 src = fetchgit {
66 url = "git://git.ardour.org/ardour/ardour.git";
67 rev = version;
68- hash = "sha256-fDZGmKQ6qgENkq8NY/J67Jym+IXoOYs8DT4xyPXLcC4=";
69 };
7071 bundledContent = fetchzip {
···58}:
59stdenv.mkDerivation rec {
60 pname = "ardour";
61+ version = "7.4";
6263 # We can't use `fetchFromGitea` here, as attempting to fetch release archives from git.ardour.org
64 # result in an empty archive. See https://tracker.ardour.org/view.php?id=7328 for more info.
65 src = fetchgit {
66 url = "git://git.ardour.org/ardour/ardour.git";
67 rev = version;
68+ hash = "sha256-CUGhJi3ji0F6v41Y08sQvo7oKITOJ96ojdJL+FyCxmw=";
69 };
7071 bundledContent = fetchzip {