lol

Merge remote-tracking branch 'origin/master' into staging-next

K900 c8c30c91 7b9832a7

+1238 -580
+3 -2
maintainers/scripts/bootstrap-files/refresh-tarballs.bash
··· 97 97 riscv64-unknown-linux-gnu 98 98 s390x-unknown-linux-gnu 99 99 x86_64-unknown-freebsd 100 + loongarch64-unknown-linux-gnu 100 101 ) 101 102 102 103 is_cross() { ··· 264 265 265 266 # individual file entries 266 267 cat <<EOF 267 - $attr = import <nix/fetchurl.nix> { 268 + $attr = import <nix/fetchurl.nix> { 268 269 url = "http://tarballs.nixos.org/${s3_prefix}/${nixpkgs_revision}/$fname"; 269 270 hash = "${sri}";$( 270 271 [[ -n ${executable_nix} ]] && printf "\n %s" "${executable_nix}" 271 272 [[ -n ${name_nix} ]] && printf "\n %s" "${name_nix}" 272 273 [[ -n ${unpack_nix} ]] && printf "\n %s" "${unpack_nix}" 273 274 ) 274 - }; 275 + }; 275 276 EOF 276 277 done 277 278 # footer
+8 -1
nixos/doc/manual/release-notes/rl-2505.section.md
··· 4 4 5 5 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 6 6 7 - - Initial support for the [COSMIC DE](https://system76.com/cosmic), a Rust-based desktop environment by System76, makers of Pop!_OS. Toggle the greeter (login manager) using `services.displayManager.cosmic-greeter.enable` and the DE itself with `services.desktopManager.cosmic.enable`. Mostly stable but still experimental. Please report any issues to the [COSMIC DE tracker in Nixpkgs](https://github.com/NixOS/nixpkgs/issues/259641) instead of upstream. 7 + - NixOS now has initial support for the [**COSMIC DE**](https://system76.com/cosmic) which is currently at **Alpha 7**. COSMIC is a Rust-based Desktop Environment by System76, makers of Pop!_OS. Enable COSMIC by enabling the greeter (login manager) `services.displayManager.cosmic-greeter.enable` and the DE itself by enabling `services.desktopManager.cosmic.enable` options. The support in NixOS/nixpkgs is stable but still considered experimental because of the recent the addition. The COSMIC maintainers will be waiting for one more release of NixOS to determine if the experimental tag should be removed or not. Until then, please report any issues to the [COSMIC DE tracker in Nixpkgs](https://github.com/NixOS/nixpkgs/issues/259641) instead of upstream. 8 8 9 9 - `services.dex` now restarts upon changes to the `.environmentFile` or entries in `.settings.staticClients[].secretFile` when the entry is a `path` type. 10 10 ··· 163 163 - [GlitchTip](https://glitchtip.com/), an open source Sentry API compatible error tracking platform. Available as [services.glitchtip](#opt-services.glitchtip.enable). 164 164 165 165 - [`yarr`](https://github.com/nkanaev/yarr), a small, web-based feed aggregator and RSS reader. Available as [services.yarr](#opt-services.yarr.enable). 166 + 167 + - [OliveTin](https://www.olivetin.app/), gives safe and simple access to predefined shell commands from a web interface. Available as [services.olivetin](#opt-services.olivetin.enable). 166 168 167 169 - [Stash](https://github.com/stashapp/stash), An organizer for your adult videos/images, written in Go. Available as [services.stash](#opt-services.stash.enable). 168 170 ··· 576 578 To get the necessary hash of the vendored dependencies, omit `hash`. The build will fail and tell you the correct value. 577 579 578 580 Note that all provided plugins must have versions/tags (string after `@`), even if upstream repo does not tag each release. For untagged plugins, you can either create an empty Go project and run `go get <plugin>` and see changes in `go.mod` to get the pseudo-version number, or provide a commit hash in place of version/tag for the first run, and update the plugin string based on the error output. 581 + 582 + - `buildGoModule` now supports a self-referencing `finalAttrs:` parameter 583 + containing the final arguments including overrides. 584 + This allows packaging configuration to be overridden in a consistent manner by 585 + providing an alternative to `rec {}` syntax. 579 586 580 587 - KDE Partition Manager `partitionmanager`'s support for ReiserFS is removed. 581 588 ReiserFS has not been actively maintained for many years. It has been marked as obsolete since Linux 6.6, and
+1
nixos/modules/module-list.nix
··· 1604 1604 ./services/web-apps/mediagoblin.nix 1605 1605 ./services/web-apps/open-web-calendar.nix 1606 1606 ./services/web-apps/mobilizon.nix 1607 + ./services/web-apps/olivetin.nix 1607 1608 ./services/web-apps/openwebrx.nix 1608 1609 ./services/web-apps/outline.nix 1609 1610 ./services/web-apps/pds.nix
+152
nixos/modules/services/web-apps/olivetin.nix
··· 1 + { 2 + config, 3 + pkgs, 4 + lib, 5 + ... 6 + }: 7 + 8 + let 9 + cfg = config.services.olivetin; 10 + 11 + settingsFormat = pkgs.formats.yaml { }; 12 + in 13 + 14 + { 15 + meta.maintainers = with lib.maintainers; [ defelo ]; 16 + 17 + options.services.olivetin = { 18 + enable = lib.mkEnableOption "OliveTin"; 19 + 20 + package = lib.mkPackageOption pkgs "olivetin" { }; 21 + 22 + user = lib.mkOption { 23 + type = lib.types.str; 24 + description = "The user account under which OliveTin runs."; 25 + default = "olivetin"; 26 + }; 27 + 28 + group = lib.mkOption { 29 + type = lib.types.str; 30 + description = "The group under which OliveTin runs."; 31 + default = "olivetin"; 32 + }; 33 + 34 + path = lib.mkOption { 35 + type = 36 + with lib.types; 37 + listOf (oneOf [ 38 + package 39 + str 40 + ]); 41 + description = '' 42 + Packages added to the service's {env}`PATH`. 43 + ''; 44 + defaultText = lib.literalExpression '' 45 + with pkgs; [ bash ] 46 + ''; 47 + }; 48 + 49 + settings = lib.mkOption { 50 + description = '' 51 + Configuration of OliveTin. See <https://docs.olivetin.app/config.html> for more information. 52 + ''; 53 + default = { }; 54 + 55 + type = lib.types.submodule { 56 + freeformType = settingsFormat.type; 57 + 58 + options = { 59 + ListenAddressSingleHTTPFrontend = lib.mkOption { 60 + type = lib.types.str; 61 + description = '' 62 + The address to listen on for the internal "microproxy" frontend. 63 + ''; 64 + default = "127.0.0.1:8000"; 65 + example = "0.0.0.0:8000"; 66 + }; 67 + }; 68 + }; 69 + }; 70 + 71 + extraConfigFiles = lib.mkOption { 72 + type = lib.types.listOf lib.types.path; 73 + default = [ ]; 74 + example = [ "/run/secrets/olivetin.yaml" ]; 75 + description = '' 76 + Config files to merge into the settings defined in [](#opt-services.olivetin.settings). 77 + This is useful to avoid putting secrets into the nix store. 78 + See <https://docs.olivetin.app/config.html> for more information. 79 + ''; 80 + }; 81 + }; 82 + 83 + config = lib.mkIf cfg.enable { 84 + services.olivetin = { 85 + path = with pkgs; [ bash ]; 86 + }; 87 + 88 + systemd.services.olivetin = { 89 + description = "OliveTin"; 90 + 91 + wantedBy = [ "multi-user.target" ]; 92 + 93 + wants = [ 94 + "network-online.target" 95 + "local-fs.target" 96 + ]; 97 + after = [ 98 + "network-online.target" 99 + "local-fs.target" 100 + ]; 101 + 102 + inherit (cfg) path; 103 + 104 + preStart = '' 105 + tmp="$(mktemp -d)" 106 + trap 'rm -rf "$tmp"' EXIT 107 + cd "$tmp" 108 + 109 + cp ${settingsFormat.generate "olivetin-config.yaml" cfg.settings} config.yaml 110 + chmod +w config.yaml 111 + for ((i=0; i < ${toString (lib.length cfg.extraConfigFiles)}; i++)); do 112 + ${lib.getExe pkgs.yq} -yi ' 113 + def merge($y): 114 + . as $x | 115 + if ($x | type == "object") and ($y | type == "object") then 116 + $x + $y + with_entries(select(.key | in($y)) | .key as $key | .value |= merge($y[$key])) 117 + elif ($x | type == "array") and ($y | type == "array") then 118 + $x + $y 119 + else 120 + $y 121 + end; 122 + merge($f | fromjson) 123 + ' config.yaml --rawfile f <(${lib.getExe pkgs.yq} -c . "$CREDENTIALS_DIRECTORY/config-$i.yaml") 124 + done 125 + chmod -w config.yaml 126 + 127 + mkdir -p /run/olivetin/config 128 + mv config.yaml /run/olivetin/config/config.yaml 129 + ''; 130 + 131 + serviceConfig = { 132 + User = cfg.user; 133 + Group = cfg.group; 134 + RuntimeDirectory = "olivetin"; 135 + Restart = "always"; 136 + 137 + LoadCredential = lib.imap0 (i: path: "config-${toString i}.yaml:${path}") cfg.extraConfigFiles; 138 + 139 + ExecStart = "${lib.getExe cfg.package} -configdir /run/olivetin/config"; 140 + }; 141 + }; 142 + 143 + users.users = lib.mkIf (cfg.user == "olivetin") { 144 + olivetin = { 145 + group = cfg.group; 146 + isSystemUser = true; 147 + }; 148 + }; 149 + 150 + users.groups = lib.mkIf (cfg.group == "olivetin") { olivetin = { }; }; 151 + }; 152 + }
+1
nixos/tests/all-tests.nix
··· 966 966 oddjobd = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./oddjobd.nix { }; 967 967 obs-studio = runTest ./obs-studio.nix; 968 968 oh-my-zsh = handleTest ./oh-my-zsh.nix { }; 969 + olivetin = runTest ./olivetin.nix; 969 970 ollama = runTest ./ollama.nix; 970 971 ollama-cuda = runTestOn [ "x86_64-linux" "aarch64-linux" ] ./ollama-cuda.nix; 971 972 ollama-rocm = runTestOn [ "x86_64-linux" "aarch64-linux" ] ./ollama-rocm.nix;
+57
nixos/tests/olivetin.nix
··· 1 + { lib, ... }: 2 + 3 + { 4 + name = "olivetin"; 5 + meta.maintainers = with lib.maintainers; [ defelo ]; 6 + 7 + nodes.machine = { 8 + services.olivetin = { 9 + enable = true; 10 + settings = { 11 + actions = [ 12 + { 13 + id = "hello_world"; 14 + title = "Say Hello"; 15 + shell = "echo -n 'Hello World!' | tee /tmp/result"; 16 + } 17 + ]; 18 + }; 19 + extraConfigFiles = [ 20 + (builtins.toFile "secrets.yaml" '' 21 + actions: 22 + - id: secret 23 + title: Secret Action 24 + shell: echo -n secret > /tmp/result2 25 + '') 26 + ]; 27 + }; 28 + }; 29 + 30 + interactive.nodes.machine = { 31 + services.olivetin.settings.ListenAddressSingleHTTPFrontend = "0.0.0.0:8000"; 32 + networking.firewall.allowedTCPPorts = [ 8000 ]; 33 + virtualisation.forwardPorts = [ 34 + { 35 + from = "host"; 36 + host.port = 8000; 37 + guest.port = 8000; 38 + } 39 + ]; 40 + }; 41 + 42 + testScript = '' 43 + import json 44 + 45 + machine.wait_for_unit("olivetin.service") 46 + machine.wait_for_open_port(8000) 47 + 48 + response = json.loads(machine.succeed("curl http://localhost:8000/api/StartActionByGetAndWait/hello_world")) 49 + assert response["logEntry"]["exitCode"] == 0 50 + assert response["logEntry"]["output"] == "Hello World!" 51 + assert machine.succeed("cat /tmp/result") == "Hello World!" 52 + 53 + response = json.loads(machine.succeed("curl http://localhost:8000/api/StartActionByGetAndWait/secret")) 54 + assert response["logEntry"]["exitCode"] == 0 55 + assert machine.succeed("cat /tmp/result2") == "secret" 56 + ''; 57 + }
+4 -4
pkgs/applications/editors/android-studio/default.nix
··· 20 20 sha256Hash = "sha256-VNXErfb4PhljcJwGq863ldh/3i8fMdJirlwolEIk+fI="; 21 21 }; 22 22 betaVersion = { 23 - version = "2024.3.2.11"; # "Android Studio Meerkat Feature Drop | 2024.3.2 RC 2" 24 - sha256Hash = "sha256-pE17kbLnsEMRtaQencKqckW3uke9IliLkoHP6q3NrQg="; 23 + version = "2024.3.2.12"; # "Android Studio Meerkat Feature Drop | 2024.3.2 RC 3" 24 + sha256Hash = "sha256-wmCPkYV88/OwuPqm10t3jT1x+cFRK+7Mgy683Au1P3g="; 25 25 }; 26 26 latestVersion = { 27 - version = "2025.1.1.6"; # "Android Studio Narwhal | 2025.1.1 Canary 6" 28 - sha256Hash = "sha256-FUDb8/kyvO3M/NJp30VZCyNacJ90y/fawrDTFin7g6o="; 27 + version = "2025.1.1.7"; # "Android Studio Narwhal | 2025.1.1 Canary 7" 28 + sha256Hash = "sha256-RQOmTzmk0el8WXE3cnSBCnpginFk0bK45Aij7eil1uM="; 29 29 }; 30 30 in 31 31 {
+13
pkgs/applications/editors/vim/plugins/generated.nix
··· 11844 11844 meta.hydraPlatforms = [ ]; 11845 11845 }; 11846 11846 11847 + peek-nvim = buildVimPlugin { 11848 + pname = "peek.nvim"; 11849 + version = "2024-04-09"; 11850 + src = fetchFromGitHub { 11851 + owner = "toppair"; 11852 + repo = "peek.nvim"; 11853 + rev = "5820d937d5414baea5f586dc2a3d912a74636e5b"; 11854 + sha256 = "01bdrk1h1xaq2bbbgwsrb2h2cc9j2d88kjcx2k3p8j8kgk20yql4"; 11855 + }; 11856 + meta.homepage = "https://github.com/toppair/peek.nvim/"; 11857 + meta.hydraPlatforms = [ ]; 11858 + }; 11859 + 11847 11860 persisted-nvim = buildVimPlugin { 11848 11861 pname = "persisted.nvim"; 11849 11862 version = "2025-03-30";
+4
pkgs/applications/editors/vim/plugins/overrides.nix
··· 2744 2744 ]; 2745 2745 }; 2746 2746 2747 + peek-nvim = super.peek-nvim.overrideAttrs { 2748 + runtimeDeps = [ deno ]; 2749 + }; 2750 + 2747 2751 persisted-nvim = super.persisted-nvim.overrideAttrs { 2748 2752 nvimSkipModules = [ 2749 2753 # /lua/persisted/init.lua:44: attempt to index upvalue 'config' (a nil value)
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 909 909 https://github.com/lewis6991/pckr.nvim/,HEAD, 910 910 https://github.com/tmsvg/pear-tree/,, 911 911 https://github.com/steelsojka/pears.nvim/,, 912 + https://github.com/toppair/peek.nvim/,HEAD, 912 913 https://github.com/olimorris/persisted.nvim/,HEAD, 913 914 https://github.com/folke/persistence.nvim/,, 914 915 https://github.com/Weissle/persistent-breakpoints.nvim/,,
+21 -4
pkgs/applications/emulators/mame/default.nix
··· 121 121 122 122 # Since the bug described in https://github.com/NixOS/nixpkgs/issues/135438, 123 123 # it is not possible to use substituteAll 124 - postPatch = '' 125 - substituteInPlace src/emu/emuopts.cpp \ 126 - --subst-var-by mamePath "$out/opt/mame" 127 - ''; 124 + postPatch = 125 + '' 126 + substituteInPlace src/emu/emuopts.cpp \ 127 + --subst-var-by mamePath "$out/opt/mame" 128 + '' 129 + # MAME's build system uses `sw_vers` to test whether it needs to link with 130 + # the Metal framework or not. However: 131 + # a) that would return the build system's version, not the target's, and 132 + # b) it can't actually find `sw_vers` in $PATH, so it thinks it's on macOS 133 + # version 0, and doesn't link with Metal - causing missing symbol errors 134 + # when it gets to the link step, because other parts of the build system 135 + # _do_ use the correct target version number. 136 + # This replaces the `sw_vers` call with the macOS version actually being 137 + # targeted, so everything gets linked correctly. 138 + + lib.optionalString stdenv.hostPlatform.isDarwin '' 139 + for file in scripts/src/osd/{mac,sdl}.lua; do 140 + substituteInPlace "$file" --replace-fail \ 141 + 'backtick("sw_vers -productVersion")' \ 142 + "os.getenv('MACOSX_DEPLOYMENT_TARGET') or '$darwinMinVersion'" 143 + done 144 + ''; 128 145 129 146 desktopItems = [ 130 147 (makeDesktopItem {
+5 -5
pkgs/applications/networking/browsers/chromium/info.json
··· 787 787 } 788 788 }, 789 789 "ungoogled-chromium": { 790 - "version": "135.0.7049.95", 790 + "version": "135.0.7049.114", 791 791 "deps": { 792 792 "depot_tools": { 793 793 "rev": "85ec2718b5a29990c7eb67778348c9f76a00f392", ··· 798 798 "hash": "sha256-8NynNvLNCHxy8EYmsnPovKhXu9DcDcYBhg4A6d2QIfY=" 799 799 }, 800 800 "ungoogled-patches": { 801 - "rev": "135.0.7049.95-1", 802 - "hash": "sha256-kLLtJti5GIF9TT0cH8zvsxywJzD22X8u2bB/tqENSjo=" 801 + "rev": "135.0.7049.114-1", 802 + "hash": "sha256-frUL7b+4CyrzBa5T1HzFseWHwFa2MPgkpkrFeASWyLA=" 803 803 }, 804 804 "npmHash": "sha256-wNrZaugdKJCyV1WchkKXzr/I1OW1AtjiC2p7qTZZOqU=" 805 805 }, 806 806 "DEPS": { 807 807 "src": { 808 808 "url": "https://chromium.googlesource.com/chromium/src.git", 809 - "rev": "de2eb485a1951079e63bdb57ce25544d2dc79c15", 810 - "hash": "sha256-6ydyJWsDawt0bfYAFHotTB9ujmIYsqUUpNwB6q6RNQE=", 809 + "rev": "63fd8a7d9d09e41ba37b84386c85d5f249f848f7", 810 + "hash": "sha256-U6OJHocA6vI36QCU8UITUsVlentm210CwdThCwlDw5E=", 811 811 "recompress": true 812 812 }, 813 813 "src/third_party/clang-format/script": {
+2 -2
pkgs/applications/office/softmaker/softmaker-office-nx.nix
··· 6 6 # overridable. This is useful when the upstream archive was replaced 7 7 # and nixpkgs is not in sync yet. 8 8 officeVersion ? { 9 - version = "1222"; 9 + version = "1224"; 10 10 edition = ""; 11 - hash = "sha256-8ya9RYpd9G5SITYOpvhxjQE8ieV8TuAApkjNwCf9nHs="; 11 + hash = "sha256-Y6x5E8WeI7Pf/wczWNKnHsCbXWW4Jdzo4ToBdzgmOF8="; 12 12 }, 13 13 14 14 ...
+2 -2
pkgs/applications/office/softmaker/softmaker-office.nix
··· 7 7 # Softmaker Office or when the upstream archive was replaced and 8 8 # nixpkgs is not in sync yet. 9 9 officeVersion ? { 10 - version = "1222"; 10 + version = "1224"; 11 11 edition = "2024"; 12 - hash = "sha256-eyYBK5ZxPcBakOvXUQZIU2aftyH6PXh/rtqC/1BJhg4="; 12 + hash = "sha256-ix9R9Xlugvu5qmKAqC2DsZFhyJ+VVsD7MSpBv+4lmTY="; 13 13 }, 14 14 15 15 ...
+3 -3
pkgs/by-name/al/alistral/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage (finalAttrs: { 12 12 pname = "alistral"; 13 - version = "0.5.6"; 13 + version = "0.5.8"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "RustyNova016"; 17 17 repo = "Alistral"; 18 18 tag = "v${finalAttrs.version}"; 19 - hash = "sha256-6p2KMFTdC04lEhNQiu88ALBPrpQUF9JhXDacntoq4lE="; 19 + hash = "sha256-LSuNVfGus9kO1g4EfVCw6yWxudvYqBnM5mpJWH7MBCs="; 20 20 }; 21 21 22 22 # remove if updating to rust 1.85 ··· 27 27 ''; 28 28 29 29 useFetchCargoVendor = true; 30 - cargoHash = "sha256-2pi2hfQTLs2HAlgp1DQCMFp/nMJQfcuQFhGlrsWgy5E="; 30 + cargoHash = "sha256-lq+0R5g4MwVm8ESjKpz+aymjpqcaAE856XnBtYXYs8A="; 31 31 32 32 env.RUSTC_BOOTSTRAP = 1; 33 33
+3 -3
pkgs/by-name/am/amazon-q-cli/package.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "amazon-q-cli"; 10 - version = "1.7.3"; 10 + version = "1.8.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "aws"; 14 14 repo = "amazon-q-developer-cli"; 15 15 tag = "v${version}"; 16 - hash = "sha256-Hi0klNNxtWlZvcqobb8Y2hLsw/Pck1YQZB4AYBmcNKI="; 16 + hash = "sha256-fOz9oz+xNwX2Bzl6szgQ9oai6lqP+EzbaCNzHPUT2cA="; 17 17 }; 18 18 19 19 useFetchCargoVendor = true; 20 20 21 - cargoHash = "sha256-XK6B2OTCnWMow3KHWU6OK1HsyQW7apcLoYRP7viTte0="; 21 + cargoHash = "sha256-H9bCke3vQDuS6RDEg8dzeFiBWCex64A8KSRhfgyp8e8="; 22 22 23 23 cargoBuildFlags = [ 24 24 "-p"
+2 -2
pkgs/by-name/bl/blender/package.nix
··· 54 54 opencolorio, 55 55 openexr, 56 56 openimagedenoise, 57 - openimageio, 57 + openimageio_2, 58 58 openjpeg, 59 59 openpgl, 60 60 opensubdiv, ··· 246 246 libwebp 247 247 opencolorio 248 248 openexr 249 - openimageio 249 + openimageio_2 250 250 openjpeg 251 251 openpgl 252 252 (opensubdiv.override { inherit cudaSupport; })
+5 -5
pkgs/by-name/br/brave/package.nix
··· 3 3 4 4 let 5 5 pname = "brave"; 6 - version = "1.77.97"; 6 + version = "1.77.101"; 7 7 8 8 allArchives = { 9 9 aarch64-linux = { 10 10 url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_arm64.deb"; 11 - hash = "sha256-1MIcibP89EMCOK4A9lbXxGgwvMKCB+3UxrT+UYiwmtk="; 11 + hash = "sha256-/JY1eBLw3xTxeAinctlpTSbwk6QibPdMVhZcBkbe7G4="; 12 12 }; 13 13 x86_64-linux = { 14 14 url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb"; 15 - hash = "sha256-6JO67t5yR2psvlYhOMERnMgta+YYTIQx/zen7y3B1Ec="; 15 + hash = "sha256-mRbRGCsvkrNVfwYrlfgGyU94dEezFTI/ittkbVynp7Q="; 16 16 }; 17 17 aarch64-darwin = { 18 18 url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-v${version}-darwin-arm64.zip"; 19 - hash = "sha256-d2MQMf1twOhcAouIPpdjG5jB/tZ7FGi/lrRJZ/A/ibs="; 19 + hash = "sha256-tn5HdMLoVRY1oLAYc/O2v2mVblb6KYud53yoHloEQ44="; 20 20 }; 21 21 x86_64-darwin = { 22 22 url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-v${version}-darwin-x64.zip"; 23 - hash = "sha256-vEF26I1+nqBERFdZEKLcDZBDru0RXcwytvblRuqL8/M="; 23 + hash = "sha256-HJel3HVz5MoOWXGTEH8Gu+Fq2Xur7xHXeZTUmWcWksk="; 24 24 }; 25 25 }; 26 26
+3 -3
pkgs/by-name/br/brush/package.nix
··· 12 12 13 13 rustPlatform.buildRustPackage rec { 14 14 pname = "brush"; 15 - version = "0.2.16"; 15 + version = "0.2.17"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "reubeno"; 19 19 repo = "brush"; 20 20 tag = "brush-shell-v${version}"; 21 - hash = "sha256-ZQ1IiWkM888CWEtwWJ+dMjJO1sGvBTA8E6f9v9JLh/w="; 21 + hash = "sha256-64xj9yu6OCNTnuymEd5ihdE0s8RWfrSMfTz9TlMQ6Sg="; 22 22 }; 23 23 24 24 useFetchCargoVendor = true; 25 - cargoHash = "sha256-Vg5efRierCc7sT+7b94/4i4+3L5CoOrDoeMx/Rzg5mE="; 25 + cargoHash = "sha256-AIEgSUl3YFCa6FOgoZYpPc1qc2EOfpm1lZEQYlBgkGg="; 26 26 27 27 nativeInstallCheckInputs = [ 28 28 versionCheckHook
+3 -3
pkgs/by-name/co/cosmic-applets/package.nix
··· 19 19 20 20 rustPlatform.buildRustPackage (finalAttrs: { 21 21 pname = "cosmic-applets"; 22 - version = "1.0.0-alpha.6"; 22 + version = "1.0.0-alpha.7"; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "pop-os"; 26 26 repo = "cosmic-applets"; 27 27 tag = "epoch-${finalAttrs.version}"; 28 - hash = "sha256-kRj2hEtE8FYky9Fn8hgHBo+UwWjOoS7/ROh9qz/0Vzs="; 28 + hash = "sha256-DmU9Dlb8w3a8U+oSGwWARPh1SRbv/8TW7TO9SSvDe1U="; 29 29 }; 30 30 31 31 useFetchCargoVendor = true; 32 - cargoHash = "sha256-jADtvhMzWdJydT1T14PSk4ggZpWIcXiOK0TW2llKeos="; 32 + cargoHash = "sha256-wWs3B5hh2DP93i+4gGDTi+7NT4bj8ULJ+fT95sXxUdg="; 33 33 34 34 nativeBuildInputs = [ 35 35 just
+3 -3
pkgs/by-name/co/cosmic-applibrary/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage (finalAttrs: { 13 13 pname = "cosmic-applibrary"; 14 - version = "1.0.0-alpha.6"; 14 + version = "1.0.0-alpha.7"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "pop-os"; 18 18 repo = "cosmic-applibrary"; 19 19 tag = "epoch-${finalAttrs.version}"; 20 - hash = "sha256-hJOM5dZdLq6uYfhfspZzpbHgUOK/FWuIXuFPoisS8DU="; 20 + hash = "sha256-2rGw4Jmr2rL9X1URA5wVPIZocuroS8yaQs42sJqiTbw="; 21 21 }; 22 22 23 23 useFetchCargoVendor = true; 24 - cargoHash = "sha256-95jTSn0yYj2PNVtfumfD1rPf1yLXHUi60FBqENK8CSw="; 24 + cargoHash = "sha256-+nkXcbAPcIkg+p4ct/E0bm5O0n1MGN43AaWPjw13t9s="; 25 25 26 26 nativeBuildInputs = [ 27 27 just
+2 -11
pkgs/by-name/co/cosmic-bg/package.nix
··· 3 3 stdenv, 4 4 fetchFromGitHub, 5 5 rustPlatform, 6 - fetchpatch, 7 6 cosmic-wallpapers, 8 7 libcosmicAppHook, 9 8 just, ··· 14 13 15 14 rustPlatform.buildRustPackage (finalAttrs: { 16 15 pname = "cosmic-bg"; 17 - version = "1.0.0-alpha.6"; 16 + version = "1.0.0-alpha.7"; 18 17 19 18 src = fetchFromGitHub { 20 19 owner = "pop-os"; 21 20 repo = "cosmic-bg"; 22 21 tag = "epoch-${finalAttrs.version}"; 23 - hash = "sha256-4b4laUXTnAbdngLVh8/dD144m9QrGReSEjRZoNR6Iks="; 22 + hash = "sha256-KMP7TmamtbycF/nKctjYozMJwVr9zdp4A8AWriswo2g="; 24 23 }; 25 - 26 - patches = [ 27 - # TOOD: This is merged and will be included in the 7th Alpha release, remove it then. 28 - (fetchpatch { 29 - url = "https://github.com/pop-os/cosmic-bg/commit/6a824a7902d7cc72b5a3117b6486603a1795a1d6.patch"; 30 - hash = "sha256-jL0az87BlJU99lDF3jnE74I4m/NV6NViyYXTfZoBDM4="; 31 - }) 32 - ]; 33 24 34 25 postPatch = '' 35 26 substituteInPlace config/src/lib.rs data/v1/all \
+3 -3
pkgs/by-name/co/cosmic-comp/package.nix
··· 20 20 21 21 rustPlatform.buildRustPackage (finalAttrs: { 22 22 pname = "cosmic-comp"; 23 - version = "1.0.0-alpha.6"; 23 + version = "1.0.0-alpha.7"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "pop-os"; 27 27 repo = "cosmic-comp"; 28 28 tag = "epoch-${finalAttrs.version}"; 29 - hash = "sha256-CygtVtzO8JJQv+G3yx/OCCy8BlPqyNqcmf3Mv1gFuT4="; 29 + hash = "sha256-2AnGEUWumE1C4Mi5inN7enbxCdWCKbQdYpUvTK3jGQ4="; 30 30 }; 31 31 32 32 useFetchCargoVendor = true; 33 - cargoHash = "sha256-bfVsfrxGi0Lq/YRddCVhfqXL8kPGL9p4bqSNPsmjx0o="; 33 + cargoHash = "sha256-fj6TIBuZ5hrds4WMHRa2krXN5fivKriO2Q/FWdnlGaA="; 34 34 35 35 separateDebugInfo = true; 36 36
+4 -4
pkgs/by-name/co/cosmic-edit/package.nix
··· 21 21 22 22 rustPlatform.buildRustPackage (finalAttrs: { 23 23 pname = "cosmic-edit"; 24 - version = "1.0.0-alpha.6"; 24 + version = "1.0.0-alpha.7"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = "pop-os"; 28 28 repo = "cosmic-edit"; 29 29 tag = "epoch-${finalAttrs.version}"; 30 - hash = "sha256-mKVZI/x8+LrwFHGnJOzOq/vFkGev7sM9xJQOTA7uZGA="; 30 + hash = "sha256-mgUSkYtc+i9pXv0n3zLHwBXFxfeWlhbsFJKa7X+mI98="; 31 31 }; 32 32 33 33 useFetchCargoVendor = true; 34 - cargoHash = "sha256-+b8pSSBUMs1EJDlldgR1UqLLH0sLU/djMOtE3JsDpkQ="; 34 + cargoHash = "sha256-qfPLDgGeYGSO0ZKJooXRK0NnTqzJ6zq6RhBpTTUusQY="; 35 35 36 36 # COSMIC applications now uses vergen for the About page 37 37 # Update the COMMIT_DATE to match when the commit was made 38 - env.VERGEN_GIT_COMMIT_DATE = "2025-02-20"; 38 + env.VERGEN_GIT_COMMIT_DATE = "2025-04-17"; 39 39 env.VERGEN_GIT_SHA = finalAttrs.src.tag; 40 40 41 41 postPatch = ''
+15 -5
pkgs/by-name/co/cosmic-files/package.nix
··· 12 12 13 13 rustPlatform.buildRustPackage (finalAttrs: { 14 14 pname = "cosmic-files"; 15 - version = "1.0.0-alpha.6"; 15 + version = "1.0.0-alpha.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pop-os"; 19 19 repo = "cosmic-files"; 20 20 tag = "epoch-${finalAttrs.version}"; 21 - hash = "sha256-i1CVhfieexeiKPwp0y29QyrKspzEFkp1+zwIaM9D/Qc="; 21 + hash = "sha256-bI5yTpqU2N6hFwI9wi4b9N5onY5iN+8YDM3bSgdYxjQ="; 22 22 }; 23 23 24 24 useFetchCargoVendor = true; 25 - cargoHash = "sha256-I5WRuEogMwa0dB6wxhWDxivqhCdUugvsPrwUvjjDnt8="; 25 + cargoHash = "sha256-7AOdSk9XIXFCDyCus3XgOK3ZBVa4CvX+NFM0jHf7Wbs="; 26 26 27 27 env = { 28 - VERGEN_GIT_COMMIT_DATE = "2025-02-21"; 28 + VERGEN_GIT_COMMIT_DATE = "2025-04-22"; 29 29 VERGEN_GIT_SHA = finalAttrs.src.tag; 30 30 }; 31 31 ··· 72 72 73 73 defaultCargoTestFlags="$cargoTestFlags" 74 74 75 - cargoTestFlags="$defaultCargoTestFlags --package cosmic-files" 75 + # Some tests with the `compio` runtime expect io_uring support but that 76 + # is disabled in the Nix sandbox and the tests fail because they can't 77 + # run in the sandbox. Ideally, the `compio` crate should fallback to a 78 + # non-io_uring runtime but for some reason, that doesn't happen. 79 + cargoTestFlags="$defaultCargoTestFlags --package cosmic-files -- \ 80 + --skip operation::tests::copy_dir_to_same_location \ 81 + --skip operation::tests::copy_file_to_same_location \ 82 + --skip operation::tests::copy_file_with_diff_name_to_diff_dir \ 83 + --skip operation::tests::copy_file_with_extension_to_same_loc \ 84 + --skip operation::tests::copy_to_diff_dir_doesnt_dupe_files \ 85 + --skip operation::tests::copying_file_multiple_times_to_same_location" 76 86 runHook cargoCheckHook 77 87 78 88 cargoTestFlags="$defaultCargoTestFlags --package cosmic-files-applet"
+6 -3
pkgs/by-name/co/cosmic-greeter/package.nix
··· 17 17 18 18 rustPlatform.buildRustPackage (finalAttrs: { 19 19 pname = "cosmic-greeter"; 20 - version = "1.0.0-alpha.6"; 20 + version = "1.0.0-alpha.7"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "pop-os"; 24 24 repo = "cosmic-greeter"; 25 25 tag = "epoch-${finalAttrs.version}"; 26 - hash = "sha256-K6kCBtlmFfav8UP4zorzDJBzHt4CoSaFFAufrW1DPrw="; 26 + hash = "sha256-o9ZoRHi+k+HCSGfRz1lQFAeJMCqcTQEHf5rf9wn3qqY="; 27 27 }; 28 28 29 29 useFetchCargoVendor = true; 30 - cargoHash = "sha256-nmkM/Jm2P5ftZFfzX+O1Fe6eobRbgBkajZsbyI67Zfw="; 30 + cargoHash = "sha256-hUHkyz/avFu9g1FMdC+4vz6xM75CauurrarhouuVZXc="; 31 + 32 + env.VERGEN_GIT_COMMIT_DATE = "2025-04-25"; 33 + env.VERGEN_GIT_SHA = finalAttrs.src.tag; 31 34 32 35 cargoBuildFlags = [ "--all" ]; 33 36
+2 -2
pkgs/by-name/co/cosmic-icons/package.nix
··· 9 9 }: 10 10 stdenvNoCC.mkDerivation (finalAttrs: { 11 11 pname = "cosmic-icons"; 12 - version = "1.0.0-alpha.6"; 12 + version = "1.0.0-alpha.7"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "pop-os"; 16 16 repo = "cosmic-icons"; 17 17 tag = "epoch-${finalAttrs.version}"; 18 - hash = "sha256-j5H2+BOWxq2jShN15QCvj9rY6OK+vlUbyR9R07Ka2rA="; 18 + hash = "sha256-KDmEYeuiDTYvqg2XJK8pMDfsmROKtN+if5Qxz57H5xs="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ just ];
+2 -2
pkgs/by-name/co/cosmic-idle/package.nix
··· 16 16 17 17 rustPlatform.buildRustPackage (finalAttrs: { 18 18 pname = "cosmic-idle"; 19 - version = "1.0.0-alpha.6"; 19 + version = "1.0.0-alpha.7"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "pop-os"; 23 23 repo = "cosmic-idle"; 24 24 tag = "epoch-${finalAttrs.version}"; 25 - hash = "sha256-hORU+iMvWA4XMSWmzir9EwjpLK5vOLR8BgMZz+aIZ4U="; 25 + hash = "sha256-dRvcow+rZ4sJV6pBxRIw6SCmU3aXP9uVKtFEJ9vozzI="; 26 26 }; 27 27 28 28 useFetchCargoVendor = true;
+3 -3
pkgs/by-name/co/cosmic-launcher/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage (finalAttrs: { 13 13 pname = "cosmic-launcher"; 14 - version = "1.0.0-alpha.6"; 14 + version = "1.0.0-alpha.7"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "pop-os"; 18 18 repo = "cosmic-launcher"; 19 19 tag = "epoch-${finalAttrs.version}"; 20 - hash = "sha256-BtYnL+qkM/aw+Air5yOKH098V+TQByM5mh1DX7v+v+s="; 20 + hash = "sha256-niMsDLVMUEr8VyubDm6RGgS7p22v5nH/F8cASJOszhs="; 21 21 }; 22 22 23 23 useFetchCargoVendor = true; 24 - cargoHash = "sha256-g7Qr3C8jQg65KehXAhftdXCpEukag0w12ClvZFkxfqs="; 24 + cargoHash = "sha256-Wh3vI42RBfXpI7mvPVUmGK3fITGi+EGyo+lG7VnZg3w="; 25 25 26 26 nativeBuildInputs = [ 27 27 just
+3 -3
pkgs/by-name/co/cosmic-notifications/package.nix
··· 12 12 13 13 rustPlatform.buildRustPackage (finalAttrs: { 14 14 pname = "cosmic-notifications"; 15 - version = "1.0.0-alpha.6"; 15 + version = "1.0.0-alpha.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pop-os"; 19 19 repo = "cosmic-notifications"; 20 20 tag = "epoch-${finalAttrs.version}"; 21 - hash = "sha256-d6bAiRSO2opKSZfadyQYrU9oIrXwPNzO/g2E2RY6q04="; 21 + hash = "sha256-xcGmcOoxHb7gj6fW7xPZ5R0MTkMVXNJgvr9d5LPy9kw="; 22 22 }; 23 23 24 24 useFetchCargoVendor = true; 25 - cargoHash = "sha256-utip7E8NST88mPaKppkuOcdW+QkFoRqWy3a2McvMHo8="; 25 + cargoHash = "sha256-7EDe1OjGS6Xl0N/BrZG8lzWO0pFbwiEp+kn6WyydJQM="; 26 26 27 27 nativeBuildInputs = [ 28 28 just
+3 -3
pkgs/by-name/co/cosmic-osd/package.nix
··· 12 12 13 13 rustPlatform.buildRustPackage (finalAttrs: { 14 14 pname = "cosmic-osd"; 15 - version = "1.0.0-alpha.6"; 15 + version = "1.0.0-alpha.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pop-os"; 19 19 repo = "cosmic-osd"; 20 20 tag = "epoch-${finalAttrs.version}"; 21 - hash = "sha256-ezOeRgqI/GOWFknUVZI7ZLEy1GYaBI+/An83HWKL6ho="; 21 + hash = "sha256-POjuxrNBajp4IOw7YwF2TS4OfoM8Hxo1fO48nkhKj8U="; 22 22 }; 23 23 24 24 postPatch = '' ··· 27 27 ''; 28 28 29 29 useFetchCargoVendor = true; 30 - cargoHash = "sha256-vYehF2RjPrTZiuGcRUe4XX3ftRo7f+SIoKizD/kOtR8="; 30 + cargoHash = "sha256-kfExKggQo3MoTXw1JbKWjLu5kwYF0n7DzSQcG6e1+QQ="; 31 31 32 32 nativeBuildInputs = [ libcosmicAppHook ]; 33 33
+3 -3
pkgs/by-name/co/cosmic-panel/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage (finalAttrs: { 13 13 pname = "cosmic-panel"; 14 - version = "1.0.0-alpha.6"; 14 + version = "1.0.0-alpha.7"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "pop-os"; 18 18 repo = "cosmic-panel"; 19 19 tag = "epoch-${finalAttrs.version}"; 20 - hash = "sha256-6lt9Rig1pM37B7+nRrR+eYke8umSfYlg8aLB45Q1X+4="; 20 + hash = "sha256-QcrkfU6HNZ2tWfKsMdcv58HC/PE7b4T14AIep85TWOY="; 21 21 }; 22 22 23 23 useFetchCargoVendor = true; 24 - cargoHash = "sha256-EIp9s42deMaB7BDe7RAqj2+CnTXjHCtZjS5Iq8l46A4="; 24 + cargoHash = "sha256-qufOJeWPRjj4GgWNJmQfYaGKeYOQbkTeFzrUSi9QNnQ="; 25 25 26 26 nativeBuildInputs = [ 27 27 just
+3 -3
pkgs/by-name/co/cosmic-player/package.nix
··· 18 18 19 19 rustPlatform.buildRustPackage (finalAttrs: { 20 20 pname = "cosmic-player"; 21 - version = "1.0.0-alpha.6"; 21 + version = "1.0.0-alpha.7"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "pop-os"; 25 25 repo = "cosmic-player"; 26 26 tag = "epoch-${finalAttrs.version}"; 27 - hash = "sha256-Ebjj+C+yLCRomZy2W8mYDig1pv7aQcD3A9V2M53RM5U="; 27 + hash = "sha256-/xf3IOFVpctfgaaNNq2HUzK/qHt7Qikcv0JKoPJboRU="; 28 28 }; 29 29 30 30 useFetchCargoVendor = true; 31 - cargoHash = "sha256-p1ylYB6xuF0UrhUO+QbGIgxqvZeQ6+GIbSNijTDXyRE="; 31 + cargoHash = "sha256-0RrtErTR2J5mn/Lfppk+5X8UUOC2LN65krAq1uz/O4M="; 32 32 33 33 postPatch = '' 34 34 substituteInPlace justfile --replace-fail '#!/usr/bin/env' "#!$(command -v env)"
+3 -3
pkgs/by-name/co/cosmic-randr/package.nix
··· 12 12 13 13 rustPlatform.buildRustPackage (finalAttrs: { 14 14 pname = "cosmic-randr"; 15 - version = "1.0.0-alpha.6"; 15 + version = "1.0.0-alpha.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pop-os"; 19 19 repo = "cosmic-randr"; 20 20 tag = "epoch-${finalAttrs.version}"; 21 - hash = "sha256-Sqxe+vKonsK9MmJGtbrZHE7frfrjkHXysm0WQt7WSU4="; 21 + hash = "sha256-vCGbWsG/F3WhWVSy8Z3r4ZHpks/X/57/ZZXuw6BFl+c="; 22 22 }; 23 23 24 24 useFetchCargoVendor = true; 25 - cargoHash = "sha256-UQ/fhjUiniVeHRQYulYko4OxcWB6UhFuxH1dVAfAzIY="; 25 + cargoHash = "sha256-lW44Y7RhA1l+cCDwqSq9sbhWi+kONJ0zy1fUu8WPYw0="; 26 26 27 27 nativeBuildInputs = [ 28 28 just
+2 -2
pkgs/by-name/co/cosmic-screenshot/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage (finalAttrs: { 12 12 pname = "cosmic-screenshot"; 13 - version = "1.0.0-alpha.6"; 13 + version = "1.0.0-alpha.7"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "pop-os"; 17 17 repo = "cosmic-screenshot"; 18 18 tag = "epoch-${finalAttrs.version}"; 19 - hash = "sha256-/sGYF+XWmPraNGlBVUcN/nokDB9JwWViEAL9gVH3ZaI="; 19 + hash = "sha256-VvU/9vYdoTvy3yzdeXrhKrtS9tUHMKnaSAeNTEKk5PA="; 20 20 }; 21 21 22 22 useFetchCargoVendor = true;
+4 -16
pkgs/by-name/co/cosmic-session/package.nix
··· 12 12 13 13 rustPlatform.buildRustPackage (finalAttrs: { 14 14 pname = "cosmic-session"; 15 - version = "1.0.0-alpha.6"; 15 + version = "1.0.0-alpha.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pop-os"; 19 19 repo = "cosmic-session"; 20 20 tag = "epoch-${finalAttrs.version}"; 21 - hash = "sha256-2EKkVdZ7uNNJ/E/3knmeH3EBa+tkYmIxP3t9d6yacww="; 21 + hash = "sha256-vozm4vcXV3RB9Pk6om1UNCfGh80vIVJvSwbzwGDQw3Y="; 22 22 }; 23 23 24 24 useFetchCargoVendor = true; 25 - cargoHash = "sha256-iYObxjWJUKgZKGTkqtYgQK4758k0EYZGhIAM/oLxxso="; 25 + cargoHash = "sha256-68budhhbt8wPY7sfDqwIs4MWB/NBXsswK6HbC2AnHqE="; 26 26 27 27 postPatch = '' 28 28 substituteInPlace data/start-cosmic \ ··· 43 43 (placeholder "out") 44 44 "--set" 45 45 "cosmic_dconf_profile" 46 - "cosmic" 46 + "${placeholder "out"}/etc/dconf/profile/cosmic" 47 47 "--set" 48 48 "cargo-target-dir" 49 49 "target/${stdenv.hostPlatform.rust.cargoShortTarget}" 50 50 ]; 51 51 52 52 env.XDP_COSMIC = "${xdg-desktop-portal-cosmic}/libexec/xdg-desktop-portal-cosmic"; 53 - 54 - postInstall = '' 55 - dconf_profile_dst=$out/etc/dconf/profile/cosmic 56 - if [ ! -f $dconf_profile_dst ]; then 57 - install -Dm0644 data/dconf/profile/cosmic $dconf_profile_dst 58 - else 59 - # future proofing 60 - echo 'The Justfile is now correctly installing the dconf profile.' 61 - echo 'Please remove the dconf profile from the `postInstall` phase.' 62 - exit 1 63 - fi 64 - ''; 65 53 66 54 passthru = { 67 55 providedSessions = [ "cosmic" ];
+5 -3
pkgs/by-name/co/cosmic-settings-daemon/package.nix
··· 6 6 pop-gtk-theme, 7 7 adw-gtk3, 8 8 pkg-config, 9 + libpulseaudio, 9 10 geoclue2-with-demo-agent, 10 11 libinput, 11 12 udev, ··· 14 15 15 16 rustPlatform.buildRustPackage (finalAttrs: { 16 17 pname = "cosmic-settings-daemon"; 17 - version = "1.0.0-alpha.6"; 18 + version = "1.0.0-alpha.7"; 18 19 19 20 src = fetchFromGitHub { 20 21 owner = "pop-os"; 21 22 repo = "cosmic-settings-daemon"; 22 23 tag = "epoch-${finalAttrs.version}"; 23 - hash = "sha256-DtwW6RxHnNh87Xu0NCULfUsHNzYU9tHtFKE9HO3rvME="; 24 + hash = "sha256-vdhkE5CmgiGYg5TXxN7lLqxjv7apKEKvIscXFIzZfRc="; 24 25 }; 25 26 26 27 postPatch = '' ··· 31 32 ''; 32 33 33 34 useFetchCargoVendor = true; 34 - cargoHash = "sha256-lGzQBL9IXbPsaKeVHp34xkm5FnTxWvfw4wg3El4LZdA="; 35 + cargoHash = "sha256-Dzv1SDeZFIa+LFQQ91lO7RBHldsjDnGf+R12Ln2WZwU="; 35 36 36 37 nativeBuildInputs = [ pkg-config ]; 37 38 buildInputs = [ 38 39 libinput 40 + libpulseaudio 39 41 udev 40 42 ]; 41 43
+3 -12
pkgs/by-name/co/cosmic-settings/package.nix
··· 2 2 lib, 3 3 stdenv, 4 4 fetchFromGitHub, 5 - fetchpatch, 6 5 rustPlatform, 7 6 cmake, 8 7 just, ··· 28 27 in 29 28 rustPlatform.buildRustPackage (finalAttrs: { 30 29 pname = "cosmic-settings"; 31 - version = "1.0.0-alpha.6"; 30 + version = "1.0.0-alpha.7"; 32 31 33 32 src = fetchFromGitHub { 34 33 owner = "pop-os"; 35 34 repo = "cosmic-settings"; 36 35 tag = "epoch-${finalAttrs.version}"; 37 - hash = "sha256-UKg3TIpyaqtynk6wLFFPpv69F74hmqfMVPra2+iFbvE="; 36 + hash = "sha256-rrPgCXl4uD4Gvstgj9Sdv6rB/0d8wa56CdBjAkTLQG8="; 38 37 }; 39 38 40 - patches = [ 41 - # TODO: This is merged and will be included in the 7th Alpha release, remove it then. 42 - (fetchpatch { 43 - url = "https://github.com/pop-os/cosmic-settings/commit/2e2898b31fabcb3f3b561e6c4cea2aca9de9b284.patch"; 44 - hash = "sha256-ZGJlGmR6lZB697uQ+ZsjvisNbPKBlBdRK/Ti541ZdlE="; 45 - }) 46 - ]; 47 - 48 39 useFetchCargoVendor = true; 49 - cargoHash = "sha256-mf/Cw3/RLrCYgsk7JKCU2+oPn1VPbD+4JzkUmbd47m8="; 40 + cargoHash = "sha256-7Aoy/okgFSwDU6jMYzTGtwPbK82yMgL5bnKBfBUD3vA="; 50 41 51 42 nativeBuildInputs = [ 52 43 cmake
+3 -3
pkgs/by-name/co/cosmic-store/package.nix
··· 15 15 16 16 rustPlatform.buildRustPackage (finalAttrs: { 17 17 pname = "cosmic-store"; 18 - version = "1.0.0-alpha.6"; 18 + version = "1.0.0-alpha.7"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "pop-os"; 22 22 repo = "cosmic-store"; 23 23 tag = "epoch-${finalAttrs.version}"; 24 - hash = "sha256-ce7PaHBhRFUoujAS6j10XWbD2PxzK6XXIk/ENclT1iY="; 24 + hash = "sha256-skNzkpcdGJkve7enlnnZxYxnScHFmyaCAy0xaMEEsE0="; 25 25 }; 26 26 27 27 useFetchCargoVendor = true; 28 - cargoHash = "sha256-kPCE6F8/UsTJOmIjwxBLISk/Jhfljwa666WhXuKkkDE="; 28 + cargoHash = "sha256-2iWJFPSvNQ6JwQwzowKYbgjog2gsjOUlReai/j0d3Do="; 29 29 30 30 nativeBuildInputs = [ 31 31 just
+4 -4
pkgs/by-name/co/cosmic-term/package.nix
··· 15 15 16 16 rustPlatform.buildRustPackage (finalAttrs: { 17 17 pname = "cosmic-term"; 18 - version = "1.0.0-alpha.6"; 18 + version = "1.0.0-alpha.7"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "pop-os"; 22 22 repo = "cosmic-term"; 23 23 tag = "epoch-${finalAttrs.version}"; 24 - hash = "sha256-sdeRkT6UcyBKIFnJZn3aGf8LZQimqVPqtXo7RtwUs5M="; 24 + hash = "sha256-leCKdnlevfLiPJkloWCpOjkHaSf7+EYdobZRZ/Jis+4="; 25 25 }; 26 26 27 27 useFetchCargoVendor = true; 28 - cargoHash = "sha256-Qznkqp+zWpP/ok2xG7U5lYBW0qo4+ARnm8hgxU20ha0="; 28 + cargoHash = "sha256-Re9t25tkwmrvXB9GmPSVG+QDUZmk5rwrrY2ntlB3Tdw="; 29 29 30 30 # COSMIC applications now uses vergen for the About page 31 31 # Update the COMMIT_DATE to match when the commit was made 32 32 env = { 33 - VERGEN_GIT_COMMIT_DATE = "2025-02-21"; 33 + VERGEN_GIT_COMMIT_DATE = "2025-04-20"; 34 34 VERGEN_GIT_SHA = finalAttrs.src.tag; 35 35 }; 36 36
+2 -2
pkgs/by-name/co/cosmic-wallpapers/package.nix
··· 8 8 9 9 stdenvNoCC.mkDerivation (finalAttrs: { 10 10 pname = "cosmic-wallpapers"; 11 - version = "1.0.0-alpha.6"; 11 + version = "1.0.0-alpha.7"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "pop-os"; ··· 16 16 tag = "epoch-${finalAttrs.version}"; 17 17 forceFetchGit = true; 18 18 fetchLFS = true; 19 - hash = "sha256-Exrps3DicL/G/g0kbSsCvoFhiJn1k3v8I09GhW7EwNM="; 19 + hash = "sha256-XtNmV6fxKFlirXQvxxgAYSQveQs8RCTfcFd8SVdEXtE="; 20 20 }; 21 21 22 22 patches = [
+3 -20
pkgs/by-name/co/cosmic-workspaces-epoch/package.nix
··· 3 3 stdenv, 4 4 rustPlatform, 5 5 fetchFromGitHub, 6 - cosmic-wallpapers, 7 6 libcosmicAppHook, 8 7 pkg-config, 9 8 libinput, ··· 15 14 16 15 rustPlatform.buildRustPackage (finalAttrs: { 17 16 pname = "cosmic-workspaces-epoch"; 18 - version = "1.0.0-alpha.6"; 17 + version = "1.0.0-alpha.7"; 19 18 20 19 src = fetchFromGitHub { 21 20 owner = "pop-os"; 22 21 repo = "cosmic-workspaces-epoch"; 23 22 tag = "epoch-${finalAttrs.version}"; 24 - hash = "sha256-3jivE0EaSddPxMYn9DDaYUMafPf60XeCwVeQegbt++c="; 23 + hash = "sha256-d7KYZbq8O/t5V/gU+wwstp06vyfnmt6vRKo+54Dct+o="; 25 24 }; 26 25 27 - postPatch = '' 28 - # While the `kate-hazen-COSMIC-desktop-wallpaper.png` image is present 29 - # in the `pop-wallpapers` package, we're using the Orion Nebula image 30 - # from NASA available in the `cosmic-wallpapers` package. Mainly because 31 - # the previous image was used in the GNOME shell extension and the 32 - # Orion Nebula image is widely used in the Rust-based COSMIC DE's 33 - # marketing materials. Another reason to use the Orion Nebula image 34 - # is that it's actually the default wallpaper as configured by the 35 - # `cosmic-bg` package's configuration in upstream [1] [2]. 36 - # 37 - # [1]: https://github.com/pop-os/cosmic-bg/blob/epoch-1.0.0-alpha.6/config/src/lib.rs#L142 38 - # [2]: https://github.com/pop-os/cosmic-bg/blob/epoch-1.0.0-alpha.6/data/v1/all#L3 39 - substituteInPlace src/view/mod.rs \ 40 - --replace-fail '/usr/share/backgrounds/pop/kate-hazen-COSMIC-desktop-wallpaper.png' "${cosmic-wallpapers}/share/backgrounds/cosmic/orion_nebula_nasa_heic0601a.jpg" 41 - ''; 42 - 43 26 useFetchCargoVendor = true; 44 - cargoHash = "sha256-l5y9bOG/h24EfiAFfVKjtzYCzjxU2TI8wh6HBUwoVcE="; 27 + cargoHash = "sha256-TjgnPuFUIDtxx9kpvN9hKiir3/ZVtCc0z1CE4UHre1Q="; 45 28 46 29 separateDebugInfo = true; 47 30
+3 -3
pkgs/by-name/da/databricks-cli/package.nix
··· 10 10 11 11 buildGoModule (finalAttrs: { 12 12 pname = "databricks-cli"; 13 - version = "0.247.1"; 13 + version = "0.249.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "databricks"; 17 17 repo = "cli"; 18 18 rev = "v${finalAttrs.version}"; 19 - hash = "sha256-c9ZcqJuue5Nccuhpoxud0LevJD2jNPAYuIrBaEuUihY="; 19 + hash = "sha256-DNa/ovllWJwsja8+QXP4Z38NE2uO99kHFQsXAEbKciQ="; 20 20 }; 21 21 22 22 # Otherwise these tests fail asserting that the version is 0.0.0-dev ··· 25 25 --replace-fail "cli/0.0.0-dev" "cli/${finalAttrs.version}" 26 26 ''; 27 27 28 - vendorHash = "sha256-c+fg2eJiuLr7UuWier7VFdLNFGDo0aCMo0q8/spnmSE="; 28 + vendorHash = "sha256-Nj9oQryh3tsXUoIPunl5EXKkWeT76zGTsdFaK0UuNVY="; 29 29 30 30 excludedPackages = [ 31 31 "bundle/internal"
+3 -3
pkgs/by-name/de/deno/package.nix
··· 21 21 in 22 22 rustPlatform.buildRustPackage (finalAttrs: { 23 23 pname = "deno"; 24 - version = "2.2.11"; 24 + version = "2.2.12"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = "denoland"; 28 28 repo = "deno"; 29 29 tag = "v${finalAttrs.version}"; 30 - hash = "sha256-6mRu1B02bX7Ax0d7MgI1cGalIKOqFMN+xP8ii+pUJWE="; 30 + hash = "sha256-/5KCwWyPdx/OKjoKgHZ8BAih7dh21VrbC+N1U74B/KI="; 31 31 }; 32 32 33 33 useFetchCargoVendor = true; 34 - cargoHash = "sha256-YZ6O31R/1L7m25Z+6Xq6b44cRAX1jgRFPlhmoFVYFok="; 34 + cargoHash = "sha256-3I1yplJjVH7Mf2wjwk8qSdbHTcR20QSJGF9MHtnu+q8="; 35 35 36 36 postPatch = '' 37 37 # Use patched nixpkgs libffi in order to fix https://github.com/libffi/libffi/pull/857
+5 -5
pkgs/by-name/de/devenv/package.nix
··· 19 19 src = fetchFromGitHub { 20 20 owner = "domenkozar"; 21 21 repo = "nix"; 22 - rev = "f3f44b2baaf6c4c6e179de8cbb1cc6db031083cd"; 23 - hash = "sha256-E3j+3MoY8Y96mG1dUIiLFm2tZmNbRvSiyN7CrSKuAVg="; 22 + rev = "090394819020afda8eae69e395b1accba9c0fab2"; 23 + hash = "sha256-eUYh7+PgqLXTt8/9IOxEuW2qyxADECmTic8QNhEwKSw="; 24 24 }; 25 25 doCheck = false; 26 26 doInstallCheck = false; 27 27 }); 28 28 29 - version = "1.5.2"; 29 + version = "1.6"; 30 30 in 31 31 rustPlatform.buildRustPackage { 32 32 pname = "devenv"; ··· 36 36 owner = "cachix"; 37 37 repo = "devenv"; 38 38 rev = "v${version}"; 39 - hash = "sha256-rXtUUxfQ34ukTy2OyHwuypnSgK95FRPGwJf69QnWMrc="; 39 + hash = "sha256-ui6UwatBHN2WFvStGUHVOdBu72MsG/7b0GeyRdTCyEw="; 40 40 }; 41 41 42 42 useFetchCargoVendor = true; 43 - cargoHash = "sha256-oiOh8m7MypViLbzy/13NpSiOwkfRwybUpDs91f+HbGA="; 43 + cargoHash = "sha256-XS6F/Sp5peJdzAormYPjAA4SJfusMH6PRYIM3Tw5AUw="; 44 44 45 45 buildAndTestSubdir = "devenv"; 46 46
+2 -2
pkgs/by-name/do/docfd/package.nix
··· 14 14 15 15 ocamlPackages.buildDunePackage rec { 16 16 pname = "docfd"; 17 - version = "10.1.3"; 17 + version = "10.2.0"; 18 18 19 19 minimalOCamlVersion = "5.1"; 20 20 ··· 22 22 owner = "darrenldl"; 23 23 repo = "docfd"; 24 24 rev = version; 25 - hash = "sha256-ZD1nKl/hfidlTGdBnNINt2EmlUmFWaJjSvY3wkyJJcg="; 25 + hash = "sha256-wVhsZTG8yEkxKA0ta3IDe7O/ER5RuBuFOPKHP8xS2GA="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+3 -3
pkgs/by-name/do/docker-language-server/package.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "docker-language-server"; 11 - version = "0.3.4"; 11 + version = "0.3.8"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "docker"; 15 15 repo = "docker-language-server"; 16 16 tag = "v${version}"; 17 - hash = "sha256-st7ZsifOJy2se0dgJHtonMSQC1hO8z3yhPYJ4H5nqAk="; 17 + hash = "sha256-irjIa+GC/4tEMoC8ZY/8n9J/Z5G/VesSj4xWqnOj6uY="; 18 18 }; 19 19 20 - vendorHash = "sha256-Odyc1pGp52f8S2bXT7v4Rpk2H3vxr+DghsNcFUVU62k="; 20 + vendorHash = "sha256-O1SQVKfnOkxWqJWamRkb8RMRsWriBZqH3oYSzIHX7Ug="; 21 21 22 22 nativeCheckInputs = [ 23 23 docker
+32 -16
pkgs/by-name/dp/dprint/plugins/default.nix
··· 1 - { lib, fetchurl }: 1 + { 2 + lib, 3 + fetchurl, 4 + stdenv, 5 + }: 2 6 let 3 7 mkDprintPlugin = 4 8 { ··· 12 16 license ? lib.licenses.mit, 13 17 maintainers ? [ lib.maintainers.phanirithvij ], 14 18 }: 15 - fetchurl { 16 - inherit 17 - hash 18 - url 19 - pname 20 - version 21 - ; 22 - name = "${pname}-${version}.wasm"; 19 + stdenv.mkDerivation (finalAttrs: { 20 + inherit pname version; 21 + src = fetchurl { inherit url hash; }; 22 + dontUnpack = true; 23 23 meta = { 24 - inherit 25 - description 26 - license 27 - maintainers 28 - ; 24 + inherit description license maintainers; 29 25 }; 26 + /* 27 + in the dprint configuration 28 + dprint expects a plugin path to end with .wasm extension 29 + 30 + for auto update with nixpkgs-update to work 31 + we cannot have .wasm extension at the end in the nix store path 32 + */ 33 + buildPhase = '' 34 + mkdir -p $out 35 + cp $src $out/plugin.wasm 36 + ''; 30 37 passthru = { 31 38 updateScript = ./update-plugins.py; 32 39 inherit initConfig updateUrl; 33 40 }; 34 - }; 41 + }); 35 42 inherit (lib) 36 43 filterAttrs 44 + isDerivation 37 45 mapAttrs' 38 46 nameValuePair 39 47 removeSuffix ··· 45 53 name: _: 46 54 nameValuePair (removeSuffix ".nix" name) (import (./. + "/${name}") { inherit mkDprintPlugin; }) 47 55 ) files; 56 + # Expects a function that receives the dprint plugin set as an input 57 + # and returns a list of plugins 58 + # Example: 59 + # pkgs.dprint-plugins.getPluginList (plugins: [ 60 + # plugins.dprint-plugin-toml 61 + # (pkgs.callPackage ./dprint/plugins/sample.nix {}) 62 + # ] 63 + getPluginList = cb: map (p: "${p}/plugin.wasm") (cb plugins); 48 64 in 49 - plugins // { inherit mkDprintPlugin; } 65 + plugins // { inherit mkDprintPlugin getPluginList; }
+4 -6
pkgs/by-name/dp/dprint/plugins/update-plugins.py
··· 29 29 30 30 31 31 # get sri hash for a url, no unpack 32 - def nix_prefetch_url(url, name, algo="sha256"): 32 + def nix_prefetch_url(url, algo="sha256"): 33 33 hash = ( 34 - subprocess.check_output( 35 - ["nix-prefetch-url", "--type", algo, "--name", name, url] 36 - ) 34 + subprocess.check_output(["nix-prefetch-url", "--type", algo, url]) 37 35 .decode("utf-8") 38 36 .rstrip() 39 37 ) ··· 119 117 data = requests.get(p["updateUrl"]).json() 120 118 p["url"] = data["url"] 121 119 p["version"] = data["version"] 122 - p["hash"] = nix_prefetch_url(data["url"], f"{name}-{data["version"]}.wasm") 120 + p["hash"] = nix_prefetch_url(data["url"]) 123 121 124 122 write_plugin_derivation(p) 125 123 ··· 136 134 pname = pname.replace("/", "-") 137 135 drv_attrs = { 138 136 "url": e["url"], 139 - "hash": nix_prefetch_url(e["url"], f"{pname}-{e["version"]}.wasm"), 137 + "hash": nix_prefetch_url(e["url"]), 140 138 "updateUrl": update_url, 141 139 "pname": pname, 142 140 "version": e["version"],
+2 -2
pkgs/by-name/e1/e1s/package.nix
··· 5 5 }: 6 6 let 7 7 pname = "e1s"; 8 - version = "1.0.45"; 8 + version = "1.0.46"; 9 9 in 10 10 buildGoModule { 11 11 inherit pname version; ··· 14 14 owner = "keidarcy"; 15 15 repo = "e1s"; 16 16 tag = "v${version}"; 17 - hash = "sha256-1dbdIShEyQ9/1kXx0w4SiEu6c53WUj5+RtmIcwuhSRA="; 17 + hash = "sha256-Wnj6HNxVdhnmGMtw+Da/LRxMkXBm+rWDUcHPOxFXDLU="; 18 18 }; 19 19 20 20 vendorHash = "sha256-bBl4D7HNIiAym6BWSJ0x4LZnIEUMfECj6dDDVZIFrHA=";
+4
pkgs/by-name/ed/eduvpn-client/package.nix
··· 40 40 setuptools 41 41 ]; 42 42 43 + postInstall = '' 44 + ln -s $out/${python3Packages.python.sitePackages}/eduvpn/data/share/ $out/share 45 + ''; 46 + 43 47 checkInputs = with python3Packages; [ 44 48 pytestCheckHook 45 49 ];
+3 -3
pkgs/by-name/ez/eza/package.nix
··· 15 15 16 16 rustPlatform.buildRustPackage (finalAttrs: { 17 17 pname = "eza"; 18 - version = "0.21.1"; 18 + version = "0.21.2"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "eza-community"; 22 22 repo = "eza"; 23 23 tag = "v${finalAttrs.version}"; 24 - hash = "sha256-HtukMHiTWWejbq+cpeyF4QmTaBP4yvvyVb/xaacHKwI="; 24 + hash = "sha256-r8svNiz0hcK0QQ0LvkYKTc9gLOEDLylZss32g6sM/hY="; 25 25 }; 26 26 27 27 useFetchCargoVendor = true; 28 - cargoHash = "sha256-T/ryAhBM0ECttDx3vMesLfTXfnHecM/0gpOCcg/o2kI="; 28 + cargoHash = "sha256-akoRFvlwHUg8KzmxMGkJ//fIrX/+/yu6fHbxBjgwUZc="; 29 29 30 30 nativeBuildInputs = [ 31 31 cmake
+3 -3
pkgs/by-name/fu/fulcio/package.nix
··· 15 15 16 16 buildGoModule rec { 17 17 pname = "fulcio"; 18 - version = "1.7.0"; 18 + version = "1.7.1"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "sigstore"; 22 22 repo = pname; 23 23 rev = "v${version}"; 24 - hash = "sha256-ymPczybHADTz4uiY8aLLre+Q8bBq/5L5MXJ26eBhi+U="; 24 + hash = "sha256-UVUVT4RvNHvzIwV6azu2h1O9lnNu0PQnnkj4wbrY8BA="; 25 25 # populate values that require us to use git. By doing this in postFetch we 26 26 # can delete .git afterwards and maintain better reproducibility of the src. 27 27 leaveDotGit = true; ··· 33 33 find "$out" -name .git -print0 | xargs -0 rm -rf 34 34 ''; 35 35 }; 36 - vendorHash = "sha256-lfJCPE8FRAX+juXQ7CiwItbnd0kAheaEdWG0Bwoyz/Y="; 36 + vendorHash = "sha256-lNPRejC7Z3OHDvhJGzPIlgqi7eXjlqgeECJO/13gGt4="; 37 37 38 38 nativeBuildInputs = [ installShellFiles ]; 39 39
+2 -2
pkgs/by-name/gh/gh/package.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "gh"; 13 - version = "2.71.0"; 13 + version = "2.71.2"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "cli"; 17 17 repo = "cli"; 18 18 tag = "v${version}"; 19 - hash = "sha256-Wx1C5xrjssF09ok9YYXsewDi5Tdi3Gepfnf1FueEpkI="; 19 + hash = "sha256-n1qGJ5/X7wp4kgQqgcUomNvln2WavDJOjwxjVokfbiU="; 20 20 }; 21 21 22 22 vendorHash = "sha256-69bGTUdVD/jebvmxYu0Mx7poSlbkXBAXUWLJ1CclXJU=";
+2 -2
pkgs/by-name/gp/gpupad/package.nix
··· 7 7 glslang, 8 8 imath, 9 9 ktx-tools, 10 - openimageio, 10 + openimageio_2, 11 11 qt6Packages, 12 12 spdlog, 13 13 spirv-cross, ··· 42 42 glslang 43 43 imath # needed for openimageio 44 44 ktx-tools 45 - openimageio 45 + openimageio_2 46 46 qt6Packages.qtbase 47 47 qt6Packages.qtdeclarative 48 48 qt6Packages.qtmultimedia
+3 -3
pkgs/by-name/ht/httpx/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "httpx"; 10 - version = "1.6.10"; 10 + version = "1.7.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "projectdiscovery"; 14 14 repo = "httpx"; 15 15 tag = "v${version}"; 16 - hash = "sha256-lU5LtYFnWJu4yZTqdJFqLnaAUOQ3Nc2EaNPrvTxoW3Q="; 16 + hash = "sha256-V4OTIUm7KSUSKgQczkOtIw8HlkLEMgvX53a4caQP5IU="; 17 17 }; 18 18 19 - vendorHash = "sha256-+m0TPKIBCnRfswrMw9+w1r/pWaRmkI+s0RRbv5X5GBo="; 19 + vendorHash = "sha256-lwk/ajywAJ969U5gpYQgIg8+u1xKARFH+HTk2+OgY4A="; 20 20 21 21 subPackages = [ "cmd/httpx" ]; 22 22
+1 -1
pkgs/by-name/hy/hyprls/package.nix
··· 26 26 27 27 meta = { 28 28 description = "LSP server for Hyprland's configuration language"; 29 - homepage = "https://en.ewen.works/hyprls"; 29 + homepage = "https://gwen.works/hyprls"; 30 30 changelog = "https://github.com/hyprland-community/hyprls/releases/tag/v${version}"; 31 31 license = lib.licenses.mit; 32 32 maintainers = with lib.maintainers; [ arthsmn ];
+5 -3
pkgs/by-name/im/immich-go/package.nix
··· 9 9 }: 10 10 buildGoModule rec { 11 11 pname = "immich-go"; 12 - version = "0.25.2"; 12 + version = "0.25.3"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "simulot"; 16 16 repo = "immich-go"; 17 17 tag = "v${version}"; 18 - hash = "sha256-YTijKTelSFDVYSx0XocOx2OqEDCtoIMGBLEH3uUbg20="; 18 + hash = "sha256-l4D0tE0yB2eLy9QlB9kraOtCUfqVRhYyaMUb/Xvv82c="; 19 19 20 20 # Inspired by: https://github.com/NixOS/nixpkgs/blob/f2d7a289c5a5ece8521dd082b81ac7e4a57c2c5c/pkgs/applications/graphics/pdfcpu/default.nix#L20-L32 21 21 # The intention here is to write the information into files in the `src`'s ··· 32 32 ''; 33 33 }; 34 34 35 - vendorHash = "sha256-AC+nXaUvnppEIPDthfWDffeoh8hcsd3wDynmF34XBD8="; 35 + vendorHash = "sha256-z9gS8i9GatDq4flomPcBUpf7b/6BJZ42lGOmpfpdmao="; 36 36 37 37 # options used by upstream: 38 38 # https://github.com/simulot/immich-go/blob/v0.25.0/.goreleaser.yaml ··· 47 47 ldflags+=" -X github.com/simulot/immich-go/Commit=$(cat COMMIT)" 48 48 ldflags+=" -X github.com/simulot/immich-go/Date=$(cat SOURCE_DATE)" 49 49 ''; 50 + 51 + __darwinAllowLocalNetworking = true; 50 52 51 53 nativeCheckInputs = [ 52 54 writableTmpDirAsHomeHook
+31 -31
pkgs/by-name/je/jetbrains-toolbox/package.nix
··· 11 11 12 12 let 13 13 pname = "jetbrains-toolbox"; 14 - version = "2.5.4.38621"; 14 + version = "2.6.1.40902"; 15 15 16 - passthru.updateScript = ./update.sh; 16 + updateScript = ./update.sh; 17 17 18 18 meta = { 19 19 description = "Jetbrains Toolbox"; ··· 34 34 attrs.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 35 35 36 36 linux = appimageTools.wrapAppImage rec { 37 - inherit 38 - pname 39 - version 40 - passthru 41 - meta 42 - ; 37 + inherit pname version meta; 38 + 39 + source = 40 + let 41 + arch = selectSystem { 42 + x86_64-linux = ""; 43 + aarch64-linux = "-arm64"; 44 + }; 45 + in 46 + fetchzip { 47 + url = "https://download.jetbrains.com/toolbox/jetbrains-toolbox-${version}${arch}.tar.gz"; 48 + hash = selectSystem { 49 + x86_64-linux = "sha256-P4kv6ca6mGtl334HKNkdo9Iib/Cgu3ROrbQKlQqxUj4="; 50 + aarch64-linux = "sha256-mG8GAVPi2I0A13rKhXoXxiRIHK1QOWPv4gZxfm0+DKs="; 51 + }; 52 + }; 43 53 44 54 src = appimageTools.extractType2 { 45 55 inherit pname version; 46 - src = 47 - let 48 - arch = selectSystem { 49 - x86_64-linux = ""; 50 - aarch64-linux = "-arm64"; 51 - }; 52 - in 53 - fetchzip { 54 - url = "https://download.jetbrains.com/toolbox/jetbrains-toolbox-${version}${arch}.tar.gz"; 55 - hash = selectSystem { 56 - x86_64-linux = "sha256-rq0Hn9g+/u9C8vbEVH2mv62c1dvxr+t9tBhf26swQgI="; 57 - aarch64-linux = "sha256-52wFejaKBSg/eeJu3NDGl1AdZLsJdi/838YeROD4Loc="; 58 - }; 59 - } 60 - + "/jetbrains-toolbox"; 56 + src = source + "/jetbrains-toolbox"; 61 57 postExtract = '' 62 58 patchelf --add-rpath ${lib.makeLibraryPath [ icu ]} $out/jetbrains-toolbox 63 59 ''; ··· 71 67 wrapProgram $out/bin/jetbrains-toolbox \ 72 68 --append-flags "--update-failed" 73 69 ''; 70 + 71 + passthru = { 72 + src = source; 73 + inherit updateScript; 74 + }; 74 75 }; 75 76 76 77 darwin = stdenv.mkDerivation (finalAttrs: { 77 - inherit 78 - pname 79 - version 80 - passthru 81 - meta 82 - ; 78 + inherit pname version meta; 83 79 84 80 src = 85 81 let ··· 91 87 fetchurl { 92 88 url = "https://download.jetbrains.com/toolbox/jetbrains-toolbox-${finalAttrs.version}${arch}.dmg"; 93 89 hash = selectSystem { 94 - x86_64-darwin = "sha256-y0zXQEqY5lj/e440dRtyBfaw8CwqqgzO3Ujreb37Z/I="; 95 - aarch64-darwin = "sha256-9Bj5puG9NUHO53oXBRlB5DvX9jGTmrkDgjV2QPH9qg0="; 90 + x86_64-darwin = "sha256-Dw1CqthgvKIlHrcQIoOpYbAG5c6uvq/UgzaO4n25YJY="; 91 + aarch64-darwin = "sha256-b/z8Pq8h6n34junSMyxRS3Y/TQ3tu05Bh77xlvMvEtI="; 96 92 }; 97 93 }; 98 94 ··· 109 105 110 106 runHook postInstall 111 107 ''; 108 + 109 + passthru = { 110 + inherit updateScript; 111 + }; 112 112 }); 113 113 in 114 114 if stdenv.hostPlatform.isDarwin then darwin else linux
+22 -7
pkgs/by-name/ko/koreader/package.nix
··· 11 11 luajit, 12 12 sdcv, 13 13 SDL2, 14 + openssl, 14 15 nix-update-script, 15 16 }: 16 17 let ··· 18 19 in 19 20 stdenv.mkDerivation rec { 20 21 pname = "koreader"; 21 - version = "2024.11"; 22 + version = "2025.04"; 22 23 23 24 src = 24 25 { 25 26 aarch64-linux = fetchurl { 26 27 url = "https://github.com/koreader/koreader/releases/download/v${version}/koreader-${version}-arm64.deb"; 27 - hash = "sha256-uy+4+pNyz10xrGM0QF9q0y6UpQK1B9PGNqrcK6nENQY="; 28 + hash = "sha256-bpKNP+1C0oHZEv6HGL4dBziv3RfCow882yV8JFLtDJ4="; 28 29 }; 29 30 armv7l-linux = fetchurl { 30 31 url = "https://github.com/koreader/koreader/releases/download/v${version}/koreader-${version}-armhf.deb"; 31 - hash = "sha256-lTc12qmoe0kGUhrStlGfDRw+cNJnX7F09/jKKc/1U9g="; 32 + hash = "sha256-q3M33f0b5FAU/nmPfzsXu93mVZOhXMVgBbfwnieqkeM="; 32 33 }; 33 34 x86_64-linux = fetchurl { 34 35 url = "https://github.com/koreader/koreader/releases/download/v${version}/koreader-${version}-amd64.deb"; 35 - hash = "sha256-ibehFrOcJqhM+CMAcHDn3Xwy6CueB8kdnoYMMDe/2Js="; 36 + hash = "sha256-ZZujk98YVvNJmffW2fDg+n+z1xgtkha7y1LasYEhCR4="; 36 37 }; 37 38 } 38 39 .${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); ··· 40 41 src_repo = fetchFromGitHub { 41 42 repo = "koreader"; 42 43 owner = "koreader"; 43 - rev = "v${version}"; 44 + tag = "v${version}"; 44 45 fetchSubmodules = true; 45 - sha256 = "sha256-EI8UOQuwhJqcAp8QnLYhI0K+uV/7ZqxdHNk8mPkDWA0="; 46 + hash = "sha256-Kt00AZARfQjGY8FzDcQB8UaowWW2+KWyXJzexFNmZmM="; 46 47 }; 47 48 48 49 nativeBuildInputs = [ ··· 56 57 luajit_lua52 57 58 sdcv 58 59 SDL2 60 + openssl 59 61 ]; 60 62 61 63 dontConfigure = true; ··· 63 65 64 66 installPhase = '' 65 67 mkdir -p $out 68 + dpkg-deb -x $src . 66 69 cp -R usr/* $out/ 70 + 71 + # Link required binaries 67 72 ln -sf ${luajit_lua52}/bin/luajit $out/lib/koreader/luajit 68 73 ln -sf ${sdcv}/bin/sdcv $out/lib/koreader/sdcv 69 74 ln -sf ${gnutar}/bin/tar $out/lib/koreader/tar 75 + 76 + # Link SSL/network libraries 77 + ln -sf ${openssl.out}/lib/libcrypto.so.3 $out/lib/koreader/libs/libcrypto.so.1.1 78 + ln -sf ${openssl.out}/lib/libssl.so.3 $out/lib/koreader/libs/libssl.so.1.1 79 + 80 + # Copy fonts 70 81 find ${src_repo}/resources/fonts -type d -execdir cp -r '{}' $out/lib/koreader/fonts \; 82 + 83 + # Remove broken symlinks 71 84 find $out -xtype l -print -delete 72 - wrapProgram $out/bin/koreader --prefix LD_LIBRARY_PATH : ${ 85 + 86 + wrapProgram $out/bin/koreader --prefix LD_LIBRARY_PATH : $out/lib/koreader/libs:${ 73 87 lib.makeLibraryPath [ 74 88 gtk3-x11 75 89 SDL2 76 90 glib 77 91 stdenv.cc.cc 92 + openssl.out 78 93 ] 79 94 } 80 95 '';
+36 -8
pkgs/by-name/li/live555/package.nix
··· 1 1 { 2 - lib, 2 + buildPackages, 3 3 cctools, 4 4 fetchpatch, 5 5 fetchurl, 6 + lib, 7 + live555, 6 8 openssl, 9 + runCommand, 7 10 stdenv, 8 - vlc, 9 11 }: 12 + let 13 + isStatic = stdenv.hostPlatform.isStatic; 14 + in 10 15 11 16 stdenv.mkDerivation (finalAttrs: { 12 17 pname = "live555"; ··· 42 47 "PREFIX=${placeholder "out"}" 43 48 "C_COMPILER=$(CC)" 44 49 "CPLUSPLUS_COMPILER=$(CXX)" 45 - "LIBRARY_LINK=$(AR) cr " 46 50 "LINK=$(CXX) -o " 51 + "LIBRARY_LINK=${if isStatic then "$(AR) cr " else "$(CC) -o "}" 47 52 ]; 48 53 49 54 # Since NIX_CFLAGS_COMPILE affects both C and C++ toolchains, we set CXXFLAGS ··· 83 88 let 84 89 platform = 85 90 if stdenv.hostPlatform.isLinux then 86 - "linux" 91 + if isStatic then "linux" else "linux-with-shared-libraries" 87 92 else if stdenv.hostPlatform.isDarwin then 88 93 "macosx-catalina" 89 94 else ··· 97 102 runHook postConfigure 98 103 ''; 99 104 100 - passthru.tests = { 101 - # Downstream dependency 102 - inherit vlc; 103 - }; 105 + doInstallCheck = true; 106 + installCheckPhase = '' 107 + if ! ($out/bin/openRTSP || :) 2>&1 | grep -q "Usage: "; then 108 + echo "Executing example program failed" >&2 109 + exit 1 110 + else 111 + echo "Example program executed successfully" 112 + fi 113 + ''; 114 + 115 + passthru.tests = 116 + let 117 + emulator = stdenv.hostPlatform.emulator buildPackages; 118 + in 119 + { 120 + # The installCheck phase above cannot be ran in cross-compilation scenarios, 121 + # therefore the passthru test 122 + run-test-prog = runCommand "live555-run-test-prog" { } '' 123 + if ! (${emulator} ${live555}/bin/openRTSP || :) 2>&1 | grep -q "Usage: "; then 124 + echo "Executing example program failed" >&2 125 + exit 1 126 + else 127 + echo "Example program executed successfully" 128 + touch $out 129 + fi 130 + ''; 131 + }; 104 132 105 133 meta = { 106 134 homepage = "http://www.live555.com/liveMedia/";
+2 -2
pkgs/by-name/ll/llama-cpp/package.nix
··· 72 72 in 73 73 effectiveStdenv.mkDerivation (finalAttrs: { 74 74 pname = "llama-cpp"; 75 - version = "5141"; 75 + version = "5186"; 76 76 77 77 src = fetchFromGitHub { 78 78 owner = "ggml-org"; 79 79 repo = "llama.cpp"; 80 80 tag = "b${finalAttrs.version}"; 81 - hash = "sha256-qHjHsc2v4LB+GVYni97d3KVo5uJqpF7RQqG2rWXwpHY="; 81 + hash = "sha256-f07FvHgRobUbei06kcKHJ1ulLCYARAvo64oWsDBwHO0="; 82 82 leaveDotGit = true; 83 83 postFetch = '' 84 84 git -C "$out" rev-parse --short HEAD > $out/COMMIT
+3 -3
pkgs/by-name/lo/lockbook-desktop/package.nix
··· 18 18 in 19 19 rustPlatform.buildRustPackage rec { 20 20 pname = "lockbook-desktop"; 21 - version = "0.9.21"; 21 + version = "0.9.22"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "lockbook"; 25 25 repo = "lockbook"; 26 26 tag = version; 27 - hash = "sha256-SRmfLxF78jR1a/37pU1TLM6nFpmYLRbHJzQIVQtM8/M="; 27 + hash = "sha256-akCtnPLJupoo7n3Vfyl37fjCmK4dHB0bt92rie6k0dQ="; 28 28 }; 29 29 30 30 useFetchCargoVendor = true; 31 - cargoHash = "sha256-faqbsxXF2AjDE+FMkD1PihacPAvQlD6nkczN4QdsCeM="; 31 + cargoHash = "sha256-xH3GIwh3zaLbpZqvzM+KM+K14fWj241RTwUM7dWRCKA="; 32 32 33 33 nativeBuildInputs = [ 34 34 pkg-config
+3 -3
pkgs/by-name/lo/lockbook/package.nix
··· 7 7 }: 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "lockbook"; 10 - version = "0.9.21"; 10 + version = "0.9.22"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "lockbook"; 14 14 repo = "lockbook"; 15 15 tag = version; 16 - hash = "sha256-SRmfLxF78jR1a/37pU1TLM6nFpmYLRbHJzQIVQtM8/M="; 16 + hash = "sha256-akCtnPLJupoo7n3Vfyl37fjCmK4dHB0bt92rie6k0dQ="; 17 17 }; 18 18 19 19 useFetchCargoVendor = true; 20 - cargoHash = "sha256-faqbsxXF2AjDE+FMkD1PihacPAvQlD6nkczN4QdsCeM="; 20 + cargoHash = "sha256-xH3GIwh3zaLbpZqvzM+KM+K14fWj241RTwUM7dWRCKA="; 21 21 22 22 doCheck = false; # there are no cli tests 23 23 cargoBuildFlags = [
+23
pkgs/by-name/lx/lx-music-desktop/electron-builder.patch
··· 1 + diff --git a/build-config/build-pack.js b/build-config/build-pack.js 2 + index 569252c..ccaef34 100644 3 + --- a/build-config/build-pack.js 4 + +++ b/build-config/build-pack.js 5 + @@ -1,7 +1,5 @@ 6 + /* eslint-disable no-template-curly-in-string */ 7 + - 8 + const builder = require('electron-builder') 9 + -const beforePack = require('./build-before-pack') 10 + const afterPack = require('./build-after-pack') 11 + 12 + /** 13 + @@ -11,8 +9,9 @@ const afterPack = require('./build-after-pack') 14 + const options = { 15 + appId: 'cn.toside.music.desktop', 16 + productName: 'lx-music-desktop', 17 + - beforePack, 18 + afterPack, 19 + + electronVersion: "@electron_version@", 20 + + electronDist: "./electron-dist", 21 + protocols: { 22 + name: 'lx-music-protocol', 23 + schemes: [
+57 -52
pkgs/by-name/lx/lx-music-desktop/package.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchurl, 5 - makeWrapper, 4 + buildNpmPackage, 6 5 7 - dpkg, 8 - libGL, 9 - systemd, 10 - electron_32, 6 + fetchFromGitHub, 7 + replaceVars, 8 + 9 + makeWrapper, 11 10 11 + electron_34, 12 12 commandLineArgs ? "", 13 13 }: 14 14 15 15 let 16 + # if we want to use later electron, we'll need to bump the `node-abi` npm package version 17 + electron = electron_34; 18 + in 19 + buildNpmPackage rec { 16 20 pname = "lx-music-desktop"; 17 21 version = "2.10.0"; 18 22 19 - buildUrl = 20 - version: arch: 21 - "https://github.com/lyswhut/lx-music-desktop/releases/download/v${version}/lx-music-desktop_${version}_${arch}.deb"; 22 - 23 - srcs = { 24 - x86_64-linux = fetchurl { 25 - url = buildUrl version "amd64"; 26 - hash = "sha256-btNB8XFCJij1wUVZoWaa55vZn5n1gsKSMnEbQPTd9lg="; 27 - }; 28 - 29 - aarch64-linux = fetchurl { 30 - url = buildUrl version "arm64"; 31 - hash = "sha256-GVTzxTV7bM4AWZ+Xfb70fyedDMIa9eX/YwnGkm3WOsk="; 32 - }; 33 - 34 - armv7l-linux = fetchurl { 35 - url = buildUrl version "armv7l"; 36 - hash = "sha256-3zttIk+A4BpG0W196LzgTJ5WeqWvLjqPFz6e9RCGlJo="; 37 - }; 23 + src = fetchFromGitHub { 24 + owner = "lyswhut"; 25 + repo = "lx-music-desktop"; 26 + tag = "v${version}"; 27 + hash = "sha256-8IzQEGdaeoBbCsZSPhVowipeBr4YHGm/G28qGHtCY/s="; 38 28 }; 39 29 40 - host = stdenv.hostPlatform.system; 41 - src = srcs.${host} or (throw "Unsupported system: ${host}"); 42 - 43 - runtimeLibs = lib.makeLibraryPath [ 44 - libGL 45 - stdenv.cc.cc 30 + patches = [ 31 + # set electron version and dist dir 32 + # disable before-pack: it would copy prebuilt libraries 33 + (replaceVars ./electron-builder.patch { 34 + electron_version = electron.version; 35 + }) 46 36 ]; 47 - in 48 - stdenv.mkDerivation { 49 - inherit pname version src; 50 37 51 38 nativeBuildInputs = [ 52 - dpkg 53 39 makeWrapper 54 40 ]; 55 41 56 - runtimeDependencies = map lib.getLib [ 57 - systemd 58 - ]; 42 + npmDepsHash = "sha256-awD8gu1AnhUn5uT/dITXjMVWNAwABAmcEVZOKukbWrI="; 43 + 44 + makeCacheWritable = true; 45 + 46 + env.ELECTRON_SKIP_BINARY_DOWNLOAD = "1"; 47 + 48 + # we haven't set up npm_config_nodedir at this point 49 + # and electron-rebuild will rebuild the native libs later anyway 50 + npmFlags = [ "--ignore-scripts" ]; 51 + 52 + preBuild = '' 53 + # delete prebuilt libs 54 + rm -r build-config/lib 55 + 56 + # don't spam the build logs 57 + substituteInPlace build-config/pack.js \ 58 + --replace-fail 'new Spinnies({' 'new Spinnies({disableSpins:true,' 59 + 60 + # this directory is configured to be used in the patch 61 + cp -r ${electron.dist} electron-dist 62 + chmod -R u+w electron-dist 63 + 64 + export npm_config_nodedir=${electron.headers} 65 + export npm_config_build_from_source="true" 66 + 67 + npm rebuild --no-progress --verbose 68 + ''; 69 + 70 + npmBuildScript = "pack:dir"; 59 71 60 72 installPhase = '' 61 73 runHook preInstall 62 74 63 - mkdir -p $out/bin $out/opt/lx-music-desktop 64 - cp -r opt/lx-music-desktop/{resources,locales} $out/opt/lx-music-desktop 65 - cp -r usr/share $out/share 66 - 67 - substituteInPlace $out/share/applications/lx-music-desktop.desktop \ 68 - --replace-fail "/opt/lx-music-desktop/lx-music-desktop" "$out/bin/lx-music-desktop" \ 75 + mkdir -p "$out/opt/lx-music-desktop" 76 + cp -r build/*-unpacked/{locales,resources{,.pak}} "$out/opt/lx-music-desktop" 77 + rm "$out/opt/lx-music-desktop/resources/app-update.yml" 69 78 70 79 runHook postInstall 71 80 ''; 72 81 73 82 postFixup = '' 74 - makeWrapper ${electron_32}/bin/electron $out/bin/lx-music-desktop \ 83 + makeWrapper ${lib.getExe electron} $out/bin/lx-music-desktop \ 75 84 --add-flags $out/opt/lx-music-desktop/resources/app.asar \ 76 - --prefix LD_LIBRARY_PATH : "${runtimeLibs}" \ 77 85 --add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime=true}}" \ 78 - --add-flags ${lib.escapeShellArg commandLineArgs} \ 86 + --add-flags ${lib.escapeShellArg commandLineArgs} 79 87 ''; 80 88 81 89 meta = with lib; { 90 + broken = stdenv.hostPlatform.isDarwin; 82 91 description = "Music software based on Electron and Vue"; 83 92 homepage = "https://github.com/lyswhut/lx-music-desktop"; 84 93 changelog = "https://github.com/lyswhut/lx-music-desktop/releases/tag/v${version}"; 85 94 license = licenses.asl20; 86 - platforms = [ 87 - "x86_64-linux" 88 - "aarch64-linux" 89 - "armv7l-linux" 90 - ]; 95 + platforms = electron.meta.platforms; 91 96 sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 92 97 mainProgram = "lx-music-desktop"; 93 98 maintainers = with maintainers; [ oosquare ];
+2 -2
pkgs/by-name/ly/LycheeSlicer/package.nix
··· 7 7 }: 8 8 let 9 9 pname = "LycheeSlicer"; 10 - version = "7.3.1"; 10 + version = "7.3.2"; 11 11 12 12 src = fetchurl { 13 13 url = "https://mango-lychee.nyc3.cdn.digitaloceanspaces.com/LycheeSlicer-${version}.AppImage"; 14 - hash = "sha256-21ySVT2Un/WAWxvEAH5GfrumGbsSaeNVjaMsL9mYwsg="; 14 + hash = "sha256-CmN4Q4gTGYeICIoLz0UuVlSyOstXW/yYVb4s1dT5EOc="; 15 15 }; 16 16 17 17 desktopItem = makeDesktopItem {
+19 -7
pkgs/by-name/ma/mapcache/package.nix
··· 12 12 fcgi, 13 13 gdal, 14 14 geos, 15 + gfortran, 15 16 libgeotiff, 16 17 libjpeg, 17 18 libpng, ··· 23 24 zlib, 24 25 }: 25 26 26 - stdenv.mkDerivation rec { 27 + stdenv.mkDerivation (finalAttrs: { 27 28 pname = "mapcache"; 28 29 version = "1.14.1"; 29 30 30 31 src = fetchFromGitHub { 31 32 owner = "MapServer"; 32 33 repo = "mapcache"; 33 - rev = "rel-${lib.replaceStrings [ "." ] [ "-" ] version}"; 34 + tag = "rel-${lib.replaceStrings [ "." ] [ "-" ] finalAttrs.version}"; 34 35 hash = "sha256-AwdZdOEq9SZ5VzuBllg4U1gdVxZ9IVdqiDrn3QuRdCk="; 35 36 }; 36 37 37 - nativeBuildInputs = [ 38 - cmake 39 - pkg-config 40 - ]; 38 + nativeBuildInputs = 39 + [ 40 + cmake 41 + pkg-config 42 + ] 43 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ 44 + # work around for `ld: file not found: @rpath/libquadmath.0.dylib` 45 + gfortran.cc 46 + ]; 41 47 42 48 buildInputs = [ 43 49 apacheHttpd ··· 70 76 71 77 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.hostPlatform.isDarwin "-std=c99"; 72 78 79 + prePatch = lib.optionalString stdenv.hostPlatform.isDarwin '' 80 + substituteInPlace CMakeLists.txt \ 81 + --replace-fail "include_directories(\''${TIFF_INCLUDE_DIR})" "" \ 82 + --replace-fail "target_link_libraries(mapcache \''${TIFF_LIBRARY})" "target_link_libraries(mapcache TIFF::TIFF)" 83 + ''; 84 + 73 85 meta = { 74 86 description = "Server that implements tile caching to speed up access to WMS layers"; 75 87 homepage = "https://mapserver.org/mapcache/"; ··· 78 90 maintainers = lib.teams.geospatial.members; 79 91 platforms = lib.platforms.unix; 80 92 }; 81 - } 93 + })
+2 -2
pkgs/by-name/ma/mattermostLatest/package.nix
··· 11 11 # and make sure the version regex is up to date here. 12 12 # Ensure you also check ../mattermost/package.nix for ESR releases. 13 13 regex = "^v(10\\.[0-9]+\\.[0-9]+)$"; 14 - version = "10.7.0"; 15 - srcHash = "sha256-T8lLF5AsJYALVijXOUxkSACa6h8W4HcqoML2+BPsEsY="; 14 + version = "10.7.1"; 15 + srcHash = "sha256-pUVy/l6C3ygwX2JMQmHEpiHwYEUBl1/k37gq2fLM0Os="; 16 16 vendorHash = "sha256-B2vfHszOVKbkN7h0tQGeGzLdeuxQDgaFv9QWkQgGCWs="; 17 17 npmDepsHash = "sha256-ZMgsfdmGtU3PgdmiY0xMCHh8dAOAmEFNbKcxXKO7CJc="; 18 18 lockfileOverlay = ''
+3 -3
pkgs/by-name/mi/miniflux/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "miniflux"; 12 - version = "2.2.7"; 12 + version = "2.2.8"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "miniflux"; 16 16 repo = "v2"; 17 17 tag = version; 18 - hash = "sha256-1W+sFXvM5qOYxpbRBkZIvombchv2oYkcFuq7/ETGjfs="; 18 + hash = "sha256-AQ6HVRVlWt1D8fA4Z2FH7VIEKydDva7txwa/9Rfq0Ho="; 19 19 }; 20 20 21 - vendorHash = "sha256-bulQrLtA61RMZVhTtupTJUUTWJGWXcmpGaNUAoXEfYE="; 21 + vendorHash = "sha256-9I0/dyjanuV8oZystox9RY/gGx1SZuFRTghArv5aJ64="; 22 22 23 23 nativeBuildInputs = [ installShellFiles ]; 24 24
+140
pkgs/by-name/ol/olivetin/package.nix
··· 1 + { 2 + lib, 3 + fetchFromGitHub, 4 + buildGoModule, 5 + stdenvNoCC, 6 + writableTmpDirAsHomeHook, 7 + buf, 8 + protoc-gen-go, 9 + protoc-gen-go-grpc, 10 + grpc-gateway, 11 + buildNpmPackage, 12 + installShellFiles, 13 + versionCheckHook, 14 + nixosTests, 15 + }: 16 + 17 + buildGoModule ( 18 + finalAttrs: 19 + 20 + let 21 + gen = stdenvNoCC.mkDerivation { 22 + pname = "olivetin-gen"; 23 + inherit (finalAttrs) version src; 24 + 25 + nativeBuildInputs = [ 26 + writableTmpDirAsHomeHook 27 + buf 28 + protoc-gen-go 29 + protoc-gen-go-grpc 30 + grpc-gateway 31 + ]; 32 + 33 + buildPhase = '' 34 + runHook preBuild 35 + 36 + pushd proto 37 + buf generate 38 + popd 39 + 40 + runHook postBuild 41 + ''; 42 + 43 + installPhase = '' 44 + runHook preInstall 45 + 46 + cp -r service/gen $out 47 + 48 + runHook postInstall 49 + ''; 50 + 51 + outputHashMode = "recursive"; 52 + outputHash = "sha256-KygZ7NqkfhczYy1YMR824Om4NTq06+KHa/jvmsCty3s="; 53 + }; 54 + 55 + webui = buildNpmPackage { 56 + pname = "olivetin-webui"; 57 + inherit (finalAttrs) version src; 58 + 59 + npmDepsHash = "sha256-VxIPjpsbxEPP15cu5Wvz0qeDGXTMb2tojdry8YaHMVI="; 60 + 61 + sourceRoot = "${finalAttrs.src.name}/webui.dev"; 62 + 63 + buildPhase = '' 64 + runHook preBuild 65 + 66 + npx parcel build --public-url "." 67 + 68 + runHook postBuild 69 + ''; 70 + 71 + installPhase = '' 72 + runHook preInstall 73 + 74 + cp -r dist $out 75 + cp -r *.png $out 76 + 77 + runHook postInstall 78 + ''; 79 + }; 80 + in 81 + 82 + { 83 + pname = "olivetin"; 84 + version = "2025.4.22"; 85 + 86 + src = fetchFromGitHub { 87 + owner = "OliveTin"; 88 + repo = "OliveTin"; 89 + tag = finalAttrs.version; 90 + hash = "sha256-dgoYGtBsyaCTgxCT/y7rU5B9pEvIU/yiLU2/pPm/vJU="; 91 + }; 92 + 93 + modRoot = "service"; 94 + 95 + vendorHash = "sha256-yUW4BrC7Oqs+mvvZGp6oxdGQ9fxP5gQNacq6Pz5ZHAQ="; 96 + 97 + ldflags = [ 98 + "-s" 99 + "-w" 100 + "-X main.version=${finalAttrs.version}" 101 + ]; 102 + 103 + __darwinAllowLocalNetworking = true; 104 + 105 + nativeBuildInputs = [ installShellFiles ]; 106 + 107 + preBuild = '' 108 + ln -s ${gen} gen 109 + substituteInPlace internal/config/config.go \ 110 + --replace-fail 'config.WebUIDir = "./webui"' 'config.WebUIDir = "${webui}"' 111 + substituteInPlace internal/httpservers/webuiServer_test.go \ 112 + --replace-fail '"../webui/"' '"${webui}"' 113 + ''; 114 + 115 + postInstall = '' 116 + installManPage ../var/manpage/OliveTin.1.gz 117 + ''; 118 + 119 + nativeInstallCheckInputs = [ versionCheckHook ]; 120 + versionCheckProgram = "${placeholder "out"}/bin/OliveTin"; 121 + versionCheckProgramArg = "-version"; 122 + doInstallCheck = true; 123 + 124 + passthru = { 125 + inherit gen webui; 126 + tests = { inherit (nixosTests) olivetin; }; 127 + updateScript = ./update.sh; 128 + }; 129 + 130 + meta = { 131 + description = "Gives safe and simple access to predefined shell commands from a web interface"; 132 + homepage = "https://www.olivetin.app/"; 133 + downloadPage = "https://github.com/OliveTin/OliveTin"; 134 + changelog = "https://github.com/OliveTin/OliveTin/releases/tag/${finalAttrs.version}"; 135 + license = lib.licenses.agpl3Only; 136 + maintainers = with lib.maintainers; [ defelo ]; 137 + mainProgram = "OliveTin"; 138 + }; 139 + } 140 + )
+9
pkgs/by-name/ol/olivetin/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p nix-update common-updater-scripts 3 + 4 + set -euo pipefail 5 + 6 + nix-update olivetin --src-only 7 + update-source-version olivetin --source-key=gen --ignore-same-version 8 + update-source-version olivetin --source-key=webui.npmDeps --ignore-same-version 9 + update-source-version olivetin --source-key=goModules --ignore-same-version
+15
pkgs/by-name/op/openimageio/2.nix
··· 1 + { fetchFromGitHub, openimageio }: 2 + 3 + let 4 + version = "2.5.17.0"; 5 + in 6 + openimageio.overrideAttrs { 7 + inherit version; 8 + 9 + src = fetchFromGitHub { 10 + owner = "AcademySoftwareFoundation"; 11 + repo = "OpenImageIO"; 12 + tag = "v${version}"; 13 + hash = "sha256-d5LqRcqWj6E9jJYY/Pa5e7/MeuQGMjUo/hMCYRKsKeU="; 14 + }; 15 + }
+1 -1
pkgs/by-name/op/ophcrack/package.nix
··· 15 15 version = "3.8.0"; 16 16 17 17 src = fetchurl { 18 - url = "mirror://ophcrack/ophcrack/${version}/ophcrack-${version}.tar.bz2"; 18 + url = "mirror://sourceforge/ophcrack/${version}/ophcrack-${version}.tar.bz2"; 19 19 hash = "sha256-BIpt9XmDo6WjGsfE7BLfFqpJ5lKilnbZPU75WdUK7uA="; 20 20 }; 21 21
+4 -4
pkgs/by-name/os/osu-lazer-bin/package.nix
··· 10 10 11 11 let 12 12 pname = "osu-lazer-bin"; 13 - version = "2025.420.0"; 13 + version = "2025.424.0"; 14 14 15 15 src = 16 16 { 17 17 aarch64-darwin = fetchzip { 18 18 url = "https://github.com/ppy/osu/releases/download/${version}/osu.app.Apple.Silicon.zip"; 19 - hash = "sha256-rFPh1mziEcbqBhxRAoV2qHKNQeWjWIrprx6tXnLoGLs="; 19 + hash = "sha256-fgG3SnltGxOYHwos8BTngaW4YrRdpOdURxd73sz0t7o="; 20 20 stripRoot = false; 21 21 }; 22 22 x86_64-darwin = fetchzip { 23 23 url = "https://github.com/ppy/osu/releases/download/${version}/osu.app.Intel.zip"; 24 - hash = "sha256-PlyJkN9ALSE8s2gPVkMXoZd+1FKqqFxIFPLkJkXwk0k="; 24 + hash = "sha256-0K+uAH4f8JOfzG4J37aGaStpEkH5tdUfHEqsogMtN2I="; 25 25 stripRoot = false; 26 26 }; 27 27 x86_64-linux = fetchurl { 28 28 url = "https://github.com/ppy/osu/releases/download/${version}/osu.AppImage"; 29 - hash = "sha256-yrVFep119E2PkRsyB0UPhZnjR7jXuhd9CktIgL98om4="; 29 + hash = "sha256-8nOoSkNbzEFpDj0FivCYI20tZzT02YHcKZblfEfh+Zo="; 30 30 }; 31 31 } 32 32 .${stdenvNoCC.system} or (throw "osu-lazer-bin: ${stdenvNoCC.system} is unsupported.");
+2 -2
pkgs/by-name/os/osu-lazer/package.nix
··· 22 22 23 23 buildDotnetModule rec { 24 24 pname = "osu-lazer"; 25 - version = "2025.420.0"; 25 + version = "2025.424.0"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "ppy"; 29 29 repo = "osu"; 30 30 tag = version; 31 - hash = "sha256-yDWU4mQYR6a9eKTEEsxZ2UASvMuQzWi+HZbDmanhalA="; 31 + hash = "sha256-+r7YeaNrUkoYoMzGqhqT+bqdO1UohvJRlAcAskF7vn4="; 32 32 }; 33 33 34 34 projectFile = "osu.Desktop/osu.Desktop.csproj";
+2 -2
pkgs/by-name/po/pocket-id/package.nix
··· 12 12 13 13 stdenvNoCC.mkDerivation (finalAttrs: { 14 14 pname = "pocket-id"; 15 - version = "0.48.0"; 15 + version = "0.49.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pocket-id"; 19 19 repo = "pocket-id"; 20 20 tag = "v${finalAttrs.version}"; 21 - hash = "sha256-ax5E3e3GUrQLVsQREUhjmORjXQgKrEBVa9ySJr5ZLUY="; 21 + hash = "sha256-fyyeYArjhsS/R9VsZsRM3oO5fz8EUqjNIuvFJpGZbds="; 22 22 }; 23 23 24 24 backend = buildGoModule {
+6 -6
pkgs/by-name/qq/qq/sources.nix
··· 1 1 # Generated by ./update.sh - do not update manually! 2 - # Last updated: 2025-04-06 2 + # Last updated: 2025-04-25 3 3 { 4 - version = "3.2.16-2025.4.1"; 5 - amd64_url = "https://dldir1.qq.com/qqfile/qq/QQNT/Linux/QQ_3.2.16_250401_amd64_01.deb"; 6 - arm64_url = "https://dldir1.qq.com/qqfile/qq/QQNT/Linux/QQ_3.2.16_250401_arm64_01.deb"; 7 - arm64_hash = "sha256-av1Pu5ZXASc0Jmm0c7xxtmECIHAYWOo1NQOdI3fDmZA="; 8 - amd64_hash = "sha256-f+7bo4zVSywnAE1WJPUjVLyFJQYlz56QVEah2uDSzP8="; 4 + version = "3.2.17-2025.4.23"; 5 + amd64_url = "https://dldir1.qq.com/qqfile/qq/QQNT/Linux/QQ_3.2.17_250423_amd64_01.deb"; 6 + arm64_url = "https://dldir1.qq.com/qqfile/qq/QQNT/Linux/QQ_3.2.17_250423_arm64_01.deb"; 7 + arm64_hash = "sha256-BJ6WNswd9foQRD+SrJm854OiSVxREHJIv+VFe1NGnKE="; 8 + amd64_hash = "sha256-l65Gci0wRcGuL7xqwnCng8hWdlbNC6pEaE8NaZpftM0="; 9 9 }
+2 -2
pkgs/by-name/qu/quarkus/package.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "quarkus-cli"; 11 - version = "3.21.1"; 11 + version = "3.21.4"; 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/quarkusio/quarkus/releases/download/${finalAttrs.version}/quarkus-cli-${finalAttrs.version}.tar.gz"; 15 - hash = "sha256-5RQsGznVMVR24v0hxIWKV+Hs6SR0g0tsY7tpgFp8sps="; 15 + hash = "sha256-ksI55x1rmpIRfNNgajmAvprKU3OwL4EW8QpNV2eyPTc="; 16 16 }; 17 17 18 18 nativeBuildInputs = [ makeWrapper ];
+7 -8
pkgs/by-name/re/rerun/package.nix
··· 28 28 # More information can be found in there README: 29 29 # https://raw.githubusercontent.com/rerun-io/rerun/5a9794990c4903c088ad77174e65eb2573162d97/crates/utils/re_analytics/README.md 30 30 buildWebViewerFeatures ? [ 31 - "grpc" 32 31 "map_view" 33 32 ], 34 33 }: 35 34 36 - rustPlatform.buildRustPackage rec { 35 + rustPlatform.buildRustPackage (finalAttrs: { 37 36 pname = "rerun"; 38 - version = "0.22.1"; 37 + version = "0.23.0"; 39 38 40 39 src = fetchFromGitHub { 41 40 owner = "rerun-io"; 42 41 repo = "rerun"; 43 - tag = version; 44 - hash = "sha256-J9Iy/KiDajDavL95qLcQBfUWpZ6OiUtldk+ZAGpSNWA="; 42 + tag = finalAttrs.version; 43 + hash = "sha256-ZMvX/9kz+tEiQ01GO7B+/wdxxkFkuExR9jA2KROIbgw="; 45 44 }; 46 45 47 46 # The path in `build.rs` is wrong for some reason, so we patch it to make the passthru tests work ··· 51 50 ''; 52 51 53 52 useFetchCargoVendor = true; 54 - cargoHash = "sha256-cGg8yi/jYKyle8dudHSNLPMnOtcgqlBQmu83h4B26NI="; 53 + cargoHash = "sha256-2BMBfEunRRMX4++w0Fg9wTAeEmODtOTcruXCO9JKreo="; 55 54 56 55 cargoBuildFlags = [ "--package rerun-cli" ]; 57 56 cargoTestFlags = [ "--package rerun-cli" ]; ··· 153 152 meta = { 154 153 description = "Visualize streams of multimodal data. Fast, easy to use, and simple to integrate. Built in Rust using egui"; 155 154 homepage = "https://github.com/rerun-io/rerun"; 156 - changelog = "https://github.com/rerun-io/rerun/blob/${version}/CHANGELOG.md"; 155 + changelog = "https://github.com/rerun-io/rerun/blob/${finalAttrs.version}/CHANGELOG.md"; 157 156 license = with lib.licenses; [ 158 157 asl20 159 158 mit ··· 164 163 ]; 165 164 mainProgram = "rerun"; 166 165 }; 167 - } 166 + })
+3 -3
pkgs/by-name/ru/ruff/package.nix
··· 16 16 17 17 rustPlatform.buildRustPackage (finalAttrs: { 18 18 pname = "ruff"; 19 - version = "0.11.6"; 19 + version = "0.11.7"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "astral-sh"; 23 23 repo = "ruff"; 24 24 tag = finalAttrs.version; 25 - hash = "sha256-Yi8eRA2xL+wumXXrq5c4NNtPORZ3BjEM5IowDEfsjwA="; 25 + hash = "sha256-DXu9/DRwcffZtsql/Qk+6GyzhiYXUyW6R9FCAvLhn6o="; 26 26 }; 27 27 28 28 useFetchCargoVendor = true; 29 - cargoHash = "sha256-rJNA6Lh3OnY60BZ8YnjP+7cSGftbCb69ISQyr7z523Q="; 29 + cargoHash = "sha256-4TK7HEdSCvUGqsAH+dnPgMBYmT/0mOnvQXHr/PtcsT0="; 30 30 31 31 nativeBuildInputs = [ installShellFiles ]; 32 32
+65
pkgs/by-name/ru/rundeck-cli/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchurl, 5 + makeWrapper, 6 + jdk11, 7 + unzip, 8 + versionCheckHook, 9 + nix-update-script, 10 + }: 11 + 12 + stdenv.mkDerivation (finalAttrs: { 13 + pname = "rundeck-cli"; 14 + version = "2.0.8"; 15 + 16 + src = fetchurl { 17 + url = "https://github.com/rundeck/rundeck-cli/releases/download/v${finalAttrs.version}/rundeck-cli-${finalAttrs.version}-all.jar"; 18 + hash = "sha256-mpy4oS7zCUdt4Q+KQPrGGbw6Gzmh1Msygl+NXDmFhDw="; 19 + }; 20 + 21 + nativeBuildInputs = [ makeWrapper ]; 22 + buildInputs = [ jdk11 ]; 23 + 24 + dontUnpack = true; 25 + 26 + installPhase = '' 27 + runHook preInstall 28 + 29 + mkdir -p $out/share/rundeck-cli 30 + cp $src $out/share/rundeck-cli/rundeck-cli.jar 31 + 32 + mkdir -p $out/bin 33 + makeWrapper ${lib.getExe jdk11} $out/bin/rd \ 34 + --add-flags "-jar $out/share/rundeck-cli/rundeck-cli.jar" 35 + 36 + runHook postInstall 37 + ''; 38 + 39 + nativeInstallCheckInputs = [ 40 + versionCheckHook 41 + ]; 42 + versionCheckProgram = "${placeholder "out"}/bin/rd"; 43 + versionCheckProgramArg = "--version"; 44 + doInstallCheck = true; 45 + 46 + passthru = { 47 + updateScript = nix-update-script { }; 48 + }; 49 + 50 + meta = { 51 + description = "The official CLI tool for Rundeck"; 52 + longDescription = '' 53 + The rd command provides command line access to the Rundeck HTTP API, 54 + allowing you to access and control your Rundeck server from the 55 + command line or shell scripts. 56 + ''; 57 + homepage = "https://github.com/rundeck/rundeck-cli"; 58 + changelog = "https://github.com/rundeck/rundeck-cli/blob/v${finalAttrs.version}/docs/changes.md"; 59 + sourceProvenance = [ lib.sourceTypes.binaryBytecode ]; 60 + license = lib.licenses.asl20; 61 + platforms = lib.platforms.unix; 62 + maintainers = with lib.maintainers; [ liberodark ]; 63 + mainProgram = "rd"; 64 + }; 65 + })
+3 -3
pkgs/by-name/ru/rundeck/package.nix
··· 11 11 12 12 stdenv.mkDerivation (finalAttrs: { 13 13 pname = "rundeck"; 14 - version = "5.10.0-20250312"; 14 + version = "5.11.1-20250415"; 15 15 16 16 src = fetchurl { 17 17 url = "https://packagecloud.io/pagerduty/rundeck/packages/java/org.rundeck/rundeck-${finalAttrs.version}.war/artifacts/rundeck-${finalAttrs.version}.war/download?distro_version_id=167"; 18 - hash = "sha256-BwO7FM1LP0OrjG7opz4qqDuJQdtBmmFtZTtigV99ssE="; 18 + hash = "sha256-WOxY2GGtll+2xkSbJUKOvgsr408nIvRcEuBULcawijc="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ makeWrapper ]; ··· 55 55 sourceProvenance = [ lib.sourceTypes.binaryBytecode ]; 56 56 license = lib.licenses.asl20; 57 57 platforms = lib.platforms.unix; 58 - maintainers = [ lib.maintainers.liberodark ]; 58 + maintainers = with lib.maintainers; [ liberodark ]; 59 59 mainProgram = "rundeck"; 60 60 }; 61 61 })
+13
pkgs/by-name/sd/SDL2_classic_image/package.nix
··· 1 + { 2 + SDL2_image, 3 + SDL2_classic, 4 + enableSTB ? true, 5 + }: 6 + 7 + (SDL2_image.override { 8 + SDL2 = SDL2_classic; 9 + inherit enableSTB; 10 + }).overrideAttrs 11 + { 12 + pname = "SDL2_classic_image"; 13 + }
+11
pkgs/by-name/sd/SDL2_classic_mixer/package.nix
··· 1 + { 2 + SDL2_mixer, 3 + SDL2_classic, 4 + }: 5 + 6 + (SDL2_mixer.override { 7 + SDL2 = SDL2_classic; 8 + }).overrideAttrs 9 + { 10 + pname = "SDL2_classic_mixer"; 11 + }
+8
pkgs/by-name/sd/SDL2_classic_mixer_2_0/package.nix
··· 1 + { 2 + SDL2_mixer_2_0, 3 + SDL2_classic_mixer, 4 + }: 5 + 6 + SDL2_mixer_2_0.override { 7 + SDL2_mixer = SDL2_classic_mixer; 8 + }
+11
pkgs/by-name/sd/SDL2_classic_ttf/package.nix
··· 1 + { 2 + SDL2_ttf, 3 + SDL2_classic, 4 + }: 5 + 6 + (SDL2_ttf.override { 7 + SDL2 = SDL2_classic; 8 + }).overrideAttrs 9 + { 10 + pname = "SDL2_classic_ttf"; 11 + }
-2
pkgs/by-name/sd/SDL2_image/package.nix
··· 3 3 SDL2, 4 4 autoreconfHook, 5 5 fetchurl, 6 - giflib, 7 - libXpm, 8 6 libjpeg, 9 7 libpng, 10 8 libtiff,
+2 -2
pkgs/by-name/si/signal-desktop-bin/signal-desktop-darwin.nix
··· 6 6 }: 7 7 stdenv.mkDerivation (finalAttrs: { 8 8 pname = "signal-desktop-bin"; 9 - version = "7.47.0"; 9 + version = "7.51.0"; 10 10 11 11 src = fetchurl { 12 12 url = "https://updates.signal.org/desktop/signal-desktop-mac-universal-${finalAttrs.version}.dmg"; 13 - hash = "sha256-PP8D6D/DJiONJp0UNUSoy8zDwWGVWRRMsqfPTWQCgs8="; 13 + hash = "sha256-dUcBvKbGVsEUxOSv8u/jjuvYjHar2+zbv+/ZRS85w1w="; 14 14 }; 15 15 sourceRoot = "."; 16 16
+3 -3
pkgs/by-name/tr/trezor-suite/package.nix
··· 10 10 11 11 let 12 12 pname = "trezor-suite"; 13 - version = "25.2.2"; 13 + version = "25.4.2"; 14 14 15 15 suffix = 16 16 { ··· 24 24 hash = 25 25 { 26 26 # curl -Lfs https://github.com/trezor/trezor-suite/releases/download/v${version}/latest-linux{-arm64,}.yml | grep ^sha512 | sed 's/: /-/' 27 - aarch64-linux = "sha512-9EWbYju0e3DdS8bnuMiD4Cdodz/LxbLyCItNEWSIi/UADxtH7smAbpAu4Awcgbb3o39x94Mf8rbqcxmIktDDhQ=="; 28 - x86_64-linux = "sha512-j8TI46Jr/Tc99Ri3aFY0z73HFY5AWpeAv/yJy8xsV8rNGWEwKlCvJzkrEUpvpFUBMoHgGw3PTQ7CYUQ5bmB/CA=="; 27 + aarch64-linux = "sha512-BqZjccLs1eHcHmmzyWa3L37KjKjHJFxEhk+BtAD52Z9Mg8wq2Qpz0+z5JrCOXdqLf+j5jfmAQae2HpQhQrqV3g=="; 28 + x86_64-linux = "sha512-P4+FQd5Uis1rCzCOCpNNAbGS70t/u7FYHkz2+ylF+yBHauARsyvLm1IbUKZyqCsruae0O8n2wIuIltpLImNtqA=="; 29 29 } 30 30 .${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 31 31 };
+2 -2
pkgs/by-name/tu/turbo-unwrapped/package.nix
··· 17 17 18 18 rustPlatform.buildRustPackage (finalAttrs: { 19 19 pname = "turbo-unwrapped"; 20 - version = "2.5.0"; 20 + version = "2.5.1"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "vercel"; 24 24 repo = "turborepo"; 25 25 tag = "v${finalAttrs.version}"; 26 - hash = "sha256-crpEJdhO27cVXl4YnPmUwvJFAeezcxdS/vJPJ2m1VU8="; 26 + hash = "sha256-qwTFD9lIHY5sBliB5ri5AOvW5Cr/nvM+u7e7JS0CAKQ="; 27 27 }; 28 28 29 29 useFetchCargoVendor = true;
+5 -5
pkgs/by-name/we/werf/package.nix
··· 10 10 }: 11 11 buildGoModule (finalAttrs: { 12 12 pname = "werf"; 13 - version = "2.35.3"; 13 + version = "2.35.4"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "werf"; 17 17 repo = "werf"; 18 18 tag = "v${finalAttrs.version}"; 19 - hash = "sha256-ebbc8pKZ8QkxGq9MttpulBkQLXcjH25Zoq8owxIamKg="; 19 + hash = "sha256-bp0KtTsKSBfCLwKfHseLKnGh9ub09+FC841y0I+KNtw="; 20 20 }; 21 21 22 22 proxyVendor = true; 23 - vendorHash = "sha256-Bgi8Pd7lON0DTSzHKaHHbqdS9S/i01tJV/x5bgmiWCo="; 23 + vendorHash = "sha256-vWjFdwcVbw8lxJl2mR54O8DpiwbGzyCy50Heu7NFLA8="; 24 24 25 25 subPackages = [ "cmd/werf" ]; 26 26 ··· 39 39 [ 40 40 "-s" 41 41 "-w" 42 - "-X github.com/werf/werf/v2/pkg/werf.Version=${finalAttrs.src.rev}" 42 + "-X github.com/werf/werf/v2/pkg/werf.Version=v${finalAttrs.version}" 43 43 ] 44 44 ++ lib.optionals (finalAttrs.env.CGO_ENABLED == 1) [ 45 45 "-extldflags=-static" ··· 103 103 Buildah. 104 104 ''; 105 105 homepage = "https://werf.io"; 106 - changelog = "https://github.com/werf/werf/releases/tag/${finalAttrs.src.rev}"; 106 + changelog = "https://github.com/werf/werf/releases/tag/v${finalAttrs.version}"; 107 107 license = lib.licenses.asl20; 108 108 maintainers = [ lib.maintainers.azahi ]; 109 109 mainProgram = "werf";
+5 -15
pkgs/by-name/xd/xdg-desktop-portal-cosmic/package.nix
··· 3 3 stdenv, 4 4 rustPlatform, 5 5 fetchFromGitHub, 6 - fetchpatch, 7 6 libcosmicAppHook, 8 7 pkg-config, 9 8 util-linux, ··· 18 17 19 18 rustPlatform.buildRustPackage (finalAttrs: { 20 19 pname = "xdg-desktop-portal-cosmic"; 21 - version = "1.0.0-alpha.6"; 20 + version = "1.0.0-alpha.7"; 22 21 23 22 src = fetchFromGitHub { 24 23 owner = "pop-os"; 25 24 repo = "xdg-desktop-portal-cosmic"; 26 25 tag = "epoch-${finalAttrs.version}"; 27 - hash = "sha256-ymBmnSEXGCNbLTIVzHP3tjKAG0bgvEFU1C8gnxiow98="; 26 + hash = "sha256-7yfrjKHuYOWPMMkHdGZ+g0hynh2TtSf4h8zW13tTus4="; 28 27 }; 29 28 30 29 env = { 31 - VERGEN_GIT_COMMIT_DATE = "2025-02-20"; 32 - VERGEN_GIT_SHA = finalAttrs.src.rev; 30 + VERGEN_GIT_COMMIT_DATE = "2025-04-08"; 31 + VERGEN_GIT_SHA = finalAttrs.src.tag; 33 32 }; 34 33 35 34 useFetchCargoVendor = true; 36 - cargoHash = "sha256-FO/GIzv9XVu8SSV+JbOf98UX/XriRgqTthtzvRIWNjo="; 35 + cargoHash = "sha256-fOaLeWtrjgBDSShC5OmBZKODNQn4bp/+iPZX5ZMQFqk="; 37 36 38 37 separateDebugInfo = true; 39 38 ··· 50 49 ]; 51 50 52 51 checkInputs = [ gst_all_1.gstreamer ]; 53 - 54 - # TODO: Remove this when updating to the next version 55 - patches = [ 56 - (fetchpatch { 57 - name = "cosmic-portal-fix-examples-after-ashpd-api-update.patch"; 58 - url = "https://github.com/pop-os/xdg-desktop-portal-cosmic/commit/df831ce7a48728aa9094fa1f30aed61cf1cc6ac3.diff?full_index=1"; 59 - hash = "sha256-yRrB3ds9TtN1OBZEZbnE6h2fkPyP4PP2IJ17n+0ugEo="; 60 - }) 61 - ]; 62 52 63 53 postPatch = '' 64 54 # While the `kate-hazen-COSMIC-desktop-wallpaper.png` image is present
+2
pkgs/by-name/ya/yarn-berry/fetcher/fetch-yarn-berry-deps.nix
··· 58 58 59 59 outputHashMode = "recursive"; 60 60 61 + dontFixup = true; # fixup phase does the patching of the shebangs, and FODs must never contain nix store paths. 62 + 61 63 passthru = { 62 64 inherit berryVersion; 63 65 };
+4 -4
pkgs/by-name/ya/yarn-berry/fetcher/yarn-berry-fetcher.nix
··· 13 13 14 14 rustPlatform.buildRustPackage (finalAttrs: { 15 15 pname = "yarn-berry-${toString berryVersion}-fetcher"; 16 - version = "1.0.0"; 16 + version = "1.0.1"; 17 17 18 18 src = fetchFromGitLab { 19 19 domain = "cyberchaos.dev"; 20 20 owner = "yuka"; 21 21 repo = "yarn-berry-fetcher"; 22 - tag = "1.0.0"; 23 - hash = "sha256-iMU/SadzrNv8pZSgp2fBwWVgrgZsnyPRsvs0ugvwyks="; 22 + tag = "1.0.1"; 23 + hash = "sha256-v92+aeGmT151TvcW7FvuooF3g+opdZw7QHY+CcLweJE="; 24 24 }; 25 25 26 26 useFetchCargoVendor = true; 27 - cargoHash = "sha256-ETFaCu+6Ar7tEeRCbTbesEqx9BdztSvPXB7Dc5KGIx0="; 27 + cargoHash = "sha256-TR9FT95WAaiRvoYBXeT0U6agF94BAdMswNncYysESKo="; 28 28 29 29 env.YARN_ZIP_SUPPORTED_CACHE_VERSION = berryCacheVersion; 30 30 env.LIBZIP_SYS_USE_PKG_CONFIG = 1;
+5 -4
pkgs/by-name/yt/ytdownloader/package.nix
··· 4 4 fetchFromGitHub, 5 5 copyDesktopItems, 6 6 makeWrapper, 7 - ffmpeg, 7 + ffmpeg-headless, 8 8 yt-dlp, 9 9 makeDesktopItem, 10 10 electron, ··· 28 28 makeWrapper 29 29 ]; 30 30 buildInputs = [ 31 - ffmpeg 31 + ffmpeg-headless 32 32 yt-dlp 33 33 ]; 34 34 ··· 56 56 # Also stop it from downloading ytdlp 57 57 postPatch = '' 58 58 substituteInPlace src/renderer.js \ 59 - --replace-fail $\{__dirname}/../ffmpeg '${lib.getExe ffmpeg}' \ 59 + --replace-fail $\{__dirname}/../ffmpeg '${lib.getExe ffmpeg-headless}' \ 60 60 --replace-fail 'path.join(os.homedir(), ".ytDownloader", "ytdlp")' '`${lib.getExe yt-dlp}`' \ 61 61 --replace-fail '!!localStorage.getItem("fullYtdlpBinPresent")' 'true' 62 62 # Disable auto-updates ··· 66 66 67 67 postInstall = '' 68 68 makeWrapper ${electron}/bin/electron $out/bin/ytdownloader \ 69 - --add-flags $out/lib/node_modules/ytdownloader/main.js 69 + --add-flags $out/lib/node_modules/ytdownloader/main.js \ 70 + --prefix PATH : ${lib.makeBinPath [ ffmpeg-headless ]} 70 71 71 72 install -Dm444 assets/images/icon.png $out/share/pixmaps/ytdownloader.png 72 73 '';
+2 -2
pkgs/by-name/zs/zsh-wd/package.nix
··· 7 7 8 8 stdenvNoCC.mkDerivation rec { 9 9 pname = "wd"; 10 - version = "0.9.3"; 10 + version = "0.10.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "mfaerevaag"; 14 14 repo = "wd"; 15 15 rev = "v${version}"; 16 - hash = "sha256-u1VrsSF+JqsvWOZfj5mSOknLra6Bxl9tR7fybyP476Y="; 16 + hash = "sha256-/xOe7XFzQt+qVGf6kfsOPPM8szWYhnmx5Mq/QIw0y1c="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ installShellFiles ];
+70 -68
pkgs/data/fonts/nerd-fonts/manifests/checksums.json
··· 1 1 { 2 - "0xProto.tar.xz": "d72bdd83f02a9071d4bb0acd38a37fe687a47bd29189e838edf847ed39b87e10", 3 - "3270.tar.xz": "304010729a11da9bea9f2f1e35e84f4f2240cd8b0ec2a315ef3c1af0ba3af185", 4 - "Agave.tar.xz": "2f7939592934ac02ed74e90556a7e13e95ca621b6e44df31db729ae6930f9cb4", 5 - "AnonymousPro.tar.xz": "85798dd957cb18837c387ca7fd43044a62830a58860d24e7bd315fc10b5b94f6", 6 - "Arimo.tar.xz": "4abbf467968a0f31bb3ad8da7ecd15117cdc8265a67a793e5b9ded6437654ce7", 7 - "AurulentSansMono.tar.xz": "b1898e9bbfa1cbea8fd514b151ff4bb572d2562234e942408a9ef90dfb14075f", 8 - "BigBlueTerminal.tar.xz": "44bf48101c6c31f6777a42430021681cf54c2f0699f1357a33c73c8788c5aa35", 9 - "BitstreamVeraSansMono.tar.xz": "0e5c4ed24358be59a8f7268f3b7352d92f5f19894cdbc62e3c0d91af16250d95", 10 - "CascadiaCode.tar.xz": "86ac1e16199fe9c3448a7882e4f3e90c11c27396fd4771c552661648e3d18f96", 11 - "CascadiaMono.tar.xz": "29e494f00c6ec0bbbeba031cb69f30ebbe4cf46945d341e0347aab7073049bf0", 12 - "CodeNewRoman.tar.xz": "b032b5521c070076148f986d861708ed142fe19f2014a9f248ca4d0a43e9cc8e", 13 - "ComicShannsMono.tar.xz": "cb3667e107e265010566d05e544170b57eec3808f33b0c1790b3b1bd069690aa", 14 - "CommitMono.tar.xz": "aa7f15a591374a04379223a0c224cd66a7c98938e52cda306311681cc51a1c22", 15 - "Cousine.tar.xz": "c7ee3224ff34c69fadfe947d5a9bf349952206cf8e0708564f7cf3d49095d4d8", 16 - "D2Coding.tar.xz": "cad0abe4898b6d9aa12d28c4383ea7260eadba951b6ed9d347a524efc234dd1b", 17 - "DaddyTimeMono.tar.xz": "8a4b6f1fda69bad7dbf102059416998caa5a870fb413c49e88d64ac2912a93e5", 18 - "DejaVuSansMono.tar.xz": "e02d9dcf740b6fe72288ece5ea235a78cdc3763502b2682d7659c7618d4400c5", 19 - "DepartureMono.tar.xz": "45dca8cadd11f6eb289c13f66be3ad7fbd525504168d3c0931d57c8ad56be909", 20 - "DroidSansMono.tar.xz": "1e2b79f888e4d07617857ddae0f82ffe07b65328fc0664e9a94bc0fac1aef888", 21 - "EnvyCodeR.tar.xz": "be99355fc93e9c351a4c70d7713c8f4fe038a65ac72f7ac9cc5550bc52734b70", 22 - "FantasqueSansMono.tar.xz": "947166571476762b8e9b87a6b0532f9eab29147dc9e5d15aad1b7983229328d7", 23 - "FiraCode.tar.xz": "7c64c44d7e530b25faf23904e135e9d1ff0339a92ee64e35e7da9116aa48af67", 24 - "FiraMono.tar.xz": "d23c8db9d53397606bcfe6593f576abb12dd8e3d0605062231e391e2719e92c0", 25 - "GeistMono.tar.xz": "8c5cacfa8a1fe276ea4ebdbe3b542ce71a7144c04a811c9f210faa401b436b3b", 26 - "Go-Mono.tar.xz": "d3d2a8ec7f30513e52412f8907ec4838fd5843323b9e2a5a841de6531aff9a3a", 27 - "Gohu.tar.xz": "da43efcf1eb53dc1773938861a9f3fcb19b71065a6a5bb0295e6038e90545027", 28 - "Hack.tar.xz": "f797524e4b99191a5f35614c6fe48e96f7b8872712e2943a2aaf59cda086e909", 29 - "Hasklig.tar.xz": "9cb2f02337782dd5eb1711f9890edaeea3d59eca00dd7ea3810c237336883fe3", 30 - "HeavyData.tar.xz": "a3473e58cf5a7469a511dfdba2935611945e5cbd2f17d09a361c1ce19a30df0f", 31 - "Hermit.tar.xz": "fddd0ada8ab3266042d4f6ddb3dd7a9c652c15ac80eda35097c3914281e14db0", 32 - "IBMPlexMono.tar.xz": "f7b420dae1361d347858c78d6d48e385bc644e32781cc21eb7dcc483c3682eb1", 33 - "Inconsolata.tar.xz": "d843486d7bab95ccf06c6c17ef03773b2dc5b284602b3926356a668c49be565f", 34 - "InconsolataGo.tar.xz": "105963a2025b4cb96798d1538f38aa65bd13a856cda9941ce25c139959eccd03", 35 - "InconsolataLGC.tar.xz": "442501cffb407e11539fa9fb4714253d779dd0508c0257c42eec187f11a18b13", 36 - "IntelOneMono.tar.xz": "0a5287b9e24a9adce148daea25c04242ae65f9bb04e3610c8374eaca7379ec20", 37 - "Iosevka.tar.xz": "01b352cd732b36d24fb7b0f2b331ddc34c2a39155af6e7a42bddf2ee279bb25d", 38 - "IosevkaTerm.tar.xz": "5ca2a43d1ed2a0098fbc9f87e7dc89c6a13d0399bcb82f09359fa141f9afb70b", 39 - "IosevkaTermSlab.tar.xz": "c8e7e72b6652adb34e4f0af20e22d1eda06368db3a6ebab5194d1078944ea31a", 40 - "JetBrainsMono.tar.xz": "7d171ea3884be22fc08bf1a1aee640a3dc93f031989c27f6f9ceb30a6a668de1", 41 - "Lekton.tar.xz": "2f83aabdf69d1ae28e9b60ef3777e572aafc359f32c8eae7a6278337f1364014", 42 - "LiberationMono.tar.xz": "cc2d9a78c88c91875d8fee10d7d5d67ee9f0687ef004fd61bee4e7a1ecef700b", 43 - "Lilex.tar.xz": "1f4d1c13252f12e9b09e09f881ea21a77645e1eac3472604990b3a11deea78c1", 44 - "MPlus.tar.xz": "55d7390e8b45fc19a028dd93d42aebf0fe55fd85321940d1be13a5f6fa592e76", 45 - "MartianMono.tar.xz": "7cad96ae914fecff010fa438276a99daf984044ade8b473049b3b63f771a5603", 46 - "Meslo.tar.xz": "6ad716ed719e2c97794abd5856a90c6131c406606b249debdc83b04ae11f4cb7", 47 - "Monaspace.tar.xz": "faeb907827a2a07ae64c8fa1a5ca48cd9e60c9084a24c48d779a30cf6bd0693a", 48 - "Monofur.tar.xz": "9dfad24a7debf0ca56db2465e8bd5a0a28435945c23e2a831bcd111785b57480", 49 - "Monoid.tar.xz": "51765143936c5c5078249eb77f2dc862f0d9436328c4c698918b276637d5caee", 50 - "Mononoki.tar.xz": "b9bff1032796daffef71610639685d28a4a5baf31cb4ca43dd53f3d14820f5cf", 51 - "NerdFontsSymbolsOnly.tar.xz": "8b5ecbe2612cb37d75e2645f7644876bc38960574909b1c01c002d0e8d33deb3", 52 - "Noto.tar.xz": "556a30d1dcdbf565946605f50657fa77105d95d150413492cfa7065263f56427", 53 - "OpenDyslexic.tar.xz": "5cd679c82f992f4140f2ab4f6cb77b0080f71a3d7152fb8c91fe0c07f4dcce83", 54 - "Overpass.tar.xz": "6dc50cddca27afa51bd2cce334d6b451d6ce56e6f955c06518ae5b9b1f99e9fc", 55 - "ProFont.tar.xz": "960a9f36ea58ab07c2955b8cb37b4386626ae19b23d026095ef896a05842dadb", 56 - "ProggyClean.tar.xz": "70e91ef90a6d6230f6870a978b856e6138dcff0b98efa9ba3e84c447dda638a2", 57 - "Recursive.tar.xz": "2c9d0b6db82ef6acf71b235b5bd7b16f33cfbbba5ce08bfb1278f7dc6ec1eb20", 58 - "RobotoMono.tar.xz": "fad79b182e2c27454276b45d9633c0800302da996168bc5cee0109fda2181ed3", 59 - "ShareTechMono.tar.xz": "0f7fb196b3700caeee85ddad56efde174416d73afc651a79d38bd319c1587d43", 60 - "SourceCodePro.tar.xz": "87834bca780558bbe3ff808e51c89e1c3d98140a2c1a0d3100e10e944456a63c", 61 - "SpaceMono.tar.xz": "a2058cfc43eee5a170208c6e90fa77d8f0aa755e0d213e795f70781f7d807942", 62 - "Terminus.tar.xz": "88b17b50aab7ee284f9a1ed395f96c20ab4d22640fde1fe0f80a31f1eacd6585", 63 - "Tinos.tar.xz": "f763b82e01f06ebce5830c475306598734d2fc91ded1760fe925a826b3cba8ef", 64 - "Ubuntu.tar.xz": "4ff08c04bec3ec86b60d75a987b5c09d7e5c434f006f426bcfdac80f6f66d938", 65 - "UbuntuMono.tar.xz": "dc8a6aebd8950e59dd89a1c5f49be3914879691e2e1293c157b7f66291c09712", 66 - "UbuntuSans.tar.xz": "3d0ed4bbadf13f9655c5e4a3bc089eef6db232fa3d4552144b1683adc9fad98d", 67 - "VictorMono.tar.xz": "f61229287e333e575f134923fd46da32fe4e01120a2a74a17d2d9b7591a9b87e", 68 - "ZedMono.tar.xz": "fa29af2373bbf6edda1c3c9a42655227748d1a9f7b2563bf4b79253618768318", 69 - "iA-Writer.tar.xz": "50d885c7f03931323c5ea232c677b8963f8d1a196cfd8f2935e2ddcf535b5971" 2 + "0xProto.tar.xz": "effaa4c257c1f25e6d2d50679e9b845eab36b346dea9ee26f4405da1a21e6428", 3 + "3270.tar.xz": "6d9dd76987968e8a0b30d3ae4d18b8139d6ddf6cd53409272dbc596654ea38b1", 4 + "AdwaitaMono.tar.xz": "39b7598b2ec30111d1ace82b274809e5d0930e241683c1c91f5b4c7e64a975cf", 5 + "Agave.tar.xz": "fe4879b0cff2d33d7fb08d1c8ba4e0cad9f44843644fe284fda1e89addf9c4ab", 6 + "AnonymousPro.tar.xz": "7ebace54eda35943062eaad9dd4f16de24390b672f31bff45475b82acb1955c0", 7 + "Arimo.tar.xz": "006464de19502bd49a72265058811665b62b823509bbbd2e7181ba87046b6b08", 8 + "AtkinsonHyperlegibleMono.tar.xz": "8643ab571f547c6af0352a08e617ba7303965b2882ab9f36d61e8d4680761a59", 9 + "AurulentSansMono.tar.xz": "a0d642ace8f9d616a9c9cbbe46e188c60ddf7486b0cf2685a3558e06aba2c284", 10 + "BigBlueTerminal.tar.xz": "9df627ec74a21f4da8df4821dba85cabcc452f95b636e8802eeaa2e6f3129e13", 11 + "BitstreamVeraSansMono.tar.xz": "59162ab2d67d39827e497beda03fbe6327d3535d2ee3b1dd7050fdeafe1f9c36", 12 + "CascadiaCode.tar.xz": "804b3d311665a059140466fe142cc76cf14ef0695b7c4d3a174f7f8fba46b6e3", 13 + "CascadiaMono.tar.xz": "7c22db8c8460ef62abffbb6d5c7b212507de0798a4a762fa2a005a8bc4c90fc6", 14 + "CodeNewRoman.tar.xz": "2db8def7863ea49b6ef69f353988d7e0f73a8646722e5946932740d76eb46b25", 15 + "ComicShannsMono.tar.xz": "23d90d18dae663b7d0dcdb4edd2f5087eecb40b00f046a1f46a9abf3ecb47651", 16 + "CommitMono.tar.xz": "44cdabae7708de3548fdd78ed59cdbb1fedbca18e16644047ed4a23623a530ca", 17 + "Cousine.tar.xz": "63bc50fc2b88897096626cf9e835d4237ee0052f9bfd902dc1f5304c693c32e6", 18 + "D2Coding.tar.xz": "5b4e8c53599ee79067a4439bfbf31bb3f1b40e93ac6493f718b48feaf972173d", 19 + "DaddyTimeMono.tar.xz": "854c8cbf59e1fcc48f114408d93f63cad70c6ba8eefad5bf3071bd9dd8ef48f8", 20 + "DejaVuSansMono.tar.xz": "0e58ff9c1f9378922b7f324fdba953929d88d61b36aedd80ee43964567b226cc", 21 + "DepartureMono.tar.xz": "f099f71bc240fb59ffeaba50d26206b32df7e54051e49d6837a1702e4d3b4f3f", 22 + "DroidSansMono.tar.xz": "43ad0a4e238ad078300d0aa2ebca5f7aaf6ff2cdb25c5cfe8191b79aab7d0af2", 23 + "EnvyCodeR.tar.xz": "b631d34ab3e3e26aba7169b382d573d82bc6647d3ddae67e9ce28481f64715e7", 24 + "FantasqueSansMono.tar.xz": "462b5490475fb8560dded4eb6cdd9cfd0049b800acee329094def095557d0ffd", 25 + "FiraCode.tar.xz": "d83fb093e0e05a531cd6f19886a6ceb884a4fa5ea3b53cf099fc1f30c5b3e47d", 26 + "FiraMono.tar.xz": "2e4adc97fefdfa2ad70a6e6e79bc0418acd401a305bcb5fcd848a84e03e35a74", 27 + "GeistMono.tar.xz": "43ef3d73cadddea5be746e20c9f27fbaa59ceb106b8b26f7245ba2de2e46b1f6", 28 + "Go-Mono.tar.xz": "81c879e6a86dd6e6cb94d7a73322bf39f06b3294a727effb5a5bb5c7f9274fd6", 29 + "Gohu.tar.xz": "458b08f1216c18a46fc3e00701d6d171a4d536192b0885c041d8cc1befb6b44d", 30 + "Hack.tar.xz": "1d00a1435638084174516975840854368a45ac30bb0bad2c0c49db713b5925f0", 31 + "Hasklig.tar.xz": "e82418895a7036158baf9a425faea7de1fe332267b218341eec44c6b5071d1ad", 32 + "HeavyData.tar.xz": "ed0d49911ae0caa1d625ae64832b49b4c94e90fa2ec0b1e5e7df440ccb28698b", 33 + "Hermit.tar.xz": "206ae23c386dcb84a2dfaca678af36123fbaff1fb402326021973485018467f3", 34 + "IBMPlexMono.tar.xz": "95e6ecaa5dfb9a96f27a6b6edc7be396fb6df30bc311a6f7e15cad56a30051c2", 35 + "Inconsolata.tar.xz": "47df94d3826a9f3e94b4c596a78f5baaddfb27f25bdb7906c5cf65caf8962eb2", 36 + "InconsolataGo.tar.xz": "0407ab5ddd9f6a9af5f178d5fa1732cbf8275c4fe6e03793adbe48bfd6c04884", 37 + "InconsolataLGC.tar.xz": "59b5961b83f0fd64ef579099ca0209dd706d5025feac813c80fcc2d0648d717f", 38 + "IntelOneMono.tar.xz": "9d55174210a512c6c9d0601532033d05d9e8817c760cb9ccca3c6c9c4ff6d7c1", 39 + "Iosevka.tar.xz": "213ee24cda99ca84d0a8326de133e7e8b2baf9ba23659ce829f589f771d357d2", 40 + "IosevkaTerm.tar.xz": "cad9da572d25e3413f7a15a319d2f3c9e7e915ee016baa99e0d88fc08cf5b781", 41 + "IosevkaTermSlab.tar.xz": "8990ca82b481a02734cb96f46db789716735ca8f6c4bf89d800899a593a1f0ca", 42 + "JetBrainsMono.tar.xz": "ef552a3e638f25125c6ad4c51176a6adcdce295ab1d2ffacf0db060caf8c1582", 43 + "Lekton.tar.xz": "2a7fa12bf2b376307c9ca2501227b0d91dcae25c453ec095e5f768a2ca5b6fe9", 44 + "LiberationMono.tar.xz": "64a9519dd6b75179a9363f9c8a0cefe2984ec8578394ced66e9d0fffd2be922f", 45 + "Lilex.tar.xz": "1d011e82a59aec26bff5564ca90a8e51636364e5b7f79417708aa2c846c633b3", 46 + "MPlus.tar.xz": "9c03e388d0ff2e0bc28be9bf6ab95f1e0260c5828b3159b18867a9e7a1f17f7b", 47 + "MartianMono.tar.xz": "e12f5ca02756268e794d06d9cb2ada93d021ec915f5a43ec2cd77355022f3624", 48 + "Meslo.tar.xz": "a57936d96aefb5cfff0660f3294210ee04705529af6cf811e2274b0923a03939", 49 + "Monaspace.tar.xz": "5fdb97828e1a23fd28ea5ed0e7d15cdebb77ef079aaa48b93f1526764b40ef8c", 50 + "Monofur.tar.xz": "539dc64f089b189c5f14ee60df6368742cc63ccc3be753bd3c8bfba7632fe068", 51 + "Monoid.tar.xz": "5c6efd6fe2f2856d5294748dc751770d1c8889665f42687a0ac8f1b3a86a3299", 52 + "Mononoki.tar.xz": "5c9b3035d45aabfe1fb3ce5e3028130043398cecc1409b20fe8273692192726e", 53 + "NerdFontsSymbolsOnly.tar.xz": "7f8c090da3b0eaa7108646bf34cbbb6ed13d5358a72460522108b06c7ecd716a", 54 + "Noto.tar.xz": "e28b31609d17fc50bdf9e6730c947a61b0e474af726c2c044c39bc78fcd9bfde", 55 + "OpenDyslexic.tar.xz": "2155e95e9c7b12d785dc589033290a8caff07c11cf1697ec3ad0bda37e3b0433", 56 + "Overpass.tar.xz": "4d6d7e8b91840bb2b18bc7ac427f979183e68b6b061db58b4139ad5679bdc36f", 57 + "ProFont.tar.xz": "c6d595ac9f7e0d6ac87c4c57e26c7515c544e8e5ac553c5a215394d12b201a8f", 58 + "ProggyClean.tar.xz": "910c51cb06ff3233daee1d045e606ed77c290ea25dd1a54378e0517601f4785c", 59 + "Recursive.tar.xz": "a047ac2e724c1614ef4350af83f35cd1d044d8d20e6477c319172b860b19329a", 60 + "RobotoMono.tar.xz": "4bc63bf0105c664e466e62cb2fd1c143b310877de93dc35b3b5d48e0e4cb6702", 61 + "ShareTechMono.tar.xz": "11bb01a73894f932a3702551245aa0c57d121ebf59dd293fac5ceac81af822d1", 62 + "SourceCodePro.tar.xz": "d52d97b66c4c5d6d9d99c88df55148faf39738f244485026f22f8e47407744f4", 63 + "SpaceMono.tar.xz": "d159c6f13291723f1821d1064a7d3e0933d96297d55bab27d76861472af68111", 64 + "Terminus.tar.xz": "e857b18a99701528f873275b6012792caf6e30c34c512ee92cda51520140054f", 65 + "Tinos.tar.xz": "c54f03f38fbf897f34235bc5989500361251f61220cf63afedd730edd221714e", 66 + "Ubuntu.tar.xz": "534bf0ffb311a993fd23666a7f3e4f4a0cfc0662abfa8b81594705cceefb69e3", 67 + "UbuntuMono.tar.xz": "a13cf890ef10517c59e812ced167245f2db47d37d2b03c9fb43ddef023a3e776", 68 + "UbuntuSans.tar.xz": "0a399b03565c577ae2da9f8362e6276b0adb13bac288e49fec085c517243e27b", 69 + "VictorMono.tar.xz": "67bb8c729aedbe2e0258435c78e52bb1753618a1d3d7c0c94e6f1c47763a56a9", 70 + "ZedMono.tar.xz": "7dfff6bb0e45143c33703c3fdf3ff77b00f3617fef29671c7ff6af166dcf31a0", 71 + "iA-Writer.tar.xz": "0156f309d942d9066a83005dd42588719a1755fb78e345e5f22ff582da46211b" 70 72 }
+38 -22
pkgs/data/fonts/nerd-fonts/manifests/fonts.json
··· 5 5 "folderName": "0xProto", 6 6 "licenseId": "OFL-1.1-no-RFN", 7 7 "patchedName": "0xProto", 8 - "version": "2.201" 8 + "version": "2.300" 9 9 }, 10 10 { 11 11 "caskName": "3270", ··· 14 14 "licenseId": "BSD-3-Clause", 15 15 "patchedName": "3270", 16 16 "version": "3.0.1" 17 + }, 18 + { 19 + "caskName": "adwaita-mono", 20 + "description": "The monospace typeface for GNOME", 21 + "folderName": "AdwaitaMono", 22 + "licenseId": "OFL-1.1-no-RFN", 23 + "patchedName": "AdwaitaMono", 24 + "version": "32.4" 17 25 }, 18 26 { 19 27 "caskName": "agave", ··· 40 48 "version": "1.33" 41 49 }, 42 50 { 51 + "caskName": "atkynson-mono", 52 + "description": "A monospaced font designed to improve legibility and readability for individuals with low vision", 53 + "folderName": "AtkinsonHyperlegibleMono", 54 + "licenseId": "OFL-1.1-RFN", 55 + "patchedName": "AtkynsonMono", 56 + "version": "2.001" 57 + }, 58 + { 43 59 "caskName": "aurulent-sans-mono", 44 60 "description": "Sans serif, designed by Stephen G. Hartke which also created Verily Serif", 45 61 "folderName": "AurulentSansMono", ··· 77 93 "folderName": "CascadiaCode", 78 94 "licenseId": "OFL-1.1-RFN", 79 95 "patchedName": "CaskaydiaCove", 80 - "version": "2111.01" 96 + "version": "2407.24" 81 97 }, 82 98 { 83 99 "caskName": "caskaydia-mono", ··· 85 101 "folderName": "CascadiaMono", 86 102 "licenseId": "OFL-1.1-RFN", 87 103 "patchedName": "CaskaydiaMono", 88 - "version": "2111.01" 104 + "version": "2407.24" 89 105 }, 90 106 { 91 107 "caskName": "code-new-roman", ··· 134 150 "licenseId": "OFL-1.1-no-RFN", 135 151 "patchedName": "DaddyTimeMono", 136 152 "version": "1.2.3" 137 - }, 138 - { 139 - "caskName": "departure-mono", 140 - "description": "A monospaced pixel font with a lo-fi, techy vibe", 141 - "folderName": "DepartureMono", 142 - "licenseId": "OFL-1.1-no-RFN", 143 - "patchedName": "DepartureMono", 144 - "version": "1.422" 145 153 }, 146 154 { 147 155 "caskName": "dejavu-sans-mono", ··· 152 160 "version": "2.37" 153 161 }, 154 162 { 163 + "caskName": "departure-mono", 164 + "description": "A monospaced pixel font with a lo-fi, techy vibe", 165 + "folderName": "DepartureMono", 166 + "licenseId": "OFL-1.1-no-RFN", 167 + "patchedName": "DepartureMono", 168 + "version": "1.422" 169 + }, 170 + { 155 171 "caskName": "droid-sans-mono", 156 172 "description": "Good for small screens or font sizes", 157 173 "folderName": "DroidSansMono", ··· 197 213 "folderName": "GeistMono", 198 214 "licenseId": "OFL-1.1-no-RFN", 199 215 "patchedName": "GeistMono", 200 - "version": "1.2.0 (1.3.0)" 216 + "version": "1.401" 201 217 }, 202 218 { 203 219 "caskName": "go-mono", ··· 277 293 "folderName": "InconsolataLGC", 278 294 "licenseId": "OFL-1.1-no-RFN", 279 295 "patchedName": "Inconsolata LGC", 280 - "version": "1.5.2" 296 + "version": "1.13" 281 297 }, 282 298 { 283 299 "caskName": "intone-mono", ··· 293 309 "folderName": "Iosevka", 294 310 "licenseId": "OFL-1.1-no-RFN", 295 311 "patchedName": "Iosevka", 296 - "version": "29.0.4" 312 + "version": "33.2.1" 297 313 }, 298 314 { 299 315 "caskName": "iosevka-term", ··· 301 317 "folderName": "IosevkaTerm", 302 318 "licenseId": "OFL-1.1-no-RFN", 303 319 "patchedName": "IosevkaTerm", 304 - "version": "29.0.4" 320 + "version": "33.2.1" 305 321 }, 306 322 { 307 323 "caskName": "iosevka-term-slab", ··· 309 325 "folderName": "IosevkaTermSlab", 310 326 "licenseId": "OFL-1.1-no-RFN", 311 327 "patchedName": "IosevkaTermSlab", 312 - "version": "29.0.4" 328 + "version": "33.2.1" 313 329 }, 314 330 { 315 331 "caskName": "jetbrains-mono", ··· 341 357 "folderName": "Lilex", 342 358 "licenseId": "OFL-1.1-no-RFN", 343 359 "patchedName": "Lilex", 344 - "version": "2.400" 360 + "version": "2.600" 345 361 }, 346 362 { 347 363 "caskName": "martian-mono", ··· 349 365 "folderName": "MartianMono", 350 366 "licenseId": "OFL-1.1-no-RFN", 351 367 "patchedName": "MartianMono", 352 - "version": "1.0.0" 368 + "version": "1.1.0" 353 369 }, 354 370 { 355 371 "caskName": "meslo-lg", ··· 365 381 "folderName": "Monaspace", 366 382 "licenseId": "OFL-1.1-RFN", 367 383 "patchedName": "Monaspice", 368 - "version": "1.101" 384 + "version": "1.200" 369 385 }, 370 386 { 371 387 "caskName": "monofur", ··· 392 408 "version": "1.6" 393 409 }, 394 410 { 395 - "caskName": "mplus", 411 + "caskName": "m+", 396 412 "description": "Multiple styles and weights, many glyph sets (e.g. Kana glyphs)", 397 413 "folderName": "MPlus", 398 414 "licenseId": "OFL-1.1-no-RFN", 399 415 "patchedName": "M+", 400 - "version": "2023/09" 416 + "version": "1.007" 401 417 }, 402 418 { 403 419 "caskName": "noto", ··· 525 541 "folderName": "UbuntuSans", 526 542 "licenseId": "LicenseRef-UbuntuFont", 527 543 "patchedName": "UbuntuSans", 528 - "version": "1.004" 544 + "version": "1.006" 529 545 }, 530 546 { 531 547 "caskName": "victor-mono",
+1 -1
pkgs/data/fonts/nerd-fonts/manifests/release.json
··· 1 1 { 2 - "tag_name": "v3.3.0" 2 + "tag_name": "v3.4.0" 3 3 }
+2 -4
pkgs/development/compilers/osl/default.nix
··· 8 8 libxml2, 9 9 zlib, 10 10 openexr, 11 - openimageio, 11 + openimageio_2, 12 12 llvm, 13 13 boost, 14 14 flex, ··· 20 20 }: 21 21 22 22 let 23 - 24 23 boost_static = boost.override { enableStatic = true; }; 25 - 26 24 in 27 25 stdenv.mkDerivation rec { 28 26 pname = "openshadinglanguage"; ··· 65 63 libclang 66 64 llvm 67 65 openexr 68 - openimageio 66 + openimageio_2 69 67 partio 70 68 pugixml 71 69 python3.pkgs.pybind11
+2 -28
pkgs/development/interpreters/emilua/default.nix
··· 3 3 stdenv, 4 4 meson, 5 5 ninja, 6 - fetchFromGitHub, 7 6 fetchFromGitLab, 8 7 re2c, 9 8 gperf, ··· 28 27 emilua, # this package 29 28 }: 30 29 31 - let 32 - trial-protocol-wrap = fetchFromGitHub { 33 - owner = "breese"; 34 - repo = "trial.protocol"; 35 - rev = "79149f604a49b8dfec57857ca28aaf508069b669"; 36 - sparseCheckout = [ 37 - "include" 38 - ]; 39 - hash = "sha256-QpQ70KDcJyR67PtOowAF6w48GitMJ700B8HiEwDA5sU="; 40 - postFetch = '' 41 - rm $out/*.* 42 - mkdir -p $out/lib/pkgconfig 43 - cat > $out/lib/pkgconfig/trial-protocol.pc << EOF 44 - Name: trial.protocol 45 - Version: 0-unstable-2023-02-10 46 - Description: C++ header-only library with parsers and generators for network wire protocols 47 - Requires: 48 - Libs: 49 - Cflags: 50 - EOF 51 - ''; 52 - }; 53 - in 54 - 55 30 stdenv.mkDerivation (finalAttrs: { 56 31 pname = "emilua"; 57 - version = "0.11.4"; 32 + version = "0.11.6"; 58 33 59 34 src = fetchFromGitLab { 60 35 owner = "emilua"; 61 36 repo = "emilua"; 62 37 tag = "v${finalAttrs.version}"; 63 - hash = "sha256-CVEBFySsGT0f16Dim1Pw1GdDM0fWUKieRZyxHaDH3O4="; 38 + hash = "sha256-r/WfRAr8AgnZGHxzcZVLg5MHDwcOTMWqOv/Qu/75Y1c="; 64 39 }; 65 40 66 41 propagatedBuildInputs = [ ··· 74 49 liburing 75 50 openssl 76 51 cereal 77 - trial-protocol-wrap 78 52 ]; 79 53 80 54 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/embree/2.x.nix
··· 7 7 ispc, 8 8 tbb, 9 9 glfw, 10 - openimageio, 10 + openimageio_2, 11 11 libjpeg, 12 12 libpng, 13 13 libpthreadstubs, ··· 35 35 ispc 36 36 tbb 37 37 glfw 38 - openimageio 38 + openimageio_2 39 39 libjpeg 40 40 libpng 41 41 libX11
+2 -2
pkgs/development/libraries/embree/default.nix
··· 7 7 ispc, 8 8 tbb, 9 9 glfw, 10 - openimageio, 10 + openimageio_2, 11 11 libjpeg, 12 12 libpng, 13 13 libpthreadstubs, ··· 50 50 buildInputs = [ 51 51 tbb 52 52 glfw 53 - openimageio 53 + openimageio_2 54 54 libjpeg 55 55 libpng 56 56 libX11
+7
pkgs/development/libraries/ffmpeg/generic.nix
··· 469 469 hash = "sha256-sqUUSOPTPLwu2h8GbAw4SfEf+0oWioz52BcpW1n4v3Y="; 470 470 }) 471 471 ] 472 + ++ optionals (lib.versionOlder version "7" && stdenv.hostPlatform.isAarch32) [ 473 + (fetchpatch2 { 474 + name = "binutils-2-43-compat.patch"; 475 + url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/654bd47716c4f36719fb0f3f7fd8386d5ed0b916"; 476 + hash = "sha256-OLiQHKBNp2p63ZmzBBI4GEGz3WSSP+rMd8ITfZSVRgY="; 477 + }) 478 + ] 472 479 ++ optionals (lib.versionAtLeast version "7.1" && lib.versionOlder version "7.1.1") [ 473 480 ./fix-fate-ffmpeg-spec-disposition-7.1.patch 474 481 ]
+9 -15
pkgs/development/libraries/openimageio/default.nix pkgs/by-name/op/openimageio/package.nix
··· 15 15 fmt, 16 16 }: 17 17 18 - stdenv.mkDerivation rec { 18 + stdenv.mkDerivation (finalAttrs: { 19 19 pname = "openimageio"; 20 - version = "2.5.16.0"; 20 + version = "3.0.5.0"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "AcademySoftwareFoundation"; 24 24 repo = "OpenImageIO"; 25 - rev = "v${version}"; 26 - hash = "sha256-hUCwlzQW5mJH5HYPbLWOcupc36nxM12CV0sakZhiGzo="; 25 + tag = "v${finalAttrs.version}"; 26 + hash = "sha256-CG2tb6jf7xmQnrLaTqEFKG3g4nkEwZoI44bXxdCRmrM="; 27 27 }; 28 - 29 - # Workaround broken zlib version detection in CMake < 3.37. 30 - postPatch = '' 31 - substituteInPlace ./src/cmake/Config.cmake.in \ 32 - --replace " @ZLIB_VERSION@" "" 33 - ''; 34 28 35 29 outputs = [ 36 30 "bin" ··· 73 67 --replace "\''${_IMPORT_PREFIX}/lib/lib" "$out/lib/lib" 74 68 ''; 75 69 76 - meta = with lib; { 70 + meta = { 77 71 homepage = "https://openimageio.org"; 78 72 description = "Library and tools for reading and writing images"; 79 - license = licenses.bsd3; 80 - maintainers = [ ]; 81 - platforms = platforms.unix; 73 + license = lib.licenses.asl20; 74 + maintainers = with lib.maintainers; [ yzx9 ]; 75 + platforms = lib.platforms.unix; 82 76 }; 83 - } 77 + })
+2 -2
pkgs/development/python-modules/docling-ibm-models/default.nix
··· 29 29 30 30 buildPythonPackage rec { 31 31 pname = "docling-ibm-models"; 32 - version = "3.4.1"; 32 + version = "3.4.2"; 33 33 pyproject = true; 34 34 35 35 src = fetchFromGitHub { 36 36 owner = "docling-project"; 37 37 repo = "docling-ibm-models"; 38 38 tag = "v${version}"; 39 - hash = "sha256-IgKP+4en0N6xLBjzwmddDk8z5P3J1vo+UMW+65a01Ww="; 39 + hash = "sha256-C3SRz4z5m/UjK+ZmpM94jLRr2xTwql7CdhFTj3HEOc0="; 40 40 }; 41 41 42 42 build-system = [
+2 -2
pkgs/development/python-modules/materialx/default.nix
··· 8 8 libX11, 9 9 libXt, 10 10 libGL, 11 - openimageio, 11 + openimageio_2, 12 12 imath, 13 13 python, 14 14 apple-sdk_14, ··· 37 37 38 38 buildInputs = 39 39 [ 40 - openimageio 40 + openimageio_2 41 41 imath 42 42 ] 43 43 ++ lib.optionals stdenv.hostPlatform.isDarwin [
+2 -2
pkgs/development/python-modules/openusd/default.nix
··· 23 23 ninja, 24 24 numpy, 25 25 opencolorio, 26 - openimageio, 26 + openimageio_2, 27 27 opensubdiv, 28 28 osl, 29 29 ptex, ··· 131 131 imath 132 132 materialx 133 133 opencolorio 134 - openimageio 134 + openimageio_2 135 135 opensubdiv 136 136 ptex 137 137 tbb
+2 -7
pkgs/development/python-modules/pygame-ce/default.nix
··· 125 125 # No audio or video device in test environment 126 126 export SDL_VIDEODRIVER=dummy 127 127 export SDL_AUDIODRIVER=disk 128 + # traceback for segfaults 129 + export PYTHONFAULTHANDLER=1 128 130 ''; 129 131 130 132 checkPhase = '' ··· 161 163 license = lib.licenses.lgpl21Plus; 162 164 maintainers = [ lib.maintainers.pbsds ]; 163 165 platforms = lib.platforms.unix; 164 - badPlatforms = [ 165 - # loading pygame.tests.font_test 166 - # /nix/store/mrvg4qq09d51w5s95v15y4ym05q009fd-stdenv-darwin/setup: line 1771: 64131 Segmentation fault: 11 167 - # 168 - # https://github.com/NixOS/nixpkgs/issues/400378 169 - lib.systems.inspect.patterns.isDarwin 170 - ]; 171 166 }; 172 167 }
+8 -11
pkgs/development/python-modules/pygame/default.nix
··· 21 21 libpng, 22 22 libX11, 23 23 portmidi, 24 - SDL2_image, 25 - SDL2_mixer, 26 - SDL2_ttf, 24 + SDL2_classic_image, 25 + SDL2_classic_mixer, 26 + SDL2_classic_ttf, 27 27 }: 28 28 29 29 buildPythonPackage rec { ··· 87 87 libX11 88 88 portmidi 89 89 SDL2_classic 90 - (SDL2_image.override { enableSTB = false; }) 91 - SDL2_mixer 92 - SDL2_ttf 90 + (SDL2_classic_image.override { enableSTB = false; }) 91 + SDL2_classic_mixer 92 + SDL2_classic_ttf 93 93 ]; 94 94 95 95 preConfigure = '' ··· 106 106 # No audio or video device in test environment 107 107 export SDL_VIDEODRIVER=dummy 108 108 export SDL_AUDIODRIVER=disk 109 + # traceback for segfaults 110 + export PYTHONFAULTHANDLER=1 109 111 110 112 ${python.interpreter} -m pygame.tests -v \ 111 113 --exclude opengl,timing \ ··· 122 124 license = lib.licenses.lgpl21Plus; 123 125 maintainers = with lib.maintainers; [ emilytrau ]; 124 126 platforms = lib.platforms.unix; 125 - badPlatforms = [ 126 - # Several tests segfault 127 - # https://github.com/pygame/pygame/issues/4486 128 - lib.systems.inspect.patterns.isDarwin 129 - ]; 130 127 }; 131 128 }
+3 -3
pkgs/development/python-modules/pylance/default.nix
··· 31 31 32 32 buildPythonPackage rec { 33 33 pname = "pylance"; 34 - version = "0.25.2"; 34 + version = "0.26.0"; 35 35 pyproject = true; 36 36 37 37 src = fetchFromGitHub { 38 38 owner = "lancedb"; 39 39 repo = "lance"; 40 40 tag = "v${version}"; 41 - hash = "sha256-Xds+qSVB7X4CrtrOrfIdOSfgn22CnUyCfKZh2e0hzRo="; 41 + hash = "sha256-TMaDLlu6JtYlFyfh9zeHRg1ky4HKlKTr9kRPT9kxTcU="; 42 42 }; 43 43 44 44 sourceRoot = "${src.name}/python"; ··· 50 50 src 51 51 sourceRoot 52 52 ; 53 - hash = "sha256-c+uQQmB6KScB5sS+HW1TMAwNsze7Ssog2bf0kQWQUWA="; 53 + hash = "sha256-43zFySOd3yGMQ06oqKXBGV1XE282D1cQEdGrijMS22o="; 54 54 }; 55 55 56 56 nativeBuildInputs = [
+5 -6
pkgs/development/python-modules/pyvista/default.nix
··· 6 6 numpy, 7 7 pillow, 8 8 pooch, 9 - pythonOlder, 9 + pythonAtLeast, 10 10 scooby, 11 11 setuptools, 12 12 typing-extensions, ··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "pyvista"; 18 - version = "0.44.2"; 18 + version = "0.45.0"; 19 19 pyproject = true; 20 - 21 - disabled = pythonOlder "3.8"; 22 20 23 21 src = fetchFromGitHub { 24 22 owner = "pyvista"; 25 23 repo = "pyvista"; 26 24 tag = "v${version}"; 27 - hash = "sha256-ZQfI0lmh/cwE224yk6a2G3gLUCsBjCQqPI1y4zYj0FI="; 25 + hash = "sha256-ruhG9HsD1PzTs/S6IDtuqIxg7UBmn67Ne2Y/H8y/9Cs="; 28 26 }; 29 27 30 28 build-system = [ setuptools ]; ··· 45 43 pythonImportsCheck = [ "pyvista" ]; 46 44 47 45 meta = with lib; { 46 + broken = pythonAtLeast "3.13"; # segfault 48 47 description = "Easier Pythonic interface to VTK"; 49 48 homepage = "https://pyvista.org"; 50 - changelog = "https://github.com/pyvista/pyvista/releases/tag/v${version}"; 49 + changelog = "https://github.com/pyvista/pyvista/releases/tag/${src.tag}"; 51 50 license = licenses.mit; 52 51 maintainers = with maintainers; [ wegank ]; 53 52 };
-4
pkgs/development/python-modules/rq/default.nix
··· 49 49 ]; 50 50 versionCheckProgramArg = "--version"; 51 51 52 - preCheck = '' 53 - export PATH=$out/bin:$PATH 54 - ''; 55 - 56 52 __darwinAllowLocalNetworking = true; 57 53 58 54 disabledTests = lib.optionals stdenv.hostPlatform.isDarwin [
+21
pkgs/stdenv/linux/bootstrap-files/loongarch64-unknown-linux-gnu.nix
··· 1 + # Autogenerated by maintainers/scripts/bootstrap-files/refresh-tarballs.bash as: 2 + # $ ./refresh-tarballs.bash --targets=loongarch64-unknown-linux-gnu 3 + # 4 + # Metadata: 5 + # - nixpkgs revision: bdcacf48f3b064c93a9064d1d545f75c60ca6c77 6 + # - hydra build: https://hydra.nixos.org/job/nixpkgs/cross-trunk/bootstrapTools.loongarch64-unknown-linux-gnu.build/latest 7 + # - resolved hydra build: https://hydra.nixos.org/build/295459473 8 + # - instantiated derivation: /nix/store/q7r692xs6kpsyipmkfamhj36va79wa5r-stdenv-bootstrap-tools-loongarch64-unknown-linux-gnu.drv 9 + # - output directory: /nix/store/gvjaqdhmvsqn821iypwj0cb8xq8yiii6-stdenv-bootstrap-tools-loongarch64-unknown-linux-gnu 10 + # - build time: Wed, 23 Apr 2025 12:35:42 +0000 11 + { 12 + bootstrapTools = import <nix/fetchurl.nix> { 13 + url = "http://tarballs.nixos.org/stdenv/loongarch64-unknown-linux-gnu/bdcacf48f3b064c93a9064d1d545f75c60ca6c77/bootstrap-tools.tar.xz"; 14 + hash = "sha256-Yx0YmbVElsbN0VKgPiKfm7+e3ed5JXu3vZv0kKIhER8="; 15 + }; 16 + busybox = import <nix/fetchurl.nix> { 17 + url = "http://tarballs.nixos.org/stdenv/loongarch64-unknown-linux-gnu/bdcacf48f3b064c93a9064d1d545f75c60ca6c77/busybox"; 18 + hash = "sha256-0UFp0zpeC8oTmS5/XJoMFnnOMTVTciQYmO/0JAi6uqk="; 19 + executable = true; 20 + }; 21 + }
+1
pkgs/stdenv/linux/default.nix
··· 82 82 powerpc64le-linux = import ./bootstrap-files/powerpc64le-unknown-linux-gnu.nix; 83 83 riscv64-linux = import ./bootstrap-files/riscv64-unknown-linux-gnu.nix; 84 84 s390x-linux = import ./bootstrap-files/s390x-unknown-linux-gnu.nix; 85 + loongarch64-linux = import ./bootstrap-files/loongarch64-unknown-linux-gnu.nix; 85 86 }; 86 87 musl = { 87 88 aarch64-linux = import ./bootstrap-files/aarch64-unknown-linux-musl.nix;
+4
pkgs/tools/package-management/nix/default.nix
··· 183 183 version = "2.28.2"; 184 184 hash = "sha256-yl+hlZ/VFHIZwPIDEs4ysOYgprW4VEORfSyvScF7Cwg="; 185 185 self_attribute_name = "nix_2_28"; 186 + patches = [ 187 + # fixes user/system registries regression: https://github.com/NixOS/nix/issues/13050 188 + ./patches/0001-Revert-Actually-ignore-system-user-registries-during.patch 189 + ]; 186 190 }; 187 191 188 192 nixComponents_git = nixDependencies.callPackage ./modular/packages.nix rec {
+51
pkgs/tools/package-management/nix/patches/0001-Revert-Actually-ignore-system-user-registries-during.patch
··· 1 + From 8df4f5db3c71046f5deaeb913e5ec0d16f70b5a2 Mon Sep 17 00:00:00 2001 2 + From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= <joerg@thalheim.io> 3 + Date: Thu, 24 Apr 2025 14:17:18 +0200 4 + Subject: [PATCH] Revert "Actually ignore system/user registries during 5 + locking" 6 + MIME-Version: 1.0 7 + Content-Type: text/plain; charset=UTF-8 8 + Content-Transfer-Encoding: 8bit 9 + 10 + This reverts commit a08477975d90dc0d2c9f89d2a417bedb5b266931. 11 + 12 + Signed-off-by: Jörg Thalheim <joerg@thalheim.io> 13 + --- 14 + src/libflake/flake/flakeref.cc | 2 +- 15 + tests/functional/flakes/flakes.sh | 7 ------- 16 + 2 files changed, 1 insertion(+), 8 deletions(-) 17 + 18 + diff --git a/src/libflake/flake/flakeref.cc b/src/libflake/flake/flakeref.cc 19 + index 1580c2846..6e95eb767 100644 20 + --- a/src/libflake/flake/flakeref.cc 21 + +++ b/src/libflake/flake/flakeref.cc 22 + @@ -39,7 +39,7 @@ FlakeRef FlakeRef::resolve( 23 + ref<Store> store, 24 + const fetchers::RegistryFilter & filter) const 25 + { 26 + - auto [input2, extraAttrs] = lookupInRegistries(store, input, filter); 27 + + auto [input2, extraAttrs] = lookupInRegistries(store, input); 28 + return FlakeRef(std::move(input2), fetchers::maybeGetStrAttr(extraAttrs, "dir").value_or(subdir)); 29 + } 30 + 31 + diff --git a/tests/functional/flakes/flakes.sh b/tests/functional/flakes/flakes.sh 32 + index b67a0964a..d8c9f254d 100755 33 + --- a/tests/functional/flakes/flakes.sh 34 + +++ b/tests/functional/flakes/flakes.sh 35 + @@ -220,13 +220,6 @@ nix store gc 36 + nix registry list --flake-registry "file://$registry" --refresh | grepQuiet flake3 37 + mv "$registry.tmp" "$registry" 38 + 39 + -# Ensure that locking ignores the user registry. 40 + -mkdir -p "$TEST_HOME/.config/nix" 41 + -ln -sfn "$registry" "$TEST_HOME/.config/nix/registry.json" 42 + -nix flake metadata flake1 43 + -expectStderr 1 nix flake update --flake-registry '' --flake "$flake3Dir" | grepQuiet "cannot find flake 'flake:flake1' in the flake registries" 44 + -rm "$TEST_HOME/.config/nix/registry.json" 45 + - 46 + # Test whether flakes are registered as GC roots for offline use. 47 + # FIXME: use tarballs rather than git. 48 + rm -rf "$TEST_HOME/.cache" 49 + -- 50 + 2.49.0 51 +
+17 -1
pkgs/tools/security/ghidra/build.nix
··· 22 22 pname = "ghidra"; 23 23 version = "11.3.2"; 24 24 25 + isMacArm64 = stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64; 26 + 25 27 releaseName = "NIX"; 26 28 distroPrefix = "ghidra_${version}_${releaseName}"; 27 29 src = fetchFromGitHub { ··· 129 131 data = ./deps.json; 130 132 }; 131 133 132 - gradleFlags = [ "-Dorg.gradle.java.home=${openjdk21}" ]; 134 + gradleFlags = 135 + [ "-Dorg.gradle.java.home=${openjdk21}" ] 136 + ++ lib.optionals isMacArm64 [ 137 + # For some reason I haven't been able to figure out yet, ghidra builds for 138 + # arm64 seems to build the x64 binaries of the decompiler. These fail to 139 + # build due to trying to link the x64 object files with arm64 stdc++ 140 + # library, which obviously fails. 141 + # 142 + # Those binaries are entirely unnecessary anyways, since we're targeting 143 + # arm64 build here, so let's exclude them from the build. 144 + "-x" 145 + "Decompiler:linkSleighMac_x86_64Executable" 146 + "-x" 147 + "Decompiler:linkDecompileMac_x86_64Executable" 148 + ]; 133 149 134 150 preBuild = '' 135 151 export JAVA_TOOL_OPTIONS="-Duser.home=$NIX_BUILD_TOP/home"
+1 -1
pkgs/top-level/all-packages.nix
··· 14358 14358 inherit (darwin) DarwinTools; 14359 14359 }; 14360 14360 14361 - openimageio = callPackage ../development/libraries/openimageio { }; 14361 + openimageio_2 = callPackage ../by-name/op/openimageio/2.nix { }; 14362 14362 14363 14363 open-music-kontrollers = lib.recurseIntoAttrs { 14364 14364 eteroj = callPackage ../applications/audio/open-music-kontrollers/eteroj.nix { };